[CRIU] ARM: SIGSEGV in parasite code

Chanho Park chanho61.park at samsusng.com
Tue Jun 11 09:41:20 EDT 2013


Hi Alexander,

I found data aborts are sometimes occurred in infected code.
We can't dump correctly due to this issue.
It couldn't be resolved even though applying your commit '9a37454'.

I attached a core dump file and a test program.
And I also added below kernel command line option to debug page fault.
	user_debug=8

It generated below backtrace log.

[  445.430000] test_test: unhandled page fault (11) at 0x00000002, code
0x817
[  445.430000] pgd = ee58c000
[  445.430000] [00000002] *pgd=6e6a6831, *pte=00000000, *ppte=00000000
[  445.440000] 
[  445.440000] CPU: 1 PID: 2970 Comm: test_test Not tainted
3.10.0-rc1-00289-gf5f8b48-dirty #158
[  445.450000] task: ee72e800 ti: eebb4000 task.ti: eebb4000
[  445.455000] PC is at 0xb6f27fe0
[  445.455000] LR is at 0xb6f27b84
[  445.460000] pc : [<b6f27fe0>]    lr : [<b6f27b84>]    psr: 80000010
[  445.460000] sp : b6f2b484  ip : 00000000  fp : b6f29594
[  445.470000] r10: b6f27f9c  r9 : b6f29594  r8 : b6f27f8c
[  445.475000] r7 : befd7cf0  r6 : 66667d10  r5 : 00000000  r4 : b6f2b488
[  445.485000] r3 : 0000003a  r2 : 00000002  r1 : b6f29548  r0 : 00000003
[  445.490000] Flags: Nzcv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment
user
[  445.495000] Control: 10c5387d  Table: 6e58c04a  DAC: 00000015
[  445.505000] CPU: 1 PID: 2970 Comm: test_test Not tainted
3.10.0-rc1-00289-gf5f8b48-dirty #158
[  445.510000] [<c00166ec>] (unwind_backtrace+0x0/0x13c) from [<c0013444>]
(show_stack+0x10/0x14)
[  445.520000] [<c0013444>] (show_stack+0x10/0x14) from [<c001dbe0>]
(__do_user_fault+0xc4/0xc8)
[  445.530000] [<c001dbe0>] (__do_user_fault+0xc4/0xc8) from [<c001de70>]
(do_page_fault+0x208/0x38c)
[  445.535000] [<c001de70>] (do_page_fault+0x208/0x38c) from [<c00084a4>]
(do_DataAbort+0x38/0x98)
[  445.545000] [<c00084a4>] (do_DataAbort+0x38/0x98) from [<c000ed34>]
(__dabt_usr+0x34/0x40)
[  445.555000] Exception stack(0xeebb5fb0 to 0xeebb5ff8)
[  445.560000] 5fa0:                                     00000003 b6f29548
00000002 0000003a
[  445.565000] 5fc0: b6f2b488 00000000 66667d10 befd7cf0 b6f27f8c b6f29594
b6f27f9c b6f29594
[  445.575000] 5fe0: 00000000 b6f2b484 b6f27b84 b6f27fe0 80000010 ffffffff

Upon run the test several times, I found abort points are differ all the
time.
I wonder you doesn't have the problem. Does it occur only our environment?
I used 3.10-rc1 kernel with CRIU patches not yet merged and
debian-7.0.0-minimal-armhf platform.
You can find the platform next link:
	
http://rcn-ee.net/deb/minfs/wheezy/debian-7.0.0-minimal-armhf-2013-05-05.tar
.xz
I also use exynos4210 based board.

IMO it is important problem because it can disturb dumping.

Best regards,
Chanho Park
-------------- next part --------------
A non-text attachment was scrubbed...
Name: core
Type: application/octet-stream
Size: 704512 bytes
Desc: not available
URL: <http://lists.openvz.org/pipermail/criu/attachments/20130611/f532bdd1/attachment-0005.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: test_test
Type: application/octet-stream
Size: 452832 bytes
Desc: not available
URL: <http://lists.openvz.org/pipermail/criu/attachments/20130611/f532bdd1/attachment-0006.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: dump_test.sh
Type: application/octet-stream
Size: 334 bytes
Desc: not available
URL: <http://lists.openvz.org/pipermail/criu/attachments/20130611/f532bdd1/attachment-0007.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: criu
Type: application/octet-stream
Size: 1100772 bytes
Desc: not available
URL: <http://lists.openvz.org/pipermail/criu/attachments/20130611/f532bdd1/attachment-0008.obj>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: dump.log
Type: application/octet-stream
Size: 5219 bytes
Desc: not available
URL: <http://lists.openvz.org/pipermail/criu/attachments/20130611/f532bdd1/attachment-0009.obj>


More information about the CRIU mailing list