oopses while playing cdrom w/ 2.0.33

Marnix Garvels (garvels@cs.utwente.nl)
Tue, 27 Jan 1998 17:20:49 +0100


Hello,

Yesterday I had 3 Oopses; all happened while playing
a mp3 audio file from my cdrom in my linux machine
over the local network to another machine,
and all were exactly similar, as the one shown below.

The cdrom was made with a Microsoft driven CDwriter,
and was therefore made with the Joliet extensions.
Since the 2.0.33 stock kernel didnt have this, I used
to mount it as iso9660, and this worked, but as I fear
causing the Oopsen.

I snatched a Joliet patch and applied this to the kernel;
after playing over an hour of music kernel still hadnt
crashed (this used to happen in 3-15 minutes after starting
to play mp3's on the other machine.

It seems to me that it might be a good idea to put the joliet
patch in 2.0.34...

Greetings,

Marnix Garvels.

2.0.33 Linux kernel,
Cyrix 6x86P200L cpu0
Asus P55T2P4 Rev.3.1
3c900 eth0
NE2000 eth1
GoldStar 8X cdrom hdb
Quantum Fireball 2.0G hda
Unable to handle kernel NULL pointer dereference at virtual address c0000084
current->tss.cr3 = 02f4d000, |r3 = 02f4d000
*pde = 00102067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<038403de>]
EFLAGS: 00010212
eax: 0000007c ebx: 00000000 ecx: 02d5c100 edx: 000000f6
esi: 000001f0 edi: 000000f6 ebp: 0000001f esp: 02f4fcf8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process update (pid: 9, process nr: 8, stackpage=02f4f000)
Stack: 0027e00e 000000ff 02d5c100 0000e401 0000003c 0016b40c 01ba502a 000600f6
0006cb9e 01ba341a 00000000 0000e000 02d5c100 0383fde6 02d5c018 002755d8
04000000 0000000c 02f4fd8c 0000000e 0010c8b5 0000e024 0000e00e 00000014
Call Trace: [cdrom_read_intr+0/592] [<0383fde6>] [<04000000>] [do_fast_IRQ+41/72] [do_IRQ+44/76] [IRQ12_interrupt+95/132] [<03846e08>]
[<0384002b>] [<03846b9e>] [<03846e08>] [<038432b9>] [<03846e08>] [<03846ea0>] [<03846e08>] [do_dev_queue_xmit+437/488]
[<03846e08>] [<03846e08>] [dev_queue_xmit+23/36] [<03846e08>] [ip_queue_xmit+485/568] [<03846e08>] [tcp_send_skb+626/656] [<03846e08>]
[tcp_send_partial+32/44] [tcp_rcv+2380/2472] [ip_fw_demasquerade+189/956] [ip_rcv+979/1312] [<03846e08>] [<03846e06>] [net_bh+244/276] [<03846e08>]
[do_bottom_half+59/96] [handle_bottom_half+11/32] [ret_from_sys_call+121/144]
Code: 8b b3 84 00 00 00 89 74 24 18 01 d6 89 b3 84 00 00 00 01 53
Using `/boot/System.map' to map addresses to symbols.

Code:
Code: 8b b3 84 00 00 movl 0x84(%ebx),%esi
Code: 00
Code: 89 74 24 18 movl %esi,0x18(%esp,1)
Code: 01 d6 addl %edx,%esi
Code: 89 b3 84 00 00 movl %esi,0x84(%ebx)
Code: 00
Code: 01 53 00 addl %edx,0x0(%ebx)
Code: 90 nop
Code: 90 nop
Code: 90 nop