segv pri pristupu ke konkretnimu souboru
Vlada Macek
tuttle na sandbox.cz
Úterý Květen 16 16:30:04 CEST 2006
Tak jsem ten zlobivy soubor zkusil smazat:
# strace rm NIT.koef
access("NIT.koef", W_OK <unfinished ...>
+++ killed by SIGSEGV +++
Bezva, chjo.
michal.schmidt na phd.feec.vutbr.cz wrote:
> Vlada Macek wrote:
>> ...
>> 0010:[link_path_walk+1354/2224] Tainted: P
> ^^^^^^^^^^
> Cimpak to mate Linux poskvrnen?
Aha, zrejme quota_v2.
# grep taint boot*
boot:Sun May 7 10:46:57 2006: quota_v2 Warning: loading
/lib/modules/2.4.27-3-686/kernel/fs/quota_v2.o will taint the
kernel: no license
boot:Sun May 7 10:46:57 2006: See
http://www.tux.org/lkml/#export-tainted for information about
tainted modules
Abych rozchodil kvoty, dal jsem ho do /etc/modules a tohle zacal pri
bootu logovat. Divim se, ze nema licenci, kdyz je to z toho samyho baliku...
Je to spatny zpusob zprovozneni diskovych kvot?
>> ...
>> [open_namei+110/1488] [filp_open+62/112] [sys_open+83/160]
>> [tracesys+31/35]
> ^^^^^^^^^
> Ten "cat" jste teď spouštěl pod strace nebo debuggerem?
strace, abych videl, kde a proc to pada na budku. Bez strace je to
trosku bohatsi:
May 16 16:03:02 sandbox kernel: <1>Unable to handle kernel paging
request at virtual address e0a8c548
May 16 16:03:02 sandbox kernel: printing eip:
May 16 16:03:02 sandbox kernel: c014907a
May 16 16:03:02 sandbox kernel: *pde = 01617067
May 16 16:03:02 sandbox kernel: *pte = 00000000
May 16 16:03:02 sandbox kernel: Oops: 0000
May 16 16:03:02 sandbox kernel: CPU: 0
May 16 16:03:02 sandbox kernel: EIP:
0010:[link_path_walk+1354/2224] Tainted: P
May 16 16:03:02 sandbox kernel: EFLAGS: 00010282
May 16 16:03:02 sandbox kernel: eax: e0a8c520 ebx: d3835440 ecx:
cd310a40 edx: 00000000
May 16 16:03:02 sandbox kernel: esi: d485c027 edi: 00000000 ebp:
de177f84 esp: de177ef8
May 16 16:03:02 sandbox kernel: ds: 0018 es: 0018 ss: 0018
May 16 16:03:02 sandbox kernel: Process cat (pid: 9320,
stackpage=de177000)
May 16 16:03:02 sandbox kernel: Stack: ccc78a20 de177f10 00000001
00000001 cd310a40 d3835440 d485c01f 00000008
May 16 16:03:02 sandbox kernel: 6506b3e3 c0152e86 de177f84
d485c000 00000000 de177f84 c01495a9 00008000
May 16 16:03:02 sandbox kernel: 00008001 4014c880 c0149a1e
00000007 00002190 00000001 000003e8 00000000
May 16 16:03:02 sandbox kernel: Call Trace:
[__mark_inode_dirty+166/176] [path_lookup+57/64]
[open_namei+110/1488] [filp_open+62/112] [sys_open+83/160]
May 16 16:03:02 sandbox kernel: [system_call+51/56]
May 16 16:03:02 sandbox kernel:
May 16 16:03:02 sandbox kernel: Code: 8b 40 28 85 c0 0f 84 fe 00 00
00 be 00 e0 ff ff 21 e6 8b 8e
--
\//\/\
(Sometimes credited as 1494 F8DD 6379 4CD7 E7E3 1FC9 D750 4243 1F05 9424.)
[ When you find a virus in mail from me, then I intended to infect you, ]
[ since I use SW that is not distributing malware w/o my knowledge. ]
Další informace o konferenci Linux