strange oops in iput. (2.6.23.1)

2007-11-15 Thread Dave Jones
I got a report from a user this morning with the following oops.

Unable to handle kernel NULL pointer dereference at 0038 RIP:
 [] iput+0x18/0x7b
PGD 6fdf9067 PUD 7810c067 PMD 0
Oops:  [1] SMP
CPU 1
Modules linked in: berry_charge tun vfat fat usb_storage appletalk ipx p8023 
i915 drm dcdbas ipt_MASQUERADE iptable_nat nf_nat bridge rfcomm l2cap autofs4 
sunrpc nf_conntrack_netbios_ns ipt_REJECT nf_conntrack_ipv4 xt_state 
nf_conntrack nfnetlink iptable_filter ip_tables ip6t_REJECT xt_tcpudp 
ip6table_filter ip6_tables x_tables ipv6 cpufreq_ondemand acpi_cpufreq 
dm_multipath kvm_intel kvm snd_hda_intel snd_seq_dummy snd_seq_oss 
snd_seq_midi_event snd_seq arc4 ecb snd_seq_device blkcipher snd_pcm_oss 
snd_mixer_oss snd_pcm snd_timer iwl3945 snd_page_alloc mac80211 tg3 snd_hwdep 
firewire_ohci hci_usb i2c_i801 i2c_core video firewire_core snd option cfg80211 
button battery bluetooth ac output usbserial soundcore sg iTCO_wdt crc_itu_t 
joydev iTCO_vendor_support sr_mod cdrom dm_snapshot dm_zero dm_mirror dm_mod 
ata_generic ata_piix libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd 
ehci_hcd
Pid: 277, comm: kswapd0 Not tainted 2.6.23.1-42.fc8 #1
RIP: 0010:[]  [] iput+0x18/0x7b
RSP: 0018:810037f11d60  EFLAGS: 00010283
RAX:  RBX: 8103fcc8 RCX: 8103fcf8
RDX: 8103fcf8 RSI: 817c5d50 RDI: 8103fcc8
RBP: 0001 R08: 0001 R09: 817c5b60
R10: 0282 R11: 817c5c30 R12: 817c5d00
R13: 0060 R14: 0001 R15: 0100
FS:  () GS:810037c2c300() knlGS:
CS:  0010 DS: 0018 ES: 0018 CR0: 8005003b
CR2: 0038 CR3: 6f40a000 CR4: 26a0
DR0:  DR1:  DR2: 
DR3:  DR6: 0ff0 DR7: 0400
Process kswapd0 (pid: 277, threadinfo 810037f1, task 810037f05020)
Stack:  810037cc6870 810ab41a 0282 810037cc6870
  810ac118 817c5c30 810037cc6870
 817c5d00 810ac2e1 8137e220 b98c
Call Trace:
 [] d_kill+0x21/0x43
 [] prune_one_dentry+0x3a/0xee
 [] prune_dcache+0x115/0x163
 [] shrink_dcache_memory+0x1c/0x36
 [] shrink_slab+0xdc/0x154
 [] kswapd+0x318/0x4a8
 [] autoremove_wake_function+0x0/0x2e
 [] kswapd+0x0/0x4a8
 [] kthread+0x47/0x73
 [] child_rip+0xa/0x12
 [] flat_send_IPI_mask+0x0/0x4c
 [] kthread+0x0/0x73
 [] child_rip+0x0/0x12
 
Code: 48 8b 40 38 75 04 0f 0b eb fe 48 85 c0 74 0b 48 8b 40 28 48


Which appears that inode->i_sb was null which afaict, shouldn't
ever happen.   How is this possible?  A race perhaps?

(only ext3 filesystems were in use)

Dave

-- 
http://www.codemonkey.org.uk
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


strange oops in iput. (2.6.23.1)

2007-11-15 Thread Dave Jones
I got a report from a user this morning with the following oops.

Unable to handle kernel NULL pointer dereference at 0038 RIP:
 [810ad479] iput+0x18/0x7b
PGD 6fdf9067 PUD 7810c067 PMD 0
Oops:  [1] SMP
CPU 1
Modules linked in: berry_charge tun vfat fat usb_storage appletalk ipx p8023 
i915 drm dcdbas ipt_MASQUERADE iptable_nat nf_nat bridge rfcomm l2cap autofs4 
sunrpc nf_conntrack_netbios_ns ipt_REJECT nf_conntrack_ipv4 xt_state 
nf_conntrack nfnetlink iptable_filter ip_tables ip6t_REJECT xt_tcpudp 
ip6table_filter ip6_tables x_tables ipv6 cpufreq_ondemand acpi_cpufreq 
dm_multipath kvm_intel kvm snd_hda_intel snd_seq_dummy snd_seq_oss 
snd_seq_midi_event snd_seq arc4 ecb snd_seq_device blkcipher snd_pcm_oss 
snd_mixer_oss snd_pcm snd_timer iwl3945 snd_page_alloc mac80211 tg3 snd_hwdep 
firewire_ohci hci_usb i2c_i801 i2c_core video firewire_core snd option cfg80211 
button battery bluetooth ac output usbserial soundcore sg iTCO_wdt crc_itu_t 
joydev iTCO_vendor_support sr_mod cdrom dm_snapshot dm_zero dm_mirror dm_mod 
ata_generic ata_piix libata sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd 
ehci_hcd
Pid: 277, comm: kswapd0 Not tainted 2.6.23.1-42.fc8 #1
RIP: 0010:[810ad479]  [810ad479] iput+0x18/0x7b
RSP: 0018:810037f11d60  EFLAGS: 00010283
RAX:  RBX: 8103fcc8 RCX: 8103fcf8
RDX: 8103fcf8 RSI: 817c5d50 RDI: 8103fcc8
RBP: 0001 R08: 0001 R09: 817c5b60
R10: 0282 R11: 817c5c30 R12: 817c5d00
R13: 0060 R14: 0001 R15: 0100
FS:  () GS:810037c2c300() knlGS:
CS:  0010 DS: 0018 ES: 0018 CR0: 8005003b
CR2: 0038 CR3: 6f40a000 CR4: 26a0
DR0:  DR1:  DR2: 
DR3:  DR6: 0ff0 DR7: 0400
Process kswapd0 (pid: 277, threadinfo 810037f1, task 810037f05020)
Stack:  810037cc6870 810ab41a 0282 810037cc6870
  810ac118 817c5c30 810037cc6870
 817c5d00 810ac2e1 8137e220 b98c
Call Trace:
 [810ab41a] d_kill+0x21/0x43
 [810ac118] prune_one_dentry+0x3a/0xee
 [810ac2e1] prune_dcache+0x115/0x163
 [810ac34b] shrink_dcache_memory+0x1c/0x36
 [8107bc99] shrink_slab+0xdc/0x154
 [8107c576] kswapd+0x318/0x4a8
 [810493c1] autoremove_wake_function+0x0/0x2e
 [8107c25e] kswapd+0x0/0x4a8
 [8104926c] kthread+0x47/0x73
 [8100c9e8] child_rip+0xa/0x12
 [8101dd1e] flat_send_IPI_mask+0x0/0x4c
 [81049225] kthread+0x0/0x73
 [8100c9de] child_rip+0x0/0x12
 
Code: 48 8b 40 38 75 04 0f 0b eb fe 48 85 c0 74 0b 48 8b 40 28 48


Which appears that inode-i_sb was null which afaict, shouldn't
ever happen.   How is this possible?  A race perhaps?

(only ext3 filesystems were in use)

Dave

-- 
http://www.codemonkey.org.uk
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: Oops in iput

2001-06-26 Thread Florian Lohoff

On Tue, Jun 26, 2001 at 11:09:33AM +0300, Ville Herva wrote:
> Well, I for one use the 2.2 ide patches extensively (on almost all of my
> machines, including a heavy-duty backup server), and haven't seen any
> problems whatsoever. I see _much_ more problems with scsi (aic7xxx), for
> example.

I have been using the udma ide patches for a long time and as long as
you stay away from known buggy drives controllers you are fine.

BTW: The machine i reported the bug for is mostly running on SCSI - Only
/var/tmp is an large IDE drive.
 
> I don't mean to say the ide patches are 100% bug free, but I wouldn't
> consider them as the prime suspect for an oops that happened elsewhere
> either. It could be hw or any other part of kernel just as well... What
> about memtest86?

I'll try 

Flo
-- 
Florian Lohoff  [EMAIL PROTECTED] +49-5201-669912
 Why is it called "common sense" when nobody seems to have any?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Ville Herva

On Tue, Jun 26, 2001 at 11:56:51AM +0100, you [Stephen C. Tweedie] claimed:
> Hi,
> 
> On Tue, Jun 26, 2001 at 11:09:33AM +0300, Ville Herva wrote:
> 
> > Well, I for one use the 2.2 ide patches extensively (on almost all of my
> > machines, including a heavy-duty backup server)
> 
> It is highly hardware-dependent.  A huge amount of effort was spent
> early in 2.4 getting blacklists and hardware tweaks right to work
> around problems with specific chipsets with ide udma.  Just because it
> works for one person doesn't give you any confidence that it won't
> trash data for somebody else.

Well, the report said 'Intel BX chipset' - that's as solid as chipsets get
(to loosely quote Alan). Almost all of my boxes are BX (one has HPT366 in
addition, and another one was changed to Via686a recently), and I imagine
that BX gets most testing since it is very common chipset. Moreover, it only
does UDMA33, not any fancy 66 or 100 stuff (although I haven't had problems
with those either on HPT366, HPT370 nor 686a).

As said, it could be the ide patch, but surely there are other just as
likely suspects as well.


-- v --

[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Stephen C. Tweedie

Hi,

On Tue, Jun 26, 2001 at 11:09:33AM +0300, Ville Herva wrote:

> Well, I for one use the 2.2 ide patches extensively (on almost all of my
> machines, including a heavy-duty backup server)

It is highly hardware-dependent.  A huge amount of effort was spent
early in 2.4 getting blacklists and hardware tweaks right to work
around problems with specific chipsets with ide udma.  Just because it
works for one person doesn't give you any confidence that it won't
trash data for somebody else.

Cheers,
 Stephen
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Ville Herva

On Mon, Jun 25, 2001 at 07:42:13PM +0100, you [Stephen C. Tweedie] claimed:
> Hi,
> 
> On Mon, Jun 25, 2001 at 08:16:12PM +0200, Florian Lohoff wrote:
> > 
> > oops in iput - Kernel 2.2.19/i386 + ide-udma patches + ext3 patches (0.0.7a)
> 
> The ide-udma patches for 2.2 haven't had nearly the testing of the 2.4
> ones, and simply can't be trusted as a baseline for debugging other
> code.  Can you reproduce this problem without them applied?  The oops
> here is a networking oops on the face of it, and I wouldn't expect to
> see that on 2.2 unless something was corrupting memory.

Well, I for one use the 2.2 ide patches extensively (on almost all of my
machines, including a heavy-duty backup server), and haven't seen any
problems whatsoever. I see _much_ more problems with scsi (aic7xxx), for
example.

I don't mean to say the ide patches are 100% bug free, but I wouldn't
consider them as the prime suspect for an oops that happened elsewhere
either. It could be hw or any other part of kernel just as well... What
about memtest86?


-- v --

[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Ville Herva

On Mon, Jun 25, 2001 at 07:42:13PM +0100, you [Stephen C. Tweedie] claimed:
 Hi,
 
 On Mon, Jun 25, 2001 at 08:16:12PM +0200, Florian Lohoff wrote:
  
  oops in iput - Kernel 2.2.19/i386 + ide-udma patches + ext3 patches (0.0.7a)
 
 The ide-udma patches for 2.2 haven't had nearly the testing of the 2.4
 ones, and simply can't be trusted as a baseline for debugging other
 code.  Can you reproduce this problem without them applied?  The oops
 here is a networking oops on the face of it, and I wouldn't expect to
 see that on 2.2 unless something was corrupting memory.

Well, I for one use the 2.2 ide patches extensively (on almost all of my
machines, including a heavy-duty backup server), and haven't seen any
problems whatsoever. I see _much_ more problems with scsi (aic7xxx), for
example.

I don't mean to say the ide patches are 100% bug free, but I wouldn't
consider them as the prime suspect for an oops that happened elsewhere
either. It could be hw or any other part of kernel just as well... What
about memtest86?


-- v --

[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Stephen C. Tweedie

Hi,

On Tue, Jun 26, 2001 at 11:09:33AM +0300, Ville Herva wrote:

 Well, I for one use the 2.2 ide patches extensively (on almost all of my
 machines, including a heavy-duty backup server)

It is highly hardware-dependent.  A huge amount of effort was spent
early in 2.4 getting blacklists and hardware tweaks right to work
around problems with specific chipsets with ide udma.  Just because it
works for one person doesn't give you any confidence that it won't
trash data for somebody else.

Cheers,
 Stephen
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Ville Herva

On Tue, Jun 26, 2001 at 11:56:51AM +0100, you [Stephen C. Tweedie] claimed:
 Hi,
 
 On Tue, Jun 26, 2001 at 11:09:33AM +0300, Ville Herva wrote:
 
  Well, I for one use the 2.2 ide patches extensively (on almost all of my
  machines, including a heavy-duty backup server)
 
 It is highly hardware-dependent.  A huge amount of effort was spent
 early in 2.4 getting blacklists and hardware tweaks right to work
 around problems with specific chipsets with ide udma.  Just because it
 works for one person doesn't give you any confidence that it won't
 trash data for somebody else.

Well, the report said 'Intel BX chipset' - that's as solid as chipsets get
(to loosely quote Alan). Almost all of my boxes are BX (one has HPT366 in
addition, and another one was changed to Via686a recently), and I imagine
that BX gets most testing since it is very common chipset. Moreover, it only
does UDMA33, not any fancy 66 or 100 stuff (although I haven't had problems
with those either on HPT366, HPT370 nor 686a).

As said, it could be the ide patch, but surely there are other just as
likely suspects as well.


-- v --

[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-26 Thread Florian Lohoff

On Tue, Jun 26, 2001 at 11:09:33AM +0300, Ville Herva wrote:
 Well, I for one use the 2.2 ide patches extensively (on almost all of my
 machines, including a heavy-duty backup server), and haven't seen any
 problems whatsoever. I see _much_ more problems with scsi (aic7xxx), for
 example.

I have been using the udma ide patches for a long time and as long as
you stay away from known buggy drives controllers you are fine.

BTW: The machine i reported the bug for is mostly running on SCSI - Only
/var/tmp is an large IDE drive.
 
 I don't mean to say the ide patches are 100% bug free, but I wouldn't
 consider them as the prime suspect for an oops that happened elsewhere
 either. It could be hw or any other part of kernel just as well... What
 about memtest86?

I'll try 

Flo
-- 
Florian Lohoff  [EMAIL PROTECTED] +49-5201-669912
 Why is it called common sense when nobody seems to have any?

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-25 Thread Stephen C. Tweedie

Hi,

On Mon, Jun 25, 2001 at 08:16:12PM +0200, Florian Lohoff wrote:
> 
> oops in iput - Kernel 2.2.19/i386 + ide-udma patches + ext3 patches (0.0.7a)

The ide-udma patches for 2.2 haven't had nearly the testing of the 2.4
ones, and simply can't be trusted as a baseline for debugging other
code.  Can you reproduce this problem without them applied?  The oops
here is a networking oops on the face of it, and I wouldn't expect to
see that on 2.2 unless something was corrupting memory.

Cheers,
 Stephen
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Oops in iput

2001-06-25 Thread Florian Lohoff


Hi,
oops in iput - Kernel 2.2.19/i386 + ide-udma patches + ext3 patches (0.0.7a)

Intel BX chipset, SCSI Disks Symbios chipset - The crashing process
is the master process of "postfix" an MTA.

Just before the crash all processes on that machine started to segfault
in nameserver resolution (remote dns server) and after 2-3 minutes
this oops happened.



ksymoops 2.3.4 on i686 2.2.19.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.2.19/ (default)
 -m /boot/System.map-2.2.19 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Unable to handle kernel paging request at virtual address 4ed90398
current->tss.cr3 = 00101000, %cr3 = 00101000
*pde = 
Oops: 
CPU:0
EIP:0010:[]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246
eax: 4ed90330   ebx:    ecx:    edx: c01eef0c
esi: 4ed90330   edi: ce27ed00   ebp: 0002   esp: cf04ddac
ds: 0018   es: 0018   ss: 0018
Process master (pid: 297, process nr: 31, stackpage=cf04d000)
Stack: cf1859a0 0001 cef7db18 cef7db18 cf1859a0 c015882f 4ed90330  
   ce27ec80 0002 ced90330 ced90330 ce27ed00 0002 ceadc0c0  
   cfce5860 c0158be3 ced903e0 ceeda140  0002 ceeda140 ced90330 
Call Trace: [] [] [] [] [] 
[] [] 
   [] [] [] [] [] [] 
[] [] 
   [] [] 
Code: 8b 46 68 85 c0 74 09 8b 40 18 85 c0 74 02 89 c3 85 db 74 10 

>>EIP; c0133ca7<=
Trace; c015882f 
Trace; c0158be3 
Trace; c011b26c 
Trace; c01262bd <__fput+25/54>
Trace; c011d2b5 
Trace; c012745c 
Trace; c0127453 
Trace; c01139bb 
Trace; c012634b 
Trace; c011073e 
Trace; c0113958 
Trace; c01184f4 
Trace; c011847d 
Trace; c0109fbb 
Trace; c0b1 
Trace; c0109583 
Trace; c010a100 
Code;  c0133ca7 
 <_EIP>:
Code;  c0133ca7<=
   0:   8b 46 68  mov0x68(%esi),%eax   <=
Code;  c0133caa 
   3:   85 c0 test   %eax,%eax
Code;  c0133cac 
   5:   74 09 je 10 <_EIP+0x10> c0133cb7 
Code;  c0133cae 
   7:   8b 40 18  mov0x18(%eax),%eax
Code;  c0133cb1 
   a:   85 c0 test   %eax,%eax
Code;  c0133cb3 
   c:   74 02 je 10 <_EIP+0x10> c0133cb7 
Code;  c0133cb5 
   e:   89 c3 mov%eax,%ebx
Code;  c0133cb7 
  10:   85 db test   %ebx,%ebx
Code;  c0133cb9 
  12:   74 10 je 24 <_EIP+0x24> c0133ccb 


1 warning issued.  Results may not be reliable.
-- 
Florian Lohoff  [EMAIL PROTECTED] +49-5201-669912
 Why is it called "common sense" when nobody seems to have any?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Oops in iput

2001-06-25 Thread Florian Lohoff


Hi,
oops in iput - Kernel 2.2.19/i386 + ide-udma patches + ext3 patches (0.0.7a)

Intel BX chipset, SCSI Disks Symbios chipset - The crashing process
is the master process of postfix an MTA.

Just before the crash all processes on that machine started to segfault
in nameserver resolution (remote dns server) and after 2-3 minutes
this oops happened.



ksymoops 2.3.4 on i686 2.2.19.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.2.19/ (default)
 -m /boot/System.map-2.2.19 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Unable to handle kernel paging request at virtual address 4ed90398
current-tss.cr3 = 00101000, %cr3 = 00101000
*pde = 
Oops: 
CPU:0
EIP:0010:[c0133ca7]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246
eax: 4ed90330   ebx:    ecx:    edx: c01eef0c
esi: 4ed90330   edi: ce27ed00   ebp: 0002   esp: cf04ddac
ds: 0018   es: 0018   ss: 0018
Process master (pid: 297, process nr: 31, stackpage=cf04d000)
Stack: cf1859a0 0001 cef7db18 cef7db18 cf1859a0 c015882f 4ed90330  
   ce27ec80 0002 ced90330 ced90330 ce27ed00 0002 ceadc0c0  
   cfce5860 c0158be3 ced903e0 ceeda140  0002 ceeda140 ced90330 
Call Trace: [c015882f] [c0158be3] [c011b26c] [c01262bd] [c011d2b5] 
[c012745c] [c0127453] 
   [c01139bb] [c012634b] [c011073e] [c0113958] [c01184f4] [c011847d] 
[c0109fbb] [c0b1] 
   [c0109583] [c010a100] 
Code: 8b 46 68 85 c0 74 09 8b 40 18 85 c0 74 02 89 c3 85 db 74 10 

EIP; c0133ca7 iput+13/228   =
Trace; c015882f sock_release+57/60
Trace; c0158be3 sock_close+3f/4c
Trace; c011b26c clear_page_tables+ac/b4
Trace; c01262bd __fput+25/54
Trace; c011d2b5 exit_mmap+115/120
Trace; c012745c fput+20/54
Trace; c0127453 fput+17/54
Trace; c01139bb mmput+3f/48
Trace; c012634b filp_close+5f/6c
Trace; c011073e send_sig_info+182/2c0
Trace; c0113958 mm_release+10/34
Trace; c01184f4 do_exit+140/2a0
Trace; c011847d do_exit+c9/2a0
Trace; c0109fbb do_signal+21f/298
Trace; c0b1 sys_kill+61/70
Trace; c0109583 sys_sigreturn+b7/e8
Trace; c010a100 signal_return+14/18
Code;  c0133ca7 iput+13/228
 _EIP:
Code;  c0133ca7 iput+13/228   =
   0:   8b 46 68  mov0x68(%esi),%eax   =
Code;  c0133caa iput+16/228
   3:   85 c0 test   %eax,%eax
Code;  c0133cac iput+18/228
   5:   74 09 je 10 _EIP+0x10 c0133cb7 iput+23/228
Code;  c0133cae iput+1a/228
   7:   8b 40 18  mov0x18(%eax),%eax
Code;  c0133cb1 iput+1d/228
   a:   85 c0 test   %eax,%eax
Code;  c0133cb3 iput+1f/228
   c:   74 02 je 10 _EIP+0x10 c0133cb7 iput+23/228
Code;  c0133cb5 iput+21/228
   e:   89 c3 mov%eax,%ebx
Code;  c0133cb7 iput+23/228
  10:   85 db test   %ebx,%ebx
Code;  c0133cb9 iput+25/228
  12:   74 10 je 24 _EIP+0x24 c0133ccb iput+37/228


1 warning issued.  Results may not be reliable.
-- 
Florian Lohoff  [EMAIL PROTECTED] +49-5201-669912
 Why is it called common sense when nobody seems to have any?

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: Oops in iput

2001-06-25 Thread Stephen C. Tweedie

Hi,

On Mon, Jun 25, 2001 at 08:16:12PM +0200, Florian Lohoff wrote:
 
 oops in iput - Kernel 2.2.19/i386 + ide-udma patches + ext3 patches (0.0.7a)

The ide-udma patches for 2.2 haven't had nearly the testing of the 2.4
ones, and simply can't be trusted as a baseline for debugging other
code.  Can you reproduce this problem without them applied?  The oops
here is a networking oops on the face of it, and I wouldn't expect to
see that on 2.2 unless something was corrupting memory.

Cheers,
 Stephen
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/