Hi!

Here 2.6.11-rc2 did this, too. (inotify.patch from 2.6.11-rc2-mm1):

On Fri, 21 Jan 2005 00:12:51 +0100, Juerg Billeter <[EMAIL PROTECTED]> wrote:
> I reproducibly get the following Oops as soon as I start using inotify
> with gamin and/or beagle. This happens with linux 2.6.10-as1 + inotify
> 0.18-rml-4 on multiple x86 machines.

Unable to handle kernel NULL pointer dereference at virtual address 00000008
printing eip:
c020342f
*pde = 00000000
Oops: 0000 [#1]
PREEMPT
Modules linked in: af_packet radeon drm ipv6 rfcomm hidp l2cap pcmcia
binfmt_misc thermal processor button battery ac ohci1394 ieee1394
yenta_socket rsrc_nonstatic pcmcia_core 3c59x mii snd_intel8x0
snd_ac97_codec snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd
soundcore snd_page_alloc hci_usb bluetooth uhci_hcd usbcore intel_agp
agpgart evdev ide_cd cdrom unix
CPU:    0
EIP:    0060:[<c020342f>]    Not tainted VLI
EFLAGS: 00010287   (2.6.11-rc2)
EIP is at inotify_dev_queue_event+0x6f/0x180
eax: 00000000   ebx: 00000800   ecx: 00000000   edx: e97364a8
esi: e960f308   edi: 00000800   ebp: e960f300   esp: df1d5ec0
ds: 007b   es: 007b   ss: 0068
Process evolution-2.0 (pid: 4276, threadinfo=df1d4000 task=e380c020)
Stack: df1d4000 ffffffff ce4f1e88 00000000 e97364a8 df1d4000 e97364a8 00000000
      00000800 c0203aba 00000000 ce4f1e88 e5a24670 00000000 e5a24670 000081a4
      ce4f1e24 c015b244 ce4f1e88 df1d5f64 ce4f1e24 e5a24670 00000242 c015b9e0
Call Trace:
[<c0203aba>] inotify_inode_queue_event+0x4a/0x80
[<c015b244>] vfs_create+0x94/0xe0
[<c015b9e0>] open_namei+0x570/0x5c0
[<c014c3ed>] filp_open+0x2d/0x60
[<c014c6a0>] get_unused_fd+0x50/0xc0
[<c0159817>] getname+0x67/0xb0
[<c014c7cd>] sys_open+0x3d/0xb0
[<c0102fb7>] syscall_call+0x7/0xb
Code: 0f 87 b6 00 00 00 0f 84 c4 00 00 00 81 fb 00 20 00 00 74 38 81
fb 00 80 00 00 74 30 8b 54 24 10 89 df 8b 42 08 8b 80 0c 01 00 00 <8b>
70 08 21 f7 85 ff 0f 84 84 00 00 00 81 fb 00 80 00 00 74 0c
<6>note: evolution-2.0[4276] exited with preempt_count 1
Unable to handle kernel NULL pointer dereference at virtual address 00000008
c020342f
*pde = 00000000
Oops: 0000 [#1]
CPU:    0
EIP:    0060:[<c020342f>]    Not tainted VLI
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010287   (2.6.11-rc2)
eax: 00000000   ebx: 00000800   ecx: 00000000   edx: e97364a8
esi: e960f308   edi: 00000800   ebp: e960f300   esp: df1d5ec0
ds: 007b   es: 007b   ss: 0068
Stack: df1d4000 ffffffff ce4f1e88 00000000 e97364a8 df1d4000 e97364a8 00000000
      00000800 c0203aba 00000000 ce4f1e88 e5a24670 00000000 e5a24670 000081a4
      ce4f1e24 c015b244 ce4f1e88 df1d5f64 ce4f1e24 e5a24670 00000242 c015b9e0
Call Trace:
[<c0203aba>] inotify_inode_queue_event+0x4a/0x80
[<c015b244>] vfs_create+0x94/0xe0
[<c015b9e0>] open_namei+0x570/0x5c0
[<c014c3ed>] filp_open+0x2d/0x60
[<c014c6a0>] get_unused_fd+0x50/0xc0
[<c0159817>] getname+0x67/0xb0
[<c014c7cd>] sys_open+0x3d/0xb0
[<c0102fb7>] syscall_call+0x7/0xb
Code: 0f 87 b6 00 00 00 0f 84 c4 00 00 00 81 fb 00 20 00 00 74 38 81
fb 00 80 00 00 74 30 8b 54 24 10 89 df 8b 42 08 8b 80 0c 01 00 00 <8b>
70 08 21 f7 85 ff 0f 84 84 00 00 00 81 fb 00 80 00 00 74 0c

>>EIP; c020342f <inotify_dev_queue_event+6f/180>   <=====

>>edx; e97364a8 <pg0+293a54a8/3fc6d400>
>>esi; e960f308 <pg0+2927e308/3fc6d400>
>>ebp; e960f300 <pg0+2927e300/3fc6d400>
>>esp; df1d5ec0 <pg0+1ee44ec0/3fc6d400>

Trace; c0203aba <inotify_inode_queue_event+4a/80>
Trace; c015b244 <vfs_create+94/e0>
Trace; c015b9e0 <open_namei+570/5c0>
Trace; c014c3ed <filp_open+2d/60>
Trace; c014c6a0 <get_unused_fd+50/c0>
Trace; c0159817 <getname+67/b0>
Trace; c014c7cd <sys_open+3d/b0>
Trace; c0102fb7 <syscall_call+7/b>

This architecture has variable length instructions, decoding before eip
is unreliable, take these instructions with a pinch of salt.

Code;  c0203404 <inotify_dev_queue_event+44/180>
00000000 <_EIP>:
Code;  c0203404 <inotify_dev_queue_event+44/180>
  0:   0f 87 b6 00 00 00         ja     bc <_EIP+0xbc>
Code;  c020340a <inotify_dev_queue_event+4a/180>
  6:   0f 84 c4 00 00 00         je     d0 <_EIP+0xd0>
Code;  c0203410 <inotify_dev_queue_event+50/180>
  c:   81 fb 00 20 00 00         cmp    $0x2000,%ebx
Code;  c0203416 <inotify_dev_queue_event+56/180>
 12:   74 38                     je     4c <_EIP+0x4c>
Code;  c0203418 <inotify_dev_queue_event+58/180>
 14:   81 fb 00 80 00 00         cmp    $0x8000,%ebx
Code;  c020341e <inotify_dev_queue_event+5e/180>
 1a:   74 30                     je     4c <_EIP+0x4c>
Code;  c0203420 <inotify_dev_queue_event+60/180>
 1c:   8b 54 24 10               mov    0x10(%esp),%edx
Code;  c0203424 <inotify_dev_queue_event+64/180>
 20:   89 df                     mov    %ebx,%edi
Code;  c0203426 <inotify_dev_queue_event+66/180>
 22:   8b 42 08                  mov    0x8(%edx),%eax
Code;  c0203429 <inotify_dev_queue_event+69/180>
 25:   8b 80 0c 01 00 00         mov    0x10c(%eax),%eax

This decode from eip onwards should be reliable

Code;  c020342f <inotify_dev_queue_event+6f/180>
00000000 <_EIP>:
Code;  c020342f <inotify_dev_queue_event+6f/180>   <=====
  0:   8b 70 08                  mov    0x8(%eax),%esi   <=====
Code;  c0203432 <inotify_dev_queue_event+72/180>
  3:   21 f7                     and    %esi,%edi
Code;  c0203434 <inotify_dev_queue_event+74/180>
  5:   85 ff                     test   %edi,%edi
Code;  c0203436 <inotify_dev_queue_event+76/180>
  7:   0f 84 84 00 00 00         je     91 <_EIP+0x91>
Code;  c020343c <inotify_dev_queue_event+7c/180>
  d:   81 fb 00 80 00 00         cmp    $0x8000,%ebx
Code;  c0203442 <inotify_dev_queue_event+82/180>
 13:   74 0c                     je     21 <_EIP+0x21>

greetings
pHilipp
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to