Hi Andrew, On Thu, 2005-03-03 at 15:37 -0800, Andrew Morton wrote: > Brice Figureau <[EMAIL PROTECTED]> wrote: [snip] > > Unable to handle kernel NULL pointer dereference at virtual address 0000000c > > printing eip: > > c01a858d > > *pde = 00000000 > > Oops: 0002 [#1] > > PREEMPT SMP > > Modules linked in: i2c_i801 i2c_core ip_conntrack_ftp ipt_LOG ipt_limit > > ipt_REJECT ipt_state iptable_filter ip_conntrack ip_tables > > CPU: 2 > > EIP: 0060:[journal_commit_transaction+877/5264] Not tainted VLI > > EFLAGS: 00010286 (2.6.10-ac10) > > EIP is at journal_commit_transaction+0x36d/0x1490 > > Please do: > > gdb vmlinux > (gdb) l *0xc01a858d
Unfortunately this kernel is not compiled with CONFIG_DEBUG_INFO=y, so the above command does not work. But: (gdb) disassemble 0xc01a858d Dump of assembler code for function journal_commit_transaction: [snipped] ... 0xc01a8568 <journal_commit_transaction+840>: test %eax,%eax 0xc01a856a <journal_commit_transaction+842>: jne 0xc01a93bf <journal_commit_transaction+4511> 0xc01a8570 <journal_commit_transaction+848>: mov 0xfffffea8(%ebp),%edx 0xc01a8576 <journal_commit_transaction+854>: mov 0x18(%edx),%eax 0xc01a8579 <journal_commit_transaction+857>: test %eax,%eax 0xc01a857b <journal_commit_transaction+859>: je 0xc01a8606 <journal_commit_transaction+998> 0xc01a8581 <journal_commit_transaction+865>: mov $0xffffe000,%esi 0xc01a8586 <journal_commit_transaction+870>: and %esp,%esi 0xc01a8588 <journal_commit_transaction+872>: mov 0x20(%eax),%edi 0xc01a858b <journal_commit_transaction+875>: mov (%edi),%ebx 0xc01a858d <journal_commit_transaction+877>: lock incl 0xc(%ebx) 0xc01a8591 <journal_commit_transaction+881>: mov (%ebx),%eax 0xc01a8593 <journal_commit_transaction+883>: test $0x4,%al 0xc01a8595 <journal_commit_transaction+885>: jne 0xc01a9379 <journal_commit_transaction+4441> 0xc01a859b <journal_commit_transaction+891>: mov %ebx,0x4(%esp) 0xc01a859f <journal_commit_transaction+895>: mov 0x8(%ebp),%ecx 0xc01a85a2 <journal_commit_transaction+898>: mov %ecx,(%esp) 0xc01a85a5 <journal_commit_transaction+901>: call 0xc01a81d0 <inverted_lock> 0xc01a85aa <journal_commit_transaction+906>: test %eax,%eax 0xc01a85ac <journal_commit_transaction+908>: je 0xc01a9373 <journal_commit_transaction+4435> 0xc01a85b2 <journal_commit_transaction+914>: mov (%ebx),%eax 0xc01a85b4 <journal_commit_transaction+916>: test $0x20,%ah So I recompiled my kernel with DEBUG_CONFIG_INFO with the hope that the code won't move too far and I could find the code: On the kernel with *debug* enabled: (gdb) l *0xc01a858d 0xc01a858d is in journal_commit_transaction (buffer_head.h:104). 99 * Emit the buffer bitops functions. Note that there are also functions 100 * of the form "mark_buffer_foo()". These are higher-level functions which 101 * do something in addition to setting a b_state bit. 102 */ 103 BUFFER_FNS(Uptodate, uptodate) 104 BUFFER_FNS(Dirty, dirty) 105 TAS_BUFFER_FNS(Dirty, dirty) 106 BUFFER_FNS(Lock, locked) 107 TAS_BUFFER_FNS(Lock, locked) 108 BUFFER_FNS(Req, req) Which does not seem to match the code included in the oops. (gdb) disassemble 0xc01a858d [snip] 0xc01a85c8 <journal_commit_transaction+840>: test %eax,%eax 0xc01a85ca <journal_commit_transaction+842>: jne 0xc01a941f <journal_commit_transaction+4511> 0xc01a85d0 <journal_commit_transaction+848>: mov 0xfffffea8(%ebp),%edx 0xc01a85d6 <journal_commit_transaction+854>: mov 0x18(%edx),%eax 0xc01a85d9 <journal_commit_transaction+857>: test %eax,%eax 0xc01a85db <journal_commit_transaction+859>: je 0xc01a8666 <journal_commit_transaction+998> 0xc01a85e1 <journal_commit_transaction+865>: mov $0xffffe000,%esi 0xc01a85e6 <journal_commit_transaction+870>: and %esp,%esi 0xc01a85e8 <journal_commit_transaction+872>: mov 0x20(%eax),%edi 0xc01a85eb <journal_commit_transaction+875>: mov (%edi),%ebx 0xc01a85ed <journal_commit_transaction+877>: lock incl 0xc(%ebx) 0xc01a85f1 <journal_commit_transaction+881>: mov (%ebx),%eax 0xc01a85f3 <journal_commit_transaction+883>: test $0x4,%al 0xc01a85f5 <journal_commit_transaction+885>: jne 0xc01a93d9 <journal_commit_transaction+4441> 0xc01a85fb <journal_commit_transaction+891>: mov %ebx,0x4(%esp) 0xc01a85ff <journal_commit_transaction+895>: mov 0x8(%ebp),%ecx 0xc01a8602 <journal_commit_transaction+898>: mov %ecx,(%esp) 0xc01a8605 <journal_commit_transaction+901>: call 0xc01a8230 <inverted_lock> 0xc01a860a <journal_commit_transaction+906>: test %eax,%eax 0xc01a860c <journal_commit_transaction+908>: je 0xc01a93d3 <journal_commit_transaction+4435> 0xc01a8612 <journal_commit_transaction+914>: mov (%ebx),%eax 0xc01a8614 <journal_commit_transaction+916>: test $0x20,%ah So the same code is now at 0xc01a85ed: (gdb) l *0xc01a85ed 0xc01a85ed is in journal_commit_transaction (atomic.h:103). 98 * 99 * Atomically increments @v by 1. 100 */ 101 static __inline__ void atomic_inc(atomic_t *v) 102 { 103 __asm__ __volatile__( 104 LOCK "incl %0" 105 :"=m" (v->counter) 106 :"m" (v->counter)); 107 } It seems to me that get_bh is the culprit because of the following definition from include/linux/buffer_head.h: static inline void get_bh(struct buffer_head *bh) { atomic_inc(&bh->b_count); } I hope this will help you. Let me know if you need more information. Thanks for taking care of that problem, Regards, -- Brice Figureau <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/