From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrew Morton Subject: Re: [Bugme-new] [Bug 13954] New: Oops in rtnetlink code when creating can device Date: Mon, 10 Aug 2009 21:54:36 -0700 Message-ID: <20090810215436.0bf47297.akpm@linux-foundation.org> References: Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: bugzilla-daemon@bugzilla.kernel.org, bugme-daemon@bugzilla.kernel.org, Urs Thuermann , Oliver Hartkopp , Lothar Wassmann , netdev@vger.kernel.org To: dbaryshkov@gmail.com Return-path: Received: from smtp1.linux-foundation.org ([140.211.169.13]:34410 "EHLO smtp1.linux-foundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751851AbZHKLyw (ORCPT ); Tue, 11 Aug 2009 07:54:52 -0400 In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: (switched to email. Please respond via emailed reply-to-all, not via the bugzilla web interface). On Mon, 10 Aug 2009 11:34:28 GMT bugzilla-daemon@bugzilla.kernel.org wrote: > http://bugzilla.kernel.org/show_bug.cgi?id=13954 Thanks. > Summary: Oops in rtnetlink code when creating can device > Product: Networking > Version: 2.5 > Kernel Version: 2.6.30-rc5 > Platform: All > OS/Version: Linux > Tree: Mainline > Status: NEW > Severity: normal > Priority: P1 > Component: Other > AssignedTo: acme@ghostprotocols.net > ReportedBy: dbaryshkov@gmail.com > Regression: No > > > I've got a nice oops when looking around new CAN code in kernel. > > root@qemux86:~# ip link add type can > [ 713.113325] BUG: unable to handle kernel NULL pointer dereference at (null) > [ 713.114216] IP: [] register_netdevice+0xab/0x420 > [ 713.114920] *pdpt = 00000000061bd001 *pde = 0000000000000000 > [ 713.115627] Oops: 0000 [#1] SMP > [ 713.115972] last sysfs file: > /sys/devices/virtual/backlight/fujitsu-laptop/brightness > [ 713.116137] Modules linked in: > [ 713.116137] > [ 713.116137] Pid: 1803, comm: ip Not tainted (2.6.31-rc5 #68) > [ 713.116137] EIP: 0060:[] EFLAGS: 00000246 CPU: 0 > [ 713.116137] EIP is at register_netdevice+0xab/0x420 > [ 713.116137] EAX: 00000000 EBX: 00000000 ECX: 00000001 EDX: 00000001 > [ 713.116137] ESI: c72c6000 EDI: 00000000 EBP: c61abb54 ESP: c61abb34 > [ 713.116137] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 > [ 713.116137] Process ip (pid: 1803, ti=c61aa000 task=c6f395e0 > task.ti=c61aa000) > [ 713.116137] Stack: > [ 713.116137] c61abb54 c13f732f 00000001 c61abbb4 894f908a 00000000 c72c6000 > 00000000 > [ 713.116137] <0> c61abc74 c13f8278 c61abbb4 00000010 c165d494 c1652090 > c61abc18 c6f3d028 > [ 713.116137] <0> 894f908a 894f908a c61abc18 c13f7da0 c61abc74 c13f7f46 > 00000008 c1546f80 > [ 713.116137] Call Trace: > [ 713.116137] [] ? rtnl_create_link+0x4f/0x130 > [ 713.116137] [] ? rtnl_newlink+0x4d8/0x4e0 > [ 713.116137] [] ? rtnl_newlink+0x0/0x4e0 > [ 713.116137] [] ? rtnl_newlink+0x1a6/0x4e0 > [ 713.116137] [] ? rtnl_newlink+0x0/0x4e0 > [ 713.116137] [] ? rtnetlink_rcv_msg+0x180/0x220 > [ 713.116137] [] ? rtnetlink_rcv_msg+0x0/0x220 > [ 713.116137] [] ? netlink_rcv_skb+0x86/0xb0 > [ 713.116137] [] ? rtnetlink_rcv+0x2a/0x50 > [ 713.116137] [] ? netlink_unicast+0x29b/0x2b0 > [ 713.116137] [] ? netlink_sendmsg+0x1eb/0x2f0 > [ 713.116137] [] ? sock_sendmsg+0xdb/0x110 > [ 713.116137] [] ? __d_instantiate+0x57/0xe0 > [ 713.116137] [] ? autoremove_wake_function+0x0/0x60 > [ 713.116137] [] ? ext3_lookup+0xaf/0x130 > [ 713.116137] [] ? d_alloc+0x114/0x1a0 > [ 713.116137] [] ? mntput_no_expire+0x25/0xe0 > [ 713.116137] [] ? copy_from_user+0x3e/0x150 > [ 713.116137] [] ? copy_from_user+0x3e/0x150 > [ 713.116137] [] ? verify_iovec+0x3b/0xc0 > [ 713.116137] [] ? sys_sendmsg+0x158/0x280 > [ 713.116137] [] ? unlock_page+0x4c/0x70 > [ 713.116137] [] ? __do_fault+0x378/0x470 > [ 713.116137] [] ? lookup_object+0x33/0x80 > [ 713.116137] [] ? filemap_fault+0x0/0x3c0 > [ 713.116137] [] ? kmemcheck_mark_freed+0x19/0x40 > [ 713.116137] [] ? copy_from_user+0x3e/0x150 > [ 713.116137] [] ? sys_socketcall+0xb7/0x290 > [ 713.116137] [] ? do_page_fault+0x18a/0x2a0 > [ 713.116137] [] ? sysenter_do_call+0x12/0x26 > [ 713.116137] Code: ff ff 3b 96 84 02 00 00 72 d6 8b 86 b4 00 00 00 c7 86 00 > 02 00 00 00 00 00 00 c7 86 04 02 00 00 ff ff ff ff c7 46 4c ff ff ff ff <8b> 10 > 85 d2 74 2f 89 f0 ff d2 83 f8 00 89 c7 74 24 b8 fb ff ff > [ 713.116137] EIP: [] register_netdevice+0xab/0x420 SS:ESP > 0068:c61abb34 > [ 713.116137] CR2: 0000000000000000 > [ 713.142874] ---[ end trace 883d4085b7c1045b ]--- > Boy, the backtrace is a bit hard to follow. Maybe enabling frame pointers would clean it up.