2.1.35 oops

Harald Evensen (haralde@pvv.ntnu.no)
Wed, 16 Apr 1997 17:30:46 +0200 (MET DST)


Got this oops when running 2.1.35 SMP kernel on a dual ppro.
Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 02ecd000, Lr3 = 02ecd000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c012731a>]
EFLAGS: 00010286
eax: 00000004 ebx: 00000000 ecx: c66043e0 edx: c01e51ac
esi: fffffffc edi: c66043e0 ebp: c785b6c8 esp: c1705e34
ds: 0018 es: 0018 ss: 0018
Process emacs (pid: 4399, process nr: 99, stackpage=c1705000)
Stack: c66043e0 c66043e0 c66043e0 c785b6c8 c66043e0 c012e539 c0152f9a 00000004
c785b6c8 c66043e0 c66043e0 c1705ec8 00000000 c1705f64 fffffff5 00000000
00000000 00000004 c01368a3 c785b6c8 c66043e0 00000000 00008000 c1705ec8
Call Trace:
Code: f7 03 ff 0f 00 00 0f 85 e2 00 00 00 8b 43 08 83 f8 0d 0f 87
Using `/System.map' to map addresses to symbols.

>>EIP: c012731a <kfree+1e/14c>

Code: c012731a <kfree+1e/14c>

Then a bit later I got this one:

Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 04e66000, Lr3 = 04e66000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c012731a>]
EFLAGS: 00010286
eax: 00000004 ebx: 00000000 ecx: c6523000 edx: 00000001
esi: fffffffc edi: c6523000 ebp: c785b6c8 esp: c4dd7e34
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 19006, process nr: 64, stackpage=c4dd7000)
Stack: c6523000 c6523000 c6523000 c785b6c8 c0225230 c65230ac c0152f9a 00000004
c785b6c8 c6523000 c6523000 c4dd7ec8 00000000 c4dd7f64 fffffffb 00000000
00000000 00000004 c01368a3 c785b6c8 c6523000 00000000 00008000 c4dd7ec8
Call Trace:
Code: f7 03 ff 0f 00 00 0f 85 e2 00 00 00 8b 43 08 83 f8 0d 0f 87
nfs_stat_to_errno: bad nfs status return value: 116
Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 01cd2000, Lr3 = 01cd2000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c012731a>]
EFLAGS: 00010286
eax: 00000004 ebx: 00000000 ecx: c6523000 edx: c01e51ac
esi: fffffffc edi: c6523000 ebp: c785b6c8 esp: c1cd3e34
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 3878, process nr: 84, stackpage=c1cd3000)
Stack: c6523000 c6523000 c6523000 c785b6c8 c6523000 c012e539 c0152f9a 00000004
c785b6c8 c6523000 c6523000 c1cd3ec8 00000000 c1cd3f64 fffffffb 00000000
00000000 00000004 c01368a3 c785b6c8 c6523000 00000000 00008000 c1cd3ec8
Call Trace:
Code: f7 03 ff 0f 00 00 0f 85 e2 00 00 00 8b 43 08 83 f8 0d 0f 87
Using `/System.map' to map addresses to symbols.

>>EIP: c012731a <kfree+1e/14c>

Code: c012731a <kfree+1e/14c>
>>EIP: c012731a <kfree+1e/14c>

Code: c012731a <kfree+1e/14c>

regards, Harald