Re: 2.1.112: Console funnies _almost_ cured (2xOops)

Michael L. Galbraith (
Fri, 31 Jul 1998 20:00:00 +0200 (MET DST)

On 31 Jul 1998, James H. Cloos Jr. wrote:

> AFAICT, the scan option does not list vesafb compatable VESA modes at
> all. Just try ones like 301, 303, 305, 307 (at the ask prompt; at the
> LILO prompt use 769, 771, 773, 775 for those four).
> Also, the consensus seems to be use vgacon rather than vgafb

Gee.. giving it real VESA modes works a _lot_ better :)) Scan said 129,
12b, 12c so I tried 329 etc which aren't recognized. Giving it the menu
number for the (ahem) 132 column mode made the beeeeeeeee. Thanks.

And now, back to the original problem.

With the (now running) VESA fb, the up-arrow return repeat repeat while
doing 'find .' still oopses, though now it doesn't reboot the box as it
does with vgafb. It oopses the find first, and then syslogd when it tries
to write to the console.

The machine is effectively dead; SysRq responds but if you poke around
a bit it will kill swapper and lock. Consoles are dead (all). The oops
which is left on the screen is syslogd, so I redid it without syslogd
running and copied the oops for the find.

In this oops, the second trace entry may look like a bad copy (in fb), but
it is not. I repeated this oops twice more to make absolutely certain.

Unable to handle kernel NULL pointer dereference at virtual address c584d000
current->tss.cr3 = 04b76000, %cr3 = 04b76000
*pde = 0009c063
*pte = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c01e6464>]
EFLAGS: 00010246
eax: 00000000 ebx: c023732f ecx: 00000000 edx: 00000000
esi: c584d000 edi: c027ebc0 ebp: 00000000 esp: c4b8ddf4
ds: 0018 es: 0018 ss: 0018
Process find (pid: 187, process nr: 10, stackpage=c4b8d000)
Stack: 00000000 c02720e0 00000000 0000001c c0111128 c4f15000 07070707 00000280
c584aa80 c01a3553 c03743b0 c027ebc0 c0093cc2 fffffa9c 0000001c 00000000
00000037 c0093220 ffffffed 00000000 c02720e0 c01a7b79 c0374380 c0093220
Call Trace: [<c0111128>] [<c584aa80>] [<c01e3553>] [<c01a7b79>] [<c01a80a3>]
[<c01acd70>] [<c01ae73c>] [<c01aabea>] [<c01aeb24>] [<c01243bc>]
[<c01aaac4>] [<c0109b38>]
Code: 89 06 8a 03 43 24 0f 88 c2 8b 44 24 18 23 04 95 60 69 23 c0
Using `/boot/2.1.112/' to map addresses to symbols.

>>EIP: c01e6464 <fbcon_cfb8_putcs+1a4/2f4>
Trace: c0111128 <tqueue_bh+24/34>
Trace: c584aa80
Trace: c01e3553 <fbcon_putcs+bf/d8>
Trace: c01a7b79 <do_con_write+655/674>
Trace: c01a80a3 <con_write+1b/2c>
Trace: c01acd70 <opost_block+17c/18c>
Trace: c01ae73c <write_chan+118/1d0>
Trace: c01aabea <tty_write+126/14c>
Trace: c01aeb24 <unset_locked_termios+84/a4>
Trace: c01243bc <sys_write+cc/128>
Trace: c01aabea <tty_write+126/14c>
Trace: c0109b38 <system_call+38/40>
Code: c01e6464 <fbcon_cfb8_putcs+1a4/2f4>
Code: c01e6464 <fbcon_cfb8_putcs+1a4/2f4> 89 06 movl %eax,(%esi)
Code: c01e6466 <fbcon_cfb8_putcs+1a6/2f4> 8a 03 movb (%ebx),%al
Code: c01e6468 <fbcon_cfb8_putcs+1a8/2f4> 43 incl %ebx
Code: c01e6469 <fbcon_cfb8_putcs+1a9/2f4> 24 0f andb $0xf,%al
Code: c01e646b <fbcon_cfb8_putcs+1ab/2f4> 88 c2 movb %al,%dl
Code: c01e646d <fbcon_cfb8_putcs+1ad/2f4> 8b 44 24 18 movl 0x18(%esp,1),%eax
Code: c01e6477 <fbcon_cfb8_putcs+1b7/2f4> 23 04 95 60 69 andl 0xc0236960(,%edx,4),%eax

vesafb: 640x480x8, linelength=640
vesafb: framebuffer at 0xa0800000, mapped to 0xc5802000, size 307200
vesafb: scrolling=redraw
Console: switching to colour frame buffer device 80x30
fb0: VESA VGA frame buffer device


Syslogd oops is from earlier boot.

Unable to handle kernel NULL pointer dereference at virtual address 00000004
current->tss.cr3 = 04771000, %cr3 = 04771000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01ae7ce>]
EFLAGS: 00010013
eax: 00000000 ebx: 00000246 ecx: c4dbdef8 edx: 00000000
esi: 0809cb0b edi: c41f7f60 ebp: 00000000 esp: c4dbded8
ds: 0018 es: 0018 ss: 0018
Process syslogd (pid: 58, process nr: 7, stackpage=c4dbd000)
Stack: 0000000f 0809cafc c4eeb000 00000000 c4dbdef8 c4dbe000 c4dbdef8 c4dbc000
c4dbc000 c41f7f60 c01aabea c4eeb000 c0239d40 0809cafc 0000000f 00000000
0000000f c4dbdf6c 00000005 c01ae624 c012459e c0239d40 0809cafc 0000000f
Call Trace: [<c01aabea>] [<c01ae624>] [<c012459e>] [<c01aaac4>] [<c01246da>] [<c0109b38>]
Code: 8b 42 04 3b 44 24 10 75 f5 89 7a 04 53 9d 89 e8 3b 74 24 34
Using `/boot/2.1.112/' to map addresses to symbols.

>>EIP: c01ae7ce <write_chan+1aa/1d0>
Trace: c01aabea <tty_write+126/14c>
Trace: c01ae7ce <write_chan+1aa/1d0>
Trace: c012459e <do_readv_writev+186/1c4>
Trace: c01aabea <tty_write+126/14c>
Trace: c01246da <sys_writev+62/c4>
Trace: c0109b38 <system_call+38/40>
Code: c01ae7ce <write_chan+1aa/1d0>
Code: c01ae7ce <write_chan+1aa/1d0> 8b 42 04 movl 0x4(%edx),%eax
Code: c01ae7d1 <write_chan+1ad/1d0> 3b 44 24 10 cmpl 0x10(%esp,1),%eax
Code: c01ae7d5 <write_chan+1b1/1d0> 75 f5 jne fffffffe <_EIP+0xfffffffe>
Code: c01ae7d7 <write_chan+1b3/1d0> 89 7a 04 movl %edi,0x4(%edx)
Code: c01ae7e0 <write_chan+1bc/1d0> 53 pushl %ebx
Code: c01ae7e1 <write_chan+1bd/1d0> 9d popf
Code: c01ae7e2 <write_chan+1be/1d0> 89 e8 movl %ebp,%eax
Code: c01ae7e4 <write_chan+1c0/1d0> 3b 74 24 34 cmpl 0x34(%esp,1),%esi

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
Please read the FAQ at