X crash/oops with 2.2.4(SMP)

Kevin Fenzi (kevin@scrye.com)
Sun, 28 Mar 1999 21:28:09 -0700 (MST)


Went off to watch a movie, and when I got back my console was stuck in
power save mode. Logging in from the handy laptop, it appears that X
crashed (leaving an oops in the logs) and left my console in a weird
state.

Couldn't do anything to get it back, had to finally reboot (even tho
the machine was up and fine on the net). ;(

Anyhow, hopefully the oops is usefull to someone:

Unable to handle kernel NULL pointer dereference at virtual address 00000021
current->tss.cr3 = 0ef2f000, %cr3 = 0ef2f000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c015ef9e>]
EFLAGS: 00010282
eax: 00000001 ebx: cdd48f20 ecx: 00000000 edx: c4cd489c
esi: ce958000 edi: 0000000b ebp: 00000000 esp: ce959f38
ds: 0018 es: 0018 ss: 0018
Process X (pid: 594, process nr: 55, stackpage=ce959000)
Stack: 00000000 00000000 c01305bf cdd48f20 00000000 00000010 00000004 c8c2cf80
00000000 00000800 00000145 ce958000 7fffffff 00000000 cf8fe000 c0130a1d
0000000e ce959fa8 ce959fa4 ce958000 00000000 00000000 bffffbf0 00003286
Call Trace: [<c01305bf>] [<c0130a1d>] [<c0108c00>]
Code: 8b 40 20 ff d0 83 c4 0c 5b c3 53 8b 5c 24 08 8b 44 24 0c 85

and when run thru ksymoops:

Options used: -V (default)
-o /lib/modules/2.2.4/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /usr/src/linux/System.map (default)
-c 1 (default)

You did not tell me where to find symbol information. I will assume
that the log matches the kernel and modules that are running right now
and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

Unable to handle kernel NULL pointer dereference at virtual address 00000021
current->tss.cr3 = 0ef2f000, %cr3 = 0ef2f000
*pde = 00000000
Oops: 0000
CPU: 1
EIP: 0010:[<c015ef9e>]
EFLAGS: 00010282
eax: 00000001 ebx: cdd48f20 ecx: 00000000 edx: c4cd489c
esi: ce958000 edi: 0000000b ebp: 00000000 esp: ce959f38
ds: 0018 es: 0018 ss: 0018
Process X (pid: 594, process nr: 55, stackpage=ce959000)
Stack: 00000000 00000000 c01305bf cdd48f20 00000000 00000010 00000004 c8c2cf80
00000000 00000800 00000145 ce958000 7fffffff 00000000 cf8fe000 c0130a1d
0000000e ce959fa8 ce959fa4 ce958000 00000000 00000000 bffffbf0 00003286
Call Trace: [<c01305bf>] [<c0130a1d>] [<c0108c00>]
Code: 8b 40 20 ff d0 83 c4 0c 5b c3 53 8b 5c 24 08 8b 44 24 0c 85

>>EIP: c015ef9e <sock_recvmsg_Rsmp_4d289327+2d6/428>
Trace: c01305bf <__pollwait_Rsmp_46c49fee+2a3/da8>
Trace: c0130a1d <__pollwait_Rsmp_46c49fee+701/da8>
Trace: c0108c00 <dump_thread_Rsmp_ae90b20c+1448/3018>
Code: c015ef9e <sock_recvmsg_Rsmp_4d289327+2d6/428> 00000000 <_EIP>: <===
Code: c015ef9e <sock_recvmsg_Rsmp_4d289327+2d6/428> 0: 8b 40 20 movl 0x20(%eax),%eax <===
Code: c015efa1 <sock_recvmsg_Rsmp_4d289327+2d9/428> 3: ff d0 call *%eax
Code: c015efa3 <sock_recvmsg_Rsmp_4d289327+2db/428> 5: 83 c4 0c addl $0xc,%esp
Code: c015efa6 <sock_recvmsg_Rsmp_4d289327+2de/428> 8: 5b popl %ebx
Code: c015efa7 <sock_recvmsg_Rsmp_4d289327+2df/428> 9: c3 ret
Code: c015efa8 <sock_recvmsg_Rsmp_4d289327+2e0/428> a: 53 pushl %ebx
Code: c015efa9 <sock_recvmsg_Rsmp_4d289327+2e1/428> b: 8b 5c 24 08 movl 0x8(%esp,1),%ebx
Code: c015efad <sock_recvmsg_Rsmp_4d289327+2e5/428> f: 8b 44 24 0c movl 0xc(%esp,1),%eax
Code: c015efb1 <sock_recvmsg_Rsmp_4d289327+2e9/428> 13: 85 00 testl %eax,(%eax)

More info on request...

kevin

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/