![](https://seccdn.libravatar.org/avatar/de745ef9d1f824636759746228d60040.jpg?s=120&d=mm&r=g)
Hello, I have just installed kernel 2.6.3 + kolivas patch+ packet writing patch. When I try to mount udf cdrom rw I get "segmentation fault". Dmesg output: nable to handle kernel NULL pointer dereference at virtual address 00000000 printing eip: 00000000 *pde = 00000000 Oops: 0000 [#1] CPU: 0 EIP: 0060:[<00000000>] Tainted: PF EFLAGS: 00010002 EIP is at 0x0 eax: f77d3a98 ebx: f7cb8000 ecx: c05c4d30 edx: f7cb8090 esi: f7dd1c00 edi: 00002468 ebp: 00000000 esp: e3d8dd38 ds: 007b es: 007b ss: 0068 Process mount (pid: 2108, threadinfo=e3d8c000 task=e3f12ca0) Stack: f89b60da f7dd1c00 f77d3a98 f77d3a98 f7dd1c00 c02e38df f7dd1c00 f77d3a98 c02e5da5 f7dd1c00 f77d3a98 e3d8c000 00000286 e3d8ddec c02e5e3e f7dd1c00 f77d3a98 e3d8dd9c f77d3a98 f89b6623 f77d3a98 f77d3a98 00000002 00000001 Call Trace: [<f89b60da>] pkt_lowlevel_elv_completed_req_fn+0x3a/0x80 [pktcdvd] [<c02e38df>] elv_completed_request+0x1f/0x30 [<c02e5da5>] __blk_put_request+0x55/0xb0 [<c02e5e3e>] blk_put_request+0x3e/0x60 [<f89b6623>] pkt_generic_packet+0x143/0x160 [pktcdvd] [<f89b8814>] pkt_set_speed+0x94/0xb0 [pktcdvd] [<f89b7dde>] pkt_get_last_written+0x6e/0xe0 [pktcdvd] [<f89b8b96>] pkt_open_dev+0x186/0x1e0 [pktcdvd] [<c02e843f>] exact_lock+0xf/0x20 [<c02e22b1>] kobj_lookup+0x131/0x1d0 [<f89b8db1>] pkt_open+0xc1/0x120 [pktcdvd] [<c015e29a>] do_open+0x14a/0x420 [<c015db80>] bdev_test+0x0/0x20 [<c015dba0>] bdev_set+0x0/0x10 [<c015e624>] blkdev_open+0x34/0x80 [<c0155392>] dentry_open+0x142/0x210 [<c0155242>] filp_open+0x62/0x70 [<c01556db>] sys_open+0x5b/0x90 [<c010b335>] sysenter_past_esp+0x52/0x71 Code: Bad EIP value. <6>note: mount[2108] exited with preempt_count 2 bad: scheduling while atomic! Call Trace: [<c011e003>] schedule+0x5b3/0x5c0 [<c0146ba3>] unmap_page_range+0x43/0x70 [<c0146d84>] unmap_vmas+0x1b4/0x210 [<c014abab>] exit_mmap+0x7b/0x190 [<c011fb64>] mmput+0x64/0x90 [<c0123a82>] do_exit+0x152/0x410 [<c011ba40>] do_page_fault+0x0/0x50c [<c010c441>] die+0xe1/0xf0 [<c011bc1e>] do_page_fault+0x1de/0x50c [<c030150b>] ata_output_data+0x8b/0xb0 [<c03015e9>] atapi_output_bytes+0x39/0x80 [<c011cbfc>] recalc_task_prio+0x9c/0x280 [<c011ce8b>] try_to_wake_up+0xab/0x1e0 [<c011ba40>] do_page_fault+0x0/0x50c [<c010bd91>] error_code+0x2d/0x38 [<f89b60da>] pkt_lowlevel_elv_completed_req_fn+0x3a/0x80 [pktcdvd] [<c02e38df>] elv_completed_request+0x1f/0x30 [<c02e5da5>] __blk_put_request+0x55/0xb0 [<c02e5e3e>] blk_put_request+0x3e/0x60 [<f89b6623>] pkt_generic_packet+0x143/0x160 [pktcdvd] [<f89b8814>] pkt_set_speed+0x94/0xb0 [pktcdvd] [<f89b7dde>] pkt_get_last_written+0x6e/0xe0 [pktcdvd] [<f89b8b96>] pkt_open_dev+0x186/0x1e0 [pktcdvd] [<c02e843f>] exact_lock+0xf/0x20 [<c02e22b1>] kobj_lookup+0x131/0x1d0 [<f89b8db1>] pkt_open+0xc1/0x120 [pktcdvd] [<c015e29a>] do_open+0x14a/0x420 [<c015db80>] bdev_test+0x0/0x20 [<c015dba0>] bdev_set+0x0/0x10 [<c015e624>] blkdev_open+0x34/0x80 [<c0155392>] dentry_open+0x142/0x210 [<c0155242>] filp_open+0x62/0x70 [<c01556db>] sys_open+0x5b/0x90 [<c010b335>] sysenter_past_esp+0x52/0x71 Can you help me? Thanks in advance.
![](https://seccdn.libravatar.org/avatar/158626f704fbee5e843c360b52eff89a.jpg?s=120&d=mm&r=g)
Can you reproduce it without "kolivas patch" ? If not,... On Fri, 5 Mar 2004, Mario Giammarco wrote:
Hello, I have just installed kernel 2.6.3 + kolivas patch+ packet writing patch. When I try to mount udf cdrom rw I get "segmentation fault". Dmesg output:
nable to handle kernel NULL pointer dereference at virtual address 00000000 printing eip: 00000000 *pde = 00000000 Oops: 0000 [#1] CPU: 0 EIP: 0060:[<00000000>] Tainted: PF EFLAGS: 00010002 EIP is at 0x0 eax: f77d3a98 ebx: f7cb8000 ecx: c05c4d30 edx: f7cb8090 esi: f7dd1c00 edi: 00002468 ebp: 00000000 esp: e3d8dd38 ds: 007b es: 007b ss: 0068 Process mount (pid: 2108, threadinfo=e3d8c000 task=e3f12ca0) Stack: f89b60da f7dd1c00 f77d3a98 f77d3a98 f7dd1c00 c02e38df f7dd1c00 f77d3a98 c02e5da5 f7dd1c00 f77d3a98 e3d8c000 00000286 e3d8ddec c02e5e3e f7dd1c00 f77d3a98 e3d8dd9c f77d3a98 f89b6623 f77d3a98 f77d3a98 00000002 00000001 Call Trace: [<f89b60da>] pkt_lowlevel_elv_completed_req_fn+0x3a/0x80 [pktcdvd] [<c02e38df>] elv_completed_request+0x1f/0x30 [<c02e5da5>] __blk_put_request+0x55/0xb0 [<c02e5e3e>] blk_put_request+0x3e/0x60 [<f89b6623>] pkt_generic_packet+0x143/0x160 [pktcdvd] [<f89b8814>] pkt_set_speed+0x94/0xb0 [pktcdvd] [<f89b7dde>] pkt_get_last_written+0x6e/0xe0 [pktcdvd] [<f89b8b96>] pkt_open_dev+0x186/0x1e0 [pktcdvd] [<c02e843f>] exact_lock+0xf/0x20 [<c02e22b1>] kobj_lookup+0x131/0x1d0 [<f89b8db1>] pkt_open+0xc1/0x120 [pktcdvd] [<c015e29a>] do_open+0x14a/0x420 [<c015db80>] bdev_test+0x0/0x20 [<c015dba0>] bdev_set+0x0/0x10 [<c015e624>] blkdev_open+0x34/0x80 [<c0155392>] dentry_open+0x142/0x210 [<c0155242>] filp_open+0x62/0x70 [<c01556db>] sys_open+0x5b/0x90 [<c010b335>] sysenter_past_esp+0x52/0x71
Code: Bad EIP value. <6>note: mount[2108] exited with preempt_count 2 bad: scheduling while atomic! Call Trace: [<c011e003>] schedule+0x5b3/0x5c0 [<c0146ba3>] unmap_page_range+0x43/0x70 [<c0146d84>] unmap_vmas+0x1b4/0x210 [<c014abab>] exit_mmap+0x7b/0x190 [<c011fb64>] mmput+0x64/0x90 [<c0123a82>] do_exit+0x152/0x410 [<c011ba40>] do_page_fault+0x0/0x50c [<c010c441>] die+0xe1/0xf0 [<c011bc1e>] do_page_fault+0x1de/0x50c [<c030150b>] ata_output_data+0x8b/0xb0 [<c03015e9>] atapi_output_bytes+0x39/0x80 [<c011cbfc>] recalc_task_prio+0x9c/0x280 [<c011ce8b>] try_to_wake_up+0xab/0x1e0 [<c011ba40>] do_page_fault+0x0/0x50c [<c010bd91>] error_code+0x2d/0x38 [<f89b60da>] pkt_lowlevel_elv_completed_req_fn+0x3a/0x80 [pktcdvd] [<c02e38df>] elv_completed_request+0x1f/0x30 [<c02e5da5>] __blk_put_request+0x55/0xb0 [<c02e5e3e>] blk_put_request+0x3e/0x60 [<f89b6623>] pkt_generic_packet+0x143/0x160 [pktcdvd] [<f89b8814>] pkt_set_speed+0x94/0xb0 [pktcdvd] [<f89b7dde>] pkt_get_last_written+0x6e/0xe0 [pktcdvd] [<f89b8b96>] pkt_open_dev+0x186/0x1e0 [pktcdvd] [<c02e843f>] exact_lock+0xf/0x20 [<c02e22b1>] kobj_lookup+0x131/0x1d0 [<f89b8db1>] pkt_open+0xc1/0x120 [pktcdvd] [<c015e29a>] do_open+0x14a/0x420 [<c015db80>] bdev_test+0x0/0x20 [<c015dba0>] bdev_set+0x0/0x10 [<c015e624>] blkdev_open+0x34/0x80 [<c0155392>] dentry_open+0x142/0x210 [<c0155242>] filp_open+0x62/0x70 [<c01556db>] sys_open+0x5b/0x90 [<c010b335>] sysenter_past_esp+0x52/0x71
Can you help me?
Thanks in advance.
![](https://seccdn.libravatar.org/avatar/51a7700397ed84d8e44df3701f556370.jpg?s=120&d=mm&r=g)
On Fri, 5 Mar 2004, Mario Giammarco wrote:
I have just installed kernel 2.6.3 + kolivas patch+ packet writing patch. When I try to mount udf cdrom rw I get "segmentation fault". Dmesg output:
nable to handle kernel NULL pointer dereference at virtual address 00000000
The error handling was broken, so if you tried to write to a disc that was not formatted for packet writing, the request queue was messed up, which led to kernel crashes later on. Here is a new patch for 2.6.4-rc2 with fixed error handling: http://w1.894.telia.com/~u89404340/patches/packet/2.6/packet-2.6.4-rc2.patch... -- Peter Osterlund - petero2@telia.com http://w1.894.telia.com/~u89404340
participants (3)
-
Frédéric L. W. Meunier
-
Mario Giammarco
-
Peter Osterlund