From: Herbert Poetzl (herbert_at_13thfloor.at)
Date: Tue 20 Apr 2004 - 16:48:35 BST
On Tue, Apr 20, 2004 at 04:25:17PM +0100, Chris Wilson wrote:
> Hi Herbert,
>
> > with vs1.9.0pre10* you can actually disable the
> > proc security from the menuconfig (or *config)
>
> OK, I built a 2.6.6-rc1 kernel with the -pre11 patch, and it Oopses when I
> try to enter a vserver:
could you try the following patch?
@@ -555,6 +557,7 @@ static int copy_mm(unsigned long clone_f
/* Copy the current MM stuff.. */
memcpy(mm, oldmm, sizeof(*mm));
+ mm->mm_vx_info = NULL;
if (!mm_init(mm))
goto fail_nomem;
it should fix this issue ...
TIA,
Herbert
> [root_at_linux1 vservers]# vserver distcc1 enter
> /sbin/ifconfig eth1:distcc1 192.168.3.181 netmask 255.255.255.0 broadcast
> 192.168.3.255
> SIOCSIFADDR: File exists
> SIOCSIFFLAGS: Cannot assign requested address
> SIOCSIFNETMASK: Cannot assign requested address
> SIOCSIFBRDADDR: Cannot assign requested address
> SIOCSIFFLAGS: Cannot assign requested address
> ipv4root is now 192.168.3.181
> Host name is now distcc1.netservers.co.uk
> New security context is 49155
> Segmentation fault
>
> linux1 kernel: kernel BUG at include/linux/vinline.h:62!
> linux1 kernel: invalid operand: 0000 [#3]
> linux1 kernel: PREEMPT
> linux1 kernel: CPU: 0
> linux1 kernel: EIP: 0060:[<c0113385>] Not tainted
> linux1 kernel: EFLAGS: 00010286 (2.6.6-rc1-vs1.9.0pre11)
> linux1 kernel: EIP is at mm_init+0xe2/0x101
> linux1 kernel: eax: e610bc00 ebx: 00000000 ecx: edfeff80 edx:
> e610bc00
> linux1 kernel: esi: e4b25ea4 edi: dfd8a76c ebp: dfd8a580 esp:
> e4b25dfc
> linux1 kernel: ds: 007b es: 007b ss: 0068
> linux1 kernel: Process save_s_context (pid: 2082, threadinfo=e4b24000
> task=defdc330)
> linux1 kernel: Stack: dfd8a580 e4b25e6c 00000001 00000000 dfd8a580
> 00000000 00000000 dfd8a6e0
> linux1 kernel: dfd8a6e0 00000000 00000000 00000000 00000000
> 00000000 ffffffff 00000000
> linux1 kernel: 00000000 00000000 00000000 00000000 00000000
> 00000000 00000000 00000000
> linux1 kernel: Call Trace:
> linux1 kernel: [<c01136ea>] copy_mm+0xe7/0x427
> linux1 kernel: [<c0114321>] copy_process+0x453/0xb7c
> linux1 kernel: [<c01593ea>] do_pipe+0x185/0x205
> linux1 kernel: [<c0114a9a>] do_fork+0x50/0x16d
> linux1 kernel: [<c01b398a>] copy_to_user+0x3e/0x4e
> linux1 kernel: [<c014c9ba>] sys_llseek+0x9f/0xc4
> linux1 kernel: [<c0104387>] sys_clone+0x41/0x45
> linux1 kernel: [<c010575d>] sysenter_past_esp+0x52/0x71
> linux1 kernel:
> linux1 kernel: Code: 0f 0b 3e 00 5f e6 28 c0 eb dc a1 ec 1f 35 c0 89 6c
> 24 04 89
>
> Any ideas?
>
> Cheers, Chris.
> --
> _ __ __ _
> / __/ / ,__(_)_ | Chris Wilson -- UNIX Firewall Lead Developer |
> / (_ ,\/ _/ /_ \ | NetServers.co.uk http://www.netservers.co.uk |
> \__/_/_/_//_/___/ | 21 Signet Court, Cambridge, UK. 01223 576516 |
>
> _______________________________________________
> Vserver mailing list
> Vserver_at_list.linux-vserver.org
> http://list.linux-vserver.org/mailman/listinfo/vserver
_______________________________________________
Vserver mailing list
Vserver_at_list.linux-vserver.org
http://list.linux-vserver.org/mailman/listinfo/vserver