various oopses with 2.1.51

Edward Welbon (welbon@bga.com)
Tue, 19 Aug 1997 21:07:18 -0500 (CDT)


Since building 2.1.51 last nite, I got oopses from crond, bash and twice
from diald. I have no rebooted since the first bootup of 2.1.51. I
haven't looked at the kernel mail list all day so maybe some of these are
ancient history. My appologies if so.

----------------------
Unable to handle kernel NULL pointer dereference at virtual address 0000004c
current->tss.cr3 = 076d3000, |r3 = 076d3000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c012f68a>]
EFLAGS: 00010286
eax: c6fb0360 ebx: c6fb0360 ecx: 00000000 edx: fffffffc
esi: c6fb0360 edi: c4922140 ebp: 00000001 esp: c0f0df18
ds: 0018 es: 0018 ss: 0018
Process crond (pid: 87, process nr: 8, stackpage=c0f0d000)
Stack: c6fb0360 c4922140 c0ec6011 c012f873 c4922140 c6fb0360 c46b10e0 00000180
000006c2 00008180 bffffc01 00000000 c0ec6005 0000000c 949e292b c012f96b
c0ec6000 00000000 00000001 c46b10e0 00000180 c0ec6000 00000180 c0d507a0
Call Trace: [<c012f873>] [<c012f96b>] [<c0126feb>] [<c012720a>] [<c0109aca>]
Code: 8b 42 50 85 c0 74 5d 83 78 2c 00 74 57 89 e0 89 c3 81 e3 00
Using `../System.map' to map addresses to symbols.

Using `../System.map' to map addresses to symbols.

>>EIP: c012f68a <do_follow_link+12/88>
Trace: c012f873 <lookup_dentry+173/1ac>
Trace: c012f96b <open_namei+3f/2b8>
Trace: c0126feb <do_open+4b/134>
Trace: c012720a <sys_open+a6/fc>
Trace: c0109aca <system_call+3a/40>

Code: c012f68a <do_follow_link+12/88>
Code: c012f68a <do_follow_link+12/88> 8b 42 50 movl 0x50(%edx),%eax
Code: c012f68d <do_follow_link+15/88> 85 c0 testl %eax,%eax
Code: c012f68f <do_follow_link+17/88> 74 5d je c012f6ee <do_follow_link+76/88>
Code: c012f691 <do_follow_link+19/88> 83 78 2c 00 cmpl $0x0,0x2c(%eax)
Code: c012f69b <do_follow_link+23/88> 74 57 je c012f6ee <do_follow_link+76/88>
Code: c012f69d <do_follow_link+25/88> 89 e0 movl %esp,%eax
Code: c012f69f <do_follow_link+27/88> 89 c3 movl %eax,%ebx
Code: c012f6a1 <do_follow_link+29/88> 81 e3 00 00 90 andl $0x90900000,%ebx
Code: c012f6ac <do_follow_link+34/88> 90
Code: c012f6ad <do_follow_link+35/88> 90 nop

-----------------------------------
Unable to handle kernel NULL pointer dereference at virtual address 0000004c
current->tss.cr3 = 07479000, |r3 = 07479000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c012f68a>]
EFLAGS: 00010286
eax: c0beb040 ebx: c0beb040 ecx: 00000000 edx: fffffffc
esi: c0beb040 edi: c5c64ca0 ebp: 00000001 esp: c76bff50
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 14660, process nr: 34, stackpage=c76bf000)
Stack: c0beb040 c5c64ca0 c0b9e008 c012f873 c5c64ca0 c0beb040 c0b9e000 00000001
00000001 bffffc24 00001001 00001000 c0b9e002 00000006 074a91fe c012f8d4
c0b9e000 00000000 00000001 00000001 0804b990 c012d483 0804b990 00000001
Call Trace: [<c012f873>] [<c012f8d4>] [<c012d483>] [<c0109aca>]
Code: 8b 42 50 85 c0 74 5d 83 78 2c 00 74 57 89 e0 89 c3 81 e3 00
Using `../System.map' to map addresses to symbols.

>>EIP: c012f68a <do_follow_link+12/88>
Trace: c012f873 <lookup_dentry+173/1ac>
Trace: c012f8d4 <__namei+28/80>
Trace: c012d483 <sys_newstat+7f/f4>
Trace: c0109aca <system_call+3a/40>

Code: c012f68a <do_follow_link+12/88>
Code: c012f68a <do_follow_link+12/88> 8b 42 50 movl 0x50(%edx),%eax
Code: c012f68d <do_follow_link+15/88> 85 c0 testl %eax,%eax
Code: c012f68f <do_follow_link+17/88> 74 5d je c012f6ee <do_follow_link+76/88>
Code: c012f691 <do_follow_link+19/88> 83 78 2c 00 cmpl $0x0,0x2c(%eax)
Code: c012f69b <do_follow_link+23/88> 74 57 je c012f6ee <do_follow_link+76/88>
Code: c012f69d <do_follow_link+25/88> 89 e0 movl %esp,%eax
Code: c012f69f <do_follow_link+27/88> 89 c3 movl %eax,%ebx
Code: c012f6a1 <do_follow_link+29/88> 81 e3 00 00 90 andl $0x90900000,%ebx
Code: c012f6ac <do_follow_link+34/88> 90
Code: c012f6ad <do_follow_link+35/88> 90 nop

-----------------------------------------
Unable to handle kernel paging request at virtual address 1abe1c3c
current->tss.cr3 = 00773000, |r3 = 00773000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0147b52>]
EFLAGS: 00010286
eax: 1abe1c00 ebx: bffff274 ecx: c1b8276f edx: 00000048
esi: c1b8276f edi: c497df78 ebp: c497df80 esp: c497df2c
ds: 0018 es: 0018 ss: 0018
Process diald (pid: 670, process nr: 45, stackpage=c497d000)
Stack: bffff274 c61d16e0 c497df78 ffffffea c497df48 c0165af0 00000202 0000029e
00000000 00000000 00000000 c34fb86c c0147e4d c1b8276f c497df80 00000048
c61d16e0 c1b826e3 c1b82727 bffff274 00000048 00000000 00000000 c497df78
Call Trace: [<c0165af0>] [<c0147e4d>] [<c0127b86>] [<c0109aca>]
Code: 83 78 3c 00 75 10 b8 a1 ff ff ff 5b 5e 5f 5d 83 c4 20 c3 8d
Using `../System.map' to map addresses to symbols.

>>EIP: c0147b52 <sock_sendmsg+12/c4>
Trace: c0165af0 <inet_sendmsg>
Trace: c0147e4d <sock_write+b1/bc>
Trace: c0127b86 <sys_write+122/198>
Trace: c0109aca <system_call+3a/40>

Code: c0147b52 <sock_sendmsg+12/c4>
Code: c0147b52 <sock_sendmsg+12/c4> 83 78 3c 00 cmpl $0x0,0x3c(%eax)
Code: c0147b56 <sock_sendmsg+16/c4> 75 10 jne c0147b68 <sock_sendmsg+28/c4>
Code: c0147b58 <sock_sendmsg+18/c4> b8 a1 ff ff ff movl $0xffffffa1,%eax
Code: c0147b63 <sock_sendmsg+23/c4> 5b popl %ebx
Code: c0147b64 <sock_sendmsg+24/c4> 5e popl %esi
Code: c0147b65 <sock_sendmsg+25/c4> 5f popl %edi
Code: c0147b66 <sock_sendmsg+26/c4> 5d popl %ebp
Code: c0147b67 <sock_sendmsg+27/c4> 83 c4 20 addl $0x20,%esp
Code: c0147b6a <sock_sendmsg+2a/c4> c3 ret
Code: c0147b6b <sock_sendmsg+2b/c4> 8d 00 leal (%eax),%eax
Code: c0147b73 <sock_sendmsg+33/c4> 90 nop
Code: c0147b74 <sock_sendmsg+34/c4> 90 nop
Code: c0147b75 <sock_sendmsg+35/c4> 90 nop

-----------------------------------------------
Unable to handle kernel NULL pointer dereference at virtual address 000000e5
current->tss.cr3 = 00101000, |r3 = 00101000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0132e10>]
EFLAGS: 00010202
eax: c1b826e3 ebx: c1b8273f ecx: c15bbfc0 edx: c11952a0
esi: 000000c1 edi: c4b00540 ebp: c61d16e0 esp: c497de3c
ds: 0018 es: 0018 ss: 0018
Process diald (pid: 670, process nr: 45, stackpage=c497d000)
Stack: c61d16e0 00000007 c4b00540 00000001 c1b826e3 00000000 c15bb2a0 c15bb2a0
c15bb33c c3422b1c c0134b27 c15bb2a0 c3422ae0 c11952a0 c34fb7e0 c012734f
c15bb2a0 c11952a0 00000000 c4b00540 c0127393 c497c000 c61d16e0 00000003
Call Trace: [<c0134b27>] [<c012734f>] [<c0127393>] [<c0118f50>] [<c010a067>] [<c0110dea>] [<c0192f2c>]
[<c0109c42>] [<c0160018>] [<c0147b52>] [<c0165af0>] [<c0147e4d>] [<c0127b86>] [<c0109aca>]
Code: 8a 46 24 a8 01 74 09 8b 4c 24 54 39 4e 14 74 10 a8 02 74 54

>>EIP: c0132e10 <locks_remove_locks+24/9c>
Trace: c0134b27 <dput+7f/a8>
Trace: c012734f <__fput+43/50>
Trace: c0127393 <close_fp+37/80>
Trace: c0118f50 <do_exit+154/248>
Trace: c010a067 <die_if_kernel+5f/64>
Trace: c0110dea <do_page_fault+34e/384>
Trace: c0192f2c <bad_pmd_string+247/287>
Trace: c0109c42 <error_code+32/40>
Trace: c0160018 <tcp_v4_init_sock+f8/114>
Trace: c0147b52 <sock_sendmsg+12/c4>
Trace: c0165af0 <inet_sendmsg>
Trace: c0147e4d <sock_write+b1/bc>
Trace: c0127b86 <sys_write+122/198>
Trace: c0109aca <system_call+3a/40>

Code: c0132e10 <locks_remove_locks+24/9c>
Code: c0132e10 <locks_remove_locks+24/9c> 8a 46 24 movb 0x24(%esi),%al
Code: c0132e13 <locks_remove_locks+27/9c> a8 01 testb $0x1,%al
Code: c0132e15 <locks_remove_locks+29/9c> 74 09 je c0132e20 <locks_remove_locks+34/9c>
Code: c0132e17 <locks_remove_locks+2b/9c> 8b 4c 24 54 movl 0x54(%esp,1),%ecx
Code: c0132e21 <locks_remove_locks+35/9c> 39 4e 14 cmpl %ecx,0x14(%esi)
Code: c0132e24 <locks_remove_locks+38/9c> 74 10 je c0132e30 <locks_remove_locks+44/9c>
Code: c0132e26 <locks_remove_locks+3a/9c> a8 02 testb $0x2,%al
Code: c0132e28 <locks_remove_locks+3c/9c> 74 54 je c0132e78 <locks_remove_locks+8c/9c>
Code: c0132e30 <locks_remove_locks+44/9c>

Ed Welbon; welbon@bga.com;

"He had bought a large map representing the sea,
Without the least vestige of land:
And the crew was much pleased when they found it to be
A map they could all understand."