Re: 2.6.20.4 crashes

2007-03-31 Thread Andrew Morton
On Sat, 31 Mar 2007 20:44:58 +0200 Maciej Soltysiak <[EMAIL PROTECTED]> wrote:

> Hi,
> 
> here's more...
> 
> BUG: unable to handle kernel NULL pointer dereference at virtual address 
> 
>  printing eip:
> 
> *pde = 
> Oops:  [#1]
> Modules linked in: binfmt_misc sit nfs lockd nfs_acl sunrpc ipt_ECN 
> iptable_mangle w83627ehf i2c_isa i2c_viapro i2c_core via_agp agpgart rtc
> CPU:0
> EIP:0060:[<>]Not tainted VLI
> EFLAGS: 00010016   (2.6.20.3-cks1 #4)

That's not 2.6.20.4.

> EIP is at 0x0
> eax: e94a5e6c   ebx: e94a5e6c   ecx:    edx: 0001
> esi:    edi: e94a5e84   ebp: e94a5e6c   esp: e94a5e4c
> ds: 007b   es: 007b   ss: 0068
> Process grep (pid: 9156, ti=e94a4000 task=f4569a90 task.ti=e94a4000)
> Stack: c0116429  0001 0001 ec7da800  0286 
>  
>e94a5e84 c0117802   ec7da800 ec7da800 ec7da85c 
> c015c622 
> e9d02b40 e94a5f60 f77b6ac0  0400 c0313e6c 
> 1000 
> Call Trace:
>  [] __wake_up_common+0x39/0x70
>  [] __wake_up+0x22/0x30
>  [] pipe_write+0x222/0x4b0
>  [] do_sync_write+0xc7/0x110
>  [] autoremove_wake_function+0x0/0x50
>  [] vfs_write+0xa6/0x160
>  [] do_sync_write+0x0/0x110
>  [] sys_write+0x41/0x70
>  [] sysenter_past_esp+0x5f/0x85
>  [] ipv6_flowlabel_opt+0x193/0x730
>  ===
> Code:  Bad EIP value.
> EIP: [<>] 0x0 SS:ESP 0068:e94a5e4c

__wake_up() did a jump-to-zero.  Is it repeatable?  Does removal of Con's 
patchset fix it?
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


2.6.20.4 crashes

2007-03-31 Thread Maciej Soltysiak

Hi,

here's more...

BUG: unable to handle kernel NULL pointer dereference at virtual address 

printing eip:

*pde = 
Oops:  [#1]
Modules linked in: binfmt_misc sit nfs lockd nfs_acl sunrpc ipt_ECN 
iptable_mangle w83627ehf i2c_isa i2c_viapro i2c_core via_agp agpgart rtc
CPU:0
EIP:0060:[<>]Not tainted VLI
EFLAGS: 00010016   (2.6.20.3-cks1 #4)
EIP is at 0x0
eax: e94a5e6c   ebx: e94a5e6c   ecx:    edx: 0001
esi:    edi: e94a5e84   ebp: e94a5e6c   esp: e94a5e4c
ds: 007b   es: 007b   ss: 0068
Process grep (pid: 9156, ti=e94a4000 task=f4569a90 task.ti=e94a4000)
Stack: c0116429  0001 0001 ec7da800  0286  
  e94a5e84 c0117802   ec7da800 ec7da800 ec7da85c c015c622 
   e9d02b40 e94a5f60 f77b6ac0  0400 c0313e6c 1000 
Call Trace:

[] __wake_up_common+0x39/0x70
[] __wake_up+0x22/0x30
[] pipe_write+0x222/0x4b0
[] do_sync_write+0xc7/0x110
[] autoremove_wake_function+0x0/0x50
[] vfs_write+0xa6/0x160
[] do_sync_write+0x0/0x110
[] sys_write+0x41/0x70
[] sysenter_past_esp+0x5f/0x85
[] ipv6_flowlabel_opt+0x193/0x730
===
Code:  Bad EIP value.
EIP: [<>] 0x0 SS:ESP 0068:e94a5e4c
<3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1
[] down_read+0x12/0x20
[] acct_collect+0x38/0x120
[] do_exit+0xda/0x750
[] printk+0x1b/0x20
[] do_trap+0x0/0x100
[] do_page_fault+0x2da/0x630
[] do_page_fault+0x0/0x630
[] error_code+0x74/0x7c
[] __wake_up_common+0x39/0x70
[] __wake_up+0x22/0x30
[] pipe_write+0x222/0x4b0
[] do_sync_write+0xc7/0x110
[] autoremove_wake_function+0x0/0x50
[] vfs_write+0xa6/0x160
[] do_sync_write+0x0/0x110
[] sys_write+0x41/0x70
[] sysenter_past_esp+0x5f/0x85
[] ipv6_flowlabel_opt+0x193/0x730
===
BUG: unable to handle kernel NULL pointer dereference at virtual address 

printing eip:

*pde = 
Oops:  [#2]
Modules linked in: binfmt_misc sit nfs lockd nfs_acl sunrpc ipt_ECN 
iptable_mangle w83627ehf i2c_isa i2c_viapro i2c_core via_agp agpgart rtc
CPU:0
EIP:0060:[<>]Not tainted VLI
EFLAGS: 00010087   (2.6.20.3-cks1 #4)
EIP is at 0x0
eax: e94a5e6c   ebx: e94a5e6c   ecx:    edx: 0001
esi:    edi: e94a5e84   ebp: e94a5ccc   esp: e94a5cac
ds: 007b   es: 007b   ss: 0068
Process grep (pid: 9156, ti=e94a4000 task=f4569a90 task.ti=e94a4000)
Stack: c0116429  0001 0001 ec7da800  0286 ec7da800 
  e94a5ce4 c0117802    0001 e9d02ad4 c015c069 
   e9d02b40 0008  e9d02ad4 f77b6ac0 c0157b20  
Call Trace:

[] __wake_up_common+0x39/0x70
[] __wake_up+0x22/0x30
[] pipe_release+0x59/0xb0
[] __fput+0xb0/0x180
[] filp_close+0x47/0x80
[] put_files_struct+0x9c/0xb0
[] do_exit+0x115/0x750
[] printk+0x1b/0x20
[] do_trap+0x0/0x100
[] do_page_fault+0x2da/0x630
[] do_page_fault+0x0/0x630
[] error_code+0x74/0x7c
[] __wake_up_common+0x39/0x70
[] __wake_up+0x22/0x30
[] pipe_write+0x222/0x4b0
[] do_sync_write+0xc7/0x110
[] autoremove_wake_function+0x0/0x50
[] vfs_write+0xa6/0x160
[] do_sync_write+0x0/0x110
[] sys_write+0x41/0x70
[] sysenter_past_esp+0x5f/0x85
[] ipv6_flowlabel_opt+0x193/0x730
===
Code:  Bad EIP value.
EIP: [<>] 0x0 SS:ESP 0068:e94a5cac
<1>Fixing recursive fault but reboot is needed!


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


2.6.20.4 crashes

2007-03-31 Thread Maciej Soltysiak

Hi,

here's more...

BUG: unable to handle kernel NULL pointer dereference at virtual address 

printing eip:

*pde = 
Oops:  [#1]
Modules linked in: binfmt_misc sit nfs lockd nfs_acl sunrpc ipt_ECN 
iptable_mangle w83627ehf i2c_isa i2c_viapro i2c_core via_agp agpgart rtc
CPU:0
EIP:0060:[]Not tainted VLI
EFLAGS: 00010016   (2.6.20.3-cks1 #4)
EIP is at 0x0
eax: e94a5e6c   ebx: e94a5e6c   ecx:    edx: 0001
esi:    edi: e94a5e84   ebp: e94a5e6c   esp: e94a5e4c
ds: 007b   es: 007b   ss: 0068
Process grep (pid: 9156, ti=e94a4000 task=f4569a90 task.ti=e94a4000)
Stack: c0116429  0001 0001 ec7da800  0286  
  e94a5e84 c0117802   ec7da800 ec7da800 ec7da85c c015c622 
   e9d02b40 e94a5f60 f77b6ac0  0400 c0313e6c 1000 
Call Trace:

[c0116429] __wake_up_common+0x39/0x70
[c0117802] __wake_up+0x22/0x30
[c015c622] pipe_write+0x222/0x4b0
[c0156887] do_sync_write+0xc7/0x110
[c012b5c0] autoremove_wake_function+0x0/0x50
[c0157156] vfs_write+0xa6/0x160
[c01567c0] do_sync_write+0x0/0x110
[c0157781] sys_write+0x41/0x70
[c0102ed6] sysenter_past_esp+0x5f/0x85
[c0300033] ipv6_flowlabel_opt+0x193/0x730
===
Code:  Bad EIP value.
EIP: [] 0x0 SS:ESP 0068:e94a5e4c
3BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1
[c012e432] down_read+0x12/0x20
[c01367b8] acct_collect+0x38/0x120
[c011cc7a] do_exit+0xda/0x750
[c011ab1b] printk+0x1b/0x20
[c0104380] do_trap+0x0/0x100
[c011533a] do_page_fault+0x2da/0x630
[c0115060] do_page_fault+0x0/0x630
[c030e5a4] error_code+0x74/0x7c
[c0116429] __wake_up_common+0x39/0x70
[c0117802] __wake_up+0x22/0x30
[c015c622] pipe_write+0x222/0x4b0
[c0156887] do_sync_write+0xc7/0x110
[c012b5c0] autoremove_wake_function+0x0/0x50
[c0157156] vfs_write+0xa6/0x160
[c01567c0] do_sync_write+0x0/0x110
[c0157781] sys_write+0x41/0x70
[c0102ed6] sysenter_past_esp+0x5f/0x85
[c0300033] ipv6_flowlabel_opt+0x193/0x730
===
BUG: unable to handle kernel NULL pointer dereference at virtual address 

printing eip:

*pde = 
Oops:  [#2]
Modules linked in: binfmt_misc sit nfs lockd nfs_acl sunrpc ipt_ECN 
iptable_mangle w83627ehf i2c_isa i2c_viapro i2c_core via_agp agpgart rtc
CPU:0
EIP:0060:[]Not tainted VLI
EFLAGS: 00010087   (2.6.20.3-cks1 #4)
EIP is at 0x0
eax: e94a5e6c   ebx: e94a5e6c   ecx:    edx: 0001
esi:    edi: e94a5e84   ebp: e94a5ccc   esp: e94a5cac
ds: 007b   es: 007b   ss: 0068
Process grep (pid: 9156, ti=e94a4000 task=f4569a90 task.ti=e94a4000)
Stack: c0116429  0001 0001 ec7da800  0286 ec7da800 
  e94a5ce4 c0117802    0001 e9d02ad4 c015c069 
   e9d02b40 0008  e9d02ad4 f77b6ac0 c0157b20  
Call Trace:

[c0116429] __wake_up_common+0x39/0x70
[c0117802] __wake_up+0x22/0x30
[c015c069] pipe_release+0x59/0xb0
[c0157b20] __fput+0xb0/0x180
[c0154ff7] filp_close+0x47/0x80
[c011bcbc] put_files_struct+0x9c/0xb0
[c011ccb5] do_exit+0x115/0x750
[c011ab1b] printk+0x1b/0x20
[c0104380] do_trap+0x0/0x100
[c011533a] do_page_fault+0x2da/0x630
[c0115060] do_page_fault+0x0/0x630
[c030e5a4] error_code+0x74/0x7c
[c0116429] __wake_up_common+0x39/0x70
[c0117802] __wake_up+0x22/0x30
[c015c622] pipe_write+0x222/0x4b0
[c0156887] do_sync_write+0xc7/0x110
[c012b5c0] autoremove_wake_function+0x0/0x50
[c0157156] vfs_write+0xa6/0x160
[c01567c0] do_sync_write+0x0/0x110
[c0157781] sys_write+0x41/0x70
[c0102ed6] sysenter_past_esp+0x5f/0x85
[c0300033] ipv6_flowlabel_opt+0x193/0x730
===
Code:  Bad EIP value.
EIP: [] 0x0 SS:ESP 0068:e94a5cac
1Fixing recursive fault but reboot is needed!


-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: 2.6.20.4 crashes

2007-03-31 Thread Andrew Morton
On Sat, 31 Mar 2007 20:44:58 +0200 Maciej Soltysiak [EMAIL PROTECTED] wrote:

 Hi,
 
 here's more...
 
 BUG: unable to handle kernel NULL pointer dereference at virtual address 
 
  printing eip:
 
 *pde = 
 Oops:  [#1]
 Modules linked in: binfmt_misc sit nfs lockd nfs_acl sunrpc ipt_ECN 
 iptable_mangle w83627ehf i2c_isa i2c_viapro i2c_core via_agp agpgart rtc
 CPU:0
 EIP:0060:[]Not tainted VLI
 EFLAGS: 00010016   (2.6.20.3-cks1 #4)

That's not 2.6.20.4.

 EIP is at 0x0
 eax: e94a5e6c   ebx: e94a5e6c   ecx:    edx: 0001
 esi:    edi: e94a5e84   ebp: e94a5e6c   esp: e94a5e4c
 ds: 007b   es: 007b   ss: 0068
 Process grep (pid: 9156, ti=e94a4000 task=f4569a90 task.ti=e94a4000)
 Stack: c0116429  0001 0001 ec7da800  0286 
  
e94a5e84 c0117802   ec7da800 ec7da800 ec7da85c 
 c015c622 
 e9d02b40 e94a5f60 f77b6ac0  0400 c0313e6c 
 1000 
 Call Trace:
  [c0116429] __wake_up_common+0x39/0x70
  [c0117802] __wake_up+0x22/0x30
  [c015c622] pipe_write+0x222/0x4b0
  [c0156887] do_sync_write+0xc7/0x110
  [c012b5c0] autoremove_wake_function+0x0/0x50
  [c0157156] vfs_write+0xa6/0x160
  [c01567c0] do_sync_write+0x0/0x110
  [c0157781] sys_write+0x41/0x70
  [c0102ed6] sysenter_past_esp+0x5f/0x85
  [c0300033] ipv6_flowlabel_opt+0x193/0x730
  ===
 Code:  Bad EIP value.
 EIP: [] 0x0 SS:ESP 0068:e94a5e4c

__wake_up() did a jump-to-zero.  Is it repeatable?  Does removal of Con's 
patchset fix it?
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/