* Null pointer dereference, mprotect.c, linux-2.4.18
@ 2002-11-08 20:33 Craig Tierney
0 siblings, 0 replies; only message in thread
From: Craig Tierney @ 2002-11-08 20:33 UTC (permalink / raw)
To: linux-mm
I am having a problem on my machines. Occasionally
on a node the kernel will report:
"Unable to handle kernel NULL pointer dereference"
The problem always starts in either sys_mprotect
or mprotect_fixup_start. It happens more on some
nodes than others, but I cannot figure out what
activity might cause it to happen more.
Kernel: 2.4.18 + trond's nfs patches
Node: P4 Xeon 2.2 Ghz 2way SMP
1 GB ram
Myrinet
Ksymoops output:
ksymoops 2.4.5 on i686 2.4.18nfs. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.18nfs/ (default)
-m /boot/System.map-2.4.18nfs (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Nov 8 05:01:00 g0062 kernel: Unable to handle kernel NULL pointer dereference at virtual address 0000000a
Nov 8 05:01:00 g0062 kernel: c013501f
Nov 8 05:01:00 g0062 kernel: *pde = 00000000
Nov 8 05:01:00 g0062 kernel: Oops: 0000
Nov 8 05:01:00 g0062 kernel: CPU: 1
Nov 8 05:01:00 g0062 kernel: EIP: 0010:[mprotect_fixup_start+15/320] Tainted: P
Nov 8 05:01:00 g0062 kernel: EIP: 0010:[<c013501f>] Tainted: P
Using defaults from ksymoops -t elf32-i386 -a i386
Nov 8 05:01:00 g0062 kernel: EFLAGS: 00010296
Nov 8 05:01:00 g0062 kernel: eax: 0000000a ebx: 40000000 ecx: 0000000a edx: f6494730
Nov 8 05:01:00 g0062 kernel: esi: 0000000a edi: 00000016 ebp: f6494730 esp: e0689e5c
Nov 8 05:01:00 g0062 kernel: ds: 0018 es: 0018 ss: 0018
Nov 8 05:01:00 g0062 kernel: Process grep (pid: 4929, stackpage=e0689000)
Nov 8 05:01:00 g0062 kernel: Stack: 00000018 00000018 40000000 0000000a 00000016 f7f26158 c0132b14 f6494730
Nov 8 05:01:00 g0062 kernel: 0000000a f7f26158 00000016 f6494680 f6494730 e9a1fc00 eeabf080 f5fecd80
Nov 8 05:01:00 g0062 kernel: 00000000 e9fdd028 c012e490 f5fecd80 4000a000 00000000 c012dd37 f5fec480
Nov 8 05:01:00 g0062 kernel: Call Trace: [filemap_nopage+196/560] [do_no_page+128/576] [do_wp_page+247/736] [handle_
mm_fault+129/288] [do_page_fault+412/1384]
Nov 8 05:01:00 g0062 kernel: Call Trace: [<c0132b14>] [<c012e490>] [<c012dd37>] [<c012e6d1>] [<c01193dc>]
Nov 8 05:01:00 g0062 kernel: [<c0105ee2>] [<c0119240>] [<c010795c>]
Nov 8 05:01:00 g0062 kernel: Code: 8b 10 89 28 85 d2 74 0c 8b 45 04 39 42 08 0f 84 c5 00 00 00
>>EIP; c013501f <mprotect_fixup_start+f/140> <=====
>>ebx; 40000000 Before first symbol
>>edx; f6494730 <_end+360c05f4/384aeec4>
>>ebp; f6494730 <_end+360c05f4/384aeec4>
>>esp; e0689e5c <_end+202b5d20/384aeec4>
Trace; c0132b14 <filemap_nopage+c4/230>
Trace; c012e490 <do_no_page+80/240>
Trace; c012dd37 <do_wp_page+f7/2e0>
Trace; c012e6d1 <handle_mm_fault+81/120>
Trace; c01193dc <do_page_fault+19c/568>
Trace; c0105ee2 <sys_execve+72/80>
Trace; c0119240 <do_page_fault+0/568>
Trace; c010795c <error_code+34/3c>
Code; c013501f <mprotect_fixup_start+f/140>
00000000 <_EIP>:
Code; c013501f <mprotect_fixup_start+f/140> <=====
0: 8b 10 mov (%eax),%edx <=====
Code; c0135021 <mprotect_fixup_start+11/140>
2: 89 28 mov %ebp,(%eax)
Code; c0135023 <mprotect_fixup_start+13/140>
4: 85 d2 test %edx,%edx
Code; c0135025 <mprotect_fixup_start+15/140>
6: 74 0c je 14 <_EIP+0x14> c0135033 <mprotect_fixup_start+23/140>
Code; c0135027 <mprotect_fixup_start+17/140>
8: 8b 45 04 mov 0x4(%ebp),%eax
Code; c013502a <mprotect_fixup_start+1a/140>
b: 39 42 08 cmp %eax,0x8(%edx)
Code; c013502d <mprotect_fixup_start+1d/140>
e: 0f 84 c5 00 00 00 je d9 <_EIP+0xd9> c01350f8 <mprotect_fixup_start+e8/140>
Nov 8 05:01:00 g0062 kernel: <1>Unable to handle kernel NULL pointer dereference at virtual address 0000007d
Nov 8 05:01:00 g0062 kernel: c0134ce0
Nov 8 05:01:00 g0062 kernel: *pde = 00000000
Nov 8 05:01:00 g0062 kernel: Oops: 0002
Nov 8 05:01:00 g0062 kernel: CPU: 1
Nov 8 05:01:00 g0062 kernel: EIP: 0010:[sys_mprotect+0/608] Tainted: P
Nov 8 05:01:00 g0062 kernel: EIP: 0010:[<c0134ce0>] Tainted: P
Nov 8 05:01:00 g0062 kernel: EFLAGS: 00010287
Nov 8 05:01:00 g0062 kernel: eax: 0000007d ebx: f67a0000 ecx: 00008be8 edx: 00000018
Nov 8 05:01:00 g0062 kernel: esi: 40022000 edi: 00133000 ebp: bfffee44 esp: f67a1fc0
Nov 8 05:01:00 g0062 kernel: ds: 0018 es: 0018 ss: 0018
Nov 8 05:01:00 g0062 kernel: Process which (pid: 4932, stackpage=f67a1000)
Nov 8 05:01:00 g0062 kernel: Stack: c010786b 40155000 00008be8 00000000 40022000 00133000 bfffee44 0000007d
Nov 8 05:01:00 g0062 kernel: 0000002b 0000002b 0000007d 400129d4 00000023 00000206 bfffecb4 0000002b
Nov 8 05:01:00 g0062 kernel: Call Trace: [system_call+51/56]
Nov 8 05:01:00 g0062 kernel: Call Trace: [<c010786b>]
Nov 8 05:01:00 g0062 kernel: Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>>EIP; c0134ce0 <sys_mprotect+0/260> <=====
>>ebx; f67a0000 <_end+363cbec4/384aeec4>
>>ecx; 00008be8 Before first symbol
>>esi; 40022000 Before first symbol
>>edi; 00133000 Before first symbol
>>ebp; bfffee44 Before first symbol
>>esp; f67a1fc0 <_end+363cde84/384aeec4>
Trace; c010786b <system_call+33/38>
Code; c0134ce0 <sys_mprotect+0/260>
00000000 <_EIP>:
Thanks,
Craig
--
Craig Tierney (ctierney@hpti.com)
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2002-11-08 20:33 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2002-11-08 20:33 Null pointer dereference, mprotect.c, linux-2.4.18 Craig Tierney
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox