On 06/04/2012 07:29 PM, Richard Weinberger wrote:

> Am 04.06.2012 18:27, schrieb Boaz Harrosh:
>> On 06/04/2012 06:42 PM, Richard Weinberger wrote:
>>
>>> Am 04.06.2012 17:41, schrieb Jiri Slaby:
>>>> Hmm, I remember. I suggest you to split the patch into several pieces.
>>>> For example moving the code from ->open into ->install can be done
>>>> separately. Otherwise it's hard to tell what's wrong with the patch as
>>>> a whole.
>>>>
>>>> Also, it would be good to see the patch rebased on the top of my
>>>> patch, because tty_port_set/get pieces would be gone from your patch too.
>>>
>>> Okay, I'll redo it!
>>> I've a much cleaner version in my local queue.
>>>
>>
>>
>> Can you send it my way, I'm still running broken, 3.4 Based ?
>>
> 
> Can you please first give Jiri's patches a try?
> 
> [PATCH 12/24] TTY: um/line, add tty_port
> [PATCH 13/24] TTY: um/line, use tty from tty_port
> 


No still crashing the same, way. BTW I do not have a systemd Distro. It's
plain old FC12. Though in the lab I have the same crash with FC15.

The crash is immediately after I login at the initial prompt. (every time)

Here is the crash print, what ever that is worth in UML.
(Can we make the crash dump stack trace a bit less terrible?)

----
Modules linked in: nfsd nfs lockd auth_rpcgss nfs_acl sunrpc osd libosd ipv6 
binfmt_misc [last unloaded: scsi_wait_scan]
Pid: 1243, comm: login Not tainted 3.4.0-pnfs+
RIP: 0033:[<00000000601bbf7f>]
RSP: 0000000077ed7ad0  EFLAGS: 00010202
RAX: 00000000601bbf6b RBX: 00000000000001d8 RCX: 000000000000000b
RDX: 00000000600206dc RSI: 00000000601c4c14 RDI: 00000000000001d8
RBP: 0000000077ed7b20 R08: 0000000000000000 R09: 0000000077ed7c30
R10: 0000000000000000 R11: 0000003ea3882a83 R12: 0000000000000000
R13: 0000000000000fff R14: 0000000000000002 R15: 0000000077ed7c30
Call Trace: 
603556c8:  [<6001c6ac>] segv+0x2f6/0x31c
603556e0:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
60355708:  [<6007d89f>] rcu_sched_qs+0xb8/0xbc
60355740:  [<600191c8>] do_IRQ+0x0/0x54
60355748:  [<6002bdf3>] os_waiting_for_events+0x0/0xb9
603557a8:  [<60018d98>] to_irq_stack+0x0/0xa1
603557b8:  [<6001c75e>] segv_handler+0x8c/0x96
603557d8:  [<600194c9>] sigio_handler+0x88/0x93
60355808:  [<6002d733>] sig_handler_common+0x9f/0xb3
60355860:  [<601bbf6b>] do_raw_spin_lock+0x0/0x121
60355870:  [<600206dc>] line_chars_in_buffer+0x0/0x82
60355878:  [<601c4c14>] tty_chars_in_buffer+0x0/0x17
60355890:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
603558b0:  [<601b331d>] radix_tree_lookup_slot+0x4d/0x5c
60355920:  [<6001669c>] _einittext+0x18d1/0x2b55
60355930:  [<600161a8>] _einittext+0x13dd/0x2b55
60355a08:  [<6001669c>] _einittext+0x18d1/0x2b55
60355aa0:  [<60017e28>] _init+0x508/0x870
60355aa8:  [<60018d98>] to_irq_stack+0x0/0xa1
60355b28:  [<60017e28>] _init+0x508/0x870
60355b38:  [<6002d906>] sig_handler+0x4c/0x5e
60355b58:  [<6002db99>] hard_handler+0x89/0xcb
60355c30:  [<601c4c14>] tty_chars_in_buffer+0x0/0x17
60355c48:  [<600206dc>] line_chars_in_buffer+0x0/0x82
60355c50:  [<601bbf6b>] do_raw_spin_lock+0x0/0x121
60355c68:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121

Kernel panic - not syncing: Kernel mode fault at addr 0x1dc, ip 0x601bbf7f
Call Trace: 
603555b8:  [<60280af4>] panic+0x170/0x2e0
603555f0:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
603555f8:  [<60280984>] panic+0x0/0x2e0
60355610:  [<6006d5fd>] __module_text_address+0x14/0x5a
60355628:  [<6006d653>] is_module_text_address+0x10/0x18
60355638:  [<60050ced>] __kernel_text_address+0x97/0x9d
60355640:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
60355658:  [<6001afc0>] show_trace+0xd4/0xdf
603556c8:  [<6001c6d2>] segv_handler+0x0/0x96
603556e0:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
60355708:  [<6007d89f>] rcu_sched_qs+0xb8/0xbc
60355740:  [<600191c8>] do_IRQ+0x0/0x54
60355748:  [<6002bdf3>] os_waiting_for_events+0x0/0xb9
603557a8:  [<60018d98>] to_irq_stack+0x0/0xa1
603557b8:  [<6001c75e>] segv_handler+0x8c/0x96
603557d8:  [<600194c9>] sigio_handler+0x88/0x93
60355808:  [<6002d733>] sig_handler_common+0x9f/0xb3
60355860:  [<601bbf6b>] do_raw_spin_lock+0x0/0x121
60355870:  [<600206dc>] line_chars_in_buffer+0x0/0x82
60355878:  [<601c4c14>] tty_chars_in_buffer+0x0/0x17
60355890:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
603558b0:  [<601b331d>] radix_tree_lookup_slot+0x4d/0x5c
60355920:  [<6001669c>] _einittext+0x18d1/0x2b55
60355930:  [<600161a8>] _einittext+0x13dd/0x2b55
60355a08:  [<6001669c>] _einittext+0x18d1/0x2b55
60355aa0:  [<60017e28>] _init+0x508/0x870
60355aa8:  [<60018d98>] to_irq_stack+0x0/0xa1
60355b28:  [<60017e28>] _init+0x508/0x870
60355b38:  [<6002d906>] sig_handler+0x4c/0x5e
60355b58:  [<6002db99>] hard_handler+0x89/0xcb
60355c30:  [<601c4c14>] tty_chars_in_buffer+0x0/0x17
60355c48:  [<600206dc>] line_chars_in_buffer+0x0/0x82
60355c50:  [<601bbf6b>] do_raw_spin_lock+0x0/0x121
60355c68:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121


Modules linked in: nfsd nfs lockd auth_rpcgss nfs_acl sunrpc osd libosd ipv6 
binfmt_misc [last unloaded: scsi_wait_scan]
Pid: 1243, comm: login Not tainted 3.4.0-pnfs+
RIP: 0033:[<00000030914d8318>]
RSP: 0000007fbfe72740  EFLAGS: 00000202
RAX: ffffffffffffffda RBX: 0000000000000010 RCX: ffffffffffffffff
RDX: 0000007fbfe72710 RSI: 0000000000005404 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000007fbfe74c40 R09: 0000000000000000
R10: 0000007fbfe72710 R11: 0000000000000202 R12: 0000007fbfe74c40
R13: 0000007fbfe72ac7 R14: 0000007fbfe72a50 R15: 0000000000000000
Call Trace: 
60355538:  [<6001c8c5>] panic_exit+0x3e/0x5c
60355540:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
60355568:  [<60058a76>] notifier_call_chain+0x32/0x5e
603555a8:  [<60058ad2>] atomic_notifier_call_chain+0x1a/0x1c
603555b8:  [<60280b24>] panic+0x1a0/0x2e0
603555f0:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
603555f8:  [<60280984>] panic+0x0/0x2e0
60355610:  [<6006d5fd>] __module_text_address+0x14/0x5a
60355628:  [<6006d653>] is_module_text_address+0x10/0x18
60355638:  [<60050ced>] __kernel_text_address+0x97/0x9d
60355640:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
60355658:  [<6001afc0>] show_trace+0xd4/0xdf
603556c8:  [<6001c6d2>] segv_handler+0x0/0x96
603556e0:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
60355708:  [<6007d89f>] rcu_sched_qs+0xb8/0xbc
60355740:  [<600191c8>] do_IRQ+0x0/0x54
60355748:  [<6002bdf3>] os_waiting_for_events+0x0/0xb9
603557a8:  [<60018d98>] to_irq_stack+0x0/0xa1
603557b8:  [<6001c75e>] segv_handler+0x8c/0x96
603557d8:  [<600194c9>] sigio_handler+0x88/0x93
60355808:  [<6002d733>] sig_handler_common+0x9f/0xb3
60355860:  [<601bbf6b>] do_raw_spin_lock+0x0/0x121
60355870:  [<600206dc>] line_chars_in_buffer+0x0/0x82
60355878:  [<601c4c14>] tty_chars_in_buffer+0x0/0x17
60355890:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
603558b0:  [<601b331d>] radix_tree_lookup_slot+0x4d/0x5c
60355920:  [<6001669c>] _einittext+0x18d1/0x2b55
60355930:  [<600161a8>] _einittext+0x13dd/0x2b55
60355a08:  [<6001669c>] _einittext+0x18d1/0x2b55
60355aa0:  [<60017e28>] _init+0x508/0x870
60355aa8:  [<60018d98>] to_irq_stack+0x0/0xa1
60355b28:  [<60017e28>] _init+0x508/0x870
60355b38:  [<6002d906>] sig_handler+0x4c/0x5e
60355b58:  [<6002db99>] hard_handler+0x89/0xcb
60355c30:  [<601c4c14>] tty_chars_in_buffer+0x0/0x17
60355c48:  [<600206dc>] line_chars_in_buffer+0x0/0x82
60355c50:  [<601bbf6b>] do_raw_spin_lock+0x0/0x121
60355c68:  [<601bbf7f>] do_raw_spin_lock+0x14/0x121
----

BTW I suspect that UML is unable to catch an invalid pointer execution
and just dumps core and exits. Let me explain.

A:
        foo == ((foo_t *)NULL)->member_not_first
 A NULL access backtrace will be generated before UML exit

but ..
B: a function call
        ((foo_op *)NULL)->function_member_not_first(...);

 Will crap out without any kind of stack trace.

Is that possible?

Thanks
Boaz

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
User-mode-linux-devel mailing list
User-mode-linux-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel

Reply via email to