Linux-2.0.30 OOPS

Pavel Krauz (kra@elanor.cz)
Wed, 18 Jun 1997 15:08:29 +0200 (MET DST)


Hi all

Today I got these oopses with linux-2.0.30 when I was copying big files
( >20MB ) from NFS mounted disk to vfat partition.

Pavel

Unable to handle kernel NULL pointer dereference at virtual address c0000018
current->tss.cr3 = 008a5000, %cr3 = 008a5000
*pde = 00102067
*pte = 00000027
Oops: 0000
CPU: 0
EIP: 0010:[<00124414>]
EFLAGS: 00010212
eax: 00000000 ebx: 00a4de9c ecx: 001ad89c edx: 001ec728
esi: 00000000 edi: 00a4de9c ebp: 00000200 esp: 00a4de64
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process cp (pid: 289, process nr: 38, stackpage=00a4d000)
Stack: 00a4de9c 00000000 00000200 00008000 00000000 001244cd 00e6e398 00a4de9c
00000200 000618a2 001b0301 00000000 00000200 001b0301 00000002 00000200
00d68898 00000ba3 00124817 00000301 00124946 00000200 000618a2 001bf90c
Call Trace: [<001244cd>] [<00124817>] [<00124946>] [<00159424>] [<0015c94f>]
[<0015ae0b>] [<0012263b>] [<0010a5f5>]
Code: 8b 40 18 89 44 24 10 ff 0f 83 7c 24 10 00 0f 85 38 ff ff ff

Using `/System.map.2.0.30' to map addresses to symbols.

>>EIP: 124414 <find_candidate+d4/f4>
Trace: 1244cd <refill_freelist+99/3b4>
Trace: 124817 <getblk+2f/3a8>
Trace: 124946 <getblk+15e/3a8>
Trace: 159424 <fat_getblk+20/30>
Trace: 15c94f <fat_add_cluster+1d3/2fc>
Trace: 15ae0b <fat_file_write+12b/410>
Trace: 12263b <sys_write+10f/148>
Trace: 10a5f5 <system_call+55/80>

Code: 124414 <find_candidate+d4/f4> movl 0x18(%eax),%eax
Code: 124417 <find_candidate+d7/f4> movl %eax,0x10(%esp,1)
Code: 12441b <find_candidate+db/f4> decl (%edi)
Code: 12441d <find_candidate+dd/f4> cmpl $0x0,0x10(%esp,1)
Code: 124422 <find_candidate+e2/f4> jne ffffff4c <_EIP+ffffff4c>
Code: 124428 <find_candidate+e8/f4>

Unable to handle kernel NULL pointer dereference at virtual address c0000018
current->tss.cr3 = 008bb000, %cr3 = 008bb000
*pde = 00102067
*pte = 00000027
Oops: 0000
CPU: 0
EIP: 0010:[<00124414>]
EFLAGS: 00010212
eax: 00000000 ebx: 008cce9c ecx: 00000000 edx: 001e9b14
esi: 00000000 edi: 008cce9c ebp: 00000200 esp: 008cce64
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process cp (pid: 246, process nr: 31, stackpage=008cc000)
Stack: 008cce9c 00000000 00000200 00008000 00000000 001244cd 00a11418 008cce9c
00000200 0007536b 001b0301 00000000 00000200 001b0301 00000002 00000200
005cbb18 0000006a 00124817 00000301 00124946 00000200 0007536b 001bf90c
Call Trace: [<001244cd>] [<00124817>] [<00124946>] [<00159424>] [<0015c94f>]
[<0015ae0b>] [<0012263b>] [<0010a5f5>]
Code: 8b 40 18 89 44 24 10 ff 0f 83 7c 24 10 00 0f 85 38 ff ff ff

Using `/System.map.2.0.30' to map addresses to symbols.

>>EIP: 124414 <find_candidate+d4/f4>
Trace: 1244cd <refill_freelist+99/3b4>
Trace: 124817 <getblk+2f/3a8>
Trace: 124946 <getblk+15e/3a8>
Trace: 159424 <fat_getblk+20/30>
Trace: 15c94f <fat_add_cluster+1d3/2fc>
Trace: 15ae0b <fat_file_write+12b/410>
Trace: 12263b <sys_write+10f/148>
Trace: 10a5f5 <system_call+55/80>

Code: 124414 <find_candidate+d4/f4> movl 0x18(%eax),%eax
Code: 124417 <find_candidate+d7/f4> movl %eax,0x10(%esp,1)
Code: 12441b <find_candidate+db/f4> decl (%edi)
Code: 12441d <find_candidate+dd/f4> cmpl $0x0,0x10(%esp,1)
Code: 124422 <find_candidate+e2/f4> jne ffffff4c <_EIP+ffffff4c>
Code: 124428 <find_candidate+e8/f4>

general protection: 0000
CPU: 0
EIP: 0010:[<0012436d>]
EFLAGS: 00010202
eax: f000e14c ebx: 0060be9c ecx: 00000000 edx: f000e14c
esi: 00000000 edi: 0060be9c ebp: 00000200 esp: 0060be64
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process cp (pid: 317, process nr: 31, stackpage=0060b000)
Stack: 0060be9c 00000000 00000200 00008000 f000e14c 001244cd 00e66098 0060be9c
00000200 000823b5 001b0301 00000000 00000200 001b0301 00000001 00000200
00159899 000000b4 00124817 00000301 00124946 00000200 000823b5 001bf90c
Call Trace: [<001244cd>] [<00159899>] [<00124817>] [<00124946>] [<00159424>] [<0015c94f>] [<0015ae0b>]
[<01919e00>] [<0012263b>] [<0010a5f5>]
Code: 39 6a 20 74 16 6a 01 8d 44 24 14 50 52 e8 1d 16 00 00 83 c4

Using `/System.map.2.0.30' to map addresses to symbols.

>>EIP: 12436d <find_candidate+2d/f4>
Trace: 1244cd <refill_freelist+99/3b4>
Trace: 159899 <fat_access+341/368>
Trace: 124817 <getblk+2f/3a8>
Trace: 124946 <getblk+15e/3a8>
Trace: 159424 <fat_getblk+20/30>
Trace: 15c94f <fat_add_cluster+1d3/2fc>
Trace: 15ae0b <fat_file_write+12b/410>
Trace: 1919e00
Trace: 12263b <sys_write+10f/148>
Trace: 10a5f5 <system_call+55/80>

Code: 12436d <find_candidate+2d/f4> cmpl %ebp,0x20(%edx)
Code: 124370 <find_candidate+30/f4> je 124388 <find_candidate+48/f4>
Code: 124372 <find_candidate+32/f4> pushl $0x1
Code: 124374 <find_candidate+34/f4> leal 0x14(%esp,1),%eax
Code: 124378 <find_candidate+38/f4> pushl %eax
Code: 124379 <find_candidate+39/f4> pushl %edx
Code: 12437a <find_candidate+3a/f4> call 12599c <try_to_free_buffer>
Code: 12437f <find_candidate+3f/f4> addl $0x0,%esp
Code: 124382 <find_candidate+42/f4> nop
Code: 124383 <find_candidate+43/f4> nop
Code: 124384 <find_candidate+44/f4> nop

general protection: 0000
CPU: 0
EIP: 0010:[<0012436d>]
EFLAGS: 00010202
eax: f000e14c ebx: 00d2fe9c ecx: 00000000 edx: f000e14c
esi: 00000000 edi: 00d2fe9c ebp: 00000200 esp: 00d2fe64
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process cp (pid: 358, process nr: 31, stackpage=00d2f000)
Stack: 00d2fe9c 00000000 00000200 00008000 f000e14c 001244cd 00e5d098 00d2fe9c
00000200 0008c6d7 001b0301 00000000 00000200 001b0301 00000001 00000200
00756118 000005d6 00124817 00000301 00124946 00000200 0008c6d7 001bf90c
Call Trace: [<001244cd>] [<00124817>] [<00124946>] [<00159424>] [<0015c94f>] [<0015ae0b>] [<0012263b>]
[<0010a5f5>]
Code: 39 6a 20 74 16 6a 01 8d 44 24 14 50 52 e8 1d 16 00 00 83 c4

Using `/System.map.2.0.30' to map addresses to symbols.

>>EIP: 12436d <find_candidate+2d/f4>
Trace: 1244cd <refill_freelist+99/3b4>
Trace: 124817 <getblk+2f/3a8>
Trace: 124946 <getblk+15e/3a8>
Trace: 159424 <fat_getblk+20/30>
Trace: 15c94f <fat_add_cluster+1d3/2fc>
Trace: 15ae0b <fat_file_write+12b/410>
Trace: 12263b <sys_write+10f/148>
Trace: 10a5f5 <system_call+55/80>

Code: 12436d <find_candidate+2d/f4> cmpl %ebp,0x20(%edx)
Code: 124370 <find_candidate+30/f4> je 124388 <find_candidate+48/f4>
Code: 124372 <find_candidate+32/f4> pushl $0x1
Code: 124374 <find_candidate+34/f4> leal 0x14(%esp,1),%eax
Code: 124378 <find_candidate+38/f4> pushl %eax
Code: 124379 <find_candidate+39/f4> pushl %edx
Code: 12437a <find_candidate+3a/f4> call 12599c <try_to_free_buffer>
Code: 12437f <find_candidate+3f/f4> addl $0x0,%esp
Code: 124382 <find_candidate+42/f4> nop
Code: 124383 <find_candidate+43/f4> nop
Code: 124384 <find_candidate+44/f4> nop