Re: 1.3.84 oopses

Johan Henselmans (johan@hsb.nest.nl)
Sat, 6 Apr 1996 14:38:12 +0100 (WET DST)


On Sat, 6 Apr 1996, Linus Torvalds wrote:

>
>
> Could you run these through ksymoops? It gives much more information that
> way.. (that's true of _all_ kernel oops messages, btw, which is why I'm
> sending this to the kernel list too).
>
> Linus
>

This better? Perhaps it should be added to the README in the kernel
source tree, as it is hard to find how to handle this stuff.

Unable to handle kernel paging request at virtual address c13e4454
current->tss.cr3 = 00aa2000, Rr3 = 00aa2000
*pde = 00000000
0ops: 0000
CPU: 0
EIP: 0010:[<00ef7013>]
EFLAGS: 00010217
eax: 00ff54f0 ebx: 00e2c3f0 ecx: 00ef6ff0 edx: 00000007
esi: 00000002 edi: 00000001 ebp: 003eef94 esp: 003eef64
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process bash (pid: 4636, process nr: 39, stackpage=003ee000)
Stack: 0010ff48 00ff54f0 00000000 00000002 bffffb74 00c1b025 00bce810 00000000
bffffb74 ffffffff 0011537a 00000001 ffffff06 0011563a 00bce810 00000000
ffffffff bffffb78 00000000 00bce810 003eefb0 0010a459 ffffffff bffffb74
Call Trace: [<0010ff48>] [<0011537a>] [<0011563a>] [<0010a459>]
Code: ff 24 04 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00

eagle:/usr/src/linux/scripts# a.out /System.1384 < ~johan/dumpksymop
Using `/System.1384' to map addresses to symbols.

Trace: 10ff48 <schedule+60/270>
Trace: 11537a <sys_wait4+2e/384>
Trace: 11563a <sys_wait4+2ee/384>
Trace: 10a459 <system_call+59/a0>

Code: jmp *(%esp,%eax,1)
Code: addb %al,(%eax)
Code: addl %eax,(%eax)
Segmentation fault

Unable to handle kernel NULL pointer dereference at virtual address c000000d
current->tss.cr3 = 0054e000, br3 = 0054e000
*pde = 00102067
*pte = 00000027
0ops: 0000
CPU: 0
EIP: 0010:[<0010ff34>]
EFLAGS: 00010202
eax: 00ad1810 ebx: 00000001 ecx: 000000f7 edx: 00000001
esi: 00000002 edi: 00000000 ebp: 00587f94 esp: 00587f6c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process bash (pid: 1233, process nr: 38, stackpage=00587000)
Stack: 00000000 00000002 bffff930 00601025 00ad1810 00000000 bffff930 ffffffff
0011537a 00000001 ffffffff 0011563a 00ad1810 00000000 ffffffff bffff934
00000000 00ad1810 00587fb0 0010a459 ffffffff bffff930 00000002 00000000
Call Trace: [<0011537a>] [<0011563a>] [<0010a459>]
Code: 8b 43 0c 8b 4b 08 89 da 8b 1b c7 42 04 00 00 00 00 50 ff d1

Using `/System.1384' to map addresses to symbols.

>>EIP: 10ff34 <schedule+4c/270>
Trace: 11537a <sys_wait4+2e/384>
Trace: 11563a <sys_wait4+2ee/384>
Trace: 10a459 <system_call+59/a0>

Code: 10ff34 <schedule+4c/270> movl 0xc(%ebx),%eax
Code: 10ff37 <schedule+4f/270> movl 0x8(%ebx),%ecx
Code: 10ff3a <schedule+52/270> movl %ebx,%edx
Code: 10ff3c <schedule+54/270> movl (%ebx),%ebx
Code: 10ff3e <schedule+56/270> movl $0x0,0x4(%edx)
Code: 10ff45 <schedule+5d/270> pushl %eax
Code: 10ff46 <schedule+5e/270> call *%ecx

Regards,

Johan

Johan Henselmans
work: johan@netsense.nl tel: (+31)-(0)20-6261180
Netsense bv, Nieuwe Herengracht 147 1011 SG Amsterdam
home: johan@hsb.nest.nl tel: (+31)-(0)20-6267538
Nieuwe Herengracht 147d 1011 SG Amsterdam