Oops in 1.3.27

Ulrich Drepper (drepper@ipd.info.uni-karlsruhe.de)
Fri, 15 Sep 1995 15:04:35 +0200


This bugs occurs while booting. It is strange that it don't appear
later.

-- Uli
________---------------------------------------------------------------
\ / Ulrich Drepper / Univ. at Karlsruhe, Germany / CS Dept. / IPD
L\inux/ email: drepper@gnu.ai.mit.edu smail: Rubensstr. 5
\ / drepper@ipd.info.uni-karlsruhe.de 76149 Karlsruhe
\/1.3.27 ------------------------------------------ Germany --------

EIP: 0010:00152bc0
EFLAGS: 00010286
eax: f000ef6f ebx: 00000000 ecx: 01dfe018 edx: 00000006
esi: 01fa61c0 edi: 01d542a0 ebp: 01d44f74 esp: 01d44f1c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pidof (pid: 84, process nr: 9, stackpage=01d44000)
Stack: 01fa61c0 01d44f74 00000000 bffffdf0 00127497 01d542a0 01fa61c0 00000000
00000000 01d44f74 00000000 01d44f74 01d44fb4 0012767b 01d542a0 01fa61c0
00000000 00000000 01d44f74 00000000 01d44fb4 00000001 00000000 01d41009
Call Trace: 00127497 0012767b 00127730 001245c9 0010a449
Code: f6 40 11 10 75 4a 8b 40 1c 85 c0 75 f3 eb 54 90 89 d0 c1 e8
Using `/System.map' to map addresses to symbols.

>>EIP: 152bc0 <proc_follow_link+110/1a0>
Trace: 127497 <follow_link+67/70>
Trace: 12767b <_namei+9b/d0>
Trace: 127730 <namei+30/50>
Trace: 1245c9 <sys_newstat+29/60>
Trace: 10a449 <system_call+59/a0>

Code: 152bc0 <proc_follow_link+110/1a0> testb $0x10,0x11(%eax)
Code: 152bc4 <proc_follow_link+114/1a0> jne 152c10 <proc_follow_link+160/1a0>
Code: 152bc6 <proc_follow_link+116/1a0> movl 0x1c(%eax),%eax
Code: 152bc9 <proc_follow_link+119/1a0> testl %eax,%eax
Code: 152bcb <proc_follow_link+11b/1a0> jne 152bc0 <proc_follow_link+110/1a0>
Code: 152bcd <proc_follow_link+11d/1a0> jmp 152c23 <proc_follow_link+173/1a0>
Code: 152bcf <proc_follow_link+11f/1a0> nop
Code: 152bd0 <proc_follow_link+120/1a0> movl %edx,%eax
Code: 152bd2 <proc_follow_link+122/1a0> shrl $0x0,%eax
Code: 152bd5 <proc_follow_link+125/1a0> nop
Code: 152bd6 <proc_follow_link+126/1a0> nop
Trace: 127497 <follow_link+67/70>

~~~~~~~~~~~~~~~~~~~ fs/proc/link.c @@ proc_follow_link ~~~~~~~~~~~~~~~
case PROC_PID_EXE: {
struct vm_area_struct * vma = p->mm->mmap;
while (vma) {
if (vma->vm_flags & VM_EXECUTABLE) {
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

new_inode = vma->vm_inode;
break;
}
vma = vma->vm_next;
}
break;
}