Here's an oops I got repeatedly trying to run 2.3.99-pre8.  Reverted
to pre7 for now.  (Please do NOT Cc me when replying to the list.)

Unable to handle kernel NULL pointer dereference at virtual address 00000034
 printing eip:
c014f4e1
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c014f4e1>]
EFLAGS: 00010202
eax: 00000000   ebx: 00000000   ecx: 00000001   edx: c0db5f54
esi: ffff8180   edi: 00000004   ebp: c0db5f24   esp: c0db5ee8
ds: 0018   es: 0018   ss: 0018
Process wdm (pid: 409, stackpage=c0db5000)
Stack: 00000000 c015021a 00000000 00000001 c0db5f54 ffff8180 c0b0cee0 bfffeb2c
       00000001 c0db5f2c 0000000b c0133c98 ffffff86 00005f58 c0b64240 00000000
       00000000 00000000 00000000 c0129f44 c0b0cee0 c0db5f54 c0b64240 ffffffff
Call Trace: [<c015021a>] [<c0133c98>] [<c0129f44>] [<c0134a0d>] [<c0129f9b>] 
[<c011d6b4>] [<c010a383>]
Code: f6 43 34 40 74 09 31 c0 e9 01 01 00 00 89 f6 8b 53 48 85 d2

And the ksymoops output:

ksymoops 2.3.4 on i586 2.4.0-test8.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.0-test8/ (default)
     -m /boot/System.map-2.4.0-test8 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Unable to handle kernel NULL pointer dereference at virtual address 00000034
c014f4e1
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c014f4e1>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 00000000   ebx: 00000000   ecx: 00000001   edx: c0db5f54
esi: ffff8180   edi: 00000004   ebp: c0db5f24   esp: c0db5ee8
ds: 0018   es: 0018   ss: 0018
Process wdm (pid: 409, stackpage=c0db5000)
Stack: 00000000 c015021a 00000000 00000001 c0db5f54 ffff8180 c0b0cee0 bfffeb2c
       00000001 c0db5f2c 0000000b c0133c98 ffffff86 00005f58 c0b64240 00000000
       00000000 00000000 00000000 c0129f44 c0b0cee0 c0db5f54 c0b64240 ffffffff
Call Trace: [<c015021a>] [<c0133c98>] [<c0129f44>] [<c0134a0d>] [<c0129f9b>] 
[<c011d6b4>] [<c010a383>]
Code: f6 43 34 40 74 09 31 c0 e9 01 01 00 00 89 f6 8b 53 48 85 d2

>>EIP; c014f4e1 <check_idq+d/120>   <=====
Trace; c015021a <dquot_transfer+26a/490>
Trace; c0133c98 <cached_lookup+10/54>
Trace; c0129f44 <chown_common+100/124>
Trace; c0134a0d <__user_walk+4d/58>
Trace; c0129f9b <sys_chown+33/48>
Trace; c011d6b4 <sys_chown16+34/38>
Trace; c010a383 <system_call+33/40>
Code;  c014f4e1 <check_idq+d/120>
00000000 <_EIP>:
Code;  c014f4e1 <check_idq+d/120>   <=====
   0:   f6 43 34 40               testb  $0x40,0x34(%ebx)   <=====
Code;  c014f4e5 <check_idq+11/120>
   4:   74 09                     je     f <_EIP+0xf> c014f4f0 <check_idq+1c/120>
Code;  c014f4e7 <check_idq+13/120>
   6:   31 c0                     xor    %eax,%eax
Code;  c014f4e9 <check_idq+15/120>
   8:   e9 01 01 00 00            jmp    10e <_EIP+0x10e> c014f5ef <check_idq+11b/120>
Code;  c014f4ee <check_idq+1a/120>
   d:   89 f6                     mov    %esi,%esi
Code;  c014f4f0 <check_idq+1c/120>
   f:   8b 53 48                  mov    0x48(%ebx),%edx
Code;  c014f4f3 <check_idq+1f/120>
  12:   85 d2                     test   %edx,%edx


1 warning issued.  Results may not be reliable.

-- 
Daniel Schepler              "Please don't disillusion me.  I
[EMAIL PROTECTED]    haven't had breakfast yet."
                                 -- Orson Scott Card
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/

Reply via email to