Miles Lane <[email protected]> wrote:
>
> BUG: unable to handle kernel NULL pointer dereference at virtual
> address 0000003a
> printing eip:
> 0000003a
> *pde = 00000000
> Oops: 0000 [#1]
> SMP
> last sysfs file: /devices/pci0000:00/0000:00:02.2/usb3/idProduct
> Modules linked in: sr_mod eth1394 snd_mpu401 8250_pnp snd_mpu401_uart
> snd_rawmidi pcspkr ehci_hcd autofs4 vfat
> fat 3c59x mii forcedeth parport_pc parport 8250 serial_core ohci1394
> ieee1394 ohci_hcd uhci_hcd usbcore conta
> iner ide_cd cdrom ide_scsi
> CPU: 0
> EIP: 0060:[<0000003a>] Not tainted VLI
> EFLAGS: 00010286 (2.6.16-rc2-mm1 #9)
> EIP is at 0x3a
> eax: ffffff85 ebx: 00000000 ecx: 00000000 edx: 00000020
> esi: 00020070 edi: 12000000 ebp: 00000000 esp: f6b60c70
> ds: 007b es: 007b ss: 0068
> Process cdrom_id (pid: 3482, threadinfo=f6b60000 task=f6b6f6f0)
> Stack: <0>00000000 00000000 00000000 00000000 00000000 00000000
> 00000000 00000000
> 00000000 00000000 00000000 00000000 00000043 00000000 0000400c c04aaca4
> 0000000c ffffff85 00000000 00000002 00000001 00007530 00000000 f64006ac
> Call Trace:
> <c01038b9> show_stack_log_lvl+0xaa/0xb5 <c01039fd> show_registers+0x139/0x1a5
> <c0103cf6> die+0x162/0x1ef <c01120e6> do_page_fault+0x389/0x4cc
> <c01032bf> error_code+0x4f/0x54
> Code: Bad EIP value.
> BUG: cdrom_id/3482, lock held at task exit time!
> [dfca557c] {init_once}
> .. held by: cdrom_id: 3482 [f6b6f6f0, 123]
> ... acquired at: do_open+0x61/0x2f0
gack, what a mess. At a guess, I'd say that block_dev.c:do_open() found a
stupid value in disk->fops->open and did an indirect jump to it.
What is `cdrom_id'?
Can you describe what was happening at the time? What does your cdrom
setup look like, which cdrom drivers were loaded at the time, etc?
It might help if you could change the value of CONFIG_FRAME_POINTER, try
again, see if we can get a better backtrace.
Also, try disabling cdrom_id (mv cdrom_id cdrom_id~), then when the machine
is booted, run `strace cdrom_id'. But one would need to work out which
arguments were begin passed to cdrom_id.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]