Re: [BUG 2.6.17-git] kmem_cache_create: duplicate cache scsi_cmd_cache

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, May 12, 2006 at 02:27:19PM -0700, Linus Torvalds wrote:
> [remove all the inflamatory stuff]

Anyway, you asked for the original oopsen, and here they are.  Enjoy.

From: Todd Blumer <[email protected]>
On a PXA27x handheld (iPAQ hx4700), when we eject a mounted SD memory
card, we get a kernel panic (kernel trying to clean up non-existent
device). One hack patch to avoid the panic is:

--- fs/partitions/check.c       10 Apr 2006 22:57:27 -0000      1.15
+++ fs/partitions/check.c       4 May 2006 20:30:15 -0000
@@ -491,6 +491,7 @@
                        kfree(disk_name);
                }
                put_device(disk->driverfs_dev);
+               disk->driverfs_dev = 0; /* HACK - what's the right
solution? */
        }
        kobject_uevent(&disk->kobj, KOBJ_REMOVE);
        kobject_del(&disk->kobj);

...
root@ipaq-pxa270:~# Unable to handle kernel NULL pointer dereference at
virtual2pgd = c218c000
[00000002] *pgd=a20ec031, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#1]
Modules linked in: nls_iso8859_1 nls_cp437 snd_pcm_oss snd_mixer_oss
snd_hx4700rCPU: 0
PC is at strlen+0xc/0x30
LR is at kobject_get_path+0x2c/0xc0
pc : [<c00ee56c>]    lr : [<c00eb724>]    Not tainted
sp : c21bfde4  ip : c21bfdf4  fp : c21bfdf0
r10: c21bfe28  r9 : 000007a5  r8 : c21bfe2c
r7 : c3554074  r6 : 000000d0  r5 : 00000001  r4 : c3554074
r3 : 00000002  r2 : c01fa88f  r1 : 00000002  r0 : 00000002
Flags: nzCv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: 397F  Table: A218C000  DAC: 00000015
Process umount (pid: 2384, stack limit = 0xc21be198)
Stack: (0xc21bfde4 to 0xc21c0000)
fde0:          c21bfe14 c21bfdf4 c00eb724 c00ee56c c34876c0 c355400c
c3542b78
fe00: 0000001a c21bfe2c c21bfe58 c21bfe18 c00e2edc c00eb704 000007a5
c21bfe28
fe20: c01fa888 000000fe 00000012 00000002 c3c9585b c0226e04 c32ff7a8
c3542b60
fe40: c3c9583f c01fab8c c0226db0 c21bfeb0 c21bfe5c c00ec130 c00e2dcc
c3c9585b
fe60: 000007a5 c3c95800 c0226dc4 c3e15b20 00000001 00000001 00000000
00000000
fe80: ffffffff bee45e28 c0331040 c3554200 c3554200 00000000 00000000
c21bff28
fea0: c21bff20 c21bfec0 c21bfeb4 c0084d6c c00ebf1c c21bfed8 c21bfec4
c0084f04
fec0: c0084d48 c3554200 c0225d84 c21bfef0 c21bfedc c0083d90 c0084ef0
c3554200
fee0: c032bd20 c21bff08 c21bfef4 c009b804 c0083d30 c21bff28 c21be000
c21bff1c
ff00: c21bff0c c008baec c009b79c 00000000 c21bff94 c21bff20 c009c0ec
c008bad8
ff20: c21bff20 c21bff20 c20e73a0 c032bd20 c21bff3c c0024db0 c00ee388
00000001
ff40: 00000001 00000000 00000000 ffffffff bee45e28 00000000 00000000
c21bffb0
ff60: 00000000 00091050 c21bff9c bee44db8 000923c8 bee44db8 00000016
c001cf64
ff80: c21be000 00091050 c21bffa4 c21bff98 c009c114 c009beec 00000000
c21bffa8
ffa0: c001cdc0 c009c10c bee44db8 000923c8 bee44db8 bee44dba 000923ca
0000006d
ffc0: bee44db8 000923c8 bee44db8 00000000 00090710 00000000 00091050
00000000
ffe0: 40160e70 bee44d9c 00063fc4 40160e74 60000010 bee44db8 401bd7d8
400dad9c
Backtrace:
[<c00ee560>] (strlen+0x0/0x30) from [<c00eb724>]
(kobject_get_path+0x2c/0xc0)
[<c00eb6f8>] (kobject_get_path+0x0/0xc0) from [<c00e2edc>]
(block_uevent+0x11c/) r8 = C21BFE2C  r7 = 0000001A  r6 = C3542B78  r5 =
C355400C
 r4 = C34876C0
[<c00e2dc0>] (block_uevent+0x0/0x1f4) from [<c00ec130>]
(kobject_uevent+0x220/0)[<c00ebf10>] (kobject_uevent+0x0/0x478) from
[<c0084d6c>] (bdev_uevent+0x30/0x3)[<c0084d3c>] (bdev_uevent+0x0/0x34)
from [<c0084f04>] (kill_block_super+0x20/0x)[<c0084ee4>]
(kill_block_super+0x0/0x3c) from [<c0083d90>] (deactivate_super+0x) r5 =
C0225D84  r4 = C3554200
[<c0083d24>] (deactivate_super+0x0/0x84) from [<c009b804>]
(mntput_no_expire+0x) r5 = C032BD20  r4 = C3554200
[<c009b790>] (mntput_no_expire+0x0/0xc0) from [<c008baec>]
(path_release_on_umo) r5 = C21BE000  r4 = C21BFF28
[<c008bacc>] (path_release_on_umount+0x0/0x24) from [<c009c0ec>]
(sys_umount+0x) r4 = 00000000
[<c009bee0>] (sys_umount+0x0/0x220) from [<c009c114>]
(sys_oldumount+0x14/0x18)
[<c009c100>] (sys_oldumount+0x0/0x18) from [<c001cdc0>]

(ret_fast_syscall+0x0/0)Code: e89da800 e1a0c00d e92dd800 e24cb004 (e5d03000)

and:

From: Mikkel Erup <mikkelerup () yahoo ! com>

 BUG: unable to handle kernel NULL pointer dereference
 at virtual address 00000002
  printing eip:
 c021570d
 *pde = 00000000
 Oops: 0000 [#1]
 PREEMPT
 Modules linked in: nls_iso8859_1 nls_cp437 vfat fat
 speedstep_lib i915 drm mmc_block nvram pcmcia
 yenta_socket rsrc_nonstatic sdhci pcmcia_core e1000
 mmc_core evdev
 CPU:    0
 EIP:    0060:[<c021570d>]    Not tainted VLI
 EFLAGS: 00010202   (2.6.16-git20 #3)
 EIP is at kobject_get_path+0x2d/0xe0
 eax: 00000000   ebx: 00000001   ecx: ffffffff   edx:
 00000000
 esi: e35e9e74   edi: 00000002   ebp: 000007a5   esp:
 dcea1e5c
 ds: 007b   es: 007b   ss: 0068
 Process umount (pid: 3407, threadinfo=dcea0000
 task=dd334a30)
 Stack: <0>c038cad3 dcea1ea0 00000008 dcea1e9c e2765200
 e35e9e0c df304158 000007a5
        c020bb5d e35e9e74 000000d0 dcea1ea0 de9ad85b
 000007a5 dcea1ea4 c038cacb
        000000fe 00000002 00000012 c020ba50 c03c8860
 0000001a de9ad800 c0215d1e
 Call Trace:
  <c020bb5d> block_uevent+0x10d/0x210   <c020ba50>
 block_uevent+0x0/0x210
  <c0215d1e> kobject_uevent+0x1fe/0x520   <c0166860>
 bdev_uevent+0x20/0x40
  <c0166cc1> kill_block_super+0x21/0x50   <c0166f80>
 deactivate_super+0x70/0xa0
  <c017fecb> sys_umount+0x4b/0x280   <c010306f>
 sysenter_past_esp+0x54/0x75
 Code: d2 57 56 53 bb 01 00 00 00 83 ec 10 8b 74 24 24
 8d b4 26 00 00 00 00 8d bc 27 00 00 00 00 8b 3e 85 ff
 74 1d b9 ff ff ff ff 89 d0 <f2> ae f7 d1 49 8b 76 24 8d
 2c 19 8d 5d 01 85 f6 75 e1 85 db 75

Now, can I have your permission not to do anything more tonight?  Is
that okay with you, or are you going to rant about that as well?

-- 
Russell King
 Linux kernel    2.6 ARM Linux   - http://www.arm.linux.org.uk/
 maintainer of:  2.6 Serial core
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux