[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20070201000619.GI10257@slug>
Date: Thu, 1 Feb 2007 00:06:19 +0000
From: Frederik Deweerdt <deweerdt@...e.fr>
To: Jose Goncalves <jose.goncalves@...v.pt>
Cc: linux-kernel@...r.kernel.org
Subject: Re: Oops on serial access on kernel 2.6.16.38
On Tue, Jan 30, 2007 at 12:55:49PM +0000, Jose Goncalves wrote:
> Jose Goncalves wrote:
> > Frederik Deweerdt wrote:
> >
> >> On Fri, Jan 26, 2007 at 06:17:03PM +0000, Jose Goncalves wrote:
> >>
> >>
> >>> Frederik Deweerdt wrote:
> >>>
> >>>
> >>>> On Fri, Jan 26, 2007 at 03:50:25PM +0000, Jose Goncalves wrote:
> >>>>
> >>>>
> >>>>
> >>>>> I'm having a problem with the latest 2.6.16 kernel (I've found the
> >>>>> problem on 2.6.16.37 and 2.6.16.38). I have a application that retreives
> >>>>> data from a GPS connected on a serial port. From time to time a get a
> >>>>> kernel Oops, like this:
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>> Could you send your .config?
> >>>>
> >>>>
> >>>>
> >>> Here it goes...
> >>>
> >>>
> >>>
> >> Thanks. It looks like something is wrong with port->ops->startup() in
> >> uart_startup(), could you apply the following patch and report the
> >> results? And btw, you're using a plain 8250 serial port, isn't it?
> >>
> >>
> >
> > OK. I've applied the patch and I'm now waiting for the kernel Oops...
> > sometimes it takes two days until it happens.
> > I'm using a standard 16550A serial controller found on my hardware, that
> > is a PC/104 SBC:
> >
> > http://www.icop.com.tw/products_detail.asp?ProductID=70
> >
> > We have a custom hardware that has another serial controller (TL16C554A)
> > with 4 extra serial ports (also, 16550A type), and the problem happens
> > in a test program that is retreiving data from ttyS0 (from the SBC) and
> > ttyS3 (from our custom hardware).
> > The serial ports initialization, as reported by the kernel:
> >
> > [ 15.216847] Serial: 8250/16550 driver $Revision: 1.90 $ 6 ports, IRQ
> > sharing disabled
> > [ 15.219517] serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
> > [ 15.221963] serial8250: ttyS1 at I/O 0x2f8 (irq = 3) is a 16550A
> > [ 15.223907] serial8250: ttyS2 at I/O 0x3e8 (irq = 5) is a 16550A
> > [ 15.225757] serial8250: ttyS3 at I/O 0x2e8 (irq = 5) is a 16550A
> > [ 15.227644] serial8250: ttyS4 at I/O 0x1a0 (irq = 6) is a 16550A
> > [ 15.229656] serial8250: ttyS5 at I/O 0x1a8 (irq = 6) is a 16550A
> >
> > With your patch I'm now getting the following for each iteration of my
> > test program:
> >
> > <4>[ 298.918962] type is 4
> > <4>[ 298.919011] ops is c0292f00
> > <4>[ 298.919033] ops->startup is c01bd777
> > <4>[ 299.436980] type is 4
> > <4>[ 299.437030] ops is c0292f00
> > <4>[ 299.437051] ops->startup is c01bd777
> >
> > I don't know if it's relevant or not but the kernel is running in
> > NFS-Root mode.
> >
> I've had a new kernel Oops with your patch applied:
>
> <4>[35769.361941] type is 4
> <4>[35769.361994] ops is c0292f00
> <4>[35769.362016] ops->startup is c01bd777
> <4>[35769.958983] type is 4
> <4>[35769.959038] ops is c0292f00
> <4>[35769.959060] ops->startup is c01bd777
> <1>[35769.959201] Unable to handle kernel NULL pointer dereference at
> virtual address 00000000
> <1>[35769.966797] printing eip:
> <4>[35769.974265] 00000000
> <1>[35769.974296] *pde = 00000000
> <0>[35769.981814] Oops: 0000 [#1]
> <4>[35769.989367] Modules linked in:
> <0>[35769.996955] CPU: 0
> <4>[35769.996974] EIP: 0060:[<00000000>] Not tainted VLI
> <4>[35769.996990] EFLAGS: 00010202 (2.6.16.38-mtm4-debug2 #1)
> <0>[35770.020533] EIP is at rest_init+0x3feffdc0/0x1e
> <0>[35770.029044] eax: 00000060 ebx: 00000000 ecx: 00000000 edx:
> 000002fd
> <0>[35770.038017] esi: 00000000 edi: 00000040 ebp: 00000202 esp:
> c72e9e34
> <0>[35770.047118] ds: 007b es: 007b ss: 0068
> <0>[35770.056257] Process gp_position (pid: 15013, threadinfo=c72e8000
> task=c11a15a0)
> <0>[35770.057042] Stack: <0>c02fae70 00000005 c02fae70 c77f6de0 c12815e4
> c77714e0 c01ba4c4 c02fae70
> <0>[35770.077407] c025f18a c01bd777 c025f17f c0292f00 c025f173
> 00000004 c12815e4 00000000
> <0>[35770.089263] c77714e0 c77714e0 c01bbacc c12815e4 00000000
> ffffffed c77714e0 00000100
> <0>[35770.101473] Call Trace:
> <0>[35770.113147] [<c01ba4c4>] uart_startup+0x8d/0x120
> <0>[35770.125473] [<c01bd777>] serial8250_startup+0x0/0x2a5
> <0>[35770.138071] [<c01bbacc>] uart_open+0xaa/0xec
> <0>[35770.150859] [<c01a9e67>] tty_open+0x16c/0x270
> <0>[35770.163665] [<c013dbbb>] chrdev_open+0xd7/0xf0
> <0>[35770.176636] [<c013dae4>] chrdev_open+0x0/0xf0
> <0>[35770.189587] [<c0136449>] __dentry_open+0xb4/0x180
> <0>[35770.202755] [<c01365e8>] nameidata_to_filp+0x1f/0x31
> <0>[35770.216107] [<c013654c>] do_filp_open+0x37/0x3f
> <0>[35770.229554] [<c0137bc0>] __fput+0x11e/0x126
> <0>[35770.242947] [<c018f64f>] strncpy_from_user+0x2e/0x4c
> <0>[35770.256773] [<c013668d>] get_unused_fd+0x4c/0x91
> <0>[35770.270556] [<c013676c>] do_sys_open+0x40/0xb5
> <0>[35770.284545] [<c01367f4>] sys_open+0x13/0x17
> <0>[35770.298620] [<c01023d9>] syscall_call+0x7/0xb
> <0>[35770.312965] Code: Bad EIP value.
> <4>[35770.357131] type is 4
> <4>[35775.528001] ops is c0292f00
> <4>[35775.541519] ops->startup is c01bd777
>
Duh, not what I expected :(. is there a way that I could get your vmlinux
file? Alternatively, could you get which code is at 0xc02fae70 ?
Regards,
Frederik
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists