Hi. I thought you would want this feedback on the 2.4.19-pre2 patch. This message might be a bit long because I'm pretty new to Linux so I want to make sure what I am finding is not my fault. Before I forget, my CDRW is a Mitsumi CR4802TE (8x4x2x) and I'm compiling for i386 (AMD K6-III+). I took the 2.4.18 sources from kernel.org and patched them with the 2.4.19-pre2 kernel patch. Then I applied the packet-cd 2.4.19-pre2 patch. I configured pktcdvd and udf to compile into the kernel rather than as modules. Compiled and installed OK. After reboot: mknod /dev/pktcdvd0 b 97 0 pktsetup /dev/pktcdvd0 /dev/hdc mount /dev/pktcdvd0 /cdrw -t udf -o rw,noatime Drive whirrs a bit and ls /cdrw shows that a couple of files written under Win98 are present - in fact, I can cat the files. But after about 20 seconds I get: Unable to handle kernel NULL pointer dereference at virtual address 00000018 *pde = 00000000 Ooops: 0000 CPU: 0 EIP: 0010:[<c012d67f>] Not tainted EFLAGS: 00010202 eax: 00000000 ebx: cdfdb860 ecx: 00002000 edx 00000588 esi: 00000000 edi: 00000000 ebp: cdfdb860 esp: ce463e44 ds: 0018 es: 0018 ss: 0018 Process pktcdvd0 (pid: 166, stackpage - ce Stack: cdfdb860 00000000 00000000 00000000 c01c5d46 00000000 cdfdb860 cdfdb860 00001600 00000000 ce210380 00000000 00002000 c032b6ec 00000000 00000004 00000000 00000000 00000588 00000788 c01c6308 c032b6ec 00000000 cdfdb860 Call Trace: [<c01c5d46>] [<c01c6308>] [<c01d18cf>] [<c01d1acd>] [<c01d1c90>] [<c01d20ac>] [<c01d2207>] [<c01057ac>] Code: 8b 40 18 f6 c4 08 75 09 89 e8 e9 08 01 00 00 89 f6 e8 5f ff I've also tried applying the packet cd patch to the "raw" 2.4.18 kernel source (i.e. not patching the kernel to 2.4.19-pre2), but after compiling etc I get the same crash. I hope this helps. Chris This only happens if I mount rw, a ro mount seems fine. --- This message has been virus checked by Grisoft AVG during dispatch. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.332 / Virus Database: 186 - Release Date: 06/03/02
At 11:15 10.03.2002 +0000, Chris Clayton wrote:
I took the 2.4.18 sources from kernel.org and patched them with the 2.4.19-pre2 kernel patch. Then I applied the packet-cd 2.4.19-pre2 patch. I configured pktcdvd and udf to compile into the kernel rather than as modules. Compiled and installed OK. After reboot:
Can you reproduce the problem when you are using modules? It could be one of those problems that only show up for the compiled-in driver.
Unable to handle kernel NULL pointer dereference at virtual address 00000018 *pde = 00000000 Ooops: 0000 CPU: 0
Get the latest version of 'ksymoops' from ftp://ftp.*.kernel.org/, then run these messages trough it to get more meaningful output. Arnd <><
Can you reproduce the problem when you are using modules? It could be one of those problems that only show up for the compiled-in driver.
Yes, I have just reconfigured and compiled with pktcdvd as a module and the same thing happens.
Get the latest version of 'ksymoops' from ftp://ftp.*.kernel.org/, then run these messages trough it to get more meaningful output.
OK, output from ksymoops (from latest failure with pktcdvd as a module) is: ksymoops 2.4.4 on i586 2.4.19-pre2. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.19-pre2/ (default) -m ./System.map (specified) Unable to handle kernel NULL pointer dereference at virtual address 00000018 c012d67f *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c012d67f>] Tainted: P Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010202 eax: 00000000 ebx: ce275cc0 ecx: 00002000 edx: 00000588 esi: 00000000 edi: 00000000 ebp: ce275cc0 esp: ce24de44 ds: 0018 es: 0018 ss: 0018 Process pktcdvd0 (pid: 226, stackpage=ce24d000) Stack: ce275cc0 00000000 00000000 00000004 c01c5d46 00000000 ce275cc0 ce275cc0 00001600 00000000 ce24f380 00000000 00002000 c03276cc 00000000 00000004 00000000 00000000 00000588 00000788 c01c6308 c03276ac 00000000 ce275cc0 Call Trace: [<c01c5d46>] [<c01c6308>] [<d089c93f>] [<d089cb3d>] [<d089cd00>] [<d089d11c>] [<d089d277>] [<c01057ac>] Code: 8b 40 18 f6 c4 08 75 09 89 e8 e9 08 01 00 00 89 f6 e8 5f ff
EIP; c012d67f
<===== Trace; c01c5d46 <__make_request+86/5b0> Trace; c01c6308 Trace; d089c93f <[pktcdvd]pkt_read_bh+3b/50> Trace; d089cb3d <[pktcdvd]pkt_gather_data+105/25c> Trace; d089cd00 <[pktcdvd]pkt_do_request+6c/74> Trace; d089d11c <[pktcdvd]pkt_handle_queue+8c/100> Trace; d089d277 <[pktcdvd]kcdrwd+e7/148> Trace; c01057ac Code; c012d67f 00000000 <_EIP>: Code; c012d67f <===== 0: 8b 40 18 mov 0x18(%eax),%eax <===== Code; c012d682 3: f6 c4 08 test $0x8,%ah Code; c012d685 6: 75 09 jne 11 <_EIP+0x11> c012d690 Code; c012d687 8: 89 e8 mov %ebp,%eax Code; c012d689 a: e9 08 01 00 00 jmp 117 <_EIP+0x117> c012d796 Code; c012d68e f: 89 f6 mov %esi,%esi Code; c012d690 11: e8 5f ff 00 00 call ff75 <_EIP+0xff75> c013d5f4
Chris. --- This message has been virus checked by Grisoft AVG during dispatch. Checked by AVG anti-virus system (http://www.grisoft.com). Version: 6.0.332 / Virus Database: 186 - Release Date: 06/03/02
participants (2)
-
Arnd Bergmann
-
Chris Clayton