ooops report: Kernel 2.2.0

Pug Fantus (pug_fantus@usa.net)
Thu, 28 Jan 1999 04:16:28 -0500


Well, left to go watch a movie, put the mp3 on pause (gqmpeg was acting
up a bit, but I didn't take any notice). Came about about 3 hours
later, and my puter was locked up harDCore. It locked about an hour
after I left, there is the ooops report:

Options used: -V (default)
-o /lib/modules/2.2.0/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /usr/src/linux/System.map (default)
-c 1 (default)

You did not tell me where to find symbol information. I will assume
that the log matches the kernel and modules that are running right now
and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

./ksymoops: read_system_map stat /usr/src/linux/System.map failed : No
such file or directory
Warning in compare_ksyms_lsmod, module snd-sb16 is in lsmod but not in
ksyms, probably no symbols exported

Jan 27 23:47:19 phoenix kernel: Unable to handle kernel NULL pointer
dereference at virtual address 00000000
Jan 27 23:47:19 phoenix kernel: current->tss.cr3 = 0281d000, `r3 =
0281d000
Jan 27 23:47:19 phoenix kernel: *pde = 00000000
Jan 27 23:47:19 phoenix kernel: Oops: 0002
Jan 27 23:47:19 phoenix kernel: CPU: 0
Jan 27 23:47:19 phoenix kernel: EIP: 0010:[<c011ed19>]
Jan 27 23:47:19 phoenix kernel: EFLAGS: 00010292
Jan 27 23:47:19 phoenix kernel: eax: 0000003b ebx: c02bd6e0 ecx:
c01fd6d2 edx: c3e04000
Jan 27 23:47:19 phoenix kernel: esi: c2819340 edi: 00000292 ebp:
c1b03f60 esp: c2865ecc
Jan 27 23:47:19 phoenix kernel: ds: 0018 es: 0018 ss: 0018
Jan 27 23:47:19 phoenix kernel: Process gqmpeg (pid: 14716, process nr:
81, stackpage=c2865000)
Jan 27 23:47:19 phoenix kernel: Stack: 000000ad 00000000 00000300
c28193bc c0349000 c01115f0 c02bd6e0 c2819340
Jan 27 23:47:19 phoenix kernel: c2819340 c2819340 c2819340
c1ed2000 c014783a c2819340 c0147e92 c1ed2000
Jan 27 23:47:19 phoenix kernel: 000074f3 c0349000 c01e339c
00000400 0000000b 4018a044 ffffffff c0123d19
Jan 27 23:47:19 phoenix kernel: Call Trace: [<c01115f0>] [<c014783a>]
[<c0147e92>] [<c0123d19>] [<c01486db>] [<c01487d5>] [<c0122f62>]
Jan 27 23:47:19 phoenix kernel: [<c0108918>] [<c010002b>]
Jan 27 23:47:19 phoenix kernel: Code: c7 05 00 00 00 00 00 00 00 00 5b
5e 5f 5d 83 c4 0c c3 90 53

>>EIP: c011ed19 <kmem_cache_free+151/170>
Trace: c01115f0 <free_dma+308/c94>
Trace: c014783a <remove_proc_entry+13f6/6450>
Trace: c0147e92 <remove_proc_entry+1a4e/6450>
Trace: c0123d19 <__wait_on_buffer+89/290>
Trace: c01486db <remove_proc_entry+2297/6450>
Trace: c01487d5 <remove_proc_entry+2391/6450>
Trace: c0122f62 <sys_close+3a6/ad0>
Trace: c0108918 <dump_thread+132c/23ec>
Code: c011ed19 <kmem_cache_free+151/170> 00000000 <_EIP>:
Code: c011ed19 <kmem_cache_free+151/170> 0: c7 05 00 00 00
movl $0x0,0x0
Code: c011ed1e <kmem_cache_free+156/170> 5: 00 00 00 00 00
Code: c011ed23 <kmem_cache_free+15b/170> a: 5b
popl %ebx
Code: c011ed24 <kmem_cache_free+15c/170> b: 5e
popl %esi
Code: c011ed25 <kmem_cache_free+15d/170> c: 5f
popl %edi
Code: c011ed26 <kmem_cache_free+15e/170> d: 5d
popl %ebp
Code: c011ed27 <kmem_cache_free+15f/170> e: 83 c4 0c
addl $0xc,%esp
Code: c011ed2a <kmem_cache_free+162/170> 11: c3
ret
Code: c011ed2b <kmem_cache_free+163/170> 12: 90
nop
Code: c011ed2c <kmem_cache_free+164/170> 13: 53
pushl %ebx

Jan 27 23:47:19 phoenix kernel: Unable to handle kernel NULL pointer
dereference at virtual address 00000008
Jan 27 23:47:19 phoenix kernel: current->tss.cr3 = 02088000, `r3 =
02088000
Jan 27 23:47:19 phoenix kernel: *pde = c2088000
Jan 27 23:47:19 phoenix kernel: Oops: 0000
Jan 27 23:47:19 phoenix kernel: CPU: 0
Jan 27 23:47:19 phoenix kernel: EIP: 0010:[<c011af7e>]
Jan 27 23:47:19 phoenix kernel: EFLAGS: 00010286
Jan 27 23:47:19 phoenix kernel: eax: 00000000 ebx: 00023000 ecx:
c0f2a0c0 edx: c0238960
Jan 27 23:47:19 phoenix kernel: esi: 0000000d edi: 00000000 ebp:
00000000 esp: c1ed3bcc
Jan 27 23:47:19 phoenix kernel: ds: 0018 es: 0018 ss: 0018
Jan 27 23:47:19 phoenix kernel: Process mpg123 (pid: 29939, process nr:
78, stackpage=c1ed3000)
Jan 27 23:47:19 phoenix kernel: Stack: 00000000 00025000 c02105dc
c011bc94 c0f2a0c0 00023000 00000000 c06caac0
Jan 27 23:47:19 phoenix kernel: c1ed2000 00000001 c306d1b8
00000000 c02105e8 c3ebf238 c0f2a0c0 c0119720
Jan 27 23:47:19 phoenix kernel: c06caac0 0806e000 00000001
c1ed2000 0806e200 c06caac0 00000001 c2b3dda0
Jan 27 23:47:19 phoenix kernel: Call Trace: [<c011bc94>] [<c0119720>]
[<c011987c>] [<c010dc2f>] [<c0108a1d>] [<c01b889e>] [<c012f59d>]
Jan 27 23:47:19 phoenix kernel: [<c01306d2>] [<c0128c87>]
[<c0128edb>] [<c0128f00>] [<c010785f>] [<c0108918>] [<c01002b>]
Jan 27 23:47:19 phoenix kernel: Code: 8b 70 08 8b 7c 24 1c 81 e7 00 f0
ff ff 85 ed 75 16 31 d2 b8

>>EIP: c011af7e <update_vm_cache+13a/954>
Trace: c011bc94 <generic_file_read+4fc/aac>
Trace: c0119720 <vmtruncate+254/620>
Trace: c011987c <vmtruncate+3b0/620>
Trace: c010dc2f <__verify_write+227/688>
Trace: c0108a1d <dump_thread+1431/23ec>
Trace: c01b889e <clear_user+3a/48>
Trace: c012f59d <is_bad_inode+69/eab4>
Trace: c01306d2 <is_bad_inode+119e/eab4>
Code: c011af7e <update_vm_cache+13a/954> 00000000 <_EIP>:
Code: c011af7e <update_vm_cache+13a/954> 0: 8b 70 08
movl 0x8(%eax),%esi
Code: c011af81 <update_vm_cache+13d/954> 3: 8b 7c 24 1c
movl 0x1c(%esp,1),%edi
Code: c011af85 <update_vm_cache+141/954> 7: 81 e7 00 f0 ff
andl $0xfffff000,%edi
Code: c011af8a <update_vm_cache+146/954> c: ff
Code: c011af8b <update_vm_cache+147/954> d: 85 ed
testl %ebp,%ebp
Code: c011af8d <update_vm_cache+149/954> f: 75 16
jne 27 <_EIP+0x27> c011afa5 <update_vm_cache+161/954>
Code: c011af8f <update_vm_cache+14b/954> 11: 31 d2
xorl %edx,%edx
Code: c011af91 <update_vm_cache+14d/954> 13: b8 00 00 00 00
movl $0x0,%eax

2 warnings and 1 error issued. Results may not be reliable.

Well, have fun all.
If you need any other info, just email me. (if this is the kernel
mailing list, I'm not on it)

--
pugfantus  --  #linuxlounge EfNet  --  http://members.xoom.com/pugfantus

"I can't understand why people are frightened of new ideas. I'm frightened of the old ones." -- John Cage

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/