I just got an oops from running one of my POSIX skin RT applications:

   [183168.735823] BUG: unable to handle kernel paging request at 00700bf5
   [183168.737436] IP: [<c10c091f>] xnheap_init+0x1cf/0x210
   [183168.738604] *pde = 00000000
   [183168.739406] Oops: 0002 [#1] PREEMPT
   [183168.740173] last sysfs file: /sys/devices/virtual/bdi/0:19/uevent
[183168.740173] Modules linked in: e1000 xeno_rtipc lxfb cfbcopyarea cfbimgblt cfbfillrect binfmt_misc psmouse usbhid serio_raw hid ata_piix [last unloaded: e1000]
   [183168.740173]
   [183168.740173] Pid: 2557, comm: eve_dal Not tainted 2.6.37 #1 /Bochs
   [183168.740173] EIP: 0060:[<c10c091f>] EFLAGS: 00010246 CPU: 0
   [183168.740173] EIP is at xnheap_init+0x1cf/0x210
   [183168.740173] EAX: 00700bf1 EBX: eed0e210 ECX: eed0e730 EDX: eed0e2fc
   [183168.740173] ESI: 00000000 EDI: 00000000 EBP: eed27da4 ESP: eed27d7c
   [183168.740173]  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068
[183168.740173] Process eve_dal (pid: 2557, ti=eed26000 task=f5773280 task.ti=eed26000)
   [183168.740173] I-pipe domain Linux
   [183168.740173] Stack:
[183168.740173] eed0e304 00000030 c157d4a9 eed0e210 eed0e2fc eed0e2fc 0000003e 00000000 [183168.740173] f85ea000 eed0e210 eed27dc8 c10c0c44 00001000 00000000 f85aa000 00040000 [183168.740173] eed0e200 fffffff4 eed0e210 eed27df0 c10cf198 eed27de4 c1058b86 eed27f20
   [183168.740173] Call Trace:
   [183168.740173]  [<c10c0c44>] ? xnheap_init_mapped+0xd4/0x210
   [183168.740173]  [<c10cf198>] ? xnshadow_sys_event+0x68/0x210
   [183168.740173]  [<c1058b86>] ? commit_creds+0xe6/0x190
   [183168.740173]  [<c10cefa3>] ? xnshadow_sys_bind+0x293/0x420
   [183168.740173]  [<c114b22e>] ? __d_lookup+0x12e/0x160
   [183168.740173]  [<c114bf96>] ? dput+0x66/0x1b0
   [183168.740173]  [<c1141b9e>] ? path_to_nameidata+0x1e/0x50
   [183168.740173]  [<c1143e02>] ? link_path_walk+0x422/0x7c0
   [183168.740173]  [<c11425f5>] ? path_put+0x25/0x30
   [183168.740173]  [<c109559d>] ? __ipipe_restore_root+0x1d/0x30
   [183168.740173]  [<c112d537>] ? kmem_cache_free+0xa7/0x100
   [183168.740173]  [<c11423ea>] ? putname+0x2a/0x40
   [183168.740173]  [<c1144cfa>] ? user_path_at+0x4a/0x80
   [183168.740173]  [<c10cd82d>] ? losyscall_event+0xad/0x200
   [183168.740173]  [<c1095035>] ? __ipipe_dispatch_event+0xb5/0x170
   [183168.740173]  [<c10cd780>] ? losyscall_event+0x0/0x200
   [183168.740173]  [<c10166d5>] ? __ipipe_syscall_root+0x45/0xd0
   [183168.740173]  [<c145526d>] ? system_call+0x2d/0x53
[183168.740173] Code: 24 e8 a6 cc 19 00 fa 8b 0d 28 36 61 c1 0f ba 2d c0 1b 61 c1 00 19 f6 8b 55 e8 83 e6 01 89 8b f0 00 00 00 8b 01 89 83 ec 00 00 00<89> 50 04 31 c0 89 11 8b 15 c0 1b 61 c1 83 05 2c 36 61 c1 01 83 [183168.740173] EIP: [<c10c091f>] xnheap_init+0x1cf/0x210 SS:ESP 0068:eed27d7c
   [183168.740173] CR2: 0000000000700bf5

As you can see, this happened with kernel 2.6.37, and I built it with Xenomai 2.6.0. The offending instruction was at xnheap_init + 463:

   0xc10c090b<xnheap_init+443>:   mov    -0x18(%ebp),%edx
   0xc10c090e<xnheap_init+446>:   and    $0x1,%esi
   0xc10c0911<xnheap_init+449>:   mov    %ecx,0xf0(%ebx)
   0xc10c0917<xnheap_init+455>:   mov    (%ecx),%eax
   0xc10c0919<xnheap_init+457>:   mov    %eax,0xec(%ebx)
   0xc10c091f<xnheap_init+463>:   mov    %edx,0x4(%eax)
   0xc10c0922<xnheap_init+466>:   xor    %eax,%eax
   0xc10c0924<xnheap_init+468>:   mov    %edx,(%ecx)
   0xc10c0926<xnheap_init+470>:   mov    0xc1611bc0,%edx
   0xc10c092c<xnheap_init+476>:   addl   $0x1,0xc161362c
   0xc10c0933<xnheap_init+483>:   addl   $0x1,0xc17c83e4

This corresponds to ath(xnholder_t *, xnholder_t *) in include/xenomai/nucleus/queue.h, line 48:

   43   static inline void ath(xnholder_t *head, xnholder_t *holder)
   44   {
   45           /* Inserts the new element right after the heading one  */
   46           holder->last = head;
   47           holder->next = head->next;
   48           holder->next->last = holder;
   49           head->next = holder;
   50   }

It's apparently the call to appendq() at kernel/xenomai/nucleus/heap.c:332 that does this, with a junk pointer dereference. So, heap->stat_link.next is not valid at the time of this call, yet it's initialized by the call to inith() on line 319. I don't know what would have changed that, unless it's a bad pointer elsewhere that caused overwriting of this data. Any ideas where to go from here?

--
    Doug Brunner


_______________________________________________
Xenomai-help mailing list
[email protected]
https://mail.gna.org/listinfo/xenomai-help

Reply via email to