Re: FIXED: Re: Bug#570350: Google Chrome
Berni Elbourn wrote:
Strangely none of the updates to the original bug came through on email
... I am so sorry but I missed the testing requests there. The bug is
now archived. So I am posting just to close the case (as it were) for me.
A whole new version google-chrome-stable is now in the google's
repositories which avoids the problem.
Actual versions: Chrome: 5.0.375.70
Kernel: Linux version 2.6.26-2-amd64 (Debian 2.6.26-22lenny1)
(dannf@debian.org) (gcc version 4.1.3 20080704 (prerelease) (Debian
4.1.2-25)) #1 SMP Wed May 12 18:03:14 UTC 2010
And significantly there is no suid nonsense with this version:
ls -l /opt/google/chrome/google-chrome
-rwxr-xr-x 1 root root 920 2010-06-02 03:42
/opt/google/chrome/google-chrome
ls -l /opt/google/chrome/chrome
-rwxr-xr-x 1 root root 42049032 Jun 2 03:42 /opt/google/chrome/chrome
But strangely after running for a couple of days the kernel BUG returns:-
Jun 25 09:10:27 red kernel: [ 9132.516449] CPU 2
Jun 25 09:10:27 red kernel: [ 9132.516453] Modules linked in: nls_utf8
nls_cp437 vfat fat nls_base binfmt_misc ppdev parport_pc lp parport
xt_TCPMSS xt_tcpmss autofs4 powernow_k8 cpufreq_stats cpufreq_userspace
cpufreq_powersave cpufreq_conservative cpufreq_ondemand freq_table nfsd
auth_rpcgss exportfs nfs lockd nfs_acl sunrpc pppoe pppox ppp_generic
slhc ipt_MASQUERADE iptable_nat nf_nat xt_tcpudp nf_conntrack_ipv4
xt_state nf_conntrack xt_multiport iptable_filter iptable_mangle
ip_tables x_tables ipv6 ipmi_si ipmi_devintf ipmi_msghandler loop
snd_usb_audio snd_pcm_oss snd_mixer_oss snd_pcm snd_page_alloc
snd_usb_lib snd_hwdep snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi
shpchp pcspkr pci_hotplug snd_seq_midi_event snd_seq snd_timer
snd_seq_device snd soundcore i2c_nforce2 i2c_core button evdev ext3 jbd
mbcache raid1 md_mod sg sr_mod cdrom sd_mod ide_pci_generic ide_core
usbhid hid ff_memless usb_storage sata_nv e100 mii tg3 ata_generic
ehci_hcd ohci_hcd libata scsi_mod dock thermal processor fan therm
Jun 25 09:10:27 red kernel: al_sys [last unloaded: scsi_wait_scan]
Jun 25 09:10:27 red kernel: [ 9132.516562] Pid: 27338, comm: chrome Not
tainted 2.6.26-2-amd64 #1
Jun 25 09:10:27 red kernel: [ 9132.516567] RIP:
0010:[<ffffffff80237b6c>] [<ffffffff80237b6c>] do_exit+0x4b9/0x6a6
Jun 25 09:10:27 red kernel: [ 9132.516579] RSP: 0018:ffff81007e161f08
EFLAGS: 00010283
Jun 25 09:10:27 red kernel: [ 9132.516583] RAX: ffff81007e5931d0 RBX:
ffff81007e593010 RCX: ffff81007e5931d0
Jun 25 09:10:27 red kernel: [ 9132.516588] RDX: ffff81007e5931d0 RSI:
ffff81007e593168 RDI: ffff81007e593010
Jun 25 09:10:27 red kernel: [ 9132.516592] RBP: ffff81007e593020 R08:
00007fffffffae30 R09: 0000000000000000
Jun 25 09:10:27 red kernel: [ 9132.516596] R10: 00007fffffffae30 R11:
0000000000000000 R12: ffff81007e593020
Jun 25 09:10:27 red kernel: [ 9132.516601] R13: ffff810013311020 R14:
0000000000000000 R15: 0000000000000000
Jun 25 09:10:27 red kernel: [ 9132.516606] FS: 00007fee16d6f780(0000)
GS:ffff81007fb93240(0000) knlGS:0000000000000000
Jun 25 09:10:27 red kernel: [ 9132.516611] CS: 0010 DS: 0000 ES: 0000
CR0: 000000008005003b
Jun 25 09:10:27 red kernel: [ 9132.516615] CR2: 0000000002f2a6b0 CR3:
000000000397b000 CR4: 00000000000006e0
Jun 25 09:10:27 red kernel: [ 9132.516620] DR0: 0000000000000000 DR1:
0000000000000000 DR2: 0000000000000000
Jun 25 09:10:27 red kernel: [ 9132.516624] DR3: 0000000000000000 DR6:
00000000ffff0ff0 DR7: 0000000000000400
Jun 25 09:10:27 red kernel: [ 9132.516629] Process chrome (pid: 27338,
threadinfo ffff81007e160000, task ffff81007e593020)
Jun 25 09:10:27 red kernel: [ 9132.516633] Stack: ffff81007e161f08
ffff81007e161f08 ffff81007e593020 ffff81007d1db780
Jun 25 09:10:27 red kernel: [ 9132.516642] ffff81001dd345c0
0000000000000000 00007fffffffae30 0000000002eb55c0
Jun 25 09:10:27 red kernel: [ 9132.516649] 0000000002e19500
ffffffff80237dc6 00007fffffffae90 00007fffffffbc10
Jun 25 09:10:27 red kernel: [ 9132.516655] Call Trace:
Jun 25 09:10:27 red kernel: [ 9132.516671] [<ffffffff80237dc6>] ?
do_group_exit+0x6d/0x9d
Jun 25 09:10:27 red kernel: [ 9132.516680] [<ffffffff80237e08>] ?
sys_exit_group+0x12/0x16
Jun 25 09:10:27 red kernel: [ 9132.516687] [<ffffffff8020beda>] ?
system_call_after_swapgs+0x8a/0x8f
Jun 25 09:10:27 red kernel: [ 9132.516705]
Jun 25 09:10:27 red kernel: [ 9132.516707]
Jun 25 09:10:27 red kernel: [ 9132.516759] RSP <ffff81007e161f08>
Jun 25 09:10:27 red kernel: [ 9132.516765] ---[ end trace
113ed97032b9133e ]---
Doh! I'll have a look at the kernel patch...
More soon.
Berni
Reply to: