Bug 13679 - kernel oops seen frequently on a 9p filesystem
Summary: kernel oops seen frequently on a 9p filesystem
Status: RESOLVED OBSOLETE
Alias: None
Product: File System
Classification: Unclassified
Component: v9fs (show other bugs)
Hardware: All Linux
: P1 normal
Assignee: Eric Van Hensbergen
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-06-30 00:25 UTC by Abhishek Kulkarni
Modified: 2013-12-10 16:40 UTC (History)
2 users (show)

See Also:
Kernel Version: 2.6.30-rc4
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description Abhishek Kulkarni 2009-06-30 00:25:20 UTC
65414 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] BUG: unable to handle kernel paging request at ffae43d2
65415 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] IP: [<c02ad8e1>] memmove+0x21/0x50
65416 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] *pde = 0000f067 *pte = 00000000
65417 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Oops: 0002 [#5] SMP
65418 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] last sysfs file: /sys/devices/virtual/vc/vcsa6/dev
65419 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Modules linked in: 9p 9pnet binfmt_misc psmouse serio_raw pcspkr i2c_piix4 pcnet32 mii fbcon tileblit font bitblit softcursor i915 drm i2c_algo_bit intel_agp agpgart
65420 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009]
65421 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Pid: 3034, comm: foo Tainted: G      D    (2.6.30-rc4-9p #1) VirtualBox
65422 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] EIP: 0060:[<c02ad8e1>] EFLAGS: 00010616 CPU: 0
65423 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] EIP is at memmove+0x21/0x50
65424 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] EAX: ffae3000 EBX: 000013d3 ECX: 000013d3 EDX: ef9f401f
65425 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] ESI: ef9f53f1 EDI: ffae43d2 EBP: efa2bbd8 ESP: efa2bbcc
65426 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0069
65427 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Process foo (pid: 3034, ti=efa2a000 task=f73318e0 task.ti=efa2a000)
65428 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009] Stack:
65429 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009]  efa00048 ef914800 00000000 efa2bc14 f8caa465 f8caf658 00000bda 000013d3
65430 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009]  efa2bc24 efa2bc04 00000000 00001fe8 00000000 ffae3000 ef9f401f 00001000
65431 Jun 29 18:13:10 ubuntu kernel: [ 1613.532009]  00000000 00000000 efa2bc50 f8d81f1e 00001000 00000000 000013d3 00000006
65432 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] Call Trace:
65433 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<f8caa465>] ? p9_client_read+0xd5/0x200 [9pnet]
65434 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<f8d81f1e>] ? v9fs_file_readn+0x5e/0x100 [9p]
65435 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<f8d81be9>] ? v9fs_vfs_readpage+0x49/0xc0 [9p]
65436 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c019340f>] ? __do_page_cache_readahead+0x20f/0x230
65437 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c019347d>] ? do_page_cache_readahead+0x4d/0x70
65438 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c018c867>] ? filemap_fault+0x337/0x440
65439 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c018ffe0>] ? __alloc_pages_internal+0xc0/0x490
65440 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c019ff1b>] ? __do_fault+0x3b/0x420
65441 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c011fcb6>] ? pte_alloc_one+0x36/0x40
65442 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c01a1169>] ? handle_mm_fault+0x109/0x720
65443 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c047a293>] ? do_page_fault+0x123/0x2c0
65444 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c047a170>] ? do_page_fault+0x0/0x2c0
65445 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c047834a>] ? error_code+0x7a/0x80
65446 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c02ae4b3>] ? clear_user+0x43/0x60
65447 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c01efeb4>] ? padzero+0x24/0x40
65448 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c01f1675>] ? load_elf_binary+0x735/0x1570
65449 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c0120b71>] ? kunmap_atomic+0x61/0x70
65450 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c019e882>] ? follow_page+0x202/0x230
65451 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c01a1871>] ? __get_user_pages+0xf1/0x3a0
65452 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c019d80e>] ? kunmap_high+0x6e/0xa0
65453 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c02ae1c8>] ? copy_from_user+0x38/0x130
65454 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c01bf5ef>] ? search_binary_handler+0xbf/0x270
65455 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c01c0c92>] ? do_execve+0x242/0x320
65456 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c02ae115>] ? strncpy_from_user+0x35/0x60
65457 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c0101898>] ? sys_execve+0x28/0x60
65458 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009]  [<c010316c>] ? syscall_call+0x7/0xb
65459 Jun 29 18:13:11 ubuntu kernel: [ 1613.532009] Code: 00 00 00 00 8d bf 00 00 00 00 55 89 e5 83 ec 0c 39 d0 89 1c 24 89 cb 89 74 24 04 89 7c 24 08 72 21 8d 79 ff 8d 34 3a 8d 3c 38 fd <f3> a4 fc 8b 1c 24 8b 74 24 04 8b 7c 24       08 89 ec 5d c3 90 8d 74
65460 Jun 29 18:13:12 ubuntu kernel: [ 1613.532009] EIP: [<c02ad8e1>] memmove+0x21/0x50 SS:ESP 0069:efa2bbcc
65461 Jun 29 18:13:12 ubuntu kernel: [ 1613.532009] CR2: 00000000ffae43d2
65462 Jun 29 18:13:12 ubuntu kernel: [ 1613.532009] ---[ end trace 6d72d8ca2263339e ]---

If it helps, here's some more information:

This occurs when trying to execute any simple program involving buffer operations (memcpy, memmove, strcpy)

$./ufs &
$mount -t 9p 127.0.0.1 /mnt/xcpu/ -o port=564,access=any,uname=root,debug=0xffff

$uname -a
Linux ubuntu 2.6.30-rc4-9p #1 SMP Mon Jun 29 10:55:22 MDT 2009 i686 GNU/Linux

@cd /mnt/xcpu/home/adk9/
$cat foo.c
#include <stdlib.h>
#include <string.h>

#define BUFLEN 128

int main(int argc, char *argv[])
{
	static char buf1[BUFLEN];
	strncpy(buf1, "Hello", 5);
	return 0;
}

$./foo

Note You need to log in before you can comment on or make changes to this bug.