From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Randy.Dunlap" Subject: Re: ide-tape oops Date: Wed, 09 Mar 2005 19:13:01 -0800 Message-ID: <422FBB3D.4010509@osdl.org> References: <7619.202.12.233.21.1110421544.squirrel@webmail.theforce.com.au> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Received: from fire.osdl.org ([65.172.181.4]:50410 "EHLO smtp.osdl.org") by vger.kernel.org with ESMTP id S261151AbVCJDZZ (ORCPT ); Wed, 9 Mar 2005 22:25:25 -0500 In-Reply-To: <7619.202.12.233.21.1110421544.squirrel@webmail.theforce.com.au> Sender: linux-ide-owner@vger.kernel.org List-Id: linux-ide@vger.kernel.org To: Grahame Jordan Cc: linux-ide@vger.kernel.org Grahame Jordan wrote: > Hi, > > I have a machine on which when I run something like mt -f /dev/ht0 status > it seg faults. However I have another machine same spec that works OK? > > Any help would be appreciated > > Thanks > > Grahame Jordan > > Debian testing > Linux hanlay 2.6.8-2-686-smp #1 SMP Mon Jan 24 02:32:52 EST 2005 i686 Is it possible for you to try to recreate this on a more recent kernel? > GNU/Linux > P4 3.2GHz > 1GB RAM > > <6>i2c /dev entries driver > Unable to handle kernel NULL pointer dereference at virtual address 00000020 > printing eip: > f891744e > *pde = 00000000 > Oops: 0000 [#3] > PREEMPT SMP > Modules linked in: i2c_dev i2c_i801 i2c_core tsdev mousedev psmouse ipv6 > snd_intel8x0 snd_ac97_codec snd_pcm snd_timer snd_page_alloc gameport > snd_mpu401_uart snd_rawmidi snd_seq_device snd hw_random shpchp pciehp > pci_hotplug intel_agp intel_mch_agp agpgart evdev ehci_hcd eth1394 > uhci_hcd usbcore i810_audio ac97_codec soundcore piix sk98lin ohci1394 > capability commoncap ide_tape sbp2 ieee1394 ide_cd ide_core genrtc ext2 > ext3 jbd mbcache sr_mod cdrom sd_mod sata_promise ata_piix libata scsi_mod > unix font vesafb cfbcopyarea cfbimgblt cfbfillrect > CPU: 0 > EIP: 0060:[] Not tainted > EFLAGS: 00010297 (2.6.8-2-686-smp) > EIP is at idetape_chrdev_open+0x3e/0x190 [ide_tape] > eax: 00000000 ebx: 00000000 ecx: f738d440 edx: fffffffa > esi: 00000000 edi: cb534000 ebp: f7642380 esp: cb535dac > ds: 007b es: 007b ss: 0068 > Process mt (pid: 7038, threadinfo=cb534000 task=f7005210) > Stack: f738b51c f7642380 0000000f 00000001 00000286 00000000 00000132 > f7b2ac00 > f756cd9c 422faee6 24eb6ec0 f756cdd8 cb457400 cb457404 40165000 > c1000000 > c014de6b c1169f40 422faee6 24eb6ec0 00000000 c02de380 00000282 > 00000246 > Call Trace: > [] zap_pte_range+0x3b/0x2d0 > [] buffered_rmqueue+0x116/0x230 > [] __alloc_pages+0x310/0x370 > [] find_get_page+0x3b/0x70 > [] filemap_nopage+0x229/0x3c0 > [] dput+0x31/0x270 > [] link_path_walk+0xc2e/0x1020 > [] pte_alloc_map+0xae/0x100 > [] permission+0x67/0x80 > [] cdev_get+0x53/0xb0 > [] chrdev_open+0x125/0x290 > [] get_empty_filp+0x71/0x110 > [] dentry_open+0x16a/0x260 > [] filp_open+0x68/0x70 > [] get_unused_fd+0x49/0x100 > [] sys_open+0x5b/0x90 > [] syscall_call+0x7/0xb > Code: 8b 5e 20 89 b5 80 00 00 00 f0 0f ba ab fc 18 00 00 02 19 c0 -- ~Randy