reading a file from an smbfs causes this oops, then the smbfs won't
unmount.
traversing the filesystem is fine, but reading data is not.  first 2=20
oopses are  from autofs-mounted shares (nt4), and the last is a
hand-mounted fs (smbd on localhost).  i don't suspect that matters
much, though.
this looks like the exact same problem reported against 2.5.19 in
`PROBLEM: Kernel 2.5.19 oops when copying files from SMBFS fs to'.
thanks.
ver_linux:
---
If some fields are empty or look unusual you may have an old version.
Compare to the current minimal requirements in Documentation/Changes.
=20
Linux density 2.5.20 #7 Wed Jun 5 19:02:22 EDT 2002 i686 unknown
=20
Gnu C                  gcc (GCC) 3.1.1 20020531 (Debian prerelease) Copyrig=
ht (C) 2002 Free Software Foundation, Inc. This is free software; see the s=
ource for copying conditions. There is NO warranty; not even for MERCHANTAB=
ILITY or FITNESS FOR A PARTICULAR PURPOSE.
Gnu make               3.79.1
util-linux             2.11n
mount                  2.11n
modutils               2.4.15
e2fsprogs              1.27
pcmcia-cs              3.1.33
PPP                    2.4.1
Linux C Library        2.2.5
Dynamic linker (ldd)   2.2.5
Procps                 2.0.7
Net-tools              1.60
Console-tools          0.2.3
Sh-utils               2.0.11
Modules Loaded         smbfs af_packet autofs4 serial_cs 3c574_cs ds yenta_=
socket pcmcia_core uhci-hcd usbcore nls_iso8859-1 nls_cp437 serial snd-pcm-=
oss snd-mixer-oss snd-maestro3 snd-pcm snd-timer snd-ac97-codec snd soundco=
re apm
---
ksymoops 2.4.5 on i686 2.5.20.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.5.20/ (default)
     -m /boot/System.map-2.5.20 (default)
Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.
cs: IO port probe 0x0c00-0x0cff: clean.
cs: IO port probe 0x0800-0x08ff: clean.
cs: IO port probe 0x0100-0x04ff: excluding 0x280-0x287 0x378-0x37f 0x4d0-0x=
4d7
cs: IO port probe 0x0a00-0x0aff: clean.
cs: memory probe 0xa0000000-0xa0ffffff: clean.
Unable to handle kernel NULL pointer dereference at virtual address 00000008
ccae8013
*pde =3D 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<ccae8013>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010286
eax: 00000000   ebx: c114feb8   ecx: c114feb8   edx: c1150590
esi: 00000000   edi: c88a7238   ebp: 00000001   esp: c9dabe44
ds: 0018   es: 0018   ss: 0018
Stack: c114feb8 00000000 c114feb8 00000000 c013bed4 00000000 c114feb8 00000=
000=20
       00000001 00000001 c88a7238 c9daa000 c013bfb0 c88a7238 c9dabe90 00000=
001=20
       c9daa000 00000001 00000000 c9dabe90 c9dabe90 00000010 00000000 00000=
000=20
Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>=
]=20
   [<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c0107=
3ff>]=20
Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2=20
>>EIP; ccae8013 <[smbfs]smb_readpage+13/40>   <=3D=3D=3D=3D=3D
>>ebx; c114feb8 <_end+e502d4/c5e241c>
>>ecx; c114feb8 <_end+e502d4/c5e241c>
>>edx; c1150590 <_end+e509ac/c5e241c>
>>edi; c88a7238 <_end+85a7654/c5e241c>
>>esp; c9dabe44 <_end+9aac260/c5e241c>
Trace; c013bed4 <read_pages+84/a0>
Trace; c013bfb0 <do_page_cache_readahead+c0/140>
Trace; c013c096 <page_cache_readahead+66/130>
Trace; c012d9bd <do_generic_file_read+bd/390>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; c012e028 <generic_file_read+a8/160>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; ccae8307 <[smbfs]smb_file_read+77/80>
Trace; c013ee6e <vfs_read+ae/f0>
Trace; c013efde <sys_read+3e/60>
Trace; c01073ff <syscall_call+7/b>
Code;  ccae8013 <[smbfs]smb_readpage+13/40>
00000000 <_EIP>:
Code;  ccae8013 <[smbfs]smb_readpage+13/40>   <=3D=3D=3D=3D=3D
   0:   8b 40 08                  mov    0x8(%eax),%eax   <=3D=3D=3D=3D=3D
Code;  ccae8016 <[smbfs]smb_readpage+16/40>
   3:   ff 43 10                  incl   0x10(%ebx)
Code;  ccae8019 <[smbfs]smb_readpage+19/40>
   6:   89 5c 24 04               mov    %ebx,0x4(%esp,1)
Code;  ccae801d <[smbfs]smb_readpage+1d/40>
   a:   89 04 24                  mov    %eax,(%esp,1)
Code;  ccae8020 <[smbfs]smb_readpage+20/40>
   d:   e8 7b fe ff ff            call   fffffe8d <_EIP+0xfffffe8d> ccae7ea=
0 <[smbfs]smb_readpage_sync+0/160>
Code;  ccae8025 <[smbfs]smb_readpage+25/40>
  12:   31 d2                     xor    %edx,%edx
Unable to handle kernel NULL pointer dereference at virtual address 00000008
ccae8013
*pde =3D 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<ccae8013>]    Not tainted
EFLAGS: 00010286
eax: 00000000   ebx: c10e2910   ecx: c10e2910   edx: c10e294c
esi: 00000000   edi: c66f3638   ebp: 00000010   esp: c664de44
ds: 0018   es: 0018   ss: 0018
Stack: c10e2910 00000000 c10e2910 00000000 c013bed4 00000000 c10e2910 00000=
000=20
       0000000f 00000010 c66f3638 c664c000 c013bfb0 c66f3638 c664de90 00000=
010=20
       c664c000 00000010 000000b3 c10e5874 c10e28ec 00000010 00000000 00000=
000=20
Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>=
]=20
   [<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c0107=
3ff>]=20
Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2=20
>>EIP; ccae8013 <[smbfs]smb_readpage+13/40>   <=3D=3D=3D=3D=3D
>>ebx; c10e2910 <_end+de2d2c/c5e241c>
>>ecx; c10e2910 <_end+de2d2c/c5e241c>
>>edx; c10e294c <_end+de2d68/c5e241c>
>>edi; c66f3638 <_end+63f3a54/c5e241c>
>>esp; c664de44 <_end+634e260/c5e241c>
Trace; c013bed4 <read_pages+84/a0>
Trace; c013bfb0 <do_page_cache_readahead+c0/140>
Trace; c013c096 <page_cache_readahead+66/130>
Trace; c012d9bd <do_generic_file_read+bd/390>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; c012e028 <generic_file_read+a8/160>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; ccae8307 <[smbfs]smb_file_read+77/80>
Trace; c013ee6e <vfs_read+ae/f0>
Trace; c013efde <sys_read+3e/60>
Trace; c01073ff <syscall_call+7/b>
Code;  ccae8013 <[smbfs]smb_readpage+13/40>
00000000 <_EIP>:
Code;  ccae8013 <[smbfs]smb_readpage+13/40>   <=3D=3D=3D=3D=3D
   0:   8b 40 08                  mov    0x8(%eax),%eax   <=3D=3D=3D=3D=3D
Code;  ccae8016 <[smbfs]smb_readpage+16/40>
   3:   ff 43 10                  incl   0x10(%ebx)
Code;  ccae8019 <[smbfs]smb_readpage+19/40>
   6:   89 5c 24 04               mov    %ebx,0x4(%esp,1)
Code;  ccae801d <[smbfs]smb_readpage+1d/40>
   a:   89 04 24                  mov    %eax,(%esp,1)
Code;  ccae8020 <[smbfs]smb_readpage+20/40>
   d:   e8 7b fe ff ff            call   fffffe8d <_EIP+0xfffffe8d> ccae7ea=
0 <[smbfs]smb_readpage_sync+0/160>
Code;  ccae8025 <[smbfs]smb_readpage+25/40>
  12:   31 d2                     xor    %edx,%edx
Unable to handle kernel NULL pointer dereference at virtual address 00000008
ccae8013
*pde =3D 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<ccae8013>]    Not tainted
EFLAGS: 00010286
eax: 00000000   ebx: c11a2850   ecx: c11a2850   edx: c1049b8c
esi: 00000000   edi: c66f3138   ebp: 00000002   esp: c78a5e44
ds: 0018   es: 0018   ss: 0018
Stack: c11a2850 00000000 c11a2850 00000000 c013bed4 00000000 c11a2850 00000=
000=20
       00000002 00000002 c66f3138 c78a4000 c013bfb0 c66f3138 c78a5e90 00000=
002=20
       c78a4000 00000002 00000001 c110c1a8 c110c1a8 00000010 00000000 00000=
000=20
Call Trace: [<c013bed4>] [<c013bfb0>] [<c013c096>] [<c012d9bd>] [<c012dee0>=
]=20
   [<c012e028>] [<c012dee0>] [<ccae8307>] [<c013ee6e>] [<c013efde>] [<c0107=
3ff>]=20
Code: 8b 40 08 ff 43 10 89 5c 24 04 89 04 24 e8 7b fe ff ff 31 d2=20
>>EIP; ccae8013 <[smbfs]smb_readpage+13/40>   <=3D=3D=3D=3D=3D
>>ebx; c11a2850 <_end+ea2c6c/c5e241c>
>>ecx; c11a2850 <_end+ea2c6c/c5e241c>
>>edx; c1049b8c <_end+d49fa8/c5e241c>
>>edi; c66f3138 <_end+63f3554/c5e241c>
>>esp; c78a5e44 <_end+75a6260/c5e241c>
Trace; c013bed4 <read_pages+84/a0>
Trace; c013bfb0 <do_page_cache_readahead+c0/140>
Trace; c013c096 <page_cache_readahead+66/130>
Trace; c012d9bd <do_generic_file_read+bd/390>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; c012e028 <generic_file_read+a8/160>
Trace; c012dee0 <file_read_actor+0/a0>
Trace; ccae8307 <[smbfs]smb_file_read+77/80>
Trace; c013ee6e <vfs_read+ae/f0>
Trace; c013efde <sys_read+3e/60>
Trace; c01073ff <syscall_call+7/b>
Code;  ccae8013 <[smbfs]smb_readpage+13/40>
00000000 <_EIP>:
Code;  ccae8013 <[smbfs]smb_readpage+13/40>   <=3D=3D=3D=3D=3D
   0:   8b 40 08                  mov    0x8(%eax),%eax   <=3D=3D=3D=3D=3D
Code;  ccae8016 <[smbfs]smb_readpage+16/40>
   3:   ff 43 10                  incl   0x10(%ebx)
Code;  ccae8019 <[smbfs]smb_readpage+19/40>
   6:   89 5c 24 04               mov    %ebx,0x4(%esp,1)
Code;  ccae801d <[smbfs]smb_readpage+1d/40>
   a:   89 04 24                  mov    %eax,(%esp,1)
Code;  ccae8020 <[smbfs]smb_readpage+20/40>
   d:   e8 7b fe ff ff            call   fffffe8d <_EIP+0xfffffe8d> ccae7ea=
0 <[smbfs]smb_readpage_sync+0/160>
Code;  ccae8025 <[smbfs]smb_readpage+25/40>
  12:   31 d2                     xor    %edx,%edx
1 warning issued.  Results may not be reliable.
---
--=20
____________________}John Flinchbaugh{______________________
| glynis@hjsoft.com         http://www.hjsoft.com/~glynis/ |
~~Powered by Linux: Reboots are for hardware upgrades only~~
--82I3+IH0IqGh5yIs
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE8/ry1CGPRljI8080RAg47AJ0XlJWT9CVspsgRzuGrUbfMshWydACfR0+4
ahX6AQOFphlr5qK8c4SQ43A=
=EkT8
-----END PGP SIGNATURE-----
--82I3+IH0IqGh5yIs--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/