Package: kernel-image-2.6.10-1-386 Version: 2.6.10-4 Severity: important I experienced an oops when launching a Java Virtual Machine. I cannot reproduce this bug since it oopsed only once, it worked when I tried again. However I have the feeling the kernel should never oops :)
The JVM is the same for months, it never oopsed on a 2.6.8 kernel. Attached is the ksymoops information. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental') Architecture: i386 (i586) Kernel: Linux 2.6.10-1-386 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C) Versions of packages kernel-image-2.6.10-1-386 depends on: ii coreutils [fileutils] 5.2.1-2 The GNU core utilities ii fileutils 5.2.1-2 The GNU file management utilities ii initrd-tools 0.1.77 tools to create initrd image for p ii module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo -- no debconf information
Unable to handle kernel NULL pointer dereference at virtual address 00000055 c0111534 *pde = 00000000 Oops: 0000 [#1] CPU: 0 EIP: 0060:[do_emu+23/1107] Not tainted VLI EFLAGS: 00210202 (2.6.10-1-386) eax: c2a36000 ebx: 0000002d ecx: 0000007b edx: 00000000 esi: 00000000 edi: 0000002d ebp: bfff62e0 esp: c2a37f88 ds: 007b es: 007b ss: 0068 Stack: bfff600c c2a36000 bfff5f0c ab521a20 c2a36000 c01022ce bfff5fa0 00000000 bfff6288 0000002d 0000002d 00000063 c011151d bfff62e0 c0103a9b 0000002d ab506e48 0000002d 00000063 00000001 bfff62e0 00000063 0000007b 0000007b Call Trace: Code: 0f be 02 01 c3 8d 42 01 89 45 00 0f b7 c3 5a 5b 5e 5f 5d c3 55 57 56 53 83 ec 28 8b 7c 24 3c 31 f6 b8 00 e0 ff ff 21 e0 ff 40 14 <8b> 47 28 89 44 24 24 8b 5c 24 24 8a 13 80 fa 0f 0f 85 d1 02 00 Using defaults from ksymoops -t elf32-i386 -a i386 >>eax; c2a36000 <pg0+26b1000/3fc79400> >>esp; c2a37f88 <pg0+26b2f88/3fc79400> Code; ffffffd5 <__kernel_rt_sigreturn+1b95/????> 00000000 <_EIP>: Code; ffffffd5 <__kernel_rt_sigreturn+1b95/????> 0: 0f be 02 movsbl (%edx),%eax Code; ffffffd8 <__kernel_rt_sigreturn+1b98/????> 3: 01 c3 add %eax,%ebx Code; ffffffda <__kernel_rt_sigreturn+1b9a/????> 5: 8d 42 01 lea 0x1(%edx),%eax Code; ffffffdd <__kernel_rt_sigreturn+1b9d/????> 8: 89 45 00 mov %eax,0x0(%ebp) Code; ffffffe0 <__kernel_rt_sigreturn+1ba0/????> b: 0f b7 c3 movzwl %bx,%eax Code; ffffffe3 <__kernel_rt_sigreturn+1ba3/????> e: 5a pop %edx Code; ffffffe4 <__kernel_rt_sigreturn+1ba4/????> f: 5b pop %ebx Code; ffffffe5 <__kernel_rt_sigreturn+1ba5/????> 10: 5e pop %esi Code; ffffffe6 <__kernel_rt_sigreturn+1ba6/????> 11: 5f pop %edi Code; ffffffe7 <__kernel_rt_sigreturn+1ba7/????> 12: 5d pop %ebp Code; ffffffe8 <__kernel_rt_sigreturn+1ba8/????> 13: c3 ret Code; ffffffe9 <__kernel_rt_sigreturn+1ba9/????> 14: 55 push %ebp Code; ffffffea <__kernel_rt_sigreturn+1baa/????> 15: 57 push %edi Code; ffffffeb <__kernel_rt_sigreturn+1bab/????> 16: 56 push %esi Code; ffffffec <__kernel_rt_sigreturn+1bac/????> 17: 53 push %ebx Code; ffffffed <__kernel_rt_sigreturn+1bad/????> 18: 83 ec 28 sub $0x28,%esp Code; fffffff0 <__kernel_rt_sigreturn+1bb0/????> 1b: 8b 7c 24 3c mov 0x3c(%esp),%edi Code; fffffff4 <__kernel_rt_sigreturn+1bb4/????> 1f: 31 f6 xor %esi,%esi Code; fffffff6 <__kernel_rt_sigreturn+1bb6/????> 21: b8 00 e0 ff ff mov $0xffffe000,%eax Code; fffffffb <__kernel_rt_sigreturn+1bbb/????> 26: 21 e0 and %esp,%eax Code; fffffffd <__kernel_rt_sigreturn+1bbd/????> 28: ff 40 14 incl 0x14(%eax) Code; 00000000 Before first symbol 2b: 8b 47 28 mov 0x28(%edi),%eax Code; 00000003 Before first symbol 2e: 89 44 24 24 mov %eax,0x24(%esp) Code; 00000007 Before first symbol 32: 8b 5c 24 24 mov 0x24(%esp),%ebx Code; 0000000b Before first symbol 36: 8a 13 mov (%ebx),%dl Code; 0000000d Before first symbol 38: 80 fa 0f cmp $0xf,%dl Code; 00000010 Before first symbol 3b: 0f .byte 0xf Code; 00000011 Before first symbol 3c: 85 d1 test %edx,%ecx Code; 00000013 Before first symbol 3e: 02 00 add (%eax),%al