2.5.20: smbfs oops in smb_readpage

glynis@butterfly.hjsoft.com
Wed, 5 Jun 2002 21:36:54 -0400


--82I3+IH0IqGh5yIs
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

reading a file from an smbfs causes this oops, then the smbfs won't
unmount.
traversing the filesystem is fine, but reading data is not. first 2=20
oopses are from autofs-mounted shares (nt4), and the last is a
hand-mounted fs (smbd on localhost). i don't suspect that matters
much, though.

this looks like the exact same problem reported against 2.5.19 in
`PROBLEM: Kernel 2.5.19 oops when copying files from SMBFS fs to'.

thanks.

ver_linux:

---
If some fields are empty or look unusual you may have an old version.
Compare to the current minimal requirements in Documentation/Changes.
=20
Linux density 2.5.20 #7 Wed Jun 5 19:02:22 EDT 2002 i686 unknown
=20
Gnu C                  gcc (GCC) 3.1.1 20020531 (Debian prerelease) Copyrig=
ht (C) 2002 Free Software Foundation, Inc. This is free software; see the s=
ource for copying conditions. There is NO warranty; not even for MERCHANTAB=
ILITY or FITNESS FOR A PARTICULAR PURPOSE.
Gnu make               3.79.1
util-linux             2.11n
mount                  2.11n
modutils               2.4.15
e2fsprogs              1.27
pcmcia-cs              3.1.33
PPP                    2.4.1
Linux C Library        2.2.5
Dynamic linker (ldd)   2.2.5
Procps                 2.0.7
Net-tools              1.60
Console-tools          0.2.3
Sh-utils               2.0.11
Modules Loaded         smbfs af_packet autofs4 serial_cs 3c574_cs ds yenta_=
socket pcmcia_core uhci-hcd usbcore nls_iso8859-1 nls_cp437 serial snd-pcm-=
oss snd-mixer-oss snd-maestro3 snd-pcm snd-timer snd-ac97-codec snd soundco=
re apm
---
ksymoops 2.4.5 on i686 2.5.20.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.5.20/ (default)
     -m /boot/System.map-2.5.20 (default)

Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options.

cs: IO port probe 0x0c00-0x0cff: clean. cs: IO port probe 0x0800-0x08ff: clean. cs: IO port probe 0x0100-0x04ff: excluding 0x280-0x287 0x378-0x37f 0x4d0-0x= 4d7 cs: IO port probe 0x0a00-0x0aff: clean. cs: memory probe 0xa0000000-0xa0ffffff: clean. Unable to handle kernel NULL pointer dereference at virtual address 00000008 ccae8013 *pde =3D 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<ccae8013>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010286 eax: 00000000 ebx: c114feb8 ecx: c114feb8 edx: c1150590 esi: 00000000 edi: c88a7238 ebp: 00000001 esp: c9dabe44 ds: 0018 es: 0018 ss: 0018 Stack: c114feb8 00000000 c114feb8 00000000 c013bed4 00000000 c114feb8 00000= 000=20 00000001 00000001 c88a7238 c9daa000 c013bfb0 c88a7238 c9dabe90 00000= 001=20 c9daa000 00000001 00000000 c9dabe90 c9dabe90 00000010 00000000 00000= 000=20 Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>= ]=20 [<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c0107= 3ff>]=20 Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2=20

>>EIP; ccae8013 <[smbfs]smb_readpage+13/40> <=3D=3D=3D=3D=3D

>>ebx; c114feb8 <_end+e502d4/c5e241c> >>ecx; c114feb8 <_end+e502d4/c5e241c> >>edx; c1150590 <_end+e509ac/c5e241c> >>edi; c88a7238 <_end+85a7654/c5e241c> >>esp; c9dabe44 <_end+9aac260/c5e241c>

Trace; c013bed4 <read_pages+84/a0> Trace; c013bfb0 <do_page_cache_readahead+c0/140> Trace; c013c096 <page_cache_readahead+66/130> Trace; c012d9bd <do_generic_file_read+bd/390> Trace; c012dee0 <file_read_actor+0/a0> Trace; c012e028 <generic_file_read+a8/160> Trace; c012dee0 <file_read_actor+0/a0> Trace; ccae8307 <[smbfs]smb_file_read+77/80> Trace; c013ee6e <vfs_read+ae/f0> Trace; c013efde <sys_read+3e/60> Trace; c01073ff <syscall_call+7/b>

Code; ccae8013 <[smbfs]smb_readpage+13/40> 00000000 <_EIP>: Code; ccae8013 <[smbfs]smb_readpage+13/40> <=3D=3D=3D=3D=3D 0: 8b 40 08 mov 0x8(%eax),%eax <=3D=3D=3D=3D=3D Code; ccae8016 <[smbfs]smb_readpage+16/40> 3: ff 43 10 incl 0x10(%ebx) Code; ccae8019 <[smbfs]smb_readpage+19/40> 6: 89 5c 24 04 mov %ebx,0x4(%esp,1) Code; ccae801d <[smbfs]smb_readpage+1d/40> a: 89 04 24 mov %eax,(%esp,1) Code; ccae8020 <[smbfs]smb_readpage+20/40> d: e8 7b fe ff ff call fffffe8d <_EIP+0xfffffe8d> ccae7ea= 0 <[smbfs]smb_readpage_sync+0/160> Code; ccae8025 <[smbfs]smb_readpage+25/40> 12: 31 d2 xor %edx,%edx

Unable to handle kernel NULL pointer dereference at virtual address 00000008 ccae8013 *pde =3D 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<ccae8013>] Not tainted EFLAGS: 00010286 eax: 00000000 ebx: c10e2910 ecx: c10e2910 edx: c10e294c esi: 00000000 edi: c66f3638 ebp: 00000010 esp: c664de44 ds: 0018 es: 0018 ss: 0018 Stack: c10e2910 00000000 c10e2910 00000000 c013bed4 00000000 c10e2910 00000= 000=20 0000000f 00000010 c66f3638 c664c000 c013bfb0 c66f3638 c664de90 00000= 010=20 c664c000 00000010 000000b3 c10e5874 c10e28ec 00000010 00000000 00000= 000=20 Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>= ]=20 [<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c0107= 3ff>]=20 Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2=20

>>EIP; ccae8013 <[smbfs]smb_readpage+13/40> <=3D=3D=3D=3D=3D

>>ebx; c10e2910 <_end+de2d2c/c5e241c> >>ecx; c10e2910 <_end+de2d2c/c5e241c> >>edx; c10e294c <_end+de2d68/c5e241c> >>edi; c66f3638 <_end+63f3a54/c5e241c> >>esp; c664de44 <_end+634e260/c5e241c>

Trace; c013bed4 <read_pages+84/a0> Trace; c013bfb0 <do_page_cache_readahead+c0/140> Trace; c013c096 <page_cache_readahead+66/130> Trace; c012d9bd <do_generic_file_read+bd/390> Trace; c012dee0 <file_read_actor+0/a0> Trace; c012e028 <generic_file_read+a8/160> Trace; c012dee0 <file_read_actor+0/a0> Trace; ccae8307 <[smbfs]smb_file_read+77/80> Trace; c013ee6e <vfs_read+ae/f0> Trace; c013efde <sys_read+3e/60> Trace; c01073ff <syscall_call+7/b>

Code; ccae8013 <[smbfs]smb_readpage+13/40> 00000000 <_EIP>: Code; ccae8013 <[smbfs]smb_readpage+13/40> <=3D=3D=3D=3D=3D 0: 8b 40 08 mov 0x8(%eax),%eax <=3D=3D=3D=3D=3D Code; ccae8016 <[smbfs]smb_readpage+16/40> 3: ff 43 10 incl 0x10(%ebx) Code; ccae8019 <[smbfs]smb_readpage+19/40> 6: 89 5c 24 04 mov %ebx,0x4(%esp,1) Code; ccae801d <[smbfs]smb_readpage+1d/40> a: 89 04 24 mov %eax,(%esp,1) Code; ccae8020 <[smbfs]smb_readpage+20/40> d: e8 7b fe ff ff call fffffe8d <_EIP+0xfffffe8d> ccae7ea= 0 <[smbfs]smb_readpage_sync+0/160> Code; ccae8025 <[smbfs]smb_readpage+25/40> 12: 31 d2 xor %edx,%edx

Unable to handle kernel NULL pointer dereference at virtual address 00000008 ccae8013 *pde =3D 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<ccae8013>] Not tainted EFLAGS: 00010286 eax: 00000000 ebx: c11a2850 ecx: c11a2850 edx: c1049b8c esi: 00000000 edi: c66f3138 ebp: 00000002 esp: c78a5e44 ds: 0018 es: 0018 ss: 0018 Stack: c11a2850 00000000 c11a2850 00000000 c013bed4 00000000 c11a2850 00000= 000=20 00000002 00000002 c66f3138 c78a4000 c013bfb0 c66f3138 c78a5e90 00000= 002=20 c78a4000 00000002 00000001 c110c1a8 c110c1a8 00000010 00000000 00000= 000=20 Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>= ]=20 [<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c0107= 3ff>]=20 Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2=20

>>EIP; ccae8013 <[smbfs]smb_readpage+13/40> <=3D=3D=3D=3D=3D

>>ebx; c11a2850 <_end+ea2c6c/c5e241c> >>ecx; c11a2850 <_end+ea2c6c/c5e241c> >>edx; c1049b8c <_end+d49fa8/c5e241c> >>edi; c66f3138 <_end+63f3554/c5e241c> >>esp; c78a5e44 <_end+75a6260/c5e241c>

Trace; c013bed4 <read_pages+84/a0> Trace; c013bfb0 <do_page_cache_readahead+c0/140> Trace; c013c096 <page_cache_readahead+66/130> Trace; c012d9bd <do_generic_file_read+bd/390> Trace; c012dee0 <file_read_actor+0/a0> Trace; c012e028 <generic_file_read+a8/160> Trace; c012dee0 <file_read_actor+0/a0> Trace; ccae8307 <[smbfs]smb_file_read+77/80> Trace; c013ee6e <vfs_read+ae/f0> Trace; c013efde <sys_read+3e/60> Trace; c01073ff <syscall_call+7/b>

Code; ccae8013 <[smbfs]smb_readpage+13/40> 00000000 <_EIP>: Code; ccae8013 <[smbfs]smb_readpage+13/40> <=3D=3D=3D=3D=3D 0: 8b 40 08 mov 0x8(%eax),%eax <=3D=3D=3D=3D=3D Code; ccae8016 <[smbfs]smb_readpage+16/40> 3: ff 43 10 incl 0x10(%ebx) Code; ccae8019 <[smbfs]smb_readpage+19/40> 6: 89 5c 24 04 mov %ebx,0x4(%esp,1) Code; ccae801d <[smbfs]smb_readpage+1d/40> a: 89 04 24 mov %eax,(%esp,1) Code; ccae8020 <[smbfs]smb_readpage+20/40> d: e8 7b fe ff ff call fffffe8d <_EIP+0xfffffe8d> ccae7ea= 0 <[smbfs]smb_readpage_sync+0/160> Code; ccae8025 <[smbfs]smb_readpage+25/40> 12: 31 d2 xor %edx,%edx

1 warning issued. Results may not be reliable.

---
--=20
____________________}John Flinchbaugh{______________________
| glynis@hjsoft.com         http://www.hjsoft.com/~glynis/ |
~~Powered by Linux: Reboots are for hardware upgrades only~~

--82I3+IH0IqGh5yIs Content-Type: application/pgp-signature Content-Disposition: inline

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE8/ry1CGPRljI8080RAg47AJ0XlJWT9CVspsgRzuGrUbfMshWydACfR0+4 ahX6AQOFphlr5qK8c4SQ43A= =EkT8 -----END PGP SIGNATURE-----

--82I3+IH0IqGh5yIs-- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/