Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262134AbVC2AMr (ORCPT ); Mon, 28 Mar 2005 19:12:47 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262135AbVC2AMr (ORCPT ); Mon, 28 Mar 2005 19:12:47 -0500 Received: from wproxy.gmail.com ([64.233.184.198]:29583 "EHLO wproxy.gmail.com") by vger.kernel.org with ESMTP id S262134AbVC2AMa (ORCPT ); Mon, 28 Mar 2005 19:12:30 -0500 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:references; b=tOvUZ4xKvANIPj7h5qYHtmpPo+SMa7dxLbsMY8tdZ5VMIeZOJFQi0dVtPE/vtZdEHHwAlz9uSQRBQryNdA5x3soAL/59F1B6WYrapaSuc5JGv2KW5RVukqylT9lSyJdmBYEdJ+7A1bri7RCvicmzaPaRYUIfDEUzhze79TrDN+4= Message-ID: <2cd57c9005032816126557d064@mail.gmail.com> Date: Tue, 29 Mar 2005 08:12:26 +0800 From: Coywolf Qi Hunt Reply-To: Coywolf Qi Hunt To: Chris Wright Subject: Re: Kernel OOOPS in 2.6.11.6 Cc: Ali Akcaagac , linux-kernel@vger.kernel.org In-Reply-To: <20050328230416.GP30522@shell0.pdx.osdl.net> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit References: <1112008141.17962.1.camel@localhost> <20050328224430.GO28536@shell0.pdx.osdl.net> <2cd57c9005032814572b7e9bac@mail.gmail.com> <20050328230416.GP30522@shell0.pdx.osdl.net> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3564 Lines: 81 On Mon, 28 Mar 2005 15:04:16 -0800, Chris Wright wrote: > * Coywolf Qi Hunt (coywolf@gmail.com) wrote: > > On Mon, 28 Mar 2005 14:44:30 -0800, Chris Wright wrote: > > > * Ali Akcaagac (aliakc@web.de) wrote: > > > > And happy easter to you all. Just got this while trying to delete some > > > > files on my system. > > > > > > I'm curious, what was the virtual address the kernel was "Unable to handle..." > > > That part was left off this bug report. > > > > > > > : printing eip: > > > > : c021f089 > > > > : *pde = 00000000 > > > > : Oops: 0000 [#1] > > > > : PREEMPT > > > > : Modules linked in: snd_seq_midi snd_emu10k1_synth snd_emux_synth > > > > snd_seq_virmidi snd_seq_midi_event snd_seq_midi_emul snd_seq snd_emu10k1 > > > > snd_rawmidi snd_seq_device snd_ac97_codec snd_pcm snd_timer > > > > snd_page_alloc snd_util_mem snd_hwdep snd soundcore parport_pc lp > > > > parport 8139too mii crc32 > > > > : CPU: 0 > > > > : EIP: 0060:[linvfs_open+89/160] Not tainted VLI > > > > : EFLAGS: 00010282 (2.6.11.6) > > > > : EIP is at linvfs_open+0x59/0xa0 > > > > > > Nothing in the -stable series has changed either XFS or the core vfs > > > path on during file open. Without a chance of reproducing or any more > > > information, it'll be tough to make much progress here. > > > > > > > : eax: 00000000 ebx: c77ac06c ecx: 00000001 edx: c021f030 > > > > : esi: 00000000 edi: c77ac050 ebp: dffe41a0 esp: c2d95f14 > > > > : ds: 007b es: 007b ss: 0068 > > > > : Process mc (pid: 17862, threadinfo=c2d94000 task=d18d2a80) > > > > : Stack: c01561a9 dffe41a0 d73504c0 00000000 c77ac06c c015446b c77ac06c > > > > d73504c0 > > > > : 00000001 ffffffe9 00008000 00008000 dc364000 c2d94000 c015426c > > > > cbcdff54 > > > > : dffe41a0 00008000 c2d95f60 cbcdff54 dffe41a0 bfffeef0 0d00ad72 > > > > 00300001 > > > > : Call Trace: > > > > : [get_empty_filp+89/208] get_empty_filp+0x59/0xd0 > > > > : [dentry_open+491/672] dentry_open+0x1eb/0x2a0 > > > > : [filp_open+92/112] filp_open+0x5c/0x70 > > > > : [get_unused_fd+123/224] get_unused_fd+0x7b/0xe0 > > > > : [sys_open+73/144] sys_open+0x49/0x90 > > > > : [syscall_call+7/11] syscall_call+0x7/0xb > > > > : Code: 5b 3c b8 01 00 00 00 e8 c6 42 ef ff b8 00 e0 ff ff 21 e0 8b 40 > > > > 08 a8 08 75 4d 85 f6 7c 0a 7f 32 81 fb ff ff ff 7f 77 2a 8b 47 14 <8b> > > > > 50 08 c7 44 24 04 00 00 00 00 89 04 24 ff 52 04 8b 5c 24 08 > > > > > > Best I can tell, you hit this: > > > > > > mov 0x8(%eax),%edx > > > > > > with eax == 00000000. This corresponds to a vp->v_fops (or rather > > > vp->v_bh.bh_first->bd_ops) deref. So, looks like the vnode has a > > > NULL v_bh.bh_first (which looks like it's meant to be used to mean > > > uninitialized). May check with XFS folks if they've seen this type > > > of bug. > > > > I think it is f = kmem_cache_alloc(filp_cachep, GFP_KERNEL); returns an > > invalid pointer, then in memset(f, 0, sizeof(*f)); fault happens at address f. > > eax == 0 is to clear the memory in memset(). > > The trace indicates it's in linvfs_open > (EIP: 0060:[linvfs_open+89/160]) > and the insturction dump at the end supports that. How to explain: Call Trace: [get_empty_filp+89/208] get_empty_filp+0x59/0xd0 ? Thanks -- Coywolf Qi Hunt http://sosdg.org/~coywolf/ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/