Reproducible segmentation faults with 2.1.98

Alfredo Sanjuan (alfre@ibd.es)
Sat, 25 Apr 1998 22:51:03 +0200


If you do a cat /proc/ide/ide0/config you get every time a segmentation
fault.

Unable to handle kernel NULL pointer dereference at virtual address 00000010
current->tss.cr3 = 011b0000, %cr3 = 011b0000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c019dff3>]
EFLAGS: 00010246
eax: 00000000 ebx: c0de1f70 ecx: c02108f0 edx: c02108f0
esi: c0973000 edi: 00000000 ebp: 00000000 esp: c0a89f30
ds: 0018 es: 0018 ss: 0018
Process cat (pid: 554, process nr: 27, stackpage=c0a89000)
Stack: 00000000 00000000 00000000 c0de1f70 c0973000 c025f6c0 00001000
00001000
c014c4c9 c0973000 c0a89f90 00000000 00000c00 c0a89f8c c02108f0
c0de1f70
ffffffea 0804cbd0 00001000 00000000 00000c00 c025f6c0 c0973000
00000000
Call Trace: [<c014c4c9>] [<c01241b6>] [<c0109a38>]
Code: 8b 45 10 50 8b 45 00 0f b6 40 18 50 68 3b 40 1d c0 8b 4c 24

Using `/System.map' to map addresses to symbols.

>>EIP: c019dff3 <proc_ide_read_config+33/140>
Trace: c014c4c9 <proc_file_read+119/1e0>
Trace: c01241b6 <sys_read+b6/110>
Trace: c0109a38 <system_call+38/40>
Code: c019dff3 <proc_ide_read_config+33/140>
Code: c019dff3 <proc_ide_read_config+33/140> 8b 45 10 movl
0x10(%ebp),%eax
Code: c019dff6 <proc_ide_read_config+36/140> 50 pushl %eax
Code: c019dff7 <proc_ide_read_config+37/140> 8b 45 00 movl
0x0(%ebp),%eax
Code: c019dffa <proc_ide_read_config+3a/140> 0f b6 40 18 movzbl
0x18(%eax),%eax
Code: c019e004 <proc_ide_read_config+44/140> 50 pushl %eax
Code: c019e005 <proc_ide_read_config+45/140> 68 3b 40 1d c0 pushl
$0xc01d403b
Code: c019e00a <proc_ide_read_config+4a/140> 8b 4c 24 00 movl
0x0(%esp,1),%ecx
Code: c019e014 <proc_ide_read_config+54/140> 90 nop
Code: c019e015 <proc_ide_read_config+55/140> 90 nop
Code: c019e016 <proc_ide_read_config+56/140> 90 nop

Alfredo

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu