VirtualBox

Opened 16 years ago

Closed 15 years ago

Last modified 15 years ago

#1812 closed defect (fixed)

Linux guest shared folder traps

Reported by: Brian J. Murrell Owned by:
Component: shared folders Version: VirtualBox 1.6.2
Keywords: Cc:
Guest type: Linux Host type: other

Description (last modified by Sander van Leeuwen)

While booting a Ubuntu Linux Hardy guest that mounts /home and /usr from the host as VirtualBox Shared Folders:

BUG: unable to handle kernel paging request at virtual address d0000004
[  758.340953] printing eip: d099ca30 *pde = 00000000 
[  758.342105] Oops: 0000 [#1] SMP 
[  758.342900] Modules linked in: vboxdrv ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp bridge ppdev autofs4 cpufreq_userspace cpufreq_powersave cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table sbs video output dock container sbshc ipv6 nfs lockd nfs_acl sunrpc iptable_filter ip_tables x_tables deflate zlib_deflate twofish twofish_common camellia serpent blowfish des_generic cbc ecb aes_generic geode_aes blkcipher aes_i586 xcbc sha256_generic sha1_generic crypto_null af_key vboxvfs uinput sbp2 ieee1394 lp af_packet parport_pc parport evdev pcspkr psmouse serio_raw battery ac i2c_piix4 button i2c_core vboxadd dm_multipath ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic pata_acpi floppy ata_piix pcnet32 mii libata scsi_mod raid10 raid456 async_xor async_memcpy async_tx xor raid1 raid0 multipath linear md_mod dm_mirror dm_snapshot dm_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse
[  758.367511] 
[  758.367884] Pid: 5890, comm: hald-runner Not tainted (2.6.24-18-generic #1)
[  758.369531] EIP: 0060:[<d099ca30>] EFLAGS: 00010286 CPU: 0
[  758.370789] EIP is at VbglHGCMCall+0x220/0x350 [vboxadd]
[  758.372006] EAX: fffffffc EBX: d0000010 ECX: 0b12150a EDX: ce641cf0
[  758.373416] ESI: 002252eb EDI: ce641d24 EBP: 00000b57 ESP: ce641c10
[  758.374879]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[  758.376109] Process hald-runner (pid: 5890, ti=ce640000 task=ce2b9700 task.ti=ce640000)
[  758.377741] Stack: cdbb0150 cde7c300 00000000 ce641c28 ce641d00 00000024 00000000 00000000 
[  758.379335]        00000000 00000000 c019ebd4 ce641c54 ce641fac 0804dcc8 00000000 ce641ea4 
[  758.380871]        00000000 c019f780 00000000 00000000 00000000 ce49df00 cdbb0068 00000000 
[  758.382394] Call Trace:
[  758.382877]  [<c019ebd4>] do_sys_poll+0x2d4/0x330
[  758.383641]  [<c019f780>] __pollwait+0x0/0xe0
[  758.384361]  [<d099b14c>] vboxadd_cmc_call+0x9c/0xa0 [vboxadd]
[  758.385275]  [<d099b1c0>] vboxadd_hgcm_callback_interruptible+0x0/0x80 [vboxadd]
[  758.386450]  [<d0e2c215>] vbglDriverIOCtl+0x15/0x20 [vboxvfs]
[  758.387362]  [<c0105612>] invalid_TSS+0x2/0x10
[  758.388067]  [<d0e2d9aa>] vboxCallCreate+0x8a/0xa0 [vboxvfs]
[  758.389014]  [<d099b14c>] vboxadd_cmc_call+0x9c/0xa0 [vboxadd]
[  758.389914]  [<d099b1c0>] vboxadd_hgcm_callback_interruptible+0x0/0x80 [vboxadd]
[  758.391165]  [<d0e2c215>] vbglDriverIOCtl+0x15/0x20 [vboxvfs]
[  758.392058]  [<c0105612>] invalid_TSS+0x2/0x10
[  758.392770]  [<d0e2d9aa>] vboxCallCreate+0x8a/0xa0 [vboxvfs]
[  758.393749]  [<d0e2bec8>] sf_inode_revalidate+0x88/0xc0 [vboxvfs]
[  758.394696]  [<d09d6e51>] ext3_get_acl+0x1d1/0x380 [ext3]
[  758.395599]  [<c01a39fc>] __d_lookup+0x8c/0x120
[  758.396346]  [<d0e2bf45>] sf_dentry_revalidate+0x5/0x10 [vboxvfs]
[  758.397424]  [<c01992f1>] do_lookup+0x41/0x1a0
[  758.398228]  [<c019ad6f>] __link_path_walk+0x12f/0xe10
[  758.399437]  [<c019ba95>] link_path_walk+0x45/0xc0
[  758.400544]  [<c0104266>] sys_sigreturn+0x106/0x180
[  758.401603]  [<c0146034>] do_gettimeofday+0x34/0xe0
[  758.402747]  [<c019bce7>] do_path_lookup+0x77/0x200
[  758.403848]  [<c019aa3a>] getname+0xaa/0xe0
[  758.404811]  [<c019c74b>] __user_walk_fd+0x3b/0x60
[  758.405936]  [<c0190607>] sys_faccessat+0x97/0x160
[  758.407046]  [<c0104266>] sys_sigreturn+0x106/0x180
[  758.408133]  [<c0146034>] do_gettimeofday+0x34/0xe0
[  758.409249]  [<c01906ef>] sys_access+0x1f/0x30
[  758.410299]  [<c01043c2>] sysenter_past_esp+0x6b/0xa9
[  758.411488]  =======================
[  758.412248] Code: 85 dc 00 00 00 8b 42 1c 8b 94 24 b0 00 00 00 89 02 8b 84 24 b0 00 00 00 8b 48 0c 85 c9 74 3e 8b 5c 24 10 31 f6 83 c3 0c 8d 76 00 <8b> 43 f4 83 e8 04 83 f8 02 77 15 8b 44 b4 18 85 c0 74 0d 8b 4b 
[  758.417844] EIP: [<d099ca30>] VbglHGCMCall+0x220/0x350 [vboxadd] SS:ESP 0068:ce641c10
[  758.419664] ---[ end trace 103bb326108be648 ]---
 * Starting bluetooth       
[  758.544927] BUG: unable to handle kernel paging request at virtual address 00140015
[  758.546131] printing eip: c018dc66 *pde = 00000000 
[  758.547004] Oops: 0000 [#2] SMP 
[  758.547537] Modules linked in: vboxdrv ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp bridge ppdev autofs4 cpufreq_userspace cpufreq_powersave cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table sbs video output dock container sbshc ipv6 nfs lockd nfs_acl sunrpc iptable_filter ip_tables x_tables deflate zlib_deflate twofish twofish_common camellia serpent blowfish des_generic cbc ecb aes_generic geode_aes blkcipher aes_i586 xcbc sha256_generic sha1_generic crypto_null af_key vboxvfs uinput sbp2 ieee1394 lp af_packet parport_pc parport evdev pcspkr psmouse serio_raw battery ac i2c_piix4 button i2c_core vboxadd dm_multipath ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic pata_acpi floppy ata_piix pcnet32 mii libata scsi_mod raid10 raid456 async_xor async_memcpy async_tx xor raid1 raid0 multipath linear md_mod dm_mirror dm_snapshot dm_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse
[  758.563910] 
[  758.564148] Pid: 5924, comm: modprobe Tainted: G      D (2.6.24-18-generic #1)
[  758.565260] EIP: 0060:[<c018dc66>] EFLAGS: 00010002 CPU: 0
[  758.566145] EIP is at kmem_cache_alloc+0x46/0xc0
[  758.566878] EAX: 00000000 EBX: 00140015 ECX: d0800000 EDX: c0183a5a
[  758.567844] ESI: c1206530 EDI: 00000296 EBP: c04191d0 ESP: ce7e9e3c
[  758.568813]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[  758.569713] Process modprobe (pid: 5924, ti=ce7e8000 task=cfbd5700 task.ti=ce7e8000)
[  758.570889] Stack: 00000008 00000001 000000d0 00013000 00013000 d0800000 000000d2 c0183a5a 
[  758.572432]        0000014e cec4113c 00000002 c016da2f 00000001 ffffffff ff7fe000 ffffffff 
[  758.574054]        00000163 000000d2 c0183bdb ff7fe000 ffffffff 000000d2 00013000 ffffffff 
[  758.575607] Call Trace:
[  758.576075]  [<c0183a5a>] __get_vm_area_node+0x8a/0x1c0
[  758.576918]  [<c016da2f>] find_lock_page+0x2f/0xb0
[  758.577749]  [<c0183bdb>] get_vm_area_node+0x4b/0x60
[  758.578560]  [<c018432e>] __vmalloc_node+0x5e/0x90
[  758.579355]  [<c018438f>] __vmalloc+0xf/0x20
[  758.580053]  [<c0150748>] sys_init_module+0xa8/0x19c0
[  758.580877]  [<c017b61e>] __do_fault+0x22e/0x420
[  758.581686]  [<c017d988>] handle_mm_fault+0x118/0x730
[  758.582516]  [<c031de7f>] do_page_fault+0x13f/0x730
[  758.583337]  [<c01043c2>] sysenter_past_esp+0x6b/0xa9
[  758.584148]  [<c013007b>] do_exit+0x46b/0x860
[  758.584869]  =======================
[  758.585438] Code: 24 14 9c 58 0f 1f 84 00 00 00 00 00 89 c7 fa 0f 1f 84 00 00 00 00 00 90 64 a1 08 60 47 c0 8b 74 85 70 8b 1e 85 db 74 53 8b 46 0c <8b> 04 83 89 06 89 f8 50 9d 0f 1f 84 00 00 00 00 00 66 83 7c 24 
[  758.590100] EIP: [<c018dc66>] kmem_cache_alloc+0x46/0xc0 SS:ESP 0068:ce7e9e3c
[  758.591284] ---[ end trace 103bb326108be648 ]---

Additionally, any use of /usr (i.e. such as trying to log in) will provoke further oopses such as:

[  970.632675] BUG: unable to handle kernel paging request at virtual address 00140015
[  970.634201] printing eip: c018dc66 *pde = 00000000 
[  970.636584] Oops: 0000 [#5] SMP 
[  970.637256] Modules linked in: vboxdrv ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp bridge ppdev autofs4 cpufreq_userspace cpufreq_powersave cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table sbs video output dock container sbshc ipv6 nfs lockd nfs_acl sunrpc iptable_filter ip_tables x_tables deflate zlib_deflate twofish twofish_common camellia serpent blowfish des_generic cbc ecb aes_generic geode_aes blkcipher aes_i586 xcbc sha256_generic sha1_generic crypto_null af_key vboxvfs uinput sbp2 ieee1394 lp af_packet parport_pc parport evdev pcspkr psmouse serio_raw battery ac i2c_piix4 button i2c_core vboxadd dm_multipath ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic pata_acpi floppy ata_piix pcnet32 mii libata scsi_mod raid10 raid456 async_xor async_memcpy async_tx xor raid1 raid0 multipath linear md_mod dm_mirror dm_snapshot dm_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse
[  970.678869] 
[  970.679534] Pid: 4555, comm: getty Tainted: G      D (2.6.24-18-generic #1)
[  970.682926] EIP: 0060:[<c018dc66>] EFLAGS: 00010002 CPU: 0
[  970.685278] EIP is at kmem_cache_alloc+0x46/0xc0
[  970.687199] EAX: 00000000 EBX: 00140015 ECX: 00000010 EDX: c02082c4
[  970.689718] ESI: c1206530 EDI: 00000292 EBP: c04191d0 ESP: cea11b04
[  970.692207]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[  970.694448] Process getty (pid: 4555, ti=cea10000 task=cea32000 task.ti=cea10000)
[  970.696056] Stack: c010aec3 38ed8883 00000010 cea32000 cf814c18 ce94e300 cf814c28 c02082c4 
[  970.698152]        c02132b0 c020bab5 c0213303 00011200 00000010 00000010 ce94e300 cf814c18 
[  970.700221]        00010000 cf46fe00 cea32000 00011210 c02132b0 cf814c18 ce94e300 cf814c28 
[  970.702344] Call Trace:
[  970.702961]  [<c010aec3>] sched_clock+0x13/0x40
[  970.704055]  [<c02082c4>] current_io_context+0x24/0x70
[  970.705199]  [<c02132b0>] cfq_set_request+0x0/0x310
[  970.706327]  [<c020bab5>] get_io_context+0x5/0x10
[  970.707243]  [<c0213303>] cfq_set_request+0x53/0x310
[  970.708051]  [<c02132b0>] cfq_set_request+0x0/0x310
[  970.708959]  [<c020659c>] elv_set_request+0x1c/0x40
[  970.710089]  [<c020a411>] get_request+0x271/0x330
[  970.711164]  [<d0876706>] __map_bio+0xe6/0x160 [dm_mod]
[  970.712342]  [<c01b6c81>] bio_alloc_bioset+0x81/0x150
[  970.713535]  [<c020ae4b>] get_request_wait+0x1b/0x190
[  970.714679]  [<d087714f>] __split_bio+0xdf/0x490 [dm_mod]
[  970.715943]  [<c020c018>] __make_request+0x68/0x570
[  970.717102]  [<d0877819>] dm_request+0xd9/0x120 [dm_mod]
[  970.717952]  [<c0208f15>] generic_make_request+0x235/0x4d0
[  970.718826]  [<c01b7ac7>] bio_add_page+0x37/0x50
[  970.719584]  [<d09c82d0>] ext3_get_block+0x0/0x100 [ext3]
[  970.720455]  [<c020921c>] submit_bio+0x6c/0x100
[  970.721456]  [<c016dbef>] add_to_page_cache+0x9f/0xb0
[  970.722301]  [<c01ba8c8>] mpage_bio_submit+0x18/0x20
[  970.723123]  [<c01bb920>] mpage_readpages+0xb0/0xf0
[  970.723939]  [<d09c82d0>] ext3_get_block+0x0/0x100 [ext3]
[  970.724899]  [<d09c7680>] ext3_readpages+0x0/0x20 [ext3]
[  970.725775]  [<c01755b5>] __do_page_cache_readahead+0x185/0x250
[  970.726729]  [<d09c82d0>] ext3_get_block+0x0/0x100 [ext3]
[  970.727638]  [<c01759e7>] page_cache_sync_readahead+0x27/0x30
[  970.728578]  [<c016e0ea>] do_generic_mapping_read+0x29a/0x490
[  970.729486]  [<c016d5d0>] file_read_actor+0x0/0x100
[  970.730323]  [<c016fcbc>] generic_file_aio_read+0x10c/0x1b0
[  970.731211]  [<c016d5d0>] file_read_actor+0x0/0x100
[  970.732017]  [<c01919d5>] do_sync_read+0xd5/0x120
[  970.732855]  [<c01a7e23>] mntput_no_expire+0x13/0x70
[  970.733702]  [<c01fe7a8>] aa_register_find+0x38/0x130
[  970.734506]  [<c0140c40>] autoremove_wake_function+0x0/0x40
[  970.735419]  [<c01ff82b>] aa_register+0x18b/0x4b0
[  970.736207]  [<c0191900>] do_sync_read+0x0/0x120
[  970.737012]  [<c0192327>] vfs_read+0xb7/0x170
[  970.737762]  [<c0195ded>] kernel_read+0x3d/0x60
[  970.738512]  [<c0195ebf>] prepare_binprm+0xaf/0xe0
[  970.739298]  [<c01976f5>] do_execve+0x125/0x1d0
[  970.740091]  [<c0102aef>] sys_execve+0x2f/0x80
[  970.740828]  [<c01043c2>] sysenter_past_esp+0x6b/0xa9
[  970.741673]  [<c0310000>] unix_dgram_recvmsg+0x50/0x2d0
[  970.742526]  =======================
[  970.743068] Code: 24 14 9c 58 0f 1f 84 00 00 00 00 00 89 c7 fa 0f 1f 84 00 00 00 00 00 90 64 a1 08 60 47 c0 8b 74 85 70 8b 1e 85 db 74 53 8b 46 0c <8b> 04 83 89 06 89 f8 50 9d 0f 1f 84 00 00 00 00 00 66 83 7c 24 
[  970.747730] EIP: [<c018dc66>] kmem_cache_alloc+0x46/0xc0 SS:ESP 0068:cea11b04
[  970.748925] ---[ end trace 103bb326108be648 ]---
[  970.750264] BUG: unable to handle kernel paging request at virtual address 00140015
[  970.751465] printing eip: c018e9c4 *pde = 00000000 
[  970.752302] Oops: 0000 [#6] SMP 
[  970.752912] Modules linked in: vboxdrv ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp bridge ppdev autofs4 cpufreq_userspace cpufreq_powersave cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table sbs video output dock container sbshc ipv6 nfs lockd nfs_acl sunrpc iptable_filter ip_tables x_tables deflate zlib_deflate twofish twofish_common camellia serpent blowfish des_generic cbc ecb aes_generic geode_aes blkcipher aes_i586 xcbc sha256_generic sha1_generic crypto_null af_key vboxvfs uinput sbp2 ieee1394 lp af_packet parport_pc parport evdev pcspkr psmouse serio_raw battery ac i2c_piix4 button i2c_core vboxadd dm_multipath ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic pata_acpi floppy ata_piix pcnet32 mii libata scsi_mod raid10 raid456 async_xor async_memcpy async_tx xor raid1 raid0 multipath linear md_mod dm_mirror dm_snapshot dm_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse
[  970.769165] 
[  970.769401] Pid: 4555, comm: getty Tainted: G      D (2.6.24-18-generic #1)
[  970.770476] EIP: 0060:[<c018e9c4>] EFLAGS: 00010002 CPU: 0
[  970.771333] EIP is at __kmalloc+0x64/0x110
[  970.771973] EAX: 00000000 EBX: 00140015 ECX: c04191d0 EDX: c021564d
[  970.772935] ESI: 00000286 EDI: c04191d0 EBP: c1206530 ESP: cea1187c
[  970.773919]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[  970.774750] Process getty (pid: 4555, ti=cea10000 task=cea32000 task.ti=cea10000)
[  970.775853] Stack: c03f6b18 0002c0d0 000080d0 00000000 ce3db478 00000019 000080d0 c021564d 
[  970.777476]        ce3db478 c0403ee0 ce3db478 fffffff4 c0403f48 c0215e50 ce3db478 00000287 
[  970.779025]        ce3d8d80 c01d766f cf003680 00000000 c03ba623 00000000 c03b9f87 ce39a000 
[  970.780669] Call Trace:
[  970.781132]  [<c021564d>] kobject_get_path+0x4d/0x90
[  970.781962]  [<c0215e50>] kobject_uevent_env+0xb0/0x3d0
[  970.782827]  [<c01d766f>] release_sysfs_dirent+0x3f/0x90
[  970.783747]  [<c01d766f>] release_sysfs_dirent+0x3f/0x90
[  970.784652]  [<c02802f8>] device_del+0x178/0x250
[  970.785382]  [<c02803d8>] device_unregister+0x8/0x10
[  970.786176]  [<c026ac59>] vcs_remove_sysfs+0x19/0x40
[  970.786956]  [<c0270efa>] con_close+0x5a/0x70
[  970.787646]  [<c0263a0b>] release_dev+0x13b/0x660
[  970.788388]  [<c0172287>] free_pages_bulk+0xc7/0x290
[  970.789214]  [<c012103d>] kunmap_atomic+0x3d/0xb0
[  970.789991]  [<c0263f3f>] tty_release+0xf/0x20
[  970.790697]  [<c0192c87>] __fput+0xa7/0x190
[  970.791393]  [<c018fc19>] filp_close+0x49/0x80
[  970.792099]  [<c012ea92>] put_files_struct+0x92/0xb0
[  970.793058]  [<c012fd90>] do_exit+0x180/0x860
[  970.793784]  [<c0105c4d>] show_registers+0x7d/0x1a0
[  970.794585]  [<c012d1bb>] printk+0x1b/0x20
[  970.795286]  [<c0105fe7>] die+0x277/0x280
[  970.795953]  [<c031e128>] do_page_fault+0x3e8/0x730
[  970.796799]  [<c0125c1e>] try_to_wake_up+0x4e/0x350
[  970.797616]  [<c031dd40>] do_page_fault+0x0/0x730
[  970.798409]  [<c031c512>] error_code+0x72/0x80
[  970.799145]  [<c02082c4>] current_io_context+0x24/0x70
[  970.799989]  [<c014007b>] sys_timer_create+0x31b/0x330
[  970.800844]  [<c014007b>] sys_timer_create+0x31b/0x330
[  970.801695]  [<c018dc66>] kmem_cache_alloc+0x46/0xc0
[  970.802502]  [<c010aec3>] sched_clock+0x13/0x40
[  970.803275]  [<c02082c4>] current_io_context+0x24/0x70
[  970.804092]  [<c02132b0>] cfq_set_request+0x0/0x310
[  970.804896]  [<c020bab5>] get_io_context+0x5/0x10
[  970.805665]  [<c0213303>] cfq_set_request+0x53/0x310
[  970.806489]  [<c02132b0>] cfq_set_request+0x0/0x310
[  970.807277]  [<c020659c>] elv_set_request+0x1c/0x40
[  970.808070]  [<c020a411>] get_request+0x271/0x330
[  970.808903]  [<d0876706>] __map_bio+0xe6/0x160 [dm_mod]
[  970.809760]  [<c01b6c81>] bio_alloc_bioset+0x81/0x150
[  970.810609]  [<c020ae4b>] get_request_wait+0x1b/0x190
[  970.811426]  [<d087714f>] __split_bio+0xdf/0x490 [dm_mod]
[  970.812315]  [<c020c018>] __make_request+0x68/0x570
[  970.813153]  [<d0877819>] dm_request+0xd9/0x120 [dm_mod]
[  970.814015]  [<c0208f15>] generic_make_request+0x235/0x4d0
[  970.814958]  [<c01b7ac7>] bio_add_page+0x37/0x50
[  970.815739]  [<d09c82d0>] ext3_get_block+0x0/0x100 [ext3]
[  970.816647]  [<c020921c>] submit_bio+0x6c/0x100
[  970.817407]  [<c016dbef>] add_to_page_cache+0x9f/0xb0
[  970.818239]  [<c01ba8c8>] mpage_bio_submit+0x18/0x20
[  970.819049]  [<c01bb920>] mpage_readpages+0xb0/0xf0
[  970.819856]  [<d09c82d0>] ext3_get_block+0x0/0x100 [ext3]
[  970.820794]  [<d09c7680>] ext3_readpages+0x0/0x20 [ext3]
[  970.821665]  [<c01755b5>] __do_page_cache_readahead+0x185/0x250
[  970.822613]  [<d09c82d0>] ext3_get_block+0x0/0x100 [ext3]
[  970.823524]  [<c01759e7>] page_cache_sync_readahead+0x27/0x30
[  970.824438]  [<c016e0ea>] do_generic_mapping_read+0x29a/0x490
[  970.825408]  [<c016d5d0>] file_read_actor+0x0/0x100
[  970.826226]  [<c016fcbc>] generic_file_aio_read+0x10c/0x1b0
[  970.827113]  [<c016d5d0>] file_read_actor+0x0/0x100
[  970.827922]  [<c01919d5>] do_sync_read+0xd5/0x120
[  970.828711]  [<c01a7e23>] mntput_no_expire+0x13/0x70
[  970.829531]  [<c01fe7a8>] aa_register_find+0x38/0x130
[  970.830352]  [<c0140c40>] autoremove_wake_function+0x0/0x40
[  970.831259]  [<c01ff82b>] aa_register+0x18b/0x4b0
[  970.832066]  [<c0191900>] do_sync_read+0x0/0x120
[  970.832849]  [<c0192327>] vfs_read+0xb7/0x170
[  970.833577]  [<c0195ded>] kernel_read+0x3d/0x60
[  970.834317]  [<c0195ebf>] prepare_binprm+0xaf/0xe0
[  970.835097]  [<c01976f5>] do_execve+0x125/0x1d0
[  970.835842]  [<c0102aef>] sys_execve+0x2f/0x80
[  970.836714]  [<c01043c2>] sysenter_past_esp+0x6b/0xa9
[  970.837576]  [<c0310000>] unix_dgram_recvmsg+0x50/0x2d0
[  970.838424]  =======================
[  970.838976] Code: 1f 84 00 00 00 00 00 89 c6 fa 0f 1f 84 00 00 00 00 00 90 64 a1 08 60 47 c0 8b 6c 87 70 8b 5d 00 85 db 0f 84 8a 00 00 00 8b 45 0c <8b> 04 83 89 45 00 89 f0 50 9d 0f 1f 84 00 00 00 00 00 66 83 7c 
[  970.843497] EIP: [<c018e9c4>] __kmalloc+0x64/0x110 SS:ESP 0068:cea1187c
[  970.844601] ---[ end trace 103bb326108be648 ]---
[  970.845408] Fixing recursive fault but reboot is needed!

Change History (11)

comment:1 by Brian J. Murrell, 16 years ago

Maybe this is too much information by now, but here's the first oopses from another boot. Notice the sf_ functions at the top (or is that bottom?) of the stack?

[  396.744555] Oops: 0000 [#1] SMP 
[  396.745806] Modules linked in: vboxdrv ppdev autofs4 cpufreq_userspace cpufreq_powersave cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table sbs video output dock container sbshc iptable_filter ip_tables x_tables ipv6 deflate zlib_deflate twofish twofish_common camellia serpent blowfish des_generic cbc ecb aes_generic geode_aes blkcipher aes_i586 xcbc sha256_generic sha1_generic crypto_null af_key vboxvfs uinput sbp2 ieee1394 lp af_packet parport_pc parport evdev psmouse serio_raw pcspkr battery ac i2c_piix4 button vboxadd i2c_core dm_multipath ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic pata_acpi floppy ata_piix pcnet32 mii libata scsi_mod raid10 raid456 async_xor async_memcpy async_tx xor raid1 raid0 multipath linear md_mod dm_mirror dm_snapshot dm_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse
[  396.787536] 
[  396.788434] Pid: 5799, comm: hald-runner Not tainted (2.6.24-18-generic #1)
[  396.790881] EIP: 0060:[<c018e9c4>] EFLAGS: 00010002 CPU: 0
[  396.793048] EIP is at __kmalloc+0x64/0x110
[  396.794666] EAX: 00000000 EBX: 00140015 ECX: c04191d0 EDX: d0e24a00
[  396.796939] ESI: 00000286 EDI: c04191d0 EBP: c1206530 ESP: cd997d14
[  396.802071]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[  396.804006] Process hald-runner (pid: 5799, ti=cd996000 task=ce155140 task.ti=cd996000)
[  396.806633] Stack: ce55d010 cedfde58 000000d0 cefeb308 00000003 00000011 ce55d020 d0e24a00 
[  396.811066]        cd997d38 ffffffff ffffffff d0e27a66 ce55d010 00000000 d0e2bba0 ceeab930 
[  396.815558]        cf850120 ce55d020 d0e25086 0000000c cd997e0c ce55d020 cf850120 d0e27a66 
[  396.820534] Call Trace:
[  396.825592]  [<d0e24a00>] sf_make_path+0x60/0x150 [vboxvfs]
[  396.828716]  [<d0e25086>] sf_path_from_dentry+0x136/0x150 [vboxvfs]
[  396.832214]  [<d0e238ac>] sf_lookup+0x4c/0x180 [vboxvfs]
[  396.835209]  [<c01a3dc4>] d_alloc+0x114/0x1a0
[  396.837977]  [<c01993d2>] do_lookup+0x122/0x1a0
[  396.840748]  [<c019b33d>] __link_path_walk+0x6fd/0xe10
[  396.843763]  [<c010879d>] enable_8259A_irq+0xd/0x50
[  396.849217]  [<c016a076>] handle_level_irq+0xb6/0xf0
[  396.852324]  [<c019ba95>] link_path_walk+0x45/0xc0
[  396.855047]  [<c0104266>] sys_sigreturn+0x106/0x180
[  396.857942]  [<c0146034>] do_gettimeofday+0x34/0xe0
[  396.860855]  [<c019bce7>] do_path_lookup+0x77/0x200
[  396.863660]  [<c019aa3a>] getname+0xaa/0xe0
[  396.866172]  [<c019c74b>] __user_walk_fd+0x3b/0x60
[  396.871634]  [<c0190607>] sys_faccessat+0x97/0x160
[  396.874600]  [<c0104266>] sys_sigreturn+0x106/0x180
[  396.877411]  [<c0146034>] do_gettimeofday+0x34/0xe0
[  396.880375]  [<c01906ef>] sys_access+0x1f/0x30
[  396.882659]  [<c01043c2>] sysenter_past_esp+0x6b/0xa9
[  396.884868]  =======================
[  396.886203] Code: 1f 84 00 00 00 00 00 89 c6 fa 0f 1f 84 00 00 00 00 00 90 64 a1 08 60 47 c0 8b 6c 87 70 8b 5d 00 85 db 0f 84 8a 00 00 00 8b 45 0c <8b> 04 83 89 45 00 89 f0 50 9d 0f 1f 84 00 00 00 00 00 66 83 7c 
[  396.905197] EIP: [<c018e9c4>] __kmalloc+0x64/0x110 SS:ESP 0068:cd997d14
[  396.908376] ---[ end trace 27e5b19da5630b59 ]---
[  397.031539] BUG: unable to handle kernel paging request at virtual address 00140015
[  397.036302] printing eip: c018e9c4 *pde = 00000000 
[  397.040437] Oops: 0000 [#2] SMP 
[  397.043877] Modules linked in: vboxdrv ppdev autofs4 cpufreq_userspace cpufreq_powersave cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table sbs video output dock container sbshc iptable_filter ip_tables x_tables ipv6 deflate zlib_deflate twofish twofish_common camellia serpent blowfish des_generic cbc ecb aes_generic geode_aes blkcipher aes_i586 xcbc sha256_generic sha1_generic crypto_null af_key vboxvfs uinput sbp2 ieee1394 lp af_packet parport_pc parport evdev psmouse serio_raw pcspkr battery ac i2c_piix4 button vboxadd i2c_core dm_multipath ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic pata_acpi floppy ata_piix pcnet32 mii libata scsi_mod raid10 raid456 async_xor async_memcpy async_tx xor raid1 raid0 multipath linear md_mod dm_mirror dm_snapshot dm_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse
[  397.096760] 
[  397.097657] Pid: 5832, comm: khelper Tainted: G      D (2.6.24-18-generic #1)
[  397.100231] EIP: 0060:[<c018e9c4>] EFLAGS: 00010002 CPU: 0
[  397.102326] EIP is at __kmalloc+0x64/0x110
[  397.107277] EAX: 00000000 EBX: 00140015 ECX: c04191d0 EDX: c01c227a
[  397.109766] ESI: 00000286 EDI: c04191d0 EBP: c1206530 ESP: cd881d94
[  397.112024]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[  397.114111] Process khelper (pid: 5832, ti=cd880000 task=cdf285c0 task.ti=cd880000)
[  397.116690] Stack: c018fca2 c0195ded 000000d0 cf2a8b20 cf2a8a00 00000000 ce9adc00 c01c227a 
[  397.121244]        000000e0 cd99c000 c012103d c10abfe0 cf2a8a00 c5600000 00000001 cd881f8c 
[  397.125778]        cf2a8b00 00000000 00000000 c03f5480 c55ff000 00000000 00000000 c03f5480 
[  397.133373] Call Trace:
[  397.135139]  [<c018fca2>] get_unused_fd_flags+0x52/0xd0
[  397.137272]  [<c0195ded>] kernel_read+0x3d/0x60
[  397.139630]  [<c01c227a>] load_elf_binary+0x183a/0x1cc0
[  397.141688]  [<c012103d>] kunmap_atomic+0x3d/0xb0
[  397.143759]  [<c01730d0>] __alloc_pages+0x60/0x3a0
[  397.145645]  [<c0181706>] find_mergeable_anon_vma+0x36/0xc0
[  397.149283]  [<c01838fc>] anon_vma_prepare+0x5c/0xe0
[  397.151219]  [<c012103d>] kunmap_atomic+0x3d/0xb0
[  397.156250]  [<c017dbf7>] handle_mm_fault+0x387/0x730
[  397.158229]  [<c01919d5>] do_sync_read+0xd5/0x120
[  397.160222]  [<c01a7e23>] mntput_no_expire+0x13/0x70
[  397.162252]  [<c012103d>] kunmap_atomic+0x3d/0xb0
[  397.164300]  [<c012103d>] kunmap_atomic+0x3d/0xb0
[  397.166269]  [<c017beea>] follow_page+0x10a/0x1b0
[  397.168371]  [<c017e079>] get_user_pages+0xd9/0x300
[  397.170432]  [<c019589b>] get_arg_page+0x4b/0xb0
[  397.172404]  [<c01c0a40>] load_elf_binary+0x0/0x1cc0
[  397.174390]  [<c0195b6a>] search_binary_handler+0x9a/0x1e0
[  397.179445]  [<c019776d>] do_execve+0x19d/0x1d0
[  397.181391]  [<c0102aef>] sys_execve+0x2f/0x80
[  397.183274]  [<c0104442>] syscall_call+0x7/0xb
[  397.185295]  [<c012007b>] __is_prefetch+0x9b/0x240
[  397.187269]  [<c01200d8>] __is_prefetch+0xf8/0x240
[  397.189292]  [<c010896c>] kernel_execve+0x1c/0x30
[  397.191266]  [<c013cce9>] ____call_usermodehelper+0x149/0x160
[  397.193553]  [<c013cba0>] ____call_usermodehelper+0x0/0x160
[  397.195770]  [<c0105677>] kernel_thread_helper+0x7/0x10
[  397.197930]  =======================
[  397.201726] Code: 1f 84 00 00 00 00 00 89 c6 fa 0f 1f 84 00 00 00 00 00 90 64 a1 08 60 47 c0 8b 6c 87 70 8b 5d 00 85 db 0f 84 8a 00 00 00 8b 45 0c <8b> 04 83 89 45 00 89 f0 50 9d 0f 1f 84 00 00 00 00 00 66 83 7c 
[  397.218331] EIP: [<c018e9c4>] __kmalloc+0x64/0x110 SS:ESP 0068:cd881d94
[  397.221152] ---[ end trace 27e5b19da5630b59 ]---

I have found at times that if I boot into single user mode, then do a few things (which really is probably just letting some time pass) then exit and let the boot continue into multi-user mode, things will work just fine.

comment:2 by Frank Mehnert, 16 years ago

Component: othershared folders

comment:3 by Sander van Leeuwen, 16 years ago

Summary: BUG: unable to handle kernel paging request at virtual address 00140015Linux guest shared folder traps

comment:4 by Sander van Leeuwen, 16 years ago

Description: modified (diff)

comment:5 by Sander van Leeuwen, 16 years ago

Description: modified (diff)

comment:6 by Frank Mehnert, 16 years ago

Guest type: otherLinux

comment:7 by Frank Mehnert, 16 years ago

Actually these backtraces don't help very much. Even the one from the first comment is an invalid access from kmalloc. This function was indeed called by sf_make_path() but kmalloc raises an invalid access only if there is something really wrong in the kernel structures. So currently no idea.

comment:8 by Frank Mehnert, 15 years ago

brian, is this problem still relevant?

in reply to:  8 comment:9 by Brian J. Murrell, 15 years ago

Replying to frank:

brian, is this problem still relevant?

I guess not given that I just booted a Hardy guest that mounted both /usr and /home as vboxsf filesystems.

Hopefully thing "ping" means you are going through (my other) open tickets to get resolution as well. :-)

comment:10 by Frank Mehnert, 15 years ago

Resolution: fixed
Status: newclosed

Note that there are currently about 1040 bugs open...

comment:11 by Brian J. Murrell, 15 years ago

Ouch.

Note: See TracTickets for help on using tickets.

© 2023 Oracle
ContactPrivacy policyTerms of Use