Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Fri, 10 Jan 2003 14:04:56 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Fri, 10 Jan 2003 13:58:45 -0500 Received: from odpn1.odpn.net ([212.40.96.53]:12043 "EHLO odpn1.odpn.net") by vger.kernel.org with ESMTP id ; Fri, 10 Jan 2003 13:58:27 -0500 To: linux-kernel@vger.kernel.org From: "Gabor Z. Papp" Subject: Oops with Linux 2.4.21-pre3-ac2 Organization: Who, me? User-Agent: tin/1.5.16-20021206 ("Spiders") (UNIX) (Linux/2.4.21-pre3-gzp2 (i686)) Message-ID: <1ec4.3e1f19d6.db05e@gzp1.gzp.hu> Date: Fri, 10 Jan 2003 19:07:02 -0000 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 7369 Lines: 169 System.map not presents due nfs mount problem, but maybe its usable. Same kernel produces total freeze on a longtime stable system. ksymoops 2.4.8 on i686 2.4.21-pre3-ac2-gzp2. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.21-pre3-ac2-gzp2/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_system_map stat /usr/src/linux/System.map failed Unable to handle kernel NULL pointer dereference at virtual address 00000004 c0129350 *pde = 00000000 Oops: 0002 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010246 eax: 00000000 ebx: c121e404 ecx: c121e404 edx: dd33e000 esi: 00000000 edi: 00000020 ebp: 00000200 esp: dd33fe48 ds: 0018 es: 0018 ss: 0018 Process mc (pid: 517, stackpage=dd33f000) Stack: cc54bba0 c121e404 00000020 00000200 c0132e0e c121e404 000001d2 00000020 00000200 c013136c cc54bba0 cc54bba0 cc54bba0 c0129983 c0128a6c 00000020 000001d2 00000020 00000006 00000006 dd33e000 000044b9 000001d2 c0210ed4 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 89 58 04 89 03 8d 42 5c 89 43 04 89 5a 5c 89 73 0c ff 42 68 >>EIP; c0129350 <===== >>ebx; c121e404 <___strtok+fa11f8/205b7e54> >>ecx; c121e404 <___strtok+fa11f8/205b7e54> >>edx; dd33e000 <___strtok+1d0c0df4/205b7e54> >>esp; dd33fe48 <___strtok+1d0c2c3c/205b7e54> Trace; c0132e0e Trace; c013136c Trace; c0129983 <__free_pages+1b/1c> Trace; c0128a6c Trace; c0128be0 Trace; c0128c42 Trace; c0129608 <_alloc_pages+68/1e0> Trace; c0129892 <__alloc_pages+112/160> Trace; c0125011 Trace; c01295b6 <_alloc_pages+16/1e0> Trace; c012502d Trace; c014ef37 Trace; c012f636 Trace; c0106b53 <__up_wakeup+101f/13e4> Code; c0129350 00000000 <_EIP>: Code; c0129350 <===== 0: 89 58 04 mov %ebx,0x4(%eax) <===== Code; c0129353 3: 89 03 mov %eax,(%ebx) Code; c0129355 5: 8d 42 5c lea 0x5c(%edx),%eax Code; c0129358 8: 89 43 04 mov %eax,0x4(%ebx) Code; c012935b b: 89 5a 5c mov %ebx,0x5c(%edx) Code; c012935e e: 89 73 0c mov %esi,0xc(%ebx) Code; c0129361 11: ff 42 68 incl 0x68(%edx) <1>Unable to handle kernel NULL pointer dereference at virtual address 00000004 c0129350 *pde = 00000000 Oops: 0002 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010246 eax: 00000000 ebx: c1374d74 ecx: c1374d90 edx: dd33e000 esi: 00000000 edi: dd8f126c ebp: 0849b000 esp: dd33fc80 ds: 0018 es: 0018 ss: 0018 Process mc (pid: 517, stackpage=dd33f000) Stack: c1374d74 00000000 dd8f126c 0849b000 00000080 014c5c48 c0278850 c019151c c0278850 c15a1540 c0278850 c15ab160 00000286 c0129983 c0129d53 c1374d74 c011f3d0 c1374d74 00003000 c011f7b3 141c2067 dd8fe180 de6ccb20 00003000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 89 58 04 89 03 8d 42 5c 89 43 04 89 5a 5c 89 73 0c ff 42 68 >>EIP; c0129350 <===== >>ebx; c1374d74 <___strtok+10f7b68/205b7e54> >>ecx; c1374d90 <___strtok+10f7b84/205b7e54> >>edx; dd33e000 <___strtok+1d0c0df4/205b7e54> >>edi; dd8f126c <___strtok+1d674060/205b7e54> >>esp; dd33fc80 <___strtok+1d0c2a74/205b7e54> Trace; c019151c Trace; c0129983 <__free_pages+1b/1c> Trace; c0129d53 Trace; c011f3d0 Trace; c011f7b3 Trace; c0121d92 Trace; c0111f2e Trace; c011617f Trace; c0107126 Trace; c010fcd7 <__verify_write+407/774> Trace; c010f9d8 <__verify_write+108/774> Trace; c0152e36 Trace; c0158aac Trace; c015091b Trace; c01584bf Trace; c0106c44 <__up_wakeup+1110/13e4> Trace; c0129350 Trace; c0132e0e Trace; c013136c Trace; c0129983 <__free_pages+1b/1c> Trace; c0128a6c Trace; c0128be0 Trace; c0128c42 Trace; c0129608 <_alloc_pages+68/1e0> Trace; c0129892 <__alloc_pages+112/160> Trace; c0125011 Trace; c01295b6 <_alloc_pages+16/1e0> Trace; c012502d Trace; c014ef37 Trace; c012f636 Trace; c0106b53 <__up_wakeup+101f/13e4> Code; c0129350 00000000 <_EIP>: Code; c0129350 <===== 0: 89 58 04 mov %ebx,0x4(%eax) <===== Code; c0129353 3: 89 03 mov %eax,(%ebx) Code; c0129355 5: 8d 42 5c lea 0x5c(%edx),%eax Code; c0129358 8: 89 43 04 mov %eax,0x4(%ebx) Code; c012935b b: 89 5a 5c mov %ebx,0x5c(%edx) Code; c012935e e: 89 73 0c mov %esi,0xc(%ebx) Code; c0129361 11: ff 42 68 incl 0x68(%edx) 1 warning and 1 error issued. Results may not be reliable. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/