segv pri pristupu ke konkretnimu souboru

Vlada Macek tuttle na sandbox.cz
Úterý Květen 16 16:30:04 CEST 2006


Tak jsem ten zlobivy soubor zkusil smazat:

    # strace rm NIT.koef
    access("NIT.koef", W_OK <unfinished ...>
    +++ killed by SIGSEGV +++

Bezva, chjo.


michal.schmidt na phd.feec.vutbr.cz wrote:
> Vlada Macek wrote:
>> ...
>> 0010:[link_path_walk+1354/2224]    Tainted: P
>                                      ^^^^^^^^^^
> Cimpak to mate Linux poskvrnen?
Aha, zrejme quota_v2.

    # grep taint boot*
    boot:Sun May  7 10:46:57 2006: quota_v2 Warning: loading
    /lib/modules/2.4.27-3-686/kernel/fs/quota_v2.o will taint the
    kernel: no license
    boot:Sun May  7 10:46:57 2006:   See
    http://www.tux.org/lkml/#export-tainted for information about
    tainted modules

Abych rozchodil kvoty, dal jsem ho do /etc/modules a tohle zacal pri
bootu logovat. Divim se, ze nema licenci, kdyz je to z toho samyho baliku...

Je to spatny zpusob zprovozneni diskovych kvot?


>> ...
>> [open_namei+110/1488] [filp_open+62/112] [sys_open+83/160]
>> [tracesys+31/35]
>                                                              ^^^^^^^^^
> Ten "cat" jste teď spouštěl pod strace nebo debuggerem?
strace, abych videl, kde a proc to pada na budku. Bez strace je to
trosku bohatsi:

    May 16 16:03:02 sandbox kernel:  <1>Unable to handle kernel paging
    request at virtual address e0a8c548
    May 16 16:03:02 sandbox kernel:  printing eip:
    May 16 16:03:02 sandbox kernel: c014907a
    May 16 16:03:02 sandbox kernel: *pde = 01617067
    May 16 16:03:02 sandbox kernel: *pte = 00000000
    May 16 16:03:02 sandbox kernel: Oops: 0000
    May 16 16:03:02 sandbox kernel: CPU:    0
    May 16 16:03:02 sandbox kernel: EIP:   
    0010:[link_path_walk+1354/2224]    Tainted: P
    May 16 16:03:02 sandbox kernel: EFLAGS: 00010282
    May 16 16:03:02 sandbox kernel: eax: e0a8c520   ebx: d3835440   ecx:
    cd310a40   edx: 00000000
    May 16 16:03:02 sandbox kernel: esi: d485c027   edi: 00000000   ebp:
    de177f84   esp: de177ef8
    May 16 16:03:02 sandbox kernel: ds: 0018   es: 0018   ss: 0018
    May 16 16:03:02 sandbox kernel: Process cat (pid: 9320,
    stackpage=de177000)
    May 16 16:03:02 sandbox kernel: Stack: ccc78a20 de177f10 00000001
    00000001 cd310a40 d3835440 d485c01f 00000008
    May 16 16:03:02 sandbox kernel:        6506b3e3 c0152e86 de177f84
    d485c000 00000000 de177f84 c01495a9 00008000
    May 16 16:03:02 sandbox kernel:        00008001 4014c880 c0149a1e
    00000007 00002190 00000001 000003e8 00000000
    May 16 16:03:02 sandbox kernel: Call Trace:   
    [__mark_inode_dirty+166/176] [path_lookup+57/64]
    [open_namei+110/1488] [filp_open+62/112] [sys_open+83/160]
    May 16 16:03:02 sandbox kernel:   [system_call+51/56]
    May 16 16:03:02 sandbox kernel:
    May 16 16:03:02 sandbox kernel: Code: 8b 40 28 85 c0 0f 84 fe 00 00
    00 be 00 e0 ff ff 21 e6 8b 8e

-- 

\//\/\
(Sometimes credited as 1494 F8DD 6379 4CD7 E7E3 1FC9 D750 4243 1F05 9424.)

 [ When you find a virus in mail from me, then I intended to infect you, ]
 [ since I use SW that is not distributing malware w/o my knowledge.     ]





Další informace o konferenci Linux