[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

NULL pointer dereference



	Hi!

  I tried to use cdrdao on 2.5.5x kernels but kernel gives me following
messages. Further debugging reveals that sb is NULL in __ext3_std_error()
function. I tried this on ext2 and it seems it isn't ext3 specific, on
ext2 it also doesn't work.
  cdrdao is after this in D state and is unkillable, but the CD-ROM drive
from which I tried to grab is perfectly usable.
  This happens to me only with cdrdao, otherwise system is perfectly solid.

	Cheers,
		Vita

grabbing to the ext3 partition:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Unable to handle kernel NULL pointer dereference at virtual address 00000118
 printing eip:
c018893a
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0060:[<c018893a>]    Not tainted
EFLAGS: 00010097
EIP is at vsnprintf+0x22a/0x41c
eax: 00000118   ebx: c0344919   ecx: 00000118   edx: fffffffe
esi: cdb21e50   edi: ffffffff   ebp: 00000118   esp: cdb21dfc
ds: 0068   es: 0068   ss: 0068
Process cdrdao (pid: 238, threadinfo=cdb20000 task=d12c4780)
Stack: c0344900 00000246 d11e0a00 c02ae2c8 d201ab70 d2609f20 ffffffff 00000000 
       c0344cff c01179c9 c0344900 00000400 c02733da cdb21e4c 00000000 c02725c6 
       d11e0a00 d201ab60 c01672a8 c02733c0 00000118 c02725c6 cdb21e6c 00000000 
Call Trace:
 [<c01179c9>] printk+0x61/0x114
 [<c01672a8>] __ext3_std_error+0x30/0x40
 [<c0162c0a>] ext3_setattr+0x19a/0x1b0
 [<c014b606>] notify_change+0xe6/0x180
 [<c013696b>] do_truncate+0x5b/0x78
 [<c0142d41>] may_open+0x165/0x17c
 [<c0143015>] open_namei+0x2bd/0x3d0
 [<c013770f>] filp_open+0x3b/0x5c
 [<c0137a63>] sys_open+0x37/0x78
 [<c0108877>] syscall_call+0x7/0xb

Code: 80 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 89 44 24 10 8b 44 


grabbing to the ext2 partition:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Unable to handle kernel paging request at virtual address 0a00007c
 printing eip:
c012d596
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0060:[<c012d596>]    Not tainted
EFLAGS: 00010296
EIP is at vmtruncate+0x102/0x140
eax: 00000000   ebx: 00000000   ecx: 00000000   edx: 0a000000
esi: 00000000   edi: d37a7504   ebp: 00000000   esp: d2023e50
ds: 0068   es: 0068   ss: 0068
Process cdrdao (pid: 159, threadinfo=d2022000 task=d2666140)
Stack: 00000048 d2023edc d37a7430 00000000 d37a7504 d37a74c0 00050070 0a000000 
       00000000 c0000024 00000a00 d37a7430 d2023edc d37a7430 c0175795 d37a7430 
       d2023edc d2023edc 000081a4 00000048 c014b606 d24ee9c0 d2023edc d37a7430 
Call Trace:
 [<c0175795>] ext2_setattr+0x25/0x30
 [<c014b606>] notify_change+0xe6/0x180
 [<c013696b>] do_truncate+0x5b/0x78
 [<c0142d41>] may_open+0x165/0x17c
 [<c0143015>] open_namei+0x2bd/0x3d0
 [<c013770f>] filp_open+0x3b/0x5c
 [<c0137a63>] sys_open+0x37/0x78
 [<c0108877>] syscall_call+0x7/0xb

Code: 8b 42 7c 85 c0 74 0d 8b 40 2c 85 c0 74 06 52 ff d0 83 c4 04 





[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]