Am Dienstag, 30. Januar 2007 15:30 schrieb Remy Bohmer:
> Hello All,
>
> Once in a while we see the following stacktrace.
> We do not know yet the exact condition that generates this, but is
> there anyone that recognises this oops?
>
> Kind Regards,
>
> Remy Bohmer
>
>
> Jan 30 14:09:20 localhost kernel: BUG: unable to handle kernel paging
> request at virtual address 2e3277e5
> Jan 30 14:09:20 localhost kernel: printing eip:
> Jan 30 14:09:20 localhost kernel: c0140214
> Jan 30 14:09:20 localhost kernel: *pde = 00000000
> Jan 30 14:09:20 localhost kernel: stopped custom tracer.
> Jan 30 14:09:20 localhost kernel: Oops: 0002 [#1]
> Jan 30 14:09:20 localhost kernel: PREEMPT SMP
> Jan 30 14:09:20 localhost kernel: Modules linked in: cap_over
> commoncap i2c_dev uhci_hcd i2c_i801 i2c_core ehci_hcd
> Jan 30 14:09:20 localhost kernel: CPU: 0
> Jan 30 14:09:20 localhost kernel: EIP: 0060:[<c0140214>] Not tainted VLI
> Jan 30 14:09:20 localhost kernel: EFLAGS: 00010246 (2.6.20-rc5-rt10 #1)
> Jan 30 14:09:20 localhost kernel: EIP is at module_put+0x24/0x60
> Jan 30 14:09:20 localhost kernel: eax: 2e3277e5 ebx: f774da00 ecx:
> c1df40a0 edx: 2e327665
> Jan 30 14:09:20 localhost kernel: esi: f6e93af0 edi: 2e327665 ebp:
> f4a1bf40 esp: f4a1bf40
> Jan 30 14:09:20 localhost kernel: ds: 007b es: 007b ss: 0068
> preempt: 00000002
> Jan 30 14:09:20 localhost kernel: Process udevd (pid: 11594,
> ti=f4a1a000 task=f6014710 task.ti=f4a1a000)
> Jan 30 14:09:20 localhost kernel: Stack: f4a1bf54 c01a360e 00000010
> f5882ac0 f7e3f9c4 f4a1bf78 c01684f1 00000000
> Jan 30 14:09:20 localhost kernel: 00000000 f43d5c14 f7dc3c40
> f5882ac0 c1f60680 00000000 f4a1bf80 c0168629
> Jan 30 14:09:20 localhost kernel: f4a1bf98 c01656f7 f4a1bfb0
> c1f60680 c1f60700 00000003 f4a1bfb0 c01669d9
> Jan 30 14:09:20 localhost kernel: Call Trace:
> Jan 30 14:09:20 localhost kernel: [<c01054ca>] show_trace_log_lvl+0x1a/0x30
> Jan 30 14:09:20 localhost kernel: [<c010559b>] show_stack_log_lvl+0xbb/0x100
> Jan 30 14:09:20 localhost kernel: [<c01057c0>] show_registers+0x1e0/0x300
> Jan 30 14:09:20 localhost kernel: [<c0105a05>] die+0x125/0x250
> Jan 30 14:09:20 localhost kernel: [<c0115b75>] do_page_fault+0x145/0x610
> Jan 30 14:09:20 localhost kernel: [<c03ee69c>] error_code+0x7c/0x84
> Jan 30 14:09:20 localhost kernel: [<c01a360e>] sysfs_release+0x3e/0x70
> Jan 30 14:09:20 localhost kernel: [<c01684f1>] __fput+0xa1/0x170
> Jan 30 14:09:20 localhost kernel: [<c0168629>] fput+0x19/0x20
> Jan 30 14:09:20 localhost kernel: [<c01656f7>] filp_close+0x47/0x70
> Jan 30 14:09:20 localhost kernel: [<c01669d9>] sys_close+0x69/0xc0
> Jan 30 14:09:20 localhost kernel: [<c0104472>] sysenter_past_esp+0x5f/0x85
> Jan 30 14:09:20 localhost kernel: =======================
> Jan 30 14:09:20 localhost kernel: Code: 00 8d bf 00 00 00 00 55 85 c0
> 89 e5 89 c2 74 34 89 e0 25 00 e0 ff ff 83 40 14 01 65 a1 04 00 00 00
> c1 e0 07 8d 84 10 80 01 00 00 <ff> 08 83 3a 02 74 1b 89 e0 25 00 e0 ff
> ff 83 68 14 01 8b 40 08
> Jan 30 14:09:20 localhost kernel: EIP: [<c0140214>]
> module_put+0x24/0x60 SS:ESP 0068:f4a1bf40
I think I saw similar oopses.
Cause was a driver having freed some kmalloced struct _before_
sysfs_release had given its ok.
Happened on physical device removal or rmmod here.
Karsten
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]