Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 4 product line. The current stable release is 4.9. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 433258

Summary: lsof crash kernel
Product: Red Hat Enterprise Linux 4 Reporter: Alexander <shaburov>
Component: kernelAssignee: Karel Zak <kzak>
Status: CLOSED DUPLICATE QA Contact: Brock Organ <borgan>
Severity: high Docs Contact:
Priority: low    
Version: 4.3CC: jrfuller
Target Milestone: rc   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-09-24 19:23:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Alexander 2008-02-18 07:19:07 UTC
Description of problem: RHEL installed on HP 570 ML-2

Unable to handle kernel NULL pointer dereference at virtual address 000001b8
 printing eip:
c018548c
*pde = 194f8001
Oops: 0000 [#1]
SMP 
Modules linked in: nfsd exportfs md5 ipv6 parport_pc lp parport netconsole 
netdump autofs4 i2c_dev i2c_core nfs lockd nfs_acl sunrpc dm_mirror dm_mod 
button battery ac ohci_hcd shpchp cpqphp e100 mii tg3 e1000 floppy ext3 jbd 
cciss aic7xxx sd_mod scsi_mod
CPU:    4
EIP:    0060:[<c018548c>]    Not tainted VLI
EFLAGS: 00010246   (2.6.9-34.ELsmp) 
EIP is at show_map+0x70/0x111
eax: 00000000   ebx: d566d7ac   ecx: 00000000   edx: f06cd930
esi: 00100073   edi: f71dcc00   ebp: 00000000   esp: ef7adf24
ds: 007b   es: 007b   ss: 0068
Process lsof (pid: 20275, threadinfo=ef7ad000 task=efa3b2b0)
Stack: 00000070 b7b8e000 00000000 00000000 00000000 ef7adf40 f06cd930 c032c980 
       c032c980 f71dcc00 00000000 d566d7ac c0174680 00000106 0000002d 000003d3 
       b7f4902d 00000014 00000000 00000013 00000000 c032ce60 c9a66d80 00000400 
Call Trace:
 [<c0174680>] seq_read+0x1c7/0x2c2
 [<c015a43d>] vfs_read+0xb6/0xe2
 [<c015a650>] sys_read+0x3c/0x62
 [<c02d2657>] syscall_call+0x7/0xb
 [<c02d007b>] schedule+0x32f/0x8d3
Code: c1 e0 0c 50 89 f0 24 80 3c 01 19 c0 83 e0 fd 83 c0 73 f7 c6 04 00 00 00 
50 75 1b 83 3d bc 11 41 c0 00 75 19 8b 54 24 18 8b 42 70 <8b> 80 b8 01 00 00 39 
43 04 73 07 b8 78 00 00 00 eb 05 b8 2d 00 

Version-Release number of selected component (if applicable):
Red Hat Enterprise Linux AS release 4 (Nahant Update 3)

How reproducible:
random

Steps to Reproduce:
I don't know
  
Actual results:


Expected results:


Additional info:

Comment 1 Johnray Fuller 2009-09-24 19:23:16 UTC
This should be resolved with the following errata:

http://rhn.redhat.com/errata/RHSA-2006-0493.html

* a flaw in the virtual memory implementation that allowed local user to
cause a denial of service (panic) by using the lsof command

*** This bug has been marked as a duplicate of bug 189260 ***