Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262438AbUKDU5C (ORCPT ); Thu, 4 Nov 2004 15:57:02 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262427AbUKDUyY (ORCPT ); Thu, 4 Nov 2004 15:54:24 -0500 Received: from mail.kroah.org ([69.55.234.183]:19623 "EHLO perch.kroah.org") by vger.kernel.org with ESMTP id S262411AbUKDUxD (ORCPT ); Thu, 4 Nov 2004 15:53:03 -0500 Date: Thu, 4 Nov 2004 12:52:38 -0800 From: Greg KH To: maneesh@in.ibm.com Cc: linux-kernel@vger.kernel.org Subject: kernel BUG at fs/sysfs/dir.c:20! Message-ID: <20041104205238.GA11885@kroah.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.6i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2735 Lines: 70 Hi, I get the following BUG in the sysfs code when I do: - plug in a usb-serial device. - open the port with 'cat /dev/ttyUSB0' - unplug the device. - stop the 'cat' process with control-C This used to work just fine before your big sysfs changes. Anything I should look at testing? thanks, greg k-h kernel BUG at fs/sysfs/dir.c:20! invalid operand: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC Modules linked in: pl2303 usbserial evdev usbhid uhci_hcd ehci_hcd usbcore CPU: 0 EIP: 0060:[] Not tainted VLI EFLAGS: 00010a87 (2.6.10-rc1-bk14) EIP is at sysfs_d_iput+0x7c/0x86 eax: d5d50f68 ebx: d5d50f68 ecx: c018e694 edx: c0489c00 esi: d739eae8 edi: d6e76ea8 ebp: d714af5c esp: d6ee9ce4 ds: 007b es: 007b ss: 0068 Process serial_loopback (pid: 9270, threadinfo=d6ee8000 task=d69b9af0) Stack: d5d50f68 d5d50f68 d6e76ea8 d5d50f70 c0172c74 d5d50f68 d6e76ea8 dca96eb4 c0407b48 db23bf0c c01f7d17 d5d50f68 00000002 dca96e90 c025a952 dca96eb4 00000042 dca96e90 db23bf0c d739eec4 c025a9c5 dca96e90 dca96ee8 00000000 Call Trace: [] dput+0x14d/0x1ed [] kobject_del+0x20/0x2d [] device_del+0x8a/0xda [] device_unregister+0x23/0x30 [] destroy_serial+0x82/0x186 [usbserial] [] serial_close+0x0/0x11c [usbserial] [] release_dev+0x6c8/0x801 [] destroy_serial+0x0/0x186 [usbserial] [] change_page_attr+0x5b/0x71 [] filp_dtor+0x0/0x1d [] kernel_map_pages+0x2a/0x58 [] cache_free_debugcheck+0x2b1/0x2b6 [] dbg_redzone1+0x15/0x2b [] poison_obj+0x2e/0x59 [] cache_free_debugcheck+0x130/0x2b6 [] remove_vm_struct+0x8b/0xa7 [] tty_release+0x14/0x1f [] __fput+0x13e/0x177 [] filp_close+0x52/0x96 [] put_files_struct+0x83/0xfc [] do_exit+0x176/0x4a6 [] do_group_exit+0x40/0xa8 [] get_signal_to_deliver+0x226/0x350 [] do_signal+0x98/0x15e [] __wake_up+0x40/0x56 [] tty_read+0xc5/0x12f [] dnotify_parent+0x3a/0xa5 [] vfs_read+0xa8/0x12f [] sys_read+0x51/0x80 [] do_notify_resume+0x37/0x3c [] work_notifysig+0x13/0x15 Code: 0c 83 c4 10 e9 36 73 fe ff 8b 5e 14 8b 03 89 04 24 e8 07 79 fb ff 8b 43 04 89 04 24 e8 43 97 06 00 89 1c 24 e8 f4 78 fb ff eb be <0f> 0b 14 00 72 99 37 c0 eb 9d 83 ec 1c a1 b0 27 3c c0 89 5c 24 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/