2.0.34-pre2 and gdb cause oops

Dave Wreski (dave@nic.com)
Thu, 5 Mar 1998 02:05:18 -0500 (EST)


Hi all. I Was using ddd to debug some of my code, and a seemingly
harmless oops appeared via syslog:

Gee, if this is related to the lockups seen recently, do I win the prize?
:)

Unable to handle kernel paging request at virtual address c8216884
current->tss.cr3 = 009ef000, %cr3 = 009ef000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010f20a>]
EFLAGS: 00010212
eax: 08216880 ebx: 009faf9c ecx: 0811002b edx: 00000040
esi: 009fafa0 edi: 00000000 ebp: 00000000 esp: 009faf74
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process gdb (pid: 5207, process nr: 49, stackpage=009fa000)
Stack: 0261a414 009faf9c 0010f266 00000007 00009800 00009000 0261a414 00000001
08216880 009fafa0 0010f87d 0261a414 0261ac0c 00000000 00000007 00000006
00000000 0010a705 00000007 0000145b 00000001 00000000 00000007 00000006
Call Trace: [<0010f266>] [<0010f87d>] [<0010a705>]
Code: 8b 50 04 89 d0 23 44 24 10 39 44 24 14 75 0c c1 ea 0d 89 c8

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 10f20a <check.282+9a/d4>
Trace: 10f266 <safe_wake_up_process+22/f4>
Trace: 10f87d <sys_ptrace+545/6bc>
Trace: 10a705 <system_call+55/7c>

Code: 10f20a <check.282+9a/d4> movl 0x4(%eax),%edx
Code: 10f20d <check.282+9d/d4> movl %edx,%eax
Code: 10f20f <check.282+9f/d4> andl 0x10(%esp,1),%eax
Code: 10f213 <check.282+a3/d4> cmpl %eax,0x14(%esp,1)
Code: 10f217 <check.282+a7/d4> jne 10f225 <check.282+b5/d4>
Code: 10f219 <check.282+a9/d4> shrl $0xd,%edx
Code: 10f21c <check.282+ac/d4> movl %ecx,%eax
Code: 10f21e <check.282+ae/d4>

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu