[Bug 12977] New: oops unmounting pmount'ed CD or DVD disc with inotify enabled
bugzilla-daemon at bugzilla.ubuntu.com
bugzilla-daemon at bugzilla.ubuntu.com
Tue Jul 26 18:11:19 UTC 2005
Please do not reply to this email. You can add comments at
http://bugzilla.ubuntu.com/show_bug.cgi?id=12977
Ubuntu | linux
Summary: oops unmounting pmount'ed CD or DVD disc with inotify
enabled
Product: Ubuntu
Version: unspecified
Platform: i386
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: linux
AssignedTo: fabbione at ubuntu.com
ReportedBy: trisk at acm.jhu.edu
QAContact: kernel-bugs at lists.ubuntu.com
Whenever I unmount (using pumount) a removable disc that was mounted using
pmount, I get the oops below. I'm running with inotify enabled, but the
problem occurs even if there's no inotify watch on that filesystem.
HAL doesn't register the unmount after the oops (volume.is_mounted = true).
Tested on linux-image-2.6.10-5-k7.
Unable to handle kernel NULL pointer dereference at virtual address
00000010
printing eip:
c017a692
*pde = 00000000
Oops: 0000 [#1]
PREEMPT
Modules linked in: nls_cp437 isofs udf nvidia ipx iptable_nat ipt_state
ip_conntrack iptable_filter ip_tables pcspkr snd_emu10k1 snd_rawmidi
snd_seq_device snd_ac97_codec snd_util_mem snd_hwdep capability commoncap
snd_pcm_oss snd_pcm snd_timer snd_page_alloc snd_mixer_oss snd soundcore
ipv6 af_packet floppy lp ide_cd parport_pc parport i2c_viapro pci_hotplug
via_agp agpgart tsdev mousedev joydev evdev usblp usbhid emu10k1_gp
gameport ehci_hcd uhci_hcd usbcore 3c59x via_rhine mii rtc sr_mod cdrom
sata_via i2c_algo_bit i2c_core unix fbcon font bitblit vesafb cfbcopyarea
cfbimgblt cfbfillrect xfs ext3 jbd mbcache libata ide_generic via82cxxx
sd_mod scsi_mod ide_pnp ide_disk ide_core
CPU: 0
EIP: 0060:[<c017a692>] Tainted: P VLI
EFLAGS: 00210296 (2.6.10-5-k7)
EIP is at inotify_super_block_umount+0x67/0x12f
eax: 00000010 ebx: cee66000 ecx: c02d3754 edx: c02d3860
esi: 00000008 edi: cee66000 ebp: d5941548 esp: cee67ef4
ds: 007b es: 007b ss: 0068
Process umount (pid: 7830, threadinfo=cee66000 task=d7dcf080)
Stack: c16dbc60 d582c258 00002000 00000000 00000000 cee66000 c02d3860
c02d3754
c3ce0074 c59c0400 e0f9dae0 cee66000 c015a309 c59c0400 c59c0400
defb9200
080506af c015aef6 c59c0400 00000005 c59c0400 e0f9dce0 c015a1ef
c59c0400
Call Trace:
[<c015a309>] generic_shutdown_super+0x27/0x130
[<c015aef6>] kill_block_super+0x2d/0x50
[<c015a1ef>] deactivate_super+0x5b/0x8a
[<c017007e>] sys_umount+0x3f/0x8e
[<c01480fd>] do_munmap+0x142/0x17f
[<c014818a>] sys_munmap+0x50/0x74
[<c01700e4>] sys_oldumount+0x17/0x1b
[<c0102efb>] syscall_call+0x7/0xb
Code: bb 00 00 00 89 4c 24 14 8b 44 24 14 83 40 14 01 8b 4c 24 1c 8b 54 24
1c 81 c2 0c 01 00 00 89 54 24 18 8b 81 0c 01 00 00 8d 70 f8 <8b> 6e 08 83
ed 08 39 d0 74 5a bf 00 e0 ff ff 21 e7 8b 5e 14 83
<6>note: umount[7830] exited with preempt_count 2
scheduling while atomic: umount/0x00000002/7830
[<c028d2d5>] schedule+0x52f/0x534
[<c0143dfd>] unmap_page_range+0x4b/0x71
[<c0143fcb>] unmap_vmas+0x1a8/0x1b6
[<c01484f0>] exit_mmap+0x84/0x15c
[<c0115ec5>] mmput+0x37/0xa0
[<c011a6d5>] do_exit+0x175/0x477
[<c0112e0c>] do_page_fault+0x0/0x5c8
[<c01040a1>] do_trap+0x0/0x110
[<c0112e0c>] do_page_fault+0x0/0x5c8
[<c01183d6>] printk+0x17/0x1b
[<c011303d>] do_page_fault+0x231/0x5c8
[<c0120799>] update_process_times+0x46/0x52
[<c0114320>] try_to_wake_up+0xa4/0xb3
[<c01208ca>] run_timer_softirq+0x10f/0x1ae
[<c0114bf7>] __wake_up_common+0x38/0x57
[<c0112e0c>] do_page_fault+0x0/0x5c8
[<c0103933>] error_code+0x2b/0x30
[<c017a692>] inotify_super_block_umount+0x67/0x12f
[<c015a309>] generic_shutdown_super+0x27/0x130
[<c015aef6>] kill_block_super+0x2d/0x50
[<c015a1ef>] deactivate_super+0x5b/0x8a
[<c017007e>] sys_umount+0x3f/0x8e
[<c01480fd>] do_munmap+0x142/0x17f
[<c014818a>] sys_munmap+0x50/0x74
[<c01700e4>] sys_oldumount+0x17/0x1b
[<c0102efb>] syscall_call+0x7/0xb
--
Configure bugmail: http://bugzilla.ubuntu.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug, or are watching the QA contact.
More information about the kernel-bugs
mailing list