bug#109: [kernel] bug#109: iptables causes trap 27


None


X-PA-RISC Linux-PR-Message: report 109
X-PA-RISC Linux-PR-Package: kernel
X-Loop: daniel_frazier@hp.com
Received: via spool by 109-bugs@bugs.parisc-linux.org id=B109.98765449418885
          (code B ref 109); Thu, 19 Apr 2001 04:33:01 GMT
Message-Id: <200104190421.WAA21523@puffin.external.hp.com>
To: Richard Hirst <rhirst@linuxcare.com>
Cc: 109@bugs.parisc-linux.org
In-Reply-To: Your message of "Wed, 18 Apr 2001 22:41:44 BST."
             <20010418224144.Y11226@linuxcare.com> 
Date: Wed, 18 Apr 2001 22:21:37 -0600
From: Grant Grundler <grundler@puffin.external.hp.com>

Richard Hirst wrote:
> > GR24 00000000000000ff
> > GR25 000000000008f001
> > GR26 000119800000e9d4
> > SR1  0000000000000180 	(SR0 is the same)
> > 
> > Looks like we tried to copyout the counters info but went past the
> > end of the page/space allocated by iptables. Not sure about this > > conclusion though...
> 
> I'd guess gr26 was screwed.  Surely the top half should be zero?

I thought so too. But then thought I have no clue how we copy from
kernel to user space and have sr1 == sr0. Hopefully jsm or willy
can comment on this ASAP.

I haven't traced the syscall path.
This could be a 32-user/64-kernel issue.
0x00011980 would be a valid user app address while 0xe9d4 would not.
(I thought all user app addresses were > 0x00010000).
Interesting we managed to make more than a dozen calls before it crashed.

thanks,
grant

Grant Grundler
parisc-linux {PCI|IOMMU|SMP} hacker
+1.408.447.7253