On Sat, Mar 1, 2014 at 10:28 AM, Toralf Förster <toralf.foerster@xxxxxx> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Today I tested if I can activate that syscall again here (munmap works fine since few days). > Testing a 32 bit user mode linux image with "$>trinity -q -N 100000 -C 8" gave in the syslog of the UML guest: > > Mar 1 10:09:18 trinity kernel: Stub registers - > Mar 1 10:09:18 trinity kernel: 0 - 100000 Looks like the stub page. You cannot remap it. If you do so the calling process will die. > Mar 1 10:09:18 trinity kernel: 1 - 2000 > Mar 1 10:09:18 trinity kernel: 2 - 0 > Mar 1 10:09:18 trinity kernel: 3 - 0 > Mar 1 10:09:18 trinity kernel: 4 - 0 > Mar 1 10:09:18 trinity kernel: 5 - 0 > Mar 1 10:09:18 trinity kernel: 6 - 0 > Mar 1 10:09:18 trinity kernel: 7 - 7b > Mar 1 10:09:18 trinity kernel: 8 - 7b > Mar 1 10:09:18 trinity kernel: 9 - 0 > Mar 1 10:09:18 trinity kernel: 10 - 33 > Mar 1 10:09:18 trinity kernel: 11 - ffffffff > Mar 1 10:09:18 trinity kernel: 12 - 1000c3 > Mar 1 10:09:18 trinity kernel: 13 - 73 > Mar 1 10:09:18 trinity kernel: 14 - 10206 > Mar 1 10:09:18 trinity kernel: 15 - 101028 > Mar 1 10:09:18 trinity kernel: 16 - 7b > Mar 1 10:09:18 trinity kernel: wait_stub_done : failed to wait for SIGTRAP, pid = 6662, n = 6662, errno = 0, status = 0xb7f > Mar 1 10:09:18 trinity kernel: do_syscall_stub : ret = 0, offset = 1052680, data = 477be008 > Mar 1 10:09:18 trinity kernel: do_syscall_stub: syscall 91 failed, return value = 0x0, expected return value = 0x0 > Mar 1 10:09:18 trinity kernel: syscall parameters: 0x100000 0x2000 0x0 0x0 0x0 0x0 > > > and a back trace of the core file of the crashed UML guest process tells: > > > $ gdb --core=/mnt/ramdisk/core /home/tfoerste/devel/linux/linux -n -batch -ex 'bt' > [New LWP 4841] > > warning: Could not load shared library symbols for linux-gate.so.1. > Do you need "set solib-search-path" or "set sysroot"? > Core was generated by `/home/tfoerste/devel/linux/linux earlyprintk ubda=/home/tfoerste/virtual/uml/tr'. > Program terminated with signal 6, Aborted. > #0 0xb77c5424 in __kernel_vsyscall () > #0 0xb77c5424 in __kernel_vsyscall () > #1 0x08481b55 in kill () > #2 0x08072acd in uml_abort () at arch/um/os-Linux/util.c:93 > #3 0x08072e05 in os_dump_core () at arch/um/os-Linux/util.c:148 > #4 0x080624fd in panic_exit (self=0x86c1598 <panic_exit_notifier>, unused1=0, unused2=0x86f89a0 <buf.16970>) at arch/um/kernel/um_arch.c:240 > #5 0x0809a2e6 in notifier_call_chain (nl=0x0, val=0, v=0x86f89a0 <buf.16970>, nr_to_call=-2, nr_calls=0x0) at kernel/notifier.c:93 > #6 0x0809a401 in __atomic_notifier_call_chain (nh=0x86f8984 <panic_notifier_list>, val=0, v=0x86f89a0 <buf.16970>, nr_to_call=0, nr_calls=0x0) at kernel/notifier.c:182 > #7 0x0809a43f in atomic_notifier_call_chain (nh=0x0, val=0, v=0x0) at kernel/notifier.c:191 > #8 0x084de7fc in panic (fmt=0x0) at kernel/panic.c:130 > #9 0x080735b5 in do_syscall_stub (addr=<optimized out>, mm_idp=<optimized out>) at arch/um/os-Linux/skas/mem.c:68 > #10 run_syscall_stub (mm_idp=0x4755d364, syscall=6, args=0x4490fb60, expected=1150352224, addr=0x4490fda4, done=1) at arch/um/os-Linux/skas/mem.c:142 > #11 0x08073c05 in unmap (mm_idp=0x0, addr=1079300096, len=4096, done=1150352224, data=0x4490fb60) at arch/um/os-Linux/skas/mem.c:244 > #12 0x08061047 in do_ops (hvc=0x4490fd80, end=1, finished=1) at arch/um/kernel/tlb.c:67 > #13 0x080615f8 in fix_range_common (mm=0x0, start_addr=1150352224, end_addr=1079840768, force=0) at arch/um/kernel/tlb.c:281 > #14 0x0806193e in fix_range (force=<optimized out>, end_addr=<optimized out>, start_addr=<optimized out>, mm=<optimized out>) at arch/um/kernel/tlb.c:493 > #15 flush_tlb_range (vma=0x0, start=1078792192, end=1079840768) at arch/um/kernel/tlb.c:501 > #16 0x080ef1ae in move_page_tables (vma=0x47839d48, old_addr=1078792192, new_vma=0x44856cc0, new_addr=2097152, len=1048576, need_rmap_locks=false) at mm/mremap.c:222 > #17 0x080ef2c7 in move_vma (vma=0x47839d48, old_addr=1150352224, old_len=6, new_len=1048576, new_addr=1048576, locked=0x0) at mm/mremap.c:269 > #18 0x080ef608 in mremap_to (locked=<optimized out>, new_len=<optimized out>, new_addr=<optimized out>, old_len=<optimized out>, addr=<optimized out>) at mm/mremap.c:438 > #19 SYSC_mremap (new_addr=<optimized out>, flags=<optimized out>, new_len=<optimized out>, old_len=<optimized out>, addr=<optimized out>) at mm/mremap.c:501 > #20 SyS_mremap (addr=1078792192, old_len=1048576, new_len=1048576, flags=3, new_addr=1048576) at mm/mremap.c:470 > #21 0x08062ab4 in handle_syscall (r=0x477df0c8) at arch/um/kernel/skas/syscall.c:35 > #22 0x08074905 in handle_trap (local_using_sysemu=<optimized out>, regs=<optimized out>, pid=<optimized out>) at arch/um/os-Linux/skas/process.c:198 > #23 userspace (regs=0x477df0c8) at arch/um/os-Linux/skas/process.c:431 > #24 0x0805f770 in fork_handler () at arch/um/kernel/process.c:149 > > > > > - -- > MfG/Sincerely > Toralf Förster > pgp finger print:1A37 6F99 4A9D 026F 13E2 4DCF C4EA CDDE 0076 E94E > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (GNU/Linux) > Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ > > iF4EAREIAAYFAlMRqEYACgkQxOrN3gB26U6DrAD/SqDlQgmtzWcG68u16UPHtPEg > UmRkKQIdpqQ3iDhK2K8BAIJ3eeIkuItS71Usp4fvGHyp1bZnYZZQJjc+brur7s9G > =1kbQ > -----END PGP SIGNATURE----- > > ------------------------------------------------------------------------------ > Flow-based real-time traffic analytics software. Cisco certified tool. > Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer > Customize your own dashboards, set traffic alerts and generate reports. > Network behavioral analysis & security monitoring. All-in-one tool. > http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk > _______________________________________________ > User-mode-linux-devel mailing list > User-mode-linux-devel@xxxxxxxxxxxxxxxxxxxxx > https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel -- Thanks, //richard -- To unsubscribe from this list: send the line "unsubscribe trinity" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html