Hi,
     Yet another Oops message:(. Iam running samba as a part of the
unionfs and this error is caused mainly when I try to remote access
the share. My share folder is not part of unionfs though (it is a
partition which was mounted after unionfs is created).

kernel BUG at include/linux/dcache.h:294!
Unable to handle kernel NULL pointer dereference at virtual address 00000000
pgd = c23c4000
[00000000] *pgd=00000000
Internal error: Oops: 805 [#1]
Modules linked in: g_ether mv_usb_gadget reiserfs xfs
CPU: 0
PC is at __bug+0x48/0x5c
LR is at 0x1
pc : [<c0083190>]    lr : [<00000001>]    Not tainted
sp : c20e9e98  ip : 60000093  fp : c20e9eac
r10: c26f8a70  r9 : 00000000  r8 : 00020441
r7 : c3d858a0  r6 : c26f8a70  r5 : c21f4558  r4 : 00000000
r3 : 00000000  r2 : 00000000  r1 : 00000000  r0 : 00000001
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: A005317F  Table: 023C4000  DAC: 00000015
Process smbd (pid: 1058, stack limit = 0xc20e81a0)
Stack: (0xc20e9e98 to 0xc20ea000)
9e80:                                                       c32905c0 00000000
9ea0: c20e9efc c20e9eb0 c0193e70 c0083158 c00ee0e4 c00eba14 00000000 00000000
9ec0: 00000001 00000000 00000000 c1c2f3c0 c20e9efc 00000001 c3d858a0 c26f8a70
9ee0: c03e00c0 00000000 c20e8000 c1c2f3c0 c20e9f24 c20e9f00 c00dde18 c0193b08
9f00: 00020441 000001a4 00000012 00000005 c0042a0c c2251000 c20e9f7c c20e9f28
9f20: c00ddfd0 c00ddcd8 c1c2f3c0 c03e00c0 624549f1 00000012 c225100f 00000300
9f40: 00000000 00000000 c20e8000 c2251000 c20e9f7c c20e9f60 c00de038 c00f99f4
9f60: 00020442 000001a4 c2251000 00020441 c20e9fa4 c20e9f80 c00de210 c00ddf98
9f80: 000001a4 00000441 2a336578 00000005 c0042a0c 00900005 00000000 c20e9fa8
9fa0: c0042280 c00de1d8 000001a4 c0086448 2a336578 00020441 000001a4 00000000
9fc0: 000001a4 00000441 2a336578 000001a4 2a2c9e10 bebf41f8 2a32ea68 00000000
9fe0: 2a32edc0 bebf41b0 402856b0 402856cc 60000010 2a336578 00000000 00000000
Backtrace:
[<c0083148>] (__bug+0x0/0x5c) from [<c0193e70>] (unionfs_open+0x378/0x578)
r4 = 00000000
[<c0193af8>] (unionfs_open+0x0/0x578) from [<c00dde18>]
(dentry_open+0x150/0x2c0)
[<c00ddcc8>] (dentry_open+0x0/0x2c0) from [<c00ddfd0>] (filp_open+0x48/0x50)
[<c00ddf88>] (filp_open+0x0/0x50) from [<c00de210>] (sys_open+0x48/0xd8)
r4 = 00020441
[<c00de1c8>] (sys_open+0x0/0xd8) from [<c0042280>] (ret_fast_syscall+0x0/0x2c)
Code: eb007fc5 e59f0014 eb007fc3 e3a03000 (e5833000)

On 10/13/06, Ram Kumar <[EMAIL PROTECTED]> wrote:
Hi,
      It took a while to reproduce the oops. The following is the
complete oops message for diagnosis:

kernel BUG at fs/unionfs/unionfs_debugmacros.h:291!
Unable to handle kernel NULL pointer dereference at virtual address 00000000
pgd = c2ce8000
[00000000] *pgd=00000000
Internal error: Oops: 805 [#1]
Modules linked in: g_ether mv_usb_gadget reiserfs xfs
CPU: 0
PC is at __bug+0x48/0x5c
LR is at 0x1
pc : [<c0088c90>]    lr : [<00000001>]    Not tainted
sp : c0c1dcd8  ip : 60000093  fp : c0c1dcec
r10: c3bbedd8  r9 : c3c97228  r8 : c0068740
r7 : 00000000  r6 : c3c972b0  r5 : c3c97a20  r4 : 00000000
r3 : 00000000  r2 : 00000000  r1 : 00000000  r0 : 00000001
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  Segment user
Control: A005317F  Table: 02CE8000  DAC: 00000015
Process nmbd (pid: 5351, stack limit = 0xc0c1c1a0)
Stack: (0xc0c1dcd8 to 0xc0c1e000)
dcc0:                                                       c0069fb8 c144ba98
dce0: c0c1dda4 c0c1dcf0 c01d6ed0 c0088c58 c0069fb8 c0068740 00000000 00000000
dd00: 00000000 c0c1dd10 c00403ac c0024064 c20e0b48 c0c1dd38 c20e0b48 c20e0b48
dd20: c05d5400 c004b7a0 00000000 c0c1c000 60000093 c033eadc c3c972b0 c05d5000
dd40: c3c97228 c3bbedd8 c0c1dd74 c0c1dd58 c00225c0 c00a2fe8 00000000 c0c1dd68
dd60: c0c1c000 80000013 c0c1dd8c c0c1dd78 c0086984 c0022590 c144ba98 c00687c4
dd80: c0c1ddfc c144ba98 c00687c4 c033eadc c3c972b0 c05d5000 c0c1ddfc c0c1dda8
dda0: c019f7f0 c01d6128 c0068720 c033eadc c004c250 c00687c4 0000002d 00000000
ddc0: c0c1dde4 c0c1ddd0 00000000 00000000 c144ba98 c20e6ea8 00000000 c20e6e78
dde0: c3c972b0 c20e6e78 c3c97228 c3bbedd8 c0c1deac c0c1de00 c0192468 c019f6b4
de00: c006839c c033eadc c004c164 c0068370 00000262 00000000 c033eadc c033eadc
de20: 00000007 00000001 c1855300 00000000 c0c1de9c 00000000 00000000 c0c1df28
de40: 000081a4 c20e6ea8 00000277 c00681a4 00000000 00000000 00000001 c20e6e78
de60: 452fa491 00000000 452fa491 00000000 452fa491 00000000 000001a4 c20e6ea8
de80: c3c972b0 00000000 000001a4 c20e6ea8 c3c972b0 c0c1df28 c0c1c000 c22bf000
dea0: c0c1ded4 c0c1deb0 c00f1d84 c018fdd8 ffffffeb c3c972b0 c0c1df28 c0d2eee8
dec0: 00000005 00020442 c0c1df24 c0c1ded8 c00f2140 c00f1cfc c22dc3c0 c0d2eee8
dee0: c0c1df30 00000000 0000000a 000001a4 c04440c0 c3c972b0 c0d2eee8 00020441
df00: 000001a4 00000003 00000005 c004308c c0c1c000 c22bf000 c0c1df7c c0c1df28
df20: c00e2008 c00f1f94 c0d2eee8 c04440c0 583656c4 00000008 c22bf00f 00000300
df40: 00000000 00000000 c0c1c000 c22bf000 c0c1df7c c0c1df60 c00e2088 c00fd64c
df60: 00020442 000001a4 c22bf000 00020441 c0c1dfa4 c0c1df80 c00e2260 c00e1fe8
df80: 000001a4 00000441 2a0f84e4 00000005 c004308c 00900005 00000000 c0c1dfa8
dfa0: c0042900 c00e2228 000001a4 c008bc38 2a0f84e4 00020441 000001a4 00000000
dfc0: 000001a4 00000441 2a0f84e4 000001a4 2a0c47a0 beac79a8 2a0f26a4 00000012
dfe0: 2a0f28f4 beac7960 402716b0 402716cc 60000010 2a0f84e4 72282034 61656c65
Backtrace:
[<c0088c48>] (__bug+0x0/0x5c) from [<c01d6ed0>]
(__fist_print_dentry+0xdb8/0xfec)
 r4 = C144BA98
[<c01d6118>] (__fist_print_dentry+0x0/0xfec) from [<c019f7f0>]
(unionfs_interpose+0x14c/0x1b90)
 r8 = C05D5000  r7 = C3C972B0  r6 = C033EADC  r5 = C00687C4
 r4 = C144BA98
[<c019f6a4>] (unionfs_interpose+0x0/0x1b90) from [<c0192468>]
(unionfs_create+0x26a0/0x3120)
[<c018fdc8>] (unionfs_create+0x0/0x3120) from [<c00f1d84>]
(vfs_create+0x98/0xc0)
[<c00f1cec>] (vfs_create+0x0/0xc0) from [<c00f2140>] (open_namei+0x1bc/0x7ac)
 r8 = 00020442  r7 = 00000005  r6 = C0D2EEE8  r5 = C0C1DF28
 r4 = C3C972B0
[<c00f1f84>] (open_namei+0x0/0x7ac) from [<c00e2008>] (filp_open+0x30/0x50)
[<c00e1fd8>] (filp_open+0x0/0x50) from [<c00e2260>] (sys_open+0x48/0xd8)
 r4 = 00020441
[<c00e2218>] (sys_open+0x0/0xd8) from [<c0042900>] (ret_fast_syscall+0x0/0x2c)
Code: eb0079e6 e59f0014 eb0079e4 e3a03000 (e5833000)

On 10/10/06, Josef Sipek <[EMAIL PROTECTED]> wrote:
> On Mon, Oct 09, 2006 at 11:06:33PM +0200, Ram Kumar wrote:
> > Exactly..it was an ARM based board running on 2.6.12 kernel and
> > unionfs-1.1.5. This issue can be easily reproduced when I play with
> > the network hotplug events (USB gadget interface esp).
>
> Hrm.
>
> > And as far as
> > the first line is concerned, I guess it is something like "Modules
> > linked in: xfs, reiserfs, usb_gadget g_ether". Is it related to the
> > architecture (arm) ? (or could it be from the usb gadget driver
> > implementation ?)
>
> Please post the entire oops. At this point, I'm not even sure if it is an
> Oops or a BUG.
>
> Chances are that it is not related to the architecture.
>
> Josef "Jeff" Sipek.
>
> --
> Research, n.:
>   Consider Columbus:
>     He didn't know where he was going.
>     When he got there he didn't know where he was.
>     When he got back he didn't know where he had been.
>     And he did it all on someone else's money.
>

_______________________________________________
unionfs mailing list
[email protected]
http://www.fsl.cs.sunysb.edu/mailman/listinfo/unionfs

Reply via email to