Oops

John Hayward-Warburton (linux@billabong.demon.co.uk)
Fri, 21 Nov 1997 13:34:11 +0000 (GMT)


When exiting the newsreader tin, got the following oops (and there
have been no oopses on this system since many weeks ago!)

Unable to handle kernel NULL pointer dereference at virtual address
0000004e
current->tss.cr3 = 0122d000, %cr3 = 0122d000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01297aa>]
EFLAGS: 00010282
eax: c222d840 ebx: c222d840 ecx: 00000000 edx: fffffffe
esi: c222d840 edi: c2ce4ea0 ebp: 00000001 esp: c03aff18
ds: 0018 es: 0018 ss: 0018
Process tin (pid: 3699, process nr: 51, stackpage=c03af000)
Stack: c222d840 c2ce4ea0 c26d6019 c012999c c2ce4ea0 c222d840 c26d6000 000001b6
00000242 000001b6 000081a4 00000001 c0129500 c26d600f 0000000a 218206cb
c0129aa8 c26d6000 00000000 00000001 c24a4b40 000001b6 c26d6000 000001b6
Call Trace: [<c012999c>] [<c0129500>] [<c0129aa8>] [<c0121e83>] [<c0122037>] [<c01091fa>]
Code: 8b 42 50 85 c0 74 5d 83 78 2c 00 74 57 89 e0 89 c3 81 e3 00
Segmentation fault

Here's the trace:

Using `/boot/System.map' to map addresses to symbols.

>>EIP: c01297aa <do_follow_link+12/88>
Trace: c012999c <lookup_dentry+17c/1bc>
Trace: c0129500 <getname+bc/144>
Trace: c0129aa8 <open_namei+48/314>
Trace: c0121e83 <do_open+4b/134>
Trace: c0122037 <sys_open+3b/6c>
Trace: c01091fa <system_call+3a/40>
Code: c01297aa <do_follow_link+12/88>
Code: c01297aa <do_follow_link+12/88> 8b 42 50 movl 0x50(%edx),%eax
Code: c01297ad <do_follow_link+15/88> 85 c0 testl %eax,%eax
Code: c01297af <do_follow_link+17/88> 74 5d je c012980e <do_follow_link+76/88>
Code: c01297b1 <do_follow_link+19/88> 83 78 2c 00 cmpl $0x0,0x2c(%eax)
Code: c01297bb <do_follow_link+23/88> 74 57 je c012980e <do_follow_link+76/88>
Code: c01297bd <do_follow_link+25/88> 89 e0 movl %esp,%eax
Code: c01297bf <do_follow_link+27/88> 89 c3 movl %eax,%ebx
Code: c01297c1 <do_follow_link+29/88> 81 e3 00 00 90 andl $0x90900000,%ebx
Code: c01297cd <do_follow_link+35/88> 90 nop

Hope that's of use.

John Hayward-Warburton