Kernel oops 2.1.9

Colten Edwards (edwards@panasync.canuck.ca)
Thu, 14 Nov 1996 12:50:30 -0600 (CST)


This came up last night. I was running a program called trafshow to show
somewhat what is happening over my ppp link. After about 6 hours this
showed up.

Unable to handle kernel NULL pointer dereference at virtual address 00000004
current->tss.cr3 = 01d11000, <r3 = 01d11000
*pde = 00000000
Oops: 0002
CPU: 0
0010:[<c013bb07>]
EFLAGS: 00010006
eax: c3fe3bf5 ebx: c170ac0c ecx: 00000000 edx: 00000000
esi: 00000246 edi: c170ac9c ebp: 00000000 esp: c19c8e24
ds: 0018 es: 0018 ss: 0018
Process trafshow (pid: 5105, process nr: 44, stackpage=c19c8000)
Stack: 00000000 c170ac0c c170ac0c c19c8f4c c0143263 c170ac0c 00000000 00000000
c19c8e60 c170ac0c c19c8ec0 00000000 00000000 c19c8ecc c2b5a000 00000000
c0153042 c170ac0c c19c8f4c 00002000 00000000 00000000 c19c8ec0 00002000
Call Trace: [<c0143263>] [<c0153042>] [<c013996a>] [<c019038e>] [<c018b154>] [<c013a25f>] [<c010a818>]
Code: 89 7a 04 89 93 90 00 00 00 c7 00 00 00 00 00 c7 40 04 00 00

Using `/boot/System.map' to map addresses to symbols.

Trace: c0143263 <packet_recvmsg+6f/118>
Trace: c0153042 <inet_recvmsg+72/88>
Trace: c013996a <sys_recvfrom+152/188>
Trace: c019038e <con_put_char+1e/28>
Trace: c018b154 <opost+1b8/1c8>
Trace: c013a25f <sys_socketcall+29f/348>
Trace: c010a818 <system_call+38/40>

Code: movl %edi,0x4(%edx)
Code: movl %edx,0x90(%ebx)
Code: movl $0x0,(%eax)
Code: movl $0x90000000,0x4(%eax)
Code: nop
Code: nop

Colten Edwards