Looking into it a little more now, uart_tasklet_action() in drivers/serial/serial_core.c looks suspicious. Meelis, can you add a BUG_ON(state->info->tty==NULL) in the middle of uart_tasklet_action() and see if it dies on that instead?

Yes, this BUG triggers and produces

sunbmac.c:v2.0 24/Nov/03 David S. Miller (davem@redhat.com)
eth1: BigMAC 100baseT Ethernet 08:00:20:72:8b:a1
kernel BUG at drivers/serial/serial_core.c:111!
              \|/ ____ \|/
              "@'/ ,. \`@"
              /_| \__/ |_\
                 \__U_/
klogd(344): Kernel bad trap [#1]
PSR: 404000c7 PC: f00f4a80 NPC: f00f4a84 Y: 00000000    Not tainted
PC: <uart_tasklet_action+0x2c/0x30>
%G: 0000006f f0195c00  f0195efc 40400fe5  f002f084 f0195c00  fbe14000 00000000
%O: 00000033 f017ea60  0000006f 00000000  00000000 501509e0  fbe15998 f00f4a78
RPC: <uart_tasklet_action+0x24/0x30>
%L: 40800fc0 f0011530  f0011534 00000001  00000000 65646861  fbe14000 50171e9c
%I: 00000000 00049000  fbe15de8 fbe15f38  50173de4 00000057  fbe15a00 f0034894
Caller[f0034894]: tasklet_action+0x6c/0xb8
Caller[f0034548]: __do_softirq+0xa0/0xc4
Caller[f00345ac]: do_softirq+0x40/0x54
Caller[f0010758]: patch_handler_irq+0x0/0x24
Caller[f01236e8]: memcpy_fromiovec+0xa8/0xc0
Caller[fe61a9bc]: unix_dgram_sendmsg+0x180/0x4ec [unix]
Caller[f011dd78]: sock_aio_write+0xe8/0x104
Caller[f006caa0]: do_sync_write+0x88/0xb4
Caller[f006cbd0]: vfs_write+0x104/0x11c
Caller[f006cc7c]: sys_write+0x30/0x64
Caller[f001122c]: syscall_is_too_hard+0x34/0x40
Caller[00012534]: 0x12534
Instruction DUMP: 9210206f  7ffc7810  90122260 <91d02005> 9de3bf98  e0062010  
e2062014  c2042010  80a06000
Kernel panic - not syncing: Aiee, killing interrupt handler!


-- Meelis Roos ([EMAIL PROTECTED]) - To unsubscribe from this list: send the line "unsubscribe sparclinux" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

Reply via email to