Oops in 2.4.0-test4 (its still this one introduced in 2.4.0-test1-ac>10)

From: Soeren Sonnenburg (sonnenburg@informatik.hu-berlin.de)
Date: Sat Jul 15 2000 - 07:49:15 EST


ksymoops 2.3.4 on i586 2.4.0-test4. Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.0-test4/ (default)
     -m /usr/src/linux/System.map (specified)

43fa4 c4333720 c5143fa4 00000000 00000000 00000000 c0141c9f
       c7e177e0 00000001 c5143fa4 c5142000 c7e177e0 c01356b1 c4333720
c5143fa4
       c7e177e0 00000000 c420b000 c5143fa4 bffffb2c 00000001 bffffb2c
c5143fa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75
Using defaults from ksymoops -t elf32-i386 -a i386

Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 8b 50 08 mov 0x8(%eax),%edx
Code; 00000003 Before first symbol
   3: 39 d0 cmp %edx,%eax
Code; 00000005 Before first symbol
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> 0000008d Before
first symbol
Code; 0000000b Before first symbol
   b: 8b 00 mov (%eax),%eax
Code; 0000000d Before first symbol
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; 00000011 Before first symbol
  11: 39 da cmp %ebx,%edx
Code; 00000013 Before first symbol
  13: 75 00 jne 15 <_EIP+0x15> 00000015 Before
first symbol

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c7ed4000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c7ed5f00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 314, stackpage=c7ed5000)
Stack: c7e177e0 c7ed5fa4 c4333720 c7ed5fa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c7ed5fa4 c7ed4000 c7e177e0 c01356b1 c4333720
c7ed5fa4
       c7e177e0 00000000 c4127000 c7ed5fa4 bffffb7c 00000001 bffffb7c
c7ed5fa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c6fda000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c6fdbf00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 319, stackpage=c6fdb000)
Stack: c7e177e0 c6fdbfa4 c4333720 c6fdbfa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c6fdbfa4 c6fda000 c7e177e0 c01356b1 c4333720
c6fdbfa4
       c7e177e0 00000000 c7157000 c6fdbfa4 bffffb6c 00000001 bffffb6c
c6fdbfa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c725c000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c725df00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 323, stackpage=c725d000)
Stack: c7e177e0 c725dfa4 c4333720 c725dfa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c725dfa4 c725c000 c7e177e0 c01356b1 c4333720
c725dfa4
       c7e177e0 00000000 c44d3000 c725dfa4 bffffb0c 00000001 bffffb0c
c725dfa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c7352000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c7353f00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 326, stackpage=c7353000)
Stack: c7e177e0 c7353fa4 c4333720 c7353fa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c7353fa4 c7352000 c7e177e0 c01356b1 c4333720
c7353fa4
       c7e177e0 00000000 c4ac1000 c7353fa4 bffffaac 00000001 bffffaac
c7353fa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c7330000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c7331f00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 336, stackpage=c7331000)
Stack: c7e177e0 c7331fa4 c4333720 c7331fa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c7331fa4 c7330000 c7e177e0 c01356b1 c4333720
c7331fa4
       c7e177e0 00000000 c2c2c000 c7331fa4 bffffb5c 00000001 bffffb5c
c7331fa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c2baa000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c2babf00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 341, stackpage=c2bab000)
Stack: c7e177e0 c2babfa4 c4333720 c2babfa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c2babfa4 c2baa000 c7e177e0 c01356b1 c4333720
c2babfa4
       c7e177e0 00000000 c2e72000 c2babfa4 bffffb6c 00000001 bffffb6c
c2babfa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c2baa000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c2babf00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 343, stackpage=c2bab000)
Stack: c7e177e0 c2babfa4 c4333720 c2babfa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c2babfa4 c2baa000 c7e177e0 c01356b1 c4333720
c2babfa4
       c7e177e0 00000000 c735e000 c2babfa4 bffffb6c 00000001 bffffb6c
c2babfa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c7330000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c7331f00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 353, stackpage=c7331000)
Stack: c7e177e0 c7331fa4 c4333720 c7331fa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c7331fa4 c7330000 c7e177e0 c01356b1 c4333720
c7331fa4
       c7e177e0 00000000 c2f9f000 c7331fa4 bffffb4c 00000001 bffffb4c
c7331fa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01417a9
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01417a9>]
EFLAGS: 00010203
eax: 00000000 ebx: c138bbc0 ecx: c7e177e0 edx: c7330000
esi: c125b320 edi: 00000000 ebp: c138bbc0 esp: c7331f00
ds: 0018 es: 0018 ss: 0018
Process start-stop-daem (pid: 358, stackpage=c7331000)
Stack: c7e177e0 c7331fa4 c4333720 c7331fa4 00000000 00000000 00000000
c0141c9f
       c7e177e0 00000001 c7331fa4 c7330000 c7e177e0 c01356b1 c4333720
c7331fa4
       c7e177e0 00000000 c44f5000 c7331fa4 bffffb6c 00000001 bffffb6c
c7331fa8
Call Trace: [<c0141c9f>] [<c01356b1>] [<c0135b56>] [<c0132809>] [<c010a734>]
Code: 8b 50 08 39 d0 0f 84 82 00 00 00 8b 00 89 54 24 18 39 da 75

>>EIP; c01417a9 <proc_permission+a9/148> <=====
Trace; c0141c9f <proc_pid_follow_link+1b/40>
Trace; c01356b1 <path_walk+679/778>
Trace; c0135b56 <__user_walk+3a/54>
Trace; c0132809 <sys_newstat+15/6c>
Trace; c010a734 <system_call+34/40>
Code; c01417a9 <proc_permission+a9/148>
00000000 <_EIP>:
Code; c01417a9 <proc_permission+a9/148> <=====
   0: 8b 50 08 mov 0x8(%eax),%edx <=====
Code; c01417ac <proc_permission+ac/148>
   3: 39 d0 cmp %edx,%eax
Code; c01417ae <proc_permission+ae/148>
   5: 0f 84 82 00 00 00 je 8d <_EIP+0x8d> c0141836
<proc_permission+136/148>
Code; c01417b4 <proc_permission+b4/148>
   b: 8b 00 mov (%eax),%eax
Code; c01417b6 <proc_permission+b6/148>
   d: 89 54 24 18 mov %edx,0x18(%esp,1)
Code; c01417ba <proc_permission+ba/148>
  11: 39 da cmp %ebx,%edx
Code; c01417bc <proc_permission+bc/148>
  13: 75 00 jne 15 <_EIP+0x15> c01417be
<proc_permission+be/148>

----
The brain is a wonderful organ; it starts working the moment you get up in
the morning, and does not stop until you get to university.

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sat Jul 15 2000 - 21:00:21 EST