From: glynis@butterfly.hjsoft.com
To: linux-kernel@vger.kernel.org
Subject: 2.5.20: smbfs oops in smb_readpage
Date: Wed, 5 Jun 2002 21:36:54 -0400 [thread overview]
Message-ID: <20020606013654.GA32609@butterfly.hjsoft.com> (raw)
[-- Attachment #1: Type: text/plain, Size: 9589 bytes --]
reading a file from an smbfs causes this oops, then the smbfs won't
unmount.
traversing the filesystem is fine, but reading data is not. first 2
oopses are from autofs-mounted shares (nt4), and the last is a
hand-mounted fs (smbd on localhost). i don't suspect that matters
much, though.
this looks like the exact same problem reported against 2.5.19 in
`PROBLEM: Kernel 2.5.19 oops when copying files from SMBFS fs to'.
thanks.
ver_linux:
---
If some fields are empty or look unusual you may have an old version.
Compare to the current minimal requirements in Documentation/Changes.
Linux density 2.5.20 #7 Wed Jun 5 19:02:22 EDT 2002 i686 unknown
Gnu C gcc (GCC) 3.1.1 20020531 (Debian prerelease) Copyright (C) 2002 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Gnu make 3.79.1
util-linux 2.11n
mount 2.11n
modutils 2.4.15
e2fsprogs 1.27
pcmcia-cs 3.1.33
PPP 2.4.1
Linux C Library 2.2.5
Dynamic linker (ldd) 2.2.5
Procps 2.0.7
Net-tools 1.60
Console-tools 0.2.3
Sh-utils 2.0.11
Modules Loaded smbfs af_packet autofs4 serial_cs 3c574_cs ds yenta_socket pcmcia_core uhci-hcd usbcore nls_iso8859-1 nls_cp437 serial snd-pcm-oss snd-mixer-oss snd-maestro3 snd-pcm snd-timer snd-ac97-codec snd soundcore apm
---
ksymoops 2.4.5 on i686 2.5.20. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.5.20/ (default)
-m /boot/System.map-2.5.20 (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
cs: IO port probe 0x0c00-0x0cff: clean.
cs: IO port probe 0x0800-0x08ff: clean.
cs: IO port probe 0x0100-0x04ff: excluding 0x280-0x287 0x378-0x37f 0x4d0-0x4d7
cs: IO port probe 0x0a00-0x0aff: clean.
cs: memory probe 0xa0000000-0xa0ffffff: clean.
Unable to handle kernel NULL pointer dereference at virtual address 00000008
ccae8013
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<ccae8013>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010286
eax: 00000000 ebx: c114feb8 ecx: c114feb8 edx: c1150590
esi: 00000000 edi: c88a7238 ebp: 00000001 esp: c9dabe44
ds: 0018 es: 0018 ss: 0018
Stack: c114feb8 00000000 c114feb8 00000000 c013bed4 00000000 c114feb8 00000000
00000001 00000001 c88a7238 c9daa000 c013bfb0 c88a7238 c9dabe90 00000001
c9daa000 00000001 00000000 c9dabe90 c9dabe90 00000010 00000000 00000000
Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>]
[<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c01073ff>]
Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2
>>EIP; ccae8013 <[smbfs]smb_readpage+13/40> <=====
>>ebx; c114feb8 <_end+e502d4/c5e241c>
>>ecx; c114feb8 <_end+e502d4/c5e241c>
>>edx; c1150590 <_end+e509ac/c5e241c>
>>edi; c88a7238 <_end+85a7654/c5e241c>
>>esp; c9dabe44 <_end+9aac260/c5e241c>
Trace; c013bed4 <read_pages+84/a0>
Trace; c013bfb0 <do_page_cache_readahead+c0/140>
Trace; c013c096 <page_cache_readahead+66/130>
Trace; c012d9bd <do_generic_file_read+bd/390>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; c012e028 <generic_file_read+a8/160>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; ccae8307 <[smbfs]smb_file_read+77/80>
Trace; c013ee6e <vfs_read+ae/f0>
Trace; c013efde <sys_read+3e/60>
Trace; c01073ff <syscall_call+7/b>
Code; ccae8013 <[smbfs]smb_readpage+13/40>
00000000 <_EIP>:
Code; ccae8013 <[smbfs]smb_readpage+13/40> <=====
0: 8b 40 08 mov 0x8(%eax),%eax <=====
Code; ccae8016 <[smbfs]smb_readpage+16/40>
3: ff 43 10 incl 0x10(%ebx)
Code; ccae8019 <[smbfs]smb_readpage+19/40>
6: 89 5c 24 04 mov %ebx,0x4(%esp,1)
Code; ccae801d <[smbfs]smb_readpage+1d/40>
a: 89 04 24 mov %eax,(%esp,1)
Code; ccae8020 <[smbfs]smb_readpage+20/40>
d: e8 7b fe ff ff call fffffe8d <_EIP+0xfffffe8d> ccae7ea0 <[smbfs]smb_readpage_sync+0/160>
Code; ccae8025 <[smbfs]smb_readpage+25/40>
12: 31 d2 xor %edx,%edx
Unable to handle kernel NULL pointer dereference at virtual address 00000008
ccae8013
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<ccae8013>] Not tainted
EFLAGS: 00010286
eax: 00000000 ebx: c10e2910 ecx: c10e2910 edx: c10e294c
esi: 00000000 edi: c66f3638 ebp: 00000010 esp: c664de44
ds: 0018 es: 0018 ss: 0018
Stack: c10e2910 00000000 c10e2910 00000000 c013bed4 00000000 c10e2910 00000000
0000000f 00000010 c66f3638 c664c000 c013bfb0 c66f3638 c664de90 00000010
c664c000 00000010 000000b3 c10e5874 c10e28ec 00000010 00000000 00000000
Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>]
[<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c01073ff>]
Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2
>>EIP; ccae8013 <[smbfs]smb_readpage+13/40> <=====
>>ebx; c10e2910 <_end+de2d2c/c5e241c>
>>ecx; c10e2910 <_end+de2d2c/c5e241c>
>>edx; c10e294c <_end+de2d68/c5e241c>
>>edi; c66f3638 <_end+63f3a54/c5e241c>
>>esp; c664de44 <_end+634e260/c5e241c>
Trace; c013bed4 <read_pages+84/a0>
Trace; c013bfb0 <do_page_cache_readahead+c0/140>
Trace; c013c096 <page_cache_readahead+66/130>
Trace; c012d9bd <do_generic_file_read+bd/390>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; c012e028 <generic_file_read+a8/160>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; ccae8307 <[smbfs]smb_file_read+77/80>
Trace; c013ee6e <vfs_read+ae/f0>
Trace; c013efde <sys_read+3e/60>
Trace; c01073ff <syscall_call+7/b>
Code; ccae8013 <[smbfs]smb_readpage+13/40>
00000000 <_EIP>:
Code; ccae8013 <[smbfs]smb_readpage+13/40> <=====
0: 8b 40 08 mov 0x8(%eax),%eax <=====
Code; ccae8016 <[smbfs]smb_readpage+16/40>
3: ff 43 10 incl 0x10(%ebx)
Code; ccae8019 <[smbfs]smb_readpage+19/40>
6: 89 5c 24 04 mov %ebx,0x4(%esp,1)
Code; ccae801d <[smbfs]smb_readpage+1d/40>
a: 89 04 24 mov %eax,(%esp,1)
Code; ccae8020 <[smbfs]smb_readpage+20/40>
d: e8 7b fe ff ff call fffffe8d <_EIP+0xfffffe8d> ccae7ea0 <[smbfs]smb_readpage_sync+0/160>
Code; ccae8025 <[smbfs]smb_readpage+25/40>
12: 31 d2 xor %edx,%edx
Unable to handle kernel NULL pointer dereference at virtual address 00000008
ccae8013
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<ccae8013>] Not tainted
EFLAGS: 00010286
eax: 00000000 ebx: c11a2850 ecx: c11a2850 edx: c1049b8c
esi: 00000000 edi: c66f3138 ebp: 00000002 esp: c78a5e44
ds: 0018 es: 0018 ss: 0018
Stack: c11a2850 00000000 c11a2850 00000000 c013bed4 00000000 c11a2850 00000000
00000002 00000002 c66f3138 c78a4000 c013bfb0 c66f3138 c78a5e90 00000002
c78a4000 00000002 00000001 c110c1a8 c110c1a8 00000010 00000000 00000000
Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>]
[<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c01073ff>]
Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2
>>EIP; ccae8013 <[smbfs]smb_readpage+13/40> <=====
>>ebx; c11a2850 <_end+ea2c6c/c5e241c>
>>ecx; c11a2850 <_end+ea2c6c/c5e241c>
>>edx; c1049b8c <_end+d49fa8/c5e241c>
>>edi; c66f3138 <_end+63f3554/c5e241c>
>>esp; c78a5e44 <_end+75a6260/c5e241c>
Trace; c013bed4 <read_pages+84/a0>
Trace; c013bfb0 <do_page_cache_readahead+c0/140>
Trace; c013c096 <page_cache_readahead+66/130>
Trace; c012d9bd <do_generic_file_read+bd/390>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; c012e028 <generic_file_read+a8/160>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; ccae8307 <[smbfs]smb_file_read+77/80>
Trace; c013ee6e <vfs_read+ae/f0>
Trace; c013efde <sys_read+3e/60>
Trace; c01073ff <syscall_call+7/b>
Code; ccae8013 <[smbfs]smb_readpage+13/40>
00000000 <_EIP>:
Code; ccae8013 <[smbfs]smb_readpage+13/40> <=====
0: 8b 40 08 mov 0x8(%eax),%eax <=====
Code; ccae8016 <[smbfs]smb_readpage+16/40>
3: ff 43 10 incl 0x10(%ebx)
Code; ccae8019 <[smbfs]smb_readpage+19/40>
6: 89 5c 24 04 mov %ebx,0x4(%esp,1)
Code; ccae801d <[smbfs]smb_readpage+1d/40>
a: 89 04 24 mov %eax,(%esp,1)
Code; ccae8020 <[smbfs]smb_readpage+20/40>
d: e8 7b fe ff ff call fffffe8d <_EIP+0xfffffe8d> ccae7ea0 <[smbfs]smb_readpage_sync+0/160>
Code; ccae8025 <[smbfs]smb_readpage+25/40>
12: 31 d2 xor %edx,%edx
1 warning issued. Results may not be reliable.
---
--
____________________}John Flinchbaugh{______________________
| glynis@hjsoft.com http://www.hjsoft.com/~glynis/ |
~~Powered by Linux: Reboots are for hardware upgrades only~~
[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]
next reply other threads:[~2002-06-06 1:37 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2002-06-06 1:36 glynis [this message]
2002-06-06 2:03 ` 2.5.20: smbfs oops in smb_readpage Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20020606013654.GA32609@butterfly.hjsoft.com \
--to=glynis@butterfly.hjsoft.com \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox