Re: A simple way to lock up 2.2.0-pre7

Mike Galbraith (mikeg@weiden.de)
Sat, 16 Jan 1999 17:09:53 +0100 (CET)


On Sat, 16 Jan 1999, Mike Galbraith wrote:

> On Fri, 15 Jan 1999, Linus Torvalds wrote:
>
> > In article <Pine.LNX.4.02A.9901160703210.283-100000@mikeg.weiden.de> you write:
> > >
> > >Every time you press return, one exits with the error message. If you
> > >press ^C again on the affected tty before these are all gone.. boom.
> > >
> >
> > The above call trace must be from some nonstandard kernel. It doesn't
> > make sense, but more importantly it's not something a standard kernel
> > would print out anyway.
>
> I just copied it from the screen and fed it to ksymoops. I'll try again
> with IKD disabled, as the symptoms are the same with or without. Maybe the
> the stack gets munged beyond usefulness.
>
> > What strange patches have you been smoking?

Ok, all strange patches out of my system except raid, and it's not in
use during testing. I was extra extra.. extra careful copying this.
(still screwy)

-Mike

Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 001010000, %cr3 = 001010000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c010eefb>]
EFLAGS: 00010246
eax: c377496c ebx: c36d9f74 ecx: c3774000 edx: c36d8000
esi: c3774968 edi: 00000001 ebp: c0275e6c esp: c0275e68
ds: 0018 es: 0018 ss: 0018
Process swapper (pid: 0, process nr: 0, stackpage=c0275000)
Stack: 00000063 00000000 c01b117a c377455c c377415c c377475c c0275f54 c377455c
c0275f5c 00630000 c377455d c377415d c377475d 0000002e 0000000b 00000001
00000000 0000fb63 0000002e 00000000 00000046 00000000 c01b8157 00000063
Call Trace: [<c01b117a>] [<c01b8157>] [<c01b7c5a>] [<c01b8aa1>]
[<c010f72e>] [<c0108a55>] [<c01af80f>] [<c01ab5fa>]
[<c0115e29>] [<c0108c59>] [<c0107b00>] [<c0106201>]
[<c010624f>] [<c0106000>] [<c0106291>] [<c0107a44>]
[<c0106000>] [<c010607f>] [<c0106000>] [<c0100176>]
Code: c6 05 00 00 00 00 00 8b 02 85 c7 74 e5 89 d0 e8 85 f9 ff ff
Using `/usr/src/linux/System.map' to map addresses to symbols.

>>EIP: c010eefb <__wake_up+23/48>
Trace: c01b117a <n_tty_receive_buf+db2/df4>
Trace: c01b8157 <do_self+47/4c>
Trace: c01b7c5a <handle_scancode+29a/2e0>
Trace: c01b8aa1 <handle_kbd_event+a9/cc>
Trace: c010f72e <update_one_process+e6/f4>
Trace: c0108a55 <handle_IRQ_event+31/68>
Trace: c01af80f <flush_to_ldisc+cf/d8>
Trace: c01ab5fa <console_bh+3e/ec>
Trace: c0115e29 <do_bottom_half+45/64>
Trace: c0108c59 <do_IRQ+39/40>
Trace: c0107b00 <ret_from_intr>
Trace: c0106201 <hard_idle+21/34>
Trace: c010624f <cpu_idle+3b/68>
Trace: c0106000 <get_options>
Trace: c0106291 <sys_idle+15/24>
Trace: c0107a44 <system_call+34/40>
Trace: c0106000 <get_options>
Trace: c010607f <cpu_idle+7/18>
Trace: c0106000 <get_options>
Trace: c0100176 <L6>
Code: c010eefb <__wake_up+23/48>
Code: c010eefb <__wake_up+23/48> c6 05 00 00 00 movb $0x0,0x0
Code: c010ef02 <__wake_up+2a/48> 8b 02 movl (%edx),%eax
Code: c010ef04 <__wake_up+2c/48> 85 c7 testl %eax,%edi
Code: c010ef0c <__wake_up+34/48> 74 e5 je fffffff2 <_EIP+0xfffffff2>
Code: c010ef0e <__wake_up+36/48> 89 d0 movl %edx,%eax
Code: c010ef10 <__wake_up+38/48> e8 85 f9 ff ff call fffff999 <_EIP+0xfffff999>

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/