Oops in 2.4.0test1-ac17 (ramfs umount)

From: Eric Buddington (snikt@resounding.com)
Date: Fri Jun 16 2000 - 12:37:31 EST


On Thu, Jun 15, 2000 at 06:42:55PM +0200, Juan J. Quintela wrote:
> Do you mind check if it works now with my one-liner patch (it is in
> the mailing list), and it solves the other related problems with
> ramfs (there was a bug hided there).

Here's the Oops I submitted before, but with the ksymoops done properly
(thanks to Keith Owens for help with that).

-Eric

ksymoops 2.3.4 on i686 2.4.0-test1-ac17. Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /boot/modules:athlon/2.4.0-test1-ac17 (specified)
     -m /boot/System.map-2.4.0test1-ac17:athlon (specified)

 e820: 000000000009fc00 @ 0000000000000000 (usable)
 e820: 0000000000000400 @ 000000000009fc00 (reserved)
 e820: 0000000000010000 @ 00000000000f0000 (reserved)
 e820: 0000000003ef0000 @ 0000000000100000 (usable)
 e820: 0000000000008000 @ 0000000003ff0000 (ACPI data)
 e820: 0000000000008000 @ 0000000003ff8000 (ACPI NVS)
 e820: 0000000000010000 @ 00000000ffff0000 (reserved)
Unable to handle kernel NULL pointer dereference at virtual address 00000030
c0145639
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0145639>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010286
eax: 00000000 ebx: 00000000 ecx: 00000246 edx: 5a5a5a5a
esi: c3e7a000 edi: 00000000 ebp: 080522a0 esp: c394df34
ds: 0018 es: 0018 ss: 0018
Process umount (pid: 142, stackpage=c394d000)
Stack: c3e7a000 c3e7a000 00000000 c480e49e 00000000 c3e7a000 c0137486 c3e7a000
       c3b5f240 c3e7a000 00000000 c0137881 c3e7a000 00000000 c3b5f240 c0265ec0
       c39a4000 ffffffff c01379be c3b5f240 00000000 00000000 c394c000 080522a1
Call Trace: [<c480e49e>] [<c0137486>] [<c0137881>] [<c01379be>] [<c0124aca>] [<c0137a3c>] [<c010b26c>]
Code: 8b 4b 30 8d 43 30 39 c1 74 23 89 c6 8d 51 d8 8b 09 8d 42 18

>>EIP; c0145639 <d_genocide+9/50> <=====
Trace; c480e49e <[ramfs]ramfs_put_super+e/20>
Trace; c0137486 <kill_super+56/f0>
Trace; c0137881 <do_umount+1d1/1e0>
Trace; c01379be <sys_umount+12e/1a0>
Trace; c0124aca <sys_munmap+6a/c0>
Trace; c0137a3c <sys_oldumount+c/10>
Trace; c010b26c <system_call+34/38>
Code; c0145639 <d_genocide+9/50>
00000000 <_EIP>:
Code; c0145639 <d_genocide+9/50> <=====
   0: 8b 4b 30 mov 0x30(%ebx),%ecx <=====
Code; c014563c <d_genocide+c/50>
   3: 8d 43 30 lea 0x30(%ebx),%eax
Code; c014563f <d_genocide+f/50>
   6: 39 c1 cmp %eax,%ecx
Code; c0145641 <d_genocide+11/50>
   8: 74 23 je 2d <_EIP+0x2d> c0145666 <d_genocide+36/50>
Code; c0145643 <d_genocide+13/50>
   a: 89 c6 mov %eax,%esi
Code; c0145645 <d_genocide+15/50>
   c: 8d 51 d8 lea 0xffffffd8(%ecx),%edx
Code; c0145648 <d_genocide+18/50>
   f: 8b 09 mov (%ecx),%ecx
Code; c014564a <d_genocide+1a/50>
  11: 8d 42 18 lea 0x18(%edx),%eax

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Fri Jun 23 2000 - 21:00:12 EST