From: "Christopher S. Aker" <caker@theshore.net>
To: <linux-kernel@vger.kernel.org>
Subject: 2.6.10-rc2-bk7 - kernel BUG at fs/sysfs/file.c:87!
Date: Wed, 24 Nov 2004 13:24:39 -0600 [thread overview]
Message-ID: <002c01c4d25b$3e8b9b10$0201a8c0@hawk> (raw)
Doing "cat /sys/block/sda/queue/iosched/show_status" produces the following BUG:
------------[ cut here ]------------
kernel BUG at fs/sysfs/file.c:87!
invalid operand: 0000 [#1]
SMP
Modules linked in:
CPU: 0
EIP: 0060:[<c018455b>] Not tainted VLI
EFLAGS: 00010206 (2.6.10-rc2-bk7-1-bigmem)
EIP is at fill_read_buffer+0x93/0x9d
eax: 000019bb ebx: f4004fc0 ecx: f7eb8800 edx: c03c49a3
esi: f7eb6188 edi: c04173b0 ebp: c0417348 esp: c0883f34
ds: 007b es: 007b ss: 0068
Process cat (pid: 14936, threadinfo=c0882000 task=f1b1ea20)
Stack: f7eb6188 c0417348 ddff0000 00000000 f4004fc0 c06a0380 c0883fac 00001000
c0184657 f6a19654 f4004fc0 00000000 00001000 00000000 c0150ffc c06a0380
0804d888 00001000 c0883fac e0026148 e0026140 c06a0380 fffffff7 0804d888
Call Trace:
[<c0184657>] sysfs_read_file+0x31/0x6d
[<c0150ffc>] vfs_read+0xb0/0x119
[<c01512ba>] sys_read+0x51/0x80
[<c01023e9>] sysenter_past_esp+0x52/0x71
Code: 10 00 00 7f 26 85 c0 78 1c 89 03 8b 54 24 0c 89 d0 8b 5c 24 10 8b 74 24 14 8b
7c 24 18 8b 6c 24 1c 83 c4 20 c3 89 44 24 0c eb e0 <0f> 0b 57 00 17 3a 3b c0 eb d0 83
ec 24 89 5c 24 14 89 74 24 18
ksymoops output:
>>EIP; c018455b <fill_read_buffer+93/9d> <=====
>>ebx; f4004fc0 <pg0+33af2fc0/3faec400>
>>ecx; f7eb8800 <pg0+379a6800/3faec400>
>>edx; c03c49a3 <__func__.4+1a7a0/41bc1>
>>esi; f7eb6188 <pg0+379a4188/3faec400>
>>edi; c04173b0 <cfq_sysfs_ops+0/8>
>>ebp; c0417348 <cfq_misc_entry+0/14>
>>esp; c0883f34 <pg0+371f34/3faec400>
Trace; c0184657 <sysfs_read_file+31/6d>
Trace; c0150ffc <vfs_read+b0/119>
Trace; c01512ba <sys_read+51/80>
Trace; c01023e9 <sysenter_past_esp+52/71>
This architecture has variable length instructions, decoding before eip
is unreliable, take these instructions with a pinch of salt.
Code; c0184530 <fill_read_buffer+68/9d>
00000000 <_EIP>:
Code; c0184530 <fill_read_buffer+68/9d>
0: 10 00 adc %al,(%eax)
Code; c0184532 <fill_read_buffer+6a/9d>
2: 00 7f 26 add %bh,0x26(%edi)
Code; c0184535 <fill_read_buffer+6d/9d>
5: 85 c0 test %eax,%eax
Code; c0184537 <fill_read_buffer+6f/9d>
7: 78 1c js 25 <_EIP+0x25>
Code; c0184539 <fill_read_buffer+71/9d>
9: 89 03 mov %eax,(%ebx)
Code; c018453b <fill_read_buffer+73/9d>
b: 8b 54 24 0c mov 0xc(%esp,1),%edx
Code; c018453f <fill_read_buffer+77/9d>
f: 89 d0 mov %edx,%eax
Code; c0184541 <fill_read_buffer+79/9d>
11: 8b 5c 24 10 mov 0x10(%esp,1),%ebx
Code; c0184545 <fill_read_buffer+7d/9d>
15: 8b 74 24 14 mov 0x14(%esp,1),%esi
Code; c0184549 <fill_read_buffer+81/9d>
19: 8b 7c 24 18 mov 0x18(%esp,1),%edi
Code; c018454d <fill_read_buffer+85/9d>
1d: 8b 6c 24 1c mov 0x1c(%esp,1),%ebp
Code; c0184551 <fill_read_buffer+89/9d>
21: 83 c4 20 add $0x20,%esp
Code; c0184554 <fill_read_buffer+8c/9d>
24: c3 ret
Code; c0184555 <fill_read_buffer+8d/9d>
25: 89 44 24 0c mov %eax,0xc(%esp,1)
Code; c0184559 <fill_read_buffer+91/9d>
29: eb e0 jmp b <_EIP+0xb>
This decode from eip onwards should be reliable
Code; c018455b <fill_read_buffer+93/9d>
00000000 <_EIP>:
Code; c018455b <fill_read_buffer+93/9d> <=====
0: 0f 0b ud2a <=====
Code; c018455d <fill_read_buffer+95/9d>
2: 57 push %edi
Code; c018455e <fill_read_buffer+96/9d>
3: 00 17 add %dl,(%edi)
Code; c0184560 <fill_read_buffer+98/9d>
5: 3a 3b cmp (%ebx),%bh
Code; c0184562 <fill_read_buffer+9a/9d>
7: c0 eb d0 shr $0xd0,%bl
Code; c0184565 <flush_read_buffer+0/c1>
a: 83 ec 24 sub $0x24,%esp
Code; c0184568 <flush_read_buffer+3/c1>
d: 89 5c 24 14 mov %ebx,0x14(%esp,1)
Code; c018456c <flush_read_buffer+7/c1>
11: 89 74 24 18 mov %esi,0x18(%esp,1)
-Chris
next reply other threads:[~2004-11-24 19:24 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-11-24 19:24 Christopher S. Aker [this message]
2004-11-24 20:41 ` 2.6.10-rc2-bk7 - kernel BUG at fs/sysfs/file.c:87! Maneesh Soni
2004-11-24 21:18 ` Jens Axboe
2004-11-24 21:32 ` Greg KH
2004-11-25 6:58 ` Jens Axboe
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='002c01c4d25b$3e8b9b10$0201a8c0@hawk' \
--to=caker@theshore.net \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox