Oops in 2.2.4: proc_readfd

Nathan Myers (ncm@cantrip.org)
Mon, 29 Mar 1999 23:18:34 -0800


I just got an Oops in 2.2.4+fs/buffer.c, after:

Unable to handle kernel paging request at virtual address 00020008

It was on a UP K6-2/300. The circumstances appear to have been that
a network/serial combo PC-Card (USR XJEAM3336) was ejected while the
machine was in hibernation, so when it awoke, cardmgr tried to shut
down the serial port driver's connection to it. I've not had any
trouble with PCMCIA or APM on this machine before, except that I've
never managed to open the serial port on that card. I've not had
any Oopses before, either, except with NFS on 2.2.0-pre9.

The process that got wedged was "fuser -s -k /dev/ttyS2", run by
"/etc/init.d/serial stop", possibly run by cardmgr. Other processes
continued OK.

(In the ksymoops analysis below, all the symbols came out 8 bytes off,
reason unknown. Binutils is 2.9.1.0.19a.)

Ideas?

Nathan Myers
ncm@cantrip.org

----------------------------------------------
Options used: -V (default)
-o /lib/modules/2.2.4/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /boot/System.map (specified)
-c 1 (default)

Warning in compare_ksyms_lsmod, module bsd_comp is in lsmod but not in ksyms,
probably no symbols exported
Warning in compare_ksyms_lsmod, module i82365 is in lsmod but not in ksyms,
probably no symbols exported
rning in compare_ksyms_lsmod, module serial_cs is in lsmod but not in ksyms,
probably no symbols exported
Warning in compare_ksyms_lsmod, module smc91c92_cs is in lsmod but not in
ksyms, probably no symbols exported
Warning: mismatch on symbol DMAbuf_close_dma , ksyms_base says c01a2ffc,
System.map says c01a2ff4. Ignoring ksyms_base entry
Warning: mismatch on symbol DMAbuf_inputintr , ksyms_base says c01a2e28,
System.map says c01a2e20. Ignoring ksyms_base entry

[etc. ...]

Unable to handle kernel paging request at virtual address 00020008
current->tss.cr3 = 01621000, %cr3 = 01621000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0147fa9>]
EFLAGS: 00010206
eax: c1b54000 ebx: c0ef9f8d ecx: c2146240 edx: 00020000
esi: 03840000 edi: 00000008 ebp: c3b06000 esp: c0ef9f60
ds: 0018 es: 0018 ss: 0018
Process fuser (pid: 2051, process nr: 35, stackpage=c0ef9000)
Stack: c2e698bc 000003d8 c2e69870 c0ef9f8d c0ef9f84 c0ef9f84 00000000 00000384
c01df524 c0ef8000 0804b653 c14c3420 c012c1a0 c14c4f20 c0ef9fb0 c012c078
c0ef8000 bfffec80 0804d7a0 bffff080 bfffecd8 bfffeccc 00000380 ffffffea
Call Trace: [<c012c1a0>] [<c012c078>] [<c0109564>]
Code: 83 7a 08 00 0f 84 91 00 00 00 8d 44 24 2c 8b 74 24 24 bb 0a

>>EIP: c0147fa9 <proc_readfd+115/1d0>
Trace: c012c1a0 <sys_getdents+ac/e8>
Trace: c012c078 <filldir+8/84>
Trace: c0109564 <system_call+34/40>
Code: c0147fa9 <proc_readfd+115/1d0> 00000000 <_EIP>: <===
Code: c0147fa9 <proc_readfd+115/1d0> 0: 83 7a 08 00 cmpl $0x0,0x8(%edx) <===
Code: c0147fad <proc_readfd+119/1d0> 4: 0f 84 91 00 00 je c0148044 <proc_readfd+1b0/1d0>
Code: c0147fb2 <proc_readfd+11e/1d0> 9: 00
Code: c0147fb3 <proc_readfd+11f/1d0> a: 8d 44 24 2c leal 0x2c(%esp,1),%eax
Code: c0147fb7 <proc_readfd+123/1d0> e: 8b 74 24 24 movl 0x24(%esp,1),%esi
Code: c0147fbb <proc_readfd+127/1d0> 12: bb 0a 00 00 00 movl $0xa,%ebx

492 warnings issued. Results may not be reliable.
[The warnings were about the 8-byte address offset.]

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/