public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* general protection fault: 0000 [#1] SMP
@ 2010-07-03 22:59 Justin P. Mattock
  0 siblings, 0 replies; 9+ messages in thread
From: Justin P. Mattock @ 2010-07-03 22:59 UTC (permalink / raw)
  To: Linux Kernel Mailing List

the kernel barfed this up, on waking up from suspend.. I've tried to 
reproduce this but haven't.(will see if I can, then will do a bisect)
also I've had to revert commit: 6a4f3b52377 due to another issue
so maybe that is a factor in this..

[10384.818511] general protection fault: 0000 [#1] SMP
[10384.818517] last sysfs file: /sys/devices/platform/applesmc.768/light
[10384.818520] CPU 1
[10384.818522] Modules linked in: radeon ttm drm_kms_helper drm sco xcbc 
bnep rmd160 sha512_generic xt_tcpudp ipt_LOG iptable_nat nf_nat xt_state 
nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 
iptable_filter ip_tables x_tables ath9k ath9k_common firewire_ohci 
firewire_core battery ath9k_hw ac video evdev ohci1394 sky2 ath joydev 
button thermal i2c_i801 hid_magicmouse aes_x86_64 lzo lzo_compress zlib 
ipcomp xfrm_ipcomp crypto_null sha256_generic cbc des_generic cast5 
blowfish serpent camellia twofish twofish_common ctr ah4 esp4 authenc 
raw1394 ieee1394 uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap 
bluetooth coretemp acpi_cpufreq processor mperf appletouch applesmc uvcvideo
[10384.818594]
[10384.818598] Pid: 409, comm: kswapd0 Not tainted 
2.6.35-rc3-00398-g5a847c7-dirty #13 Mac-F42187C8/MacBookPro2,2
[10384.818601] RIP: 0010:[<ffffffff810b7487>]  [<ffffffff810b7487>] 
find_get_pages+0x62/0xc0
[10384.818611] RSP: 0018:ffff88003e011b40  EFLAGS: 00010293
[10384.818614] RAX: ffff88000008f000 RBX: ffff88003e011bf0 RCX: 
0000000000000003
[10384.818617] RDX: ffff88003e011c08 RSI: 0000000000000001 RDI: 
8ed88ec88ce88b66
[10384.818620] RBP: ffff88003e011b90 R08: 8ed88ec88ce88b6e R09: 
0000000000000002
[10384.818623] R10: ffff88000008f050 R11: ffff88000008f050 R12: 
ffffffffffffffff
[10384.818626] R13: 000000000000000e R14: 0000000000000000 R15: 
0000000000000003
[10384.818629] FS:  0000000000000000(0000) GS:ffff880001b00000(0000) 
knlGS:0000000000000000
[10384.818632] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[10384.818635] CR2: 00007f1a8989b000 CR3: 000000000166d000 CR4: 
00000000000006e0
[10384.818638] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
[10384.818641] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
0000000000000400
[10384.818644] Process kswapd0 (pid: 409, threadinfo ffff88003e010000, 
task ffff88003eded490)
[10384.818646] Stack:
[10384.818648]  ffff88003e011b70 ffffffff810c0e85 ffff880018a2afe0 
0000000e0001fad8
[10384.818652] <0> ffff880018a30c68 ffff88003e011be0 0000000000000000 
ffff88003e011be0
[10384.818657] <0> ffffffffffffffff ffff880018a2afd8 ffff88003e011bb0 
ffffffff810bed06
[10384.818663] Call Trace:
[10384.818669]  [<ffffffff810c0e85>] ? __remove_mapping+0xa5/0xbe
[10384.818674]  [<ffffffff810bed06>] pagevec_lookup+0x1d/0x26
[10384.818678]  [<ffffffff810bfb78>] invalidate_mapping_pages+0xe7/0x10b
[10384.818683]  [<ffffffff810fdc4a>] shrink_icache_memory+0x10a/0x227
[10384.818687]  [<ffffffff810c21fc>] shrink_slab+0xd6/0x147
[10384.818691]  [<ffffffff810c25d2>] balance_pgdat+0x365/0x5b4
[10384.818695]  [<ffffffff810c29c7>] kswapd+0x1a6/0x1bc
[10384.818700]  [<ffffffff81070d75>] ? autoremove_wake_function+0x0/0x34
[10384.818704]  [<ffffffff810c2821>] ? kswapd+0x0/0x1bc
[10384.818707]  [<ffffffff81070953>] kthread+0x7a/0x82
[10384.818712]  [<ffffffff81027264>] kernel_thread_helper+0x4/0x10
[10384.818716]  [<ffffffff810708d9>] ? kthread+0x0/0x82
[10384.818719]  [<ffffffff81027260>] ? kernel_thread_helper+0x0/0x10
[10384.818721] Code: f5 d0 11 00 48 89 da 89 45 cc 31 c9 eb 64 48 8b 02 
48 8b 38 40 f6 c7 01 49 0f 45 fc 48 85 ff 74 4b 48 83 ff ff 74 c8 4c 8d 
47 08 <8b> 77 08 85 f6 74 dc 44 8d 4e 01 89 f0 f0 45 0f b1 08 39 f0 74
[10384.818762] RIP  [<ffffffff810b7487>] find_get_pages+0x62/0xc0
[10384.818767]  RSP <ffff88003e011b40>
[10384.818770] ---[ end trace 594fde37483e4533 ]---



Justin P. Mattock

^ permalink raw reply	[flat|nested] 9+ messages in thread

* general protection fault: 0000 [#1] SMP
@ 2010-11-20 16:35 Justin Mattock
  2010-11-20 22:28 ` Jesper Juhl
  0 siblings, 1 reply; 9+ messages in thread
From: Justin Mattock @ 2010-11-20 16:35 UTC (permalink / raw)
  To: Linux Kernel Mailing List

Ive seen this before, but could not reproduce for a bisect.. basically
what I remember doing
was building webkit(let sit and compile) passed out, woke up at 5AM
closed the lid on the machine,few hrs later
woke up, went for a run, came back opened the lid and this:

[43925.668053] general protection fault: 0000 [#1] SMP
[43925.668059] last sysfs file: /sys/devices/platform/applesmc.768/light
[43925.668061] CPU 0
[43925.668063] Modules linked in: firewire_sbp2 radeon sco bnep ttm
drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
sha256_generic cbc des_generic cast5 blowfish serpent camellia
twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
acpi_cpufreq processor mperf appletouch applesmc uvcvideo
[43925.668120]
[43925.668123] Pid: 27262, comm: make Not tainted
2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
[43925.668126] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
inode_has_perm+0x53/0x6a
[43925.668135] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
[43925.668137] RAX: ffff88003826a208 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
[43925.668140] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff88002feacc00
[43925.668142] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
[43925.668145] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
[43925.668147] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
[43925.668150] FS:  00007f4f786b3700(0000) GS:ffff88003ee00000(0000)
knlGS:0000000000000000
[43925.668153] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[43925.668155] CR2: 00007f4f78637000 CR3: 00000000383ac000 CR4: 00000000000006e0
[43925.668158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[43925.668161] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[43925.668163] Process make (pid: 27262, threadinfo ffff88003c5a4000,
task ffff880001afb410)
[43925.668165] Stack:
[43925.668167]  ffff880038a98060 0000000000000000 ffff88003c5a5c48
ffffffff81182b7c
[43925.668172]  ffff88003cab2688 ffff880024da9990 ffff88003caa18d8
ffff880038a98060
[43925.668177]  ffff880024da98b0 ffffea0000a54940 ffff88003c5a5c78
ffff88003d402500
[43925.668182] Call Trace:
[43925.668189]  [<ffffffff81182b7c>] ? jbd2_journal_stop+0x21e/0x230
[43925.668193]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
[43925.668196]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
[43925.668201]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
[43925.668205]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
[43925.668211]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
[43925.668215]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
[43925.668218]  [<ffffffff81102e86>] may_open+0x9e/0x11e
[43925.668221]  [<ffffffff8110373e>] do_last+0x542/0x6fa
[43925.668225]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
[43925.668228]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
[43925.668232]  [<ffffffff81103958>] ? getname+0x2c/0x1be
[43925.668236]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
[43925.668240]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
[43925.668243]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
[43925.668248]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
[43925.668250] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
48 89 75 90 <41> 0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
ff ff
[43925.668288] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
[43925.668291]  RSP <ffff88003c5a5bc8>
[43925.668295] ---[ end trace 75bdddc506717838 ]---
[43934.866252] general protection fault: 0000 [#2] SMP
[43934.866257] last sysfs file: /sys/devices/platform/applesmc.768/light
[43934.866260] CPU 0
[43934.866261] Modules linked in: firewire_sbp2 radeon sco bnep ttm
drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
sha256_generic cbc des_generic cast5 blowfish serpent camellia
twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
acpi_cpufreq processor mperf appletouch applesmc uvcvideo
[43934.866318]
[43934.866321] Pid: 27283, comm: make Tainted: G      D
2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
[43934.866324] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
inode_has_perm+0x53/0x6a
[43934.866334] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
[43934.866336] RAX: ffff88003807a958 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
[43934.866339] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff880034b01700
[43934.866341] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
[43934.866343] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
[43934.866346] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
[43934.866349] FS:  00007fdf0a661700(0000) GS:ffff88003ee00000(0000)
knlGS:0000000000000000
[43934.866352] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[43934.866354] CR2: 00007fdf0a5e5000 CR3: 0000000029800000 CR4: 00000000000006e0
[43934.866357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[43934.866359] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[43934.866362] Process make (pid: 27283, threadinfo ffff88003c5a4000,
task ffff880001afb410)
[43934.866364] Stack:
[43934.866366]  ffff88002f398a50 ffff880024da9990 000000003c5a5c78
ffffffff81810be8
[43934.866371]  0020000000000001 0000000000000001 0000000000001000
ffff880037bc0a00
[43934.866375]  0000000000001000 ffffea0000a54940 ffff88003c5a5d18
ffff88003d402500
[43934.866380] Call Trace:
[43934.866385]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
[43934.866389]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
[43934.866395]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
[43934.866398]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
[43934.866404]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
[43934.866409]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
[43934.866412]  [<ffffffff81102e86>] may_open+0x9e/0x11e
[43934.866415]  [<ffffffff8110373e>] do_last+0x542/0x6fa
[43934.866419]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
[43934.866422]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
[43934.866426]  [<ffffffff81103958>] ? getname+0x2c/0x1be
[43934.866430]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
[43934.866433]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
[43934.866437]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
[43934.866441]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
[43934.866443] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
48 89 75 90 <41> 0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
ff ff
[43934.866481] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
[43934.866484]  RSP <ffff88003c5a5bc8>
[43934.866488] ---[ end trace 75bdddc506717839 ]---



system seems usable after this... just trying to reproduce for a
bisect seems impossible
at this point(If I can I will post)

-- 
Justin P. Mattock

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: general protection fault: 0000 [#1] SMP
  2010-11-20 16:35 Justin Mattock
@ 2010-11-20 22:28 ` Jesper Juhl
  2010-11-20 22:32   ` Jesper Juhl
  0 siblings, 1 reply; 9+ messages in thread
From: Jesper Juhl @ 2010-11-20 22:28 UTC (permalink / raw)
  To: Justin Mattock; +Cc: Linux Kernel Mailing List

On Sat, 20 Nov 2010, Justin Mattock wrote:

> Ive seen this before, but could not reproduce for a bisect.. basically
> what I remember doing
> was building webkit(let sit and compile) passed out, woke up at 5AM
> closed the lid on the machine,few hrs later
> woke up, went for a run, came back opened the lid and this:
> 
> [43925.668053] general protection fault: 0000 [#1] SMP
> [43925.668059] last sysfs file: /sys/devices/platform/applesmc.768/light
> [43925.668061] CPU 0
> [43925.668063] Modules linked in: firewire_sbp2 radeon sco bnep ttm
> drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
> nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
> iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
> sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
> i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
> sha256_generic cbc des_generic cast5 blowfish serpent camellia
> twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
> uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
> acpi_cpufreq processor mperf appletouch applesmc uvcvideo
> [43925.668120]
> [43925.668123] Pid: 27262, comm: make Not tainted
> 2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
> [43925.668126] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
> inode_has_perm+0x53/0x6a
> [43925.668135] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
> [43925.668137] RAX: ffff88003826a208 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
> [43925.668140] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff88002feacc00
> [43925.668142] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
> [43925.668145] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
> [43925.668147] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
> [43925.668150] FS:  00007f4f786b3700(0000) GS:ffff88003ee00000(0000)
> knlGS:0000000000000000
> [43925.668153] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [43925.668155] CR2: 00007f4f78637000 CR3: 00000000383ac000 CR4: 00000000000006e0
> [43925.668158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [43925.668161] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [43925.668163] Process make (pid: 27262, threadinfo ffff88003c5a4000,
> task ffff880001afb410)
> [43925.668165] Stack:
> [43925.668167]  ffff880038a98060 0000000000000000 ffff88003c5a5c48
> ffffffff81182b7c
> [43925.668172]  ffff88003cab2688 ffff880024da9990 ffff88003caa18d8
> ffff880038a98060
> [43925.668177]  ffff880024da98b0 ffffea0000a54940 ffff88003c5a5c78
> ffff88003d402500
> [43925.668182] Call Trace:
> [43925.668189]  [<ffffffff81182b7c>] ? jbd2_journal_stop+0x21e/0x230
> [43925.668193]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
> [43925.668196]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
> [43925.668201]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> [43925.668205]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
> [43925.668211]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
> [43925.668215]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
> [43925.668218]  [<ffffffff81102e86>] may_open+0x9e/0x11e
> [43925.668221]  [<ffffffff8110373e>] do_last+0x542/0x6fa
> [43925.668225]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
> [43925.668228]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> [43925.668232]  [<ffffffff81103958>] ? getname+0x2c/0x1be
> [43925.668236]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
> [43925.668240]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
> [43925.668243]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
> [43925.668248]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
> [43925.668250] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
> ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
> 48 89 75 90 <41> 0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
> ff ff
> [43925.668288] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
> [43925.668291]  RSP <ffff88003c5a5bc8>
> [43925.668295] ---[ end trace 75bdddc506717838 ]---
> [43934.866252] general protection fault: 0000 [#2] SMP
> [43934.866257] last sysfs file: /sys/devices/platform/applesmc.768/light
> [43934.866260] CPU 0
> [43934.866261] Modules linked in: firewire_sbp2 radeon sco bnep ttm
> drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
> nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
> iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
> sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
> i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
> sha256_generic cbc des_generic cast5 blowfish serpent camellia
> twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
> uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
> acpi_cpufreq processor mperf appletouch applesmc uvcvideo
> [43934.866318]
> [43934.866321] Pid: 27283, comm: make Tainted: G      D
> 2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
> [43934.866324] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
> inode_has_perm+0x53/0x6a
> [43934.866334] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
> [43934.866336] RAX: ffff88003807a958 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
> [43934.866339] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff880034b01700
> [43934.866341] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
> [43934.866343] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
> [43934.866346] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
> [43934.866349] FS:  00007fdf0a661700(0000) GS:ffff88003ee00000(0000)
> knlGS:0000000000000000
> [43934.866352] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [43934.866354] CR2: 00007fdf0a5e5000 CR3: 0000000029800000 CR4: 00000000000006e0
> [43934.866357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [43934.866359] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [43934.866362] Process make (pid: 27283, threadinfo ffff88003c5a4000,
> task ffff880001afb410)
> [43934.866364] Stack:
> [43934.866366]  ffff88002f398a50 ffff880024da9990 000000003c5a5c78
> ffffffff81810be8
> [43934.866371]  0020000000000001 0000000000000001 0000000000001000
> ffff880037bc0a00
> [43934.866375]  0000000000001000 ffffea0000a54940 ffff88003c5a5d18
> ffff88003d402500
> [43934.866380] Call Trace:
> [43934.866385]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
> [43934.866389]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
> [43934.866395]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> [43934.866398]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
> [43934.866404]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
> [43934.866409]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
> [43934.866412]  [<ffffffff81102e86>] may_open+0x9e/0x11e
> [43934.866415]  [<ffffffff8110373e>] do_last+0x542/0x6fa
> [43934.866419]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
> [43934.866422]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> [43934.866426]  [<ffffffff81103958>] ? getname+0x2c/0x1be
> [43934.866430]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
> [43934.866433]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
> [43934.866437]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
> [43934.866441]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
> [43934.866443] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
> ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
> 48 89 75 90 <41> 0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
> ff ff
> [43934.866481] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
> [43934.866484]  RSP <ffff88003c5a5bc8>
> [43934.866488] ---[ end trace 75bdddc506717839 ]---
> 
[...]

Hmm, ok, I have no idea about the root cause of this problem, but I did 
notice one thing about selinux_cred_free() that's different than most 
other freeing functions in the kernel. It does not accept a NULL value.
Most other freeing functions will just return if passed NULL, but 
selinux_cred_free() will crash.
I wonder if it would make sense to add a NULL 'short circuit' to that 
function? If so, please pick up the patch below.


Signed-off-by: Jesper Juhl <jj@chaosbits.net>
---
 hooks.c |    6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 65fa8bf..d088532 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -3193,11 +3193,11 @@ static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp)
  */
 static void selinux_cred_free(struct cred *cred)
 {
-	struct task_security_struct *tsec = cred->security;
-
+	if (!cred)
+		return;
 	BUG_ON((unsigned long) cred->security < PAGE_SIZE);
 	cred->security = (void *) 0x7UL;
-	kfree(tsec);
+	kfree(cred->security);
 }
 
 /*


-- 
Jesper Juhl <jj@chaosbits.net>            http://www.chaosbits.net/
Don't top-post http://www.catb.org/~esr/jargon/html/T/top-post.html
Plain text mails only, please.


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: general protection fault: 0000 [#1] SMP
  2010-11-20 22:28 ` Jesper Juhl
@ 2010-11-20 22:32   ` Jesper Juhl
  2010-11-20 23:21     ` Justin P. Mattock
  2010-11-22 19:01     ` Justin P. Mattock
  0 siblings, 2 replies; 9+ messages in thread
From: Jesper Juhl @ 2010-11-20 22:32 UTC (permalink / raw)
  To: Justin Mattock; +Cc: Linux Kernel Mailing List

On Sat, 20 Nov 2010, Jesper Juhl wrote:

> On Sat, 20 Nov 2010, Justin Mattock wrote:
> 
> > Ive seen this before, but could not reproduce for a bisect.. basically
> > what I remember doing
> > was building webkit(let sit and compile) passed out, woke up at 5AM
> > closed the lid on the machine,few hrs later
> > woke up, went for a run, came back opened the lid and this:
> > 
> > [43925.668053] general protection fault: 0000 [#1] SMP
> > [43925.668059] last sysfs file: /sys/devices/platform/applesmc.768/light
> > [43925.668061] CPU 0
> > [43925.668063] Modules linked in: firewire_sbp2 radeon sco bnep ttm
> > drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
> > nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
> > iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
> > sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
> > i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
> > sha256_generic cbc des_generic cast5 blowfish serpent camellia
> > twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
> > uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
> > acpi_cpufreq processor mperf appletouch applesmc uvcvideo
> > [43925.668120]
> > [43925.668123] Pid: 27262, comm: make Not tainted
> > 2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
> > [43925.668126] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
> > inode_has_perm+0x53/0x6a
> > [43925.668135] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
> > [43925.668137] RAX: ffff88003826a208 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
> > [43925.668140] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff88002feacc00
> > [43925.668142] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
> > [43925.668145] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
> > [43925.668147] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
> > [43925.668150] FS:  00007f4f786b3700(0000) GS:ffff88003ee00000(0000)
> > knlGS:0000000000000000
> > [43925.668153] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [43925.668155] CR2: 00007f4f78637000 CR3: 00000000383ac000 CR4: 00000000000006e0
> > [43925.668158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > [43925.668161] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > [43925.668163] Process make (pid: 27262, threadinfo ffff88003c5a4000,
> > task ffff880001afb410)
> > [43925.668165] Stack:
> > [43925.668167]  ffff880038a98060 0000000000000000 ffff88003c5a5c48
> > ffffffff81182b7c
> > [43925.668172]  ffff88003cab2688 ffff880024da9990 ffff88003caa18d8
> > ffff880038a98060
> > [43925.668177]  ffff880024da98b0 ffffea0000a54940 ffff88003c5a5c78
> > ffff88003d402500
> > [43925.668182] Call Trace:
> > [43925.668189]  [<ffffffff81182b7c>] ? jbd2_journal_stop+0x21e/0x230
> > [43925.668193]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
> > [43925.668196]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
> > [43925.668201]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> > [43925.668205]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
> > [43925.668211]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
> > [43925.668215]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
> > [43925.668218]  [<ffffffff81102e86>] may_open+0x9e/0x11e
> > [43925.668221]  [<ffffffff8110373e>] do_last+0x542/0x6fa
> > [43925.668225]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
> > [43925.668228]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> > [43925.668232]  [<ffffffff81103958>] ? getname+0x2c/0x1be
> > [43925.668236]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
> > [43925.668240]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
> > [43925.668243]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
> > [43925.668248]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
> > [43925.668250] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
> > ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
> > 48 89 75 90 <41> 0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
> > ff ff
> > [43925.668288] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
> > [43925.668291]  RSP <ffff88003c5a5bc8>
> > [43925.668295] ---[ end trace 75bdddc506717838 ]---
> > [43934.866252] general protection fault: 0000 [#2] SMP
> > [43934.866257] last sysfs file: /sys/devices/platform/applesmc.768/light
> > [43934.866260] CPU 0
> > [43934.866261] Modules linked in: firewire_sbp2 radeon sco bnep ttm
> > drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
> > nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
> > iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
> > sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
> > i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
> > sha256_generic cbc des_generic cast5 blowfish serpent camellia
> > twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
> > uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
> > acpi_cpufreq processor mperf appletouch applesmc uvcvideo
> > [43934.866318]
> > [43934.866321] Pid: 27283, comm: make Tainted: G      D
> > 2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
> > [43934.866324] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
> > inode_has_perm+0x53/0x6a
> > [43934.866334] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
> > [43934.866336] RAX: ffff88003807a958 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
> > [43934.866339] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff880034b01700
> > [43934.866341] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
> > [43934.866343] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
> > [43934.866346] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
> > [43934.866349] FS:  00007fdf0a661700(0000) GS:ffff88003ee00000(0000)
> > knlGS:0000000000000000
> > [43934.866352] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> > [43934.866354] CR2: 00007fdf0a5e5000 CR3: 0000000029800000 CR4: 00000000000006e0
> > [43934.866357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > [43934.866359] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > [43934.866362] Process make (pid: 27283, threadinfo ffff88003c5a4000,
> > task ffff880001afb410)
> > [43934.866364] Stack:
> > [43934.866366]  ffff88002f398a50 ffff880024da9990 000000003c5a5c78
> > ffffffff81810be8
> > [43934.866371]  0020000000000001 0000000000000001 0000000000001000
> > ffff880037bc0a00
> > [43934.866375]  0000000000001000 ffffea0000a54940 ffff88003c5a5d18
> > ffff88003d402500
> > [43934.866380] Call Trace:
> > [43934.866385]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
> > [43934.866389]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
> > [43934.866395]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> > [43934.866398]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
> > [43934.866404]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
> > [43934.866409]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
> > [43934.866412]  [<ffffffff81102e86>] may_open+0x9e/0x11e
> > [43934.866415]  [<ffffffff8110373e>] do_last+0x542/0x6fa
> > [43934.866419]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
> > [43934.866422]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> > [43934.866426]  [<ffffffff81103958>] ? getname+0x2c/0x1be
> > [43934.866430]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
> > [43934.866433]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
> > [43934.866437]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
> > [43934.866441]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
> > [43934.866443] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
> > ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
> > 48 89 75 90 <41> 0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
> > ff ff
> > [43934.866481] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
> > [43934.866484]  RSP <ffff88003c5a5bc8>
> > [43934.866488] ---[ end trace 75bdddc506717839 ]---
> > 
> [...]
> 
> Hmm, ok, I have no idea about the root cause of this problem, but I did 
> notice one thing about selinux_cred_free() that's different than most 
> other freeing functions in the kernel. It does not accept a NULL value.
> Most other freeing functions will just return if passed NULL, but 
> selinux_cred_free() will crash.
> I wonder if it would make sense to add a NULL 'short circuit' to that 
> function? If so, please pick up the patch below.
> 
> 
> Signed-off-by: Jesper Juhl <jj@chaosbits.net>
> ---
>  hooks.c |    6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
> 
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index 65fa8bf..d088532 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -3193,11 +3193,11 @@ static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp)
>   */
>  static void selinux_cred_free(struct cred *cred)
>  {
> -	struct task_security_struct *tsec = cred->security;
> -
> +	if (!cred)
> +		return;
>  	BUG_ON((unsigned long) cred->security < PAGE_SIZE);
>  	cred->security = (void *) 0x7UL;
> -	kfree(tsec);
> +	kfree(cred->security);
>  }
>  
>  /*
> 

Arrgh, sent the wrong (early version) patch. This is what it should have 
been:


Signed-off-by: Jesper Juhl <jj@chaosbits.net>
---
 hooks.c |    5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 65fa8bf..00f28dc 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -3193,9 +3193,12 @@ static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp)
  */
 static void selinux_cred_free(struct cred *cred)
 {
-	struct task_security_struct *tsec = cred->security;
+	struct task_security_struct *tsec;
 
+	if (!cred)
+		return;
 	BUG_ON((unsigned long) cred->security < PAGE_SIZE);
+	tsec = cred->security;
 	cred->security = (void *) 0x7UL;
 	kfree(tsec);
 }



-- 
Jesper Juhl <jj@chaosbits.net>            http://www.chaosbits.net/
Don't top-post http://www.catb.org/~esr/jargon/html/T/top-post.html
Plain text mails only, please.


^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: general protection fault: 0000 [#1] SMP
  2010-11-20 22:32   ` Jesper Juhl
@ 2010-11-20 23:21     ` Justin P. Mattock
  2010-11-22 19:01     ` Justin P. Mattock
  1 sibling, 0 replies; 9+ messages in thread
From: Justin P. Mattock @ 2010-11-20 23:21 UTC (permalink / raw)
  To: Jesper Juhl; +Cc: Linux Kernel Mailing List

On 11/20/2010 02:32 PM, Jesper Juhl wrote:
> On Sat, 20 Nov 2010, Jesper Juhl wrote:
>
>> On Sat, 20 Nov 2010, Justin Mattock wrote:
>>
>>> Ive seen this before, but could not reproduce for a bisect.. basically
>>> what I remember doing
>>> was building webkit(let sit and compile) passed out, woke up at 5AM
>>> closed the lid on the machine,few hrs later
>>> woke up, went for a run, came back opened the lid and this:
>>>
>>> [43925.668053] general protection fault: 0000 [#1] SMP
>>> [43925.668059] last sysfs file: /sys/devices/platform/applesmc.768/light
>>> [43925.668061] CPU 0
>>> [43925.668063] Modules linked in: firewire_sbp2 radeon sco bnep ttm
>>> drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
>>> nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
>>> iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
>>> sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
>>> i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
>>> sha256_generic cbc des_generic cast5 blowfish serpent camellia
>>> twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
>>> uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
>>> acpi_cpufreq processor mperf appletouch applesmc uvcvideo
>>> [43925.668120]
>>> [43925.668123] Pid: 27262, comm: make Not tainted
>>> 2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
>>> [43925.668126] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
>>> inode_has_perm+0x53/0x6a
>>> [43925.668135] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
>>> [43925.668137] RAX: ffff88003826a208 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
>>> [43925.668140] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff88002feacc00
>>> [43925.668142] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
>>> [43925.668145] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
>>> [43925.668147] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
>>> [43925.668150] FS:  00007f4f786b3700(0000) GS:ffff88003ee00000(0000)
>>> knlGS:0000000000000000
>>> [43925.668153] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>>> [43925.668155] CR2: 00007f4f78637000 CR3: 00000000383ac000 CR4: 00000000000006e0
>>> [43925.668158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> [43925.668161] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> [43925.668163] Process make (pid: 27262, threadinfo ffff88003c5a4000,
>>> task ffff880001afb410)
>>> [43925.668165] Stack:
>>> [43925.668167]  ffff880038a98060 0000000000000000 ffff88003c5a5c48
>>> ffffffff81182b7c
>>> [43925.668172]  ffff88003cab2688 ffff880024da9990 ffff88003caa18d8
>>> ffff880038a98060
>>> [43925.668177]  ffff880024da98b0 ffffea0000a54940 ffff88003c5a5c78
>>> ffff88003d402500
>>> [43925.668182] Call Trace:
>>> [43925.668189]  [<ffffffff81182b7c>] ? jbd2_journal_stop+0x21e/0x230
>>> [43925.668193]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
>>> [43925.668196]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
>>> [43925.668201]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
>>> [43925.668205]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
>>> [43925.668211]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
>>> [43925.668215]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
>>> [43925.668218]  [<ffffffff81102e86>] may_open+0x9e/0x11e
>>> [43925.668221]  [<ffffffff8110373e>] do_last+0x542/0x6fa
>>> [43925.668225]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
>>> [43925.668228]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
>>> [43925.668232]  [<ffffffff81103958>] ? getname+0x2c/0x1be
>>> [43925.668236]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
>>> [43925.668240]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
>>> [43925.668243]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
>>> [43925.668248]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
>>> [43925.668250] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
>>> ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
>>> 48 89 75 90<41>  0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
>>> ff ff
>>> [43925.668288] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
>>> [43925.668291]  RSP<ffff88003c5a5bc8>
>>> [43925.668295] ---[ end trace 75bdddc506717838 ]---
>>> [43934.866252] general protection fault: 0000 [#2] SMP
>>> [43934.866257] last sysfs file: /sys/devices/platform/applesmc.768/light
>>> [43934.866260] CPU 0
>>> [43934.866261] Modules linked in: firewire_sbp2 radeon sco bnep ttm
>>> drm_kms_helper drm ipt_LOG iptable_nat nf_nat xt_state
>>> nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4
>>> iptable_filter ip_tables x_tables ath9k ath9k_common video ath9k_hw
>>> sky2 firewire_ohci battery ac ath evdev joydev button firewire_core
>>> i2c_i801 kvm_intel aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null
>>> sha256_generic cbc des_generic cast5 blowfish serpent camellia
>>> twofish_generic twofish_x86_64 twofish_common ctr ah4 esp4 authenc
>>> uhci_hcd ehci_hcd hci_uart rfcomm btusb hidp l2cap bluetooth coretemp
>>> acpi_cpufreq processor mperf appletouch applesmc uvcvideo
>>> [43934.866318]
>>> [43934.866321] Pid: 27283, comm: make Tainted: G      D
>>> 2.6.37-rc2-00037-g7957f0a-dirty #6 Mac-F42187C8/MacBookPro2,2
>>> [43934.866324] RIP: 0010:[<ffffffff811bf10a>]  [<ffffffff811bf10a>]
>>> inode_has_perm+0x53/0x6a
>>> [43934.866334] RSP: 0018:ffff88003c5a5bc8  EFLAGS: 00010282
>>> [43934.866336] RAX: ffff88003807a958 RBX: ffff88000008ed80 RCX: ffff88003c5a5c68
>>> [43934.866339] RDX: 0000000000000002 RSI: ffff88000008ed80 RDI: ffff880034b01700
>>> [43934.866341] RBP: ffff88003c5a5c58 R08: ffff88003c5a5c68 R09: 00000000000000d5
>>> [43934.866343] R10: 050366048b660e04 R11: 0000000000000000 R12: 0000000000000024
>>> [43934.866346] R13: 00000000ffffffd8 R14: 0000000000000000 R15: 0000000000000000
>>> [43934.866349] FS:  00007fdf0a661700(0000) GS:ffff88003ee00000(0000)
>>> knlGS:0000000000000000
>>> [43934.866352] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>>> [43934.866354] CR2: 00007fdf0a5e5000 CR3: 0000000029800000 CR4: 00000000000006e0
>>> [43934.866357] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> [43934.866359] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> [43934.866362] Process make (pid: 27283, threadinfo ffff88003c5a4000,
>>> task ffff880001afb410)
>>> [43934.866364] Stack:
>>> [43934.866366]  ffff88002f398a50 ffff880024da9990 000000003c5a5c78
>>> ffffffff81810be8
>>> [43934.866371]  0020000000000001 0000000000000001 0000000000001000
>>> ffff880037bc0a00
>>> [43934.866375]  0000000000001000 ffffea0000a54940 ffff88003c5a5d18
>>> ffff88003d402500
>>> [43934.866380] Call Trace:
>>> [43934.866385]  [<ffffffff811be4bb>] ? selinux_cred_free+0xb/0x27
>>> [43934.866389]  [<ffffffff811be441>] ? selinux_file_alloc_security+0x4a/0xb9
>>> [43934.866395]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
>>> [43934.866398]  [<ffffffff811bf853>] selinux_inode_permission+0xd2/0xd4
>>> [43934.866404]  [<ffffffff811bbf9c>] security_inode_permission+0x1c/0x1e
>>> [43934.866409]  [<ffffffff81101ab2>] inode_permission+0x87/0x93
>>> [43934.866412]  [<ffffffff81102e86>] may_open+0x9e/0x11e
>>> [43934.866415]  [<ffffffff8110373e>] do_last+0x542/0x6fa
>>> [43934.866419]  [<ffffffff811056ec>] do_filp_open+0x1f3/0x646
>>> [43934.866422]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
>>> [43934.866426]  [<ffffffff81103958>] ? getname+0x2c/0x1be
>>> [43934.866430]  [<ffffffff8110eca8>] ? alloc_fd+0x111/0x123
>>> [43934.866433]  [<ffffffff810f7a84>] do_sys_open+0x5b/0xf8
>>> [43934.866437]  [<ffffffff810f7b4a>] sys_open+0x1b/0x1d
>>> [43934.866441]  [<ffffffff8102b542>] system_call_fastpath+0x16/0x1b
>>> [43934.866443] Code: 02 00 00 44 8b 48 04 48 85 c9 75 1f 4c 8d 85 70
>>> ff ff ff b9 22 00 00 00 4c 89 c7 44 89 d8 f3 ab c6 85 70 ff ff ff 01
>>> 48 89 75 90<41>  0f b7 42 20 89 d1 41 8b 72 1c 89 c2 44 89 cf e8 99 e7
>>> ff ff
>>> [43934.866481] RIP  [<ffffffff811bf10a>] inode_has_perm+0x53/0x6a
>>> [43934.866484]  RSP<ffff88003c5a5bc8>
>>> [43934.866488] ---[ end trace 75bdddc506717839 ]---
>>>
>> [...]
>>
>> Hmm, ok, I have no idea about the root cause of this problem, but I did
>> notice one thing about selinux_cred_free() that's different than most
>> other freeing functions in the kernel. It does not accept a NULL value.
>> Most other freeing functions will just return if passed NULL, but
>> selinux_cred_free() will crash.
>> I wonder if it would make sense to add a NULL 'short circuit' to that
>> function? If so, please pick up the patch below.
>>
>>
>> Signed-off-by: Jesper Juhl<jj@chaosbits.net>
>> ---
>>   hooks.c |    6 +++---
>>   1 file changed, 3 insertions(+), 3 deletions(-)
>>
>> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
>> index 65fa8bf..d088532 100644
>> --- a/security/selinux/hooks.c
>> +++ b/security/selinux/hooks.c
>> @@ -3193,11 +3193,11 @@ static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp)
>>    */
>>   static void selinux_cred_free(struct cred *cred)
>>   {
>> -	struct task_security_struct *tsec = cred->security;
>> -
>> +	if (!cred)
>> +		return;
>>   	BUG_ON((unsigned long) cred->security<  PAGE_SIZE);
>>   	cred->security = (void *) 0x7UL;
>> -	kfree(tsec);
>> +	kfree(cred->security);
>>   }
>>
>>   /*
>>
>
> Arrgh, sent the wrong (early version) patch. This is what it should have
> been:
>
>
> Signed-off-by: Jesper Juhl<jj@chaosbits.net>
> ---
>   hooks.c |    5 ++++-
>   1 file changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
> index 65fa8bf..00f28dc 100644
> --- a/security/selinux/hooks.c
> +++ b/security/selinux/hooks.c
> @@ -3193,9 +3193,12 @@ static int selinux_cred_alloc_blank(struct cred *cred, gfp_t gfp)
>    */
>   static void selinux_cred_free(struct cred *cred)
>   {
> -	struct task_security_struct *tsec = cred->security;
> +	struct task_security_struct *tsec;
>
> +	if (!cred)
> +		return;
>   	BUG_ON((unsigned long) cred->security<  PAGE_SIZE);
> +	tsec = cred->security;
>   	cred->security = (void *) 0x7UL;
>   	kfree(tsec);
>   }
>
>
>


sure.. I'll load this patch in.. I will post if I see anything out of 
the ordinary.

Justin P. Mattock

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: general protection fault: 0000 [#1] SMP
  2010-11-20 22:32   ` Jesper Juhl
  2010-11-20 23:21     ` Justin P. Mattock
@ 2010-11-22 19:01     ` Justin P. Mattock
  2010-11-22 20:25       ` Hugh Dickins
  1 sibling, 1 reply; 9+ messages in thread
From: Justin P. Mattock @ 2010-11-22 19:01 UTC (permalink / raw)
  To: Jesper Juhl; +Cc: Linux Kernel Mailing List

<---- cut -------->

cleaned the thread up.. Anyways after doing some debugging with gdb and 
with valgrind for an application that keeps segfaulting I noticed this 
in dmesg:

[ 3028.571941] FIREWALL:INPUT IN=wlan0 OUT= 
MAC=ff:ff:ff:ff:ff:ff:00:23:12:65:cb:02:08:00 SRC=0.0.0.0 
DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=255 ID=57984 
PROTO=UDP SPT=68 DPT=67 LEN=308
[ 3061.177655] BUG: Bad page state in process make  pfn:2134c
[ 3061.177661] page:ffffea00007438a0 count:0 mapcount:0 mapping: 
   (null) index:0x507
[ 3061.177663] page flags: 0x4000000000000008(uptodate)
[ 3061.177669] Pid: 5691, comm: make Not tainted 
2.6.37-rc2-00039-g0211924 #7
[ 3061.177671] Call Trace:
[ 3061.177680]  [<ffffffff810c5900>] ? dump_page+0xc0/0xc5
[ 3061.177684]  [<ffffffff810c5f18>] bad_page+0xd8/0xea
[ 3061.177688]  [<ffffffff810c7aeb>] get_page_from_freelist+0x344/0x4a0
[ 3061.177693]  [<ffffffff811bf123>] ? inode_has_perm+0x68/0x6a
[ 3061.177697]  [<ffffffff810c7d6b>] __alloc_pages_nodemask+0x124/0x645
[ 3061.177701]  [<ffffffff810f7cf2>] ? __dentry_open+0x194/0x2a1
[ 3061.177705]  [<ffffffff810dc155>] handle_mm_fault+0x2a8/0x82f
[ 3061.177710]  [<ffffffff811056ec>] ? do_filp_open+0x1f3/0x646
[ 3061.177714]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
[ 3061.177719]  [<ffffffff81447d8e>] do_page_fault+0x3ec/0x411
[ 3061.177722]  [<ffffffff810f4b95>] ? free_debug_processing+0x1c5/0x208
[ 3061.177726]  [<ffffffff81103958>] ? getname+0x2c/0x1be
[ 3061.177728]  [<ffffffff810f4d08>] ? __slab_free+0x130/0x145
[ 3061.177732]  [<ffffffff81444e25>] page_fault+0x25/0x30
[ 3061.177734] Disabling lock debugging due to kernel taint
[ 3126.418774] type=1400 audit(1290451825.417:178): avc:  denied

from what I remember using valgirnd with the app took a while to load 
but am unsure if is the reason for the above message.

Justin P. Mattock

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: general protection fault: 0000 [#1] SMP
  2010-11-22 19:01     ` Justin P. Mattock
@ 2010-11-22 20:25       ` Hugh Dickins
  2010-11-22 21:44         ` Justin P. Mattock
  0 siblings, 1 reply; 9+ messages in thread
From: Hugh Dickins @ 2010-11-22 20:25 UTC (permalink / raw)
  To: Justin P. Mattock; +Cc: Jesper Juhl, Linux Kernel Mailing List

On Mon, 22 Nov 2010, Justin P. Mattock wrote:

> <---- cut -------->
> 
> cleaned the thread up.. Anyways after doing some debugging with gdb and with
> valgrind for an application that keeps segfaulting I noticed this in dmesg:
> 
> [ 3028.571941] FIREWALL:INPUT IN=wlan0 OUT=
> MAC=ff:ff:ff:ff:ff:ff:00:23:12:65:cb:02:08:00 SRC=0.0.0.0
> DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=255 ID=57984 PROTO=UDP
> SPT=68 DPT=67 LEN=308
> [ 3061.177655] BUG: Bad page state in process make  pfn:2134c
> [ 3061.177661] page:ffffea00007438a0 count:0 mapcount:0 mapping:   (null)
> index:0x507
> [ 3061.177663] page flags: 0x4000000000000008(uptodate)
> [ 3061.177669] Pid: 5691, comm: make Not tainted 2.6.37-rc2-00039-g0211924
> #7
> [ 3061.177671] Call Trace:
> [ 3061.177680]  [<ffffffff810c5900>] ? dump_page+0xc0/0xc5
> [ 3061.177684]  [<ffffffff810c5f18>] bad_page+0xd8/0xea
> [ 3061.177688]  [<ffffffff810c7aeb>] get_page_from_freelist+0x344/0x4a0
> [ 3061.177693]  [<ffffffff811bf123>] ? inode_has_perm+0x68/0x6a
> [ 3061.177697]  [<ffffffff810c7d6b>] __alloc_pages_nodemask+0x124/0x645
> [ 3061.177701]  [<ffffffff810f7cf2>] ? __dentry_open+0x194/0x2a1
> [ 3061.177705]  [<ffffffff810dc155>] handle_mm_fault+0x2a8/0x82f
> [ 3061.177710]  [<ffffffff811056ec>] ? do_filp_open+0x1f3/0x646
> [ 3061.177714]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
> [ 3061.177719]  [<ffffffff81447d8e>] do_page_fault+0x3ec/0x411
> [ 3061.177722]  [<ffffffff810f4b95>] ? free_debug_processing+0x1c5/0x208
> [ 3061.177726]  [<ffffffff81103958>] ? getname+0x2c/0x1be
> [ 3061.177728]  [<ffffffff810f4d08>] ? __slab_free+0x130/0x145
> [ 3061.177732]  [<ffffffff81444e25>] page_fault+0x25/0x30
> [ 3061.177734] Disabling lock debugging due to kernel taint
> [ 3126.418774] type=1400 audit(1290451825.417:178): avc:  denied
> 
> from what I remember using valgirnd with the app took a while to load but am
> unsure if is the reason for the above message.

This particular error is almost certainly fixed by rc3's patch below.
Whether your earlier errors are a side-effect of the same Uptodate bug
I cannot say: it's conceivable, but I don't see it as likely.  Maybe
you should just move up to rc3 and see what happens with that.

Hugh

From: Markus Trippelsdorf <markus@trippelsdorf.de>
Date: Thu, 18 Nov 2010 02:46:06 +0000 (-0500)
Subject: ext4: fix setting random pages PageUptodate
X-Git-Tag: v2.6.37-rc3~1^2~5
X-Git-Url: http://127.0.0.1:1234/?p=.git;a=commitdiff_plain;h=08da1193d2c8c7a25d0cef7f85d0b9f1ad7c583a

ext4: fix setting random pages PageUptodate

ext4_end_bio calls put_page and kmem_cache_free before calling
SetPageUpdate(). This can result in setting the PageUptodate bit on
random pages and causes the following BUG:

 BUG: Bad page state in process rm  pfn:52e54
 page:ffffea0001222260 count:0 mapcount:0 mapping:          (null) index:0x0
 arch kernel: page flags: 0x4000000000000008(uptodate)

Fix the problem by moving put_io_page() after the SetPageUpdate() call.

Thanks to Hugh Dickins for analyzing this problem.

Reported-by: Markus Trippelsdorf <markus@trippelsdorf.de>
Tested-by: Markus Trippelsdorf <markus@trippelsdorf.de>
Signed-off-by: Markus Trippelsdorf <markus@trippelsdorf.de>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
---

diff --git a/fs/ext4/page-io.c b/fs/ext4/page-io.c
index 7f5451c..beacce1 100644
--- a/fs/ext4/page-io.c
+++ b/fs/ext4/page-io.c
@@ -237,8 +237,6 @@ static void ext4_end_bio(struct bio *bio, int error)
 			} while (bh != head);
 		}
 
-		put_io_page(io_end->pages[i]);
-
 		/*
 		 * If this is a partial write which happened to make
 		 * all buffers uptodate then we can optimize away a
@@ -248,6 +246,8 @@ static void ext4_end_bio(struct bio *bio, int error)
 		 */
 		if (!partial_write)
 			SetPageUptodate(page);
+
+		put_io_page(io_end->pages[i]);
 	}
 	io_end->num_io_pages = 0;
 	inode = io_end->inode;

^ permalink raw reply related	[flat|nested] 9+ messages in thread

* Re: general protection fault: 0000 [#1] SMP
  2010-11-22 20:25       ` Hugh Dickins
@ 2010-11-22 21:44         ` Justin P. Mattock
  0 siblings, 0 replies; 9+ messages in thread
From: Justin P. Mattock @ 2010-11-22 21:44 UTC (permalink / raw)
  To: Hugh Dickins; +Cc: Jesper Juhl, Linux Kernel Mailing List

On 11/22/2010 12:25 PM, Hugh Dickins wrote:
> On Mon, 22 Nov 2010, Justin P. Mattock wrote:
>
>> <---- cut -------->
>>
>> cleaned the thread up.. Anyways after doing some debugging with gdb and with
>> valgrind for an application that keeps segfaulting I noticed this in dmesg:
>>
>> [ 3028.571941] FIREWALL:INPUT IN=wlan0 OUT=
>> MAC=ff:ff:ff:ff:ff:ff:00:23:12:65:cb:02:08:00 SRC=0.0.0.0
>> DST=255.255.255.255 LEN=328 TOS=0x00 PREC=0x00 TTL=255 ID=57984 PROTO=UDP
>> SPT=68 DPT=67 LEN=308
>> [ 3061.177655] BUG: Bad page state in process make  pfn:2134c
>> [ 3061.177661] page:ffffea00007438a0 count:0 mapcount:0 mapping:   (null)
>> index:0x507
>> [ 3061.177663] page flags: 0x4000000000000008(uptodate)
>> [ 3061.177669] Pid: 5691, comm: make Not tainted 2.6.37-rc2-00039-g0211924
>> #7
>> [ 3061.177671] Call Trace:
>> [ 3061.177680]  [<ffffffff810c5900>] ? dump_page+0xc0/0xc5
>> [ 3061.177684]  [<ffffffff810c5f18>] bad_page+0xd8/0xea
>> [ 3061.177688]  [<ffffffff810c7aeb>] get_page_from_freelist+0x344/0x4a0
>> [ 3061.177693]  [<ffffffff811bf123>] ? inode_has_perm+0x68/0x6a
>> [ 3061.177697]  [<ffffffff810c7d6b>] __alloc_pages_nodemask+0x124/0x645
>> [ 3061.177701]  [<ffffffff810f7cf2>] ? __dentry_open+0x194/0x2a1
>> [ 3061.177705]  [<ffffffff810dc155>] handle_mm_fault+0x2a8/0x82f
>> [ 3061.177710]  [<ffffffff811056ec>] ? do_filp_open+0x1f3/0x646
>> [ 3061.177714]  [<ffffffff810f4226>] ? check_object+0x13b/0x1eb
>> [ 3061.177719]  [<ffffffff81447d8e>] do_page_fault+0x3ec/0x411
>> [ 3061.177722]  [<ffffffff810f4b95>] ? free_debug_processing+0x1c5/0x208
>> [ 3061.177726]  [<ffffffff81103958>] ? getname+0x2c/0x1be
>> [ 3061.177728]  [<ffffffff810f4d08>] ? __slab_free+0x130/0x145
>> [ 3061.177732]  [<ffffffff81444e25>] page_fault+0x25/0x30
>> [ 3061.177734] Disabling lock debugging due to kernel taint
>> [ 3126.418774] type=1400 audit(1290451825.417:178): avc:  denied
>>
>> from what I remember using valgirnd with the app took a while to load but am
>> unsure if is the reason for the above message.
>
> This particular error is almost certainly fixed by rc3's patch below.
> Whether your earlier errors are a side-effect of the same Uptodate bug
> I cannot say: it's conceivable, but I don't see it as likely.  Maybe
> you should just move up to rc3 and see what happens with that.
>
> Hugh
>
> From: Markus Trippelsdorf<markus@trippelsdorf.de>
> Date: Thu, 18 Nov 2010 02:46:06 +0000 (-0500)
> Subject: ext4: fix setting random pages PageUptodate
> X-Git-Tag: v2.6.37-rc3~1^2~5
> X-Git-Url: http://127.0.0.1:1234/?p=.git;a=commitdiff_plain;h=08da1193d2c8c7a25d0cef7f85d0b9f1ad7c583a
>
> ext4: fix setting random pages PageUptodate
>
> ext4_end_bio calls put_page and kmem_cache_free before calling
> SetPageUpdate(). This can result in setting the PageUptodate bit on
> random pages and causes the following BUG:
>
>   BUG: Bad page state in process rm  pfn:52e54
>   page:ffffea0001222260 count:0 mapcount:0 mapping:          (null) index:0x0
>   arch kernel: page flags: 0x4000000000000008(uptodate)
>
> Fix the problem by moving put_io_page() after the SetPageUpdate() call.
>
> Thanks to Hugh Dickins for analyzing this problem.
>
> Reported-by: Markus Trippelsdorf<markus@trippelsdorf.de>
> Tested-by: Markus Trippelsdorf<markus@trippelsdorf.de>
> Signed-off-by: Markus Trippelsdorf<markus@trippelsdorf.de>
> Signed-off-by: "Theodore Ts'o"<tytso@mit.edu>
> ---
>
> diff --git a/fs/ext4/page-io.c b/fs/ext4/page-io.c
> index 7f5451c..beacce1 100644
> --- a/fs/ext4/page-io.c
> +++ b/fs/ext4/page-io.c
> @@ -237,8 +237,6 @@ static void ext4_end_bio(struct bio *bio, int error)
>   			} while (bh != head);
>   		}
>
> -		put_io_page(io_end->pages[i]);
> -
>   		/*
>   		 * If this is a partial write which happened to make
>   		 * all buffers uptodate then we can optimize away a
> @@ -248,6 +246,8 @@ static void ext4_end_bio(struct bio *bio, int error)
>   		 */
>   		if (!partial_write)
>   			SetPageUptodate(page);
> +
> +		put_io_page(io_end->pages[i]);
>   	}
>   	io_end->num_io_pages = 0;
>   	inode = io_end->inode;
>


alright.. will do..

Justin P. Mattock

^ permalink raw reply	[flat|nested] 9+ messages in thread

* general protection fault: 0000 [#1] SMP
@ 2011-03-14 17:41 Justin P. Mattock
  0 siblings, 0 replies; 9+ messages in thread
From: Justin P. Mattock @ 2011-03-14 17:41 UTC (permalink / raw)
  To: Linux Kernel Mailing List

Ive seen this before, this time though once this fired off the screen
kind of got garbled but the system was usable.
Note: I am having an issue with radeon(trying to figure out another 
issue)so maybe this is part of what I am seeing..:

  [ 7820.017431] general protection fault: 0000 [#1] SMP
[ 7820.017538] last sysfs file: 
/sys/devices/pci0000:00/0000:00:1d.3/usb5/5-1/5-1:1.0/bluetooth/hci0/hci0:46/input14/capabilities/sw
[ 7820.017628] CPU 0
[ 7820.017656] Modules linked in: evdev hidp xfrm4_mode_transport xcbc 
rmd160 sha512_generic rfcomm sco bnep l2cap radeon drm_kms_helper 
ipt_REJECT xt_tcpudp ipt_LOG iptable_nat nf_nat xt_state 
nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 
iptable_filter ip_tables x_tables btusb bluetooth psmouse thermal fan 
container button ac battery video ath9k ath9k_common ath9k_hw ath ttm 
drm aes_x86_64 lzo zlib ipcomp xfrm_ipcomp crypto_null des_generic cast5 
blowfish serpent camellia twofish_generic twofish_x86_64 twofish_common 
ctr ah4 esp4 authenc firewire_ohci firewire_core uhci_hcd ehci_hcd 
coretemp acpi_cpufreq processor mperf appletouch applesmc
[ 7820.018011]
[ 7820.018011] Pid: 508, comm: kswapd0 Not tainted 
2.6.38-rc8-00123-g41d5502 #2 Apple Computer, Inc. MacBookPro2,2/Mac-F42187C8
[ 7820.018011] RIP: 0010:[<ffffffff8110eb45>]  [<ffffffff8110eb45>] 
evict+0x10/0x88
[ 7820.018011] RSP: 0000:ffff88003d645cb0  EFLAGS: 00010282
[ 7820.018011] RAX: e08e66c08e66d88e RBX: ffff88000008f050 RCX: 
0000000000000025
[ 7820.018011] RDX: ffff8800223e8188 RSI: ffffffff8116a98f RDI: 
ffff88000008f050
[ 7820.018011] RBP: ffff88003d645cc0 R08: 0000000000000080 R09: 
ffff880039cf6f80
[ 7820.018011] R10: ffff88003d645b80 R11: ffff880039cf70d8 R12: 
ffff88003d645d00
[ 7820.018011] R13: ffff88000008f108 R14: 0000000000000080 R15: 
0000000000000080
[ 7820.018011] FS:  0000000000000000(0000) GS:ffff88003ee00000(0000) 
knlGS:0000000000000000
[ 7820.018011] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 7820.018011] CR2: 0000000000a9e000 CR3: 0000000008f26000 CR4: 
00000000000006f0
[ 7820.018011] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
[ 7820.018011] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
0000000000000400
[ 7820.018011] Process kswapd0 (pid: 508, threadinfo ffff88003d644000, 
task ffff88003d669560)
[ 7820.018011] Stack:
[ 7820.018011]  ffff880039cf7050 ffff88000008f050 ffff88003d645cf0 
ffffffff8110f17d
[ 7820.018011]  0000000000000000 ffff880005417a78 ffff880005417a88 
0000000000000000
[ 7820.018011]  ffff88003d645d40 ffffffff8110f9bb ffff8800223e8188 
ffff880002ba3a88
[ 7820.018011] Call Trace:
[ 7820.018011]  [<ffffffff8110f17d>] dispose_list+0x47/0xe3
[ 7820.018011]  [<ffffffff8110f9bb>] shrink_icache_memory+0x281/0x2b3
[ 7820.018011]  [<ffffffff810d04dc>] shrink_slab+0xde/0x162
[ 7820.018011]  [<ffffffff810d0b21>] kswapd+0x5c1/0x9af
[ 7820.018011]  [<ffffffff810d0560>] ? kswapd+0x0/0x9af
[ 7820.018011]  [<ffffffff8107bdaf>] kthread+0x7d/0x85
[ 7820.018011]  [<ffffffff8102e064>] kernel_thread_helper+0x4/0x10
[ 7820.018011]  [<ffffffff8107bd32>] ? kthread+0x0/0x85
[ 7820.018011]  [<ffffffff8102e060>] ? kernel_thread_helper+0x0/0x10
[ 7820.018011] Code: 10 81 be 07 00 00 00 e8 2f cc 33 00 48 c7 83 88 00 
00 00 60 00 00 00 5f 5b c9 c3 55 48 89 e5 53 48 89 fb 48 83 ec 08 48 8b 
47 18 <48> 8b 40 30 48 8b 40 28 48 85 c0 74 04 ff d0 eb 20 48 83 bf 10
[ 7820.018011] RIP  [<ffffffff8110eb45>] evict+0x10/0x88
[ 7820.018011]  RSP <ffff88003d645cb0>
[ 7820.028800] ---[ end trace 506063ca7889c564 ]---


full dmesg here:
http://fpaste.org/wzgx/

Justin P. Mattock


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2011-03-14 17:41 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-07-03 22:59 general protection fault: 0000 [#1] SMP Justin P. Mattock
  -- strict thread matches above, loose matches on Subject: below --
2010-11-20 16:35 Justin Mattock
2010-11-20 22:28 ` Jesper Juhl
2010-11-20 22:32   ` Jesper Juhl
2010-11-20 23:21     ` Justin P. Mattock
2010-11-22 19:01     ` Justin P. Mattock
2010-11-22 20:25       ` Hugh Dickins
2010-11-22 21:44         ` Justin P. Mattock
2011-03-14 17:41 Justin P. Mattock

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox