All of lore.kernel.org
 help / color / mirror / Atom feed
From: Peter Williams <pwil3058@bigpond.net.au>
To: Linux Kernel Mailing List <linux-kernel@vger.kernel.org>
Subject: [2.6.9-rc1-bk14 Oops] In groups_search()
Date: Thu, 09 Sep 2004 10:54:06 +1000	[thread overview]
Message-ID: <413FA9AE.90304@bigpond.net.au> (raw)

[-- Attachment #1: Type: text/plain, Size: 554 bytes --]

This problem also existed in bk12 but not in the base 2.6.9-rc1.  (I 
don't know about other bk versions as I have only tried these two.) It 
is triggered by gdmgreeter and gdm-binary.  System being used is Fedora 
Core 2 on an UP i386 machine.  The system survives the Oops and is still 
usable.

Output from syslog and the results of running ksymoops on that output 
are attached.

Peter
-- 
Peter Williams                                   pwil3058@bigpond.net.au

"Learning, n. The kind of ignorance distinguishing the studious."
  -- Ambrose Bierce

[-- Attachment #2: oops.txt --]
[-- Type: text/plain, Size: 7388 bytes --]

Sep  9 10:01:08 mudlark kernel: Unable to handle kernel paging request at virtual address 0806a64c
Sep  9 10:01:08 mudlark kernel:  printing eip:
Sep  9 10:01:08 mudlark kernel: c0124ac1
Sep  9 10:01:08 mudlark kernel: *pde = 00000000
Sep  9 10:01:08 mudlark kernel: Oops: 0000 [#1]
Sep  9 10:01:08 mudlark kernel: PREEMPT 
Sep  9 10:01:08 mudlark kernel: Modules linked in: tulip ohci_hcd
Sep  9 10:01:08 mudlark kernel: CPU:    0
Sep  9 10:01:08 mudlark kernel: EIP:    0060:[<c0124ac1>]    Not tainted VLI
Sep  9 10:01:08 mudlark kernel: EFLAGS: 00010206   (2.6.9-rc1-bk14) 
Sep  9 10:01:08 mudlark kernel: EIP is at groups_search+0x48/0x6a
Sep  9 10:01:08 mudlark kernel: eax: 0806a640   ebx: 00000006   ecx: 00000003   edx: 00000003
Sep  9 10:01:08 mudlark kernel: esi: 00000000   edi: c1921880   ebp: 00000000   esp: f7339c30
Sep  9 10:01:09 mudlark kernel: ds: 007b   es: 007b   ss: 0068
Sep  9 10:01:09 mudlark kernel: Process gdmgreeter (pid: 2968, threadinfo=f7338000 task=f798f000)
Sep  9 10:01:09 mudlark kernel: Stack: f7338000 00000001 00000004 f79bbf00 c0124caf c1921880 00000000 000081ed 
Sep  9 10:01:09 mudlark kernel:        f633a758 c015a1f7 00000000 00000004 f7338000 f78da700 c015a2c3 f633a758 
Sep  9 10:01:09 mudlark kernel:        00000004 f7338000 f7338000 c0157df4 f633a758 00000004 00000000 00000001 
Sep  9 10:01:09 mudlark kernel: Call Trace:
Sep  9 10:01:09 mudlark kernel:  [<c0124caf>] in_group_p+0x42/0x76
Sep  9 10:01:09 mudlark kernel:  [<c015a1f7>] vfs_permission+0x7a/0x117
Sep  9 10:01:09 mudlark kernel:  [<c015a2c3>] permission+0x2f/0x4b
Sep  9 10:01:09 mudlark kernel:  [<c0157df4>] flush_old_exec+0x30f/0x8cd
Sep  9 10:01:09 mudlark kernel:  [<c01578ed>] kernel_read+0x50/0x5f
Sep  9 10:01:09 mudlark kernel:  [<c01766e9>] load_elf_binary+0x32d/0xc67
Sep  9 10:01:09 mudlark kernel:  [<c01310b2>] generic_file_aio_read+0x5a/0x74
Sep  9 10:01:09 mudlark kernel:  [<c015743d>] copy_strings+0x1da/0x228
Sep  9 10:01:09 mudlark kernel:  [<c01763bc>] load_elf_binary+0x0/0xc67
Sep  9 10:01:09 mudlark kernel:  [<c0158728>] search_binary_handler+0x17a/0x2a8
Sep  9 10:01:09 mudlark kernel:  [<c0158a25>] do_execve+0x1cf/0x247
Sep  9 10:01:09 mudlark kernel:  [<c0102c06>] sys_execve+0x42/0x79
Sep  9 10:01:09 mudlark kernel:  [<c0103f61>] sysenter_past_esp+0x52/0x71
Sep  9 10:01:09 mudlark kernel: Code: 1f 8d 0c 10 d1 f9 83 f9 ff 8d 81 ff 03 00 00 89 cd 0f 4f c1 c1 f8 0a 89 c2 8b 84 87 8c 00 00 00 c1 e2 0a 29 d5 89 ea 8b 6c 24 18 <2b> 2c 90 85 ed 7e 0e 8d 71 01 39 de 7c c0 31 c0 5b 5e 5f 5d c3 
Sep  9 10:01:11 mudlark kernel:  <1>Unable to handle kernel NULL pointer dereference at virtual address 00000e24
Sep  9 10:01:11 mudlark kernel:  printing eip:
Sep  9 10:01:11 mudlark kernel: c0124ac1
Sep  9 10:01:11 mudlark kernel: *pde = 35c28067
Sep  9 10:01:11 mudlark kernel: *pte = 00000000
Sep  9 10:01:11 mudlark kernel: Oops: 0000 [#2]
Sep  9 10:01:11 mudlark kernel: PREEMPT 
Sep  9 10:01:11 mudlark kernel: Modules linked in: tulip ohci_hcd
Sep  9 10:01:11 mudlark kernel: CPU:    0
Sep  9 10:01:11 mudlark kernel: EIP:    0060:[<c0124ac1>]    Not tainted VLI
Sep  9 10:01:11 mudlark kernel: EFLAGS: 00010202   (2.6.9-rc1-bk14) 
Sep  9 10:01:11 mudlark kernel: EIP is at groups_search+0x48/0x6a
Sep  9 10:01:11 mudlark kernel: eax: 00000000   ebx: 00000712   ecx: 00000389   edx: 00000389
Sep  9 10:01:11 mudlark kernel: esi: 00000000   edi: c1921880   ebp: 00000000   esp: f6dcfe60
Sep  9 10:01:11 mudlark kernel: ds: 007b   es: 007b   ss: 0068
Sep  9 10:01:11 mudlark kernel: Process gdm-binary (pid: 3020, threadinfo=f6dce000 task=f798f000)
Sep  9 10:01:11 mudlark kernel: Stack: f6dce000 00000001 f7d01c50 f6dcff60 c0124caf c1921880 00000000 f7876001 
Sep  9 10:01:11 mudlark kernel:        000041ed c015b4b6 00000000 00000000 f78c7000 f78c7000 0000088c f789b300 
Sep  9 10:01:11 mudlark kernel:        00000000 f7d917f0 00000001 f78c7000 00223300 f789b300 00000000 c013f779 
Sep  9 10:01:11 mudlark kernel: Call Trace:
Sep  9 10:01:11 mudlark kernel:  [<c0124caf>] in_group_p+0x42/0x76
Sep  9 10:01:11 mudlark kernel:  [<c015b4b6>] link_path_walk+0xcd5/0xd78
Sep  9 10:01:11 mudlark kernel:  [<c013f779>] handle_mm_fault+0xd6/0x174
Sep  9 10:01:11 mudlark kernel:  [<c015b7d2>] path_lookup+0x80/0x13c
Sep  9 10:01:11 mudlark kernel:  [<c015be78>] open_namei+0x85/0x5f2
Sep  9 10:01:11 mudlark kernel:  [<c014c7eb>] filp_open+0x3e/0x64
Sep  9 10:01:11 mudlark kernel:  [<c014d4a5>] vfs_read+0xc9/0x119
Sep  9 10:01:11 mudlark kernel:  [<c014ca6a>] get_unused_fd+0x37/0xd9
Sep  9 10:01:11 mudlark kernel:  [<c014cbcb>] sys_open+0x49/0x89
Sep  9 10:01:11 mudlark kernel:  [<c0103fb3>] syscall_call+0x7/0xb
Sep  9 10:01:11 mudlark kernel: Code: 1f 8d 0c 10 d1 f9 83 f9 ff 8d 81 ff 03 00 00 89 cd 0f 4f c1 c1 f8 0a 89 c2 8b 84 87 8c 00 00 00 c1 e2 0a 29 d5 89 ea 8b 6c 24 18 <2b> 2c 90 85 ed 7e 0e 8d 71 01 39 de 7c c0 31 c0 5b 5e 5f 5d c3 
Sep  9 10:01:11 mudlark kernel:  <1>Unable to handle kernel NULL pointer dereference at virtual address 00000624
Sep  9 10:01:11 mudlark kernel:  printing eip:
Sep  9 10:01:11 mudlark kernel: c0124ac1
Sep  9 10:01:12 mudlark kernel: *pde = 35c24067
Sep  9 10:01:12 mudlark kernel: *pte = 00000000
Sep  9 10:01:12 mudlark kernel: Oops: 0000 [#3]
Sep  9 10:01:12 mudlark kernel: PREEMPT 
Sep  9 10:01:12 mudlark kernel: Modules linked in: tulip ohci_hcd
Sep  9 10:01:12 mudlark kernel: CPU:    0
Sep  9 10:01:12 mudlark kernel: EIP:    0060:[<c0124ac1>]    Not tainted VLI
Sep  9 10:01:12 mudlark kernel: EFLAGS: 00010202   (2.6.9-rc1-bk14) 
Sep  9 10:01:12 mudlark kernel: EIP is at groups_search+0x48/0x6a
Sep  9 10:01:12 mudlark kernel: eax: 00000000   ebx: 00000312   ecx: 00000189   edx: 00000189
Sep  9 10:01:12 mudlark kernel: esi: 00000000   edi: c1921880   ebp: 00000000   esp: f6dcbe60
Sep  9 10:01:12 mudlark kernel: ds: 007b   es: 007b   ss: 0068
Sep  9 10:01:12 mudlark kernel: Process gdm-binary (pid: 3019, threadinfo=f6dca000 task=f7948aa0)
Sep  9 10:01:12 mudlark kernel: Stack: f6dca000 00000001 f7d01c50 f6dcbf60 c0124caf c1921880 00000000 f7866001 
Sep  9 10:01:12 mudlark kernel:        000041ed c015b4b6 00000000 c16b1620 c013e9a2 c16b1620 00000ca0 f7958800 
Sep  9 10:01:12 mudlark kernel:        c013d673 c16b8480 00000001 f763c000 00328970 f7958800 00000001 c013f7ef 
Sep  9 10:01:12 mudlark kernel: Call Trace:
Sep  9 10:01:12 mudlark kernel:  [<c0124caf>] in_group_p+0x42/0x76
Sep  9 10:01:12 mudlark kernel:  [<c015b4b6>] link_path_walk+0xcd5/0xd78
Sep  9 10:01:12 mudlark kernel:  [<c013e9a2>] do_wp_page+0x2df/0x361
Sep  9 10:01:12 mudlark kernel:  [<c013d673>] pte_alloc_map+0x7c/0x9a
Sep  9 10:01:12 mudlark kernel:  [<c013f7ef>] handle_mm_fault+0x14c/0x174
Sep  9 10:01:12 mudlark kernel:  [<c015b7d2>] path_lookup+0x80/0x13c
Sep  9 10:01:12 mudlark kernel:  [<c015be78>] open_namei+0x85/0x5f2
Sep  9 10:01:12 mudlark kernel:  [<c011a4eb>] do_wait+0x1b7/0x4c6
Sep  9 10:01:12 mudlark kernel:  [<c014c7eb>] filp_open+0x3e/0x64
Sep  9 10:01:12 mudlark kernel:  [<c014ca6a>] get_unused_fd+0x37/0xd9
Sep  9 10:01:12 mudlark kernel:  [<c014cbcb>] sys_open+0x49/0x89
Sep  9 10:01:12 mudlark kernel:  [<c0103f61>] sysenter_past_esp+0x52/0x71
Sep  9 10:01:12 mudlark kernel: Code: 1f 8d 0c 10 d1 f9 83 f9 ff 8d 81 ff 03 00 00 89 cd 0f 4f c1 c1 f8 0a 89 c2 8b 84 87 8c 00 00 00 c1 e2 0a 29 d5 89 ea 8b 6c 24 18 <2b> 2c 90 85 ed 7e 0e 8d 71 01 39 de 7c c0 31 c0 5b 5e 5f 5d c3 

[-- Attachment #3: ksymoops.op.txt --]
[-- Type: text/plain, Size: 15786 bytes --]

ksymoops 2.4.8 on i686 2.6.9-rc1-bk14.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.6.9-rc1-bk14/ (default)
     -m /boot/System.map-2.6.9-rc1-bk14 (specified)

Error (regular_file): read_ksyms stat /proc/ksyms failed
No modules in ksyms, skipping objects
No ksyms, skipping lsmod
Sep  9 10:01:08 mudlark kernel: Unable to handle kernel paging request at virtual address 0806a64c
Sep  9 10:01:08 mudlark kernel: c0124ac1
Sep  9 10:01:08 mudlark kernel: *pde = 00000000
Sep  9 10:01:08 mudlark kernel: Oops: 0000 [#1]
Sep  9 10:01:08 mudlark kernel: CPU:    0
Sep  9 10:01:08 mudlark kernel: EIP:    0060:[<c0124ac1>]    Not tainted VLI
Using defaults from ksymoops -t elf32-i386 -a i386
Sep  9 10:01:08 mudlark kernel: EFLAGS: 00010206   (2.6.9-rc1-bk14) 
Sep  9 10:01:08 mudlark kernel: eax: 0806a640   ebx: 00000006   ecx: 00000003   edx: 00000003
Sep  9 10:01:08 mudlark kernel: esi: 00000000   edi: c1921880   ebp: 00000000   esp: f7339c30
Sep  9 10:01:09 mudlark kernel: ds: 007b   es: 007b   ss: 0068
Sep  9 10:01:09 mudlark kernel: Stack: f7338000 00000001 00000004 f79bbf00 c0124caf c1921880 00000000 000081ed 
Sep  9 10:01:09 mudlark kernel:        f633a758 c015a1f7 00000000 00000004 f7338000 f78da700 c015a2c3 f633a758 
Sep  9 10:01:09 mudlark kernel:        00000004 f7338000 f7338000 c0157df4 f633a758 00000004 00000000 00000001 
Sep  9 10:01:09 mudlark kernel: Call Trace:
Sep  9 10:01:09 mudlark kernel:  [<c0124caf>] in_group_p+0x42/0x76
Sep  9 10:01:09 mudlark kernel:  [<c015a1f7>] vfs_permission+0x7a/0x117
Sep  9 10:01:09 mudlark kernel:  [<c015a2c3>] permission+0x2f/0x4b
Sep  9 10:01:09 mudlark kernel:  [<c0157df4>] flush_old_exec+0x30f/0x8cd
Sep  9 10:01:09 mudlark kernel:  [<c01578ed>] kernel_read+0x50/0x5f
Sep  9 10:01:09 mudlark kernel:  [<c01766e9>] load_elf_binary+0x32d/0xc67
Sep  9 10:01:09 mudlark kernel:  [<c01310b2>] generic_file_aio_read+0x5a/0x74
Sep  9 10:01:09 mudlark kernel:  [<c015743d>] copy_strings+0x1da/0x228
Sep  9 10:01:09 mudlark kernel:  [<c01763bc>] load_elf_binary+0x0/0xc67
Sep  9 10:01:09 mudlark kernel:  [<c0158728>] search_binary_handler+0x17a/0x2a8
Sep  9 10:01:09 mudlark kernel:  [<c0158a25>] do_execve+0x1cf/0x247
Sep  9 10:01:09 mudlark kernel:  [<c0102c06>] sys_execve+0x42/0x79
Sep  9 10:01:09 mudlark kernel:  [<c0103f61>] sysenter_past_esp+0x52/0x71
Sep  9 10:01:09 mudlark kernel: Code: 1f 8d 0c 10 d1 f9 83 f9 ff 8d 81 ff 03 00 00 89 cd 0f 4f c1 c1 f8 0a 89 c2 8b 84 87 8c 00 00 00 c1 e2 0a 29 d5 89 ea 8b 6c 24 18 <2b> 2c 90 85 ed 7e 0e 8d 71 01 39 de 7c c0 31 c0 5b 5e 5f 5d c3 


>>EIP; c0124ac1 <groups_search+48/6a>   <=====

>>edi; c1921880 <pg0+1451880/3fb2e400>
>>esp; f7339c30 <pg0+36e69c30/3fb2e400>

Trace; c0124caf <in_group_p+42/76>
Trace; c015a1f7 <vfs_permission+7a/117>
Trace; c015a2c3 <permission+2f/4b>
Trace; c0157df4 <flush_old_exec+30f/8cd>
Trace; c01578ed <kernel_read+50/5f>
Trace; c01766e9 <load_elf_binary+32d/c67>
Trace; c01310b2 <generic_file_aio_read+5a/74>
Trace; c015743d <copy_strings+1da/228>
Trace; c01763bc <load_elf_binary+0/c67>
Trace; c0158728 <search_binary_handler+17a/2a8>
Trace; c0158a25 <do_execve+1cf/247>
Trace; c0102c06 <sys_execve+42/79>
Trace; c0103f61 <sysenter_past_esp+52/71>

Code;  c0124a96 <groups_search+1d/6a>
00000000 <_EIP>:
Code;  c0124a96 <groups_search+1d/6a>
   0:   1f                        pop    %ds
Code;  c0124a97 <groups_search+1e/6a>
   1:   8d 0c 10                  lea    (%eax,%edx,1),%ecx
Code;  c0124a9a <groups_search+21/6a>
   4:   d1 f9                     sar    %ecx
Code;  c0124a9c <groups_search+23/6a>
   6:   83 f9 ff                  cmp    $0xffffffff,%ecx
Code;  c0124a9f <groups_search+26/6a>
   9:   8d 81 ff 03 00 00         lea    0x3ff(%ecx),%eax
Code;  c0124aa5 <groups_search+2c/6a>
   f:   89 cd                     mov    %ecx,%ebp
Code;  c0124aa7 <groups_search+2e/6a>
  11:   0f 4f c1                  cmovg  %ecx,%eax
Code;  c0124aaa <groups_search+31/6a>
  14:   c1 f8 0a                  sar    $0xa,%eax
Code;  c0124aad <groups_search+34/6a>
  17:   89 c2                     mov    %eax,%edx
Code;  c0124aaf <groups_search+36/6a>
  19:   8b 84 87 8c 00 00 00      mov    0x8c(%edi,%eax,4),%eax
Code;  c0124ab6 <groups_search+3d/6a>
  20:   c1 e2 0a                  shl    $0xa,%edx
Code;  c0124ab9 <groups_search+40/6a>
  23:   29 d5                     sub    %edx,%ebp
Code;  c0124abb <groups_search+42/6a>
  25:   89 ea                     mov    %ebp,%edx
Code;  c0124abd <groups_search+44/6a>
  27:   8b 6c 24 18               mov    0x18(%esp),%ebp
Code;  c0124ac1 <groups_search+48/6a>   <=====
  2b:   2b 2c 90                  sub    (%eax,%edx,4),%ebp   <=====
Code;  c0124ac4 <groups_search+4b/6a>
  2e:   85 ed                     test   %ebp,%ebp
Code;  c0124ac6 <groups_search+4d/6a>
  30:   7e 0e                     jle    40 <_EIP+0x40>
Code;  c0124ac8 <groups_search+4f/6a>
  32:   8d 71 01                  lea    0x1(%ecx),%esi
Code;  c0124acb <groups_search+52/6a>
  35:   39 de                     cmp    %ebx,%esi
Code;  c0124acd <groups_search+54/6a>
  37:   7c c0                     jl     fffffff9 <_EIP+0xfffffff9>
Code;  c0124acf <groups_search+56/6a>
  39:   31 c0                     xor    %eax,%eax
Code;  c0124ad1 <groups_search+58/6a>
  3b:   5b                        pop    %ebx
Code;  c0124ad2 <groups_search+59/6a>
  3c:   5e                        pop    %esi
Code;  c0124ad3 <groups_search+5a/6a>
  3d:   5f                        pop    %edi
Code;  c0124ad4 <groups_search+5b/6a>
  3e:   5d                        pop    %ebp
Code;  c0124ad5 <groups_search+5c/6a>
  3f:   c3                        ret    

Sep  9 10:01:11 mudlark kernel:  <1>Unable to handle kernel NULL pointer dereference at virtual address 00000e24
Sep  9 10:01:11 mudlark kernel: c0124ac1
Sep  9 10:01:11 mudlark kernel: *pde = 35c28067
Sep  9 10:01:11 mudlark kernel: Oops: 0000 [#2]
Sep  9 10:01:11 mudlark kernel: CPU:    0
Sep  9 10:01:11 mudlark kernel: EIP:    0060:[<c0124ac1>]    Not tainted VLI
Sep  9 10:01:11 mudlark kernel: EFLAGS: 00010202   (2.6.9-rc1-bk14) 
Sep  9 10:01:11 mudlark kernel: eax: 00000000   ebx: 00000712   ecx: 00000389   edx: 00000389
Sep  9 10:01:11 mudlark kernel: esi: 00000000   edi: c1921880   ebp: 00000000   esp: f6dcfe60
Sep  9 10:01:11 mudlark kernel: ds: 007b   es: 007b   ss: 0068
Sep  9 10:01:11 mudlark kernel: Stack: f6dce000 00000001 f7d01c50 f6dcff60 c0124caf c1921880 00000000 f7876001 
Sep  9 10:01:11 mudlark kernel:        000041ed c015b4b6 00000000 00000000 f78c7000 f78c7000 0000088c f789b300 
Sep  9 10:01:11 mudlark kernel:        00000000 f7d917f0 00000001 f78c7000 00223300 f789b300 00000000 c013f779 
Sep  9 10:01:11 mudlark kernel: Call Trace:
Sep  9 10:01:11 mudlark kernel:  [<c0124caf>] in_group_p+0x42/0x76
Sep  9 10:01:11 mudlark kernel:  [<c015b4b6>] link_path_walk+0xcd5/0xd78
Sep  9 10:01:11 mudlark kernel:  [<c013f779>] handle_mm_fault+0xd6/0x174
Sep  9 10:01:11 mudlark kernel:  [<c015b7d2>] path_lookup+0x80/0x13c
Sep  9 10:01:11 mudlark kernel:  [<c015be78>] open_namei+0x85/0x5f2
Sep  9 10:01:11 mudlark kernel:  [<c014c7eb>] filp_open+0x3e/0x64
Sep  9 10:01:11 mudlark kernel:  [<c014d4a5>] vfs_read+0xc9/0x119
Sep  9 10:01:11 mudlark kernel:  [<c014ca6a>] get_unused_fd+0x37/0xd9
Sep  9 10:01:11 mudlark kernel:  [<c014cbcb>] sys_open+0x49/0x89
Sep  9 10:01:11 mudlark kernel:  [<c0103fb3>] syscall_call+0x7/0xb
Sep  9 10:01:11 mudlark kernel: Code: 1f 8d 0c 10 d1 f9 83 f9 ff 8d 81 ff 03 00 00 89 cd 0f 4f c1 c1 f8 0a 89 c2 8b 84 87 8c 00 00 00 c1 e2 0a 29 d5 89 ea 8b 6c 24 18 <2b> 2c 90 85 ed 7e 0e 8d 71 01 39 de 7c c0 31 c0 5b 5e 5f 5d c3 


>>EIP; c0124ac1 <groups_search+48/6a>   <=====

>>edi; c1921880 <pg0+1451880/3fb2e400>
>>esp; f6dcfe60 <pg0+368ffe60/3fb2e400>

Trace; c0124caf <in_group_p+42/76>
Trace; c015b4b6 <link_path_walk+cd5/d78>
Trace; c013f779 <handle_mm_fault+d6/174>
Trace; c015b7d2 <path_lookup+80/13c>
Trace; c015be78 <open_namei+85/5f2>
Trace; c014c7eb <filp_open+3e/64>
Trace; c014d4a5 <vfs_read+c9/119>
Trace; c014ca6a <get_unused_fd+37/d9>
Trace; c014cbcb <sys_open+49/89>
Trace; c0103fb3 <syscall_call+7/b>

Code;  c0124a96 <groups_search+1d/6a>
00000000 <_EIP>:
Code;  c0124a96 <groups_search+1d/6a>
   0:   1f                        pop    %ds
Code;  c0124a97 <groups_search+1e/6a>
   1:   8d 0c 10                  lea    (%eax,%edx,1),%ecx
Code;  c0124a9a <groups_search+21/6a>
   4:   d1 f9                     sar    %ecx
Code;  c0124a9c <groups_search+23/6a>
   6:   83 f9 ff                  cmp    $0xffffffff,%ecx
Code;  c0124a9f <groups_search+26/6a>
   9:   8d 81 ff 03 00 00         lea    0x3ff(%ecx),%eax
Code;  c0124aa5 <groups_search+2c/6a>
   f:   89 cd                     mov    %ecx,%ebp
Code;  c0124aa7 <groups_search+2e/6a>
  11:   0f 4f c1                  cmovg  %ecx,%eax
Code;  c0124aaa <groups_search+31/6a>
  14:   c1 f8 0a                  sar    $0xa,%eax
Code;  c0124aad <groups_search+34/6a>
  17:   89 c2                     mov    %eax,%edx
Code;  c0124aaf <groups_search+36/6a>
  19:   8b 84 87 8c 00 00 00      mov    0x8c(%edi,%eax,4),%eax
Code;  c0124ab6 <groups_search+3d/6a>
  20:   c1 e2 0a                  shl    $0xa,%edx
Code;  c0124ab9 <groups_search+40/6a>
  23:   29 d5                     sub    %edx,%ebp
Code;  c0124abb <groups_search+42/6a>
  25:   89 ea                     mov    %ebp,%edx
Code;  c0124abd <groups_search+44/6a>
  27:   8b 6c 24 18               mov    0x18(%esp),%ebp
Code;  c0124ac1 <groups_search+48/6a>   <=====
  2b:   2b 2c 90                  sub    (%eax,%edx,4),%ebp   <=====
Code;  c0124ac4 <groups_search+4b/6a>
  2e:   85 ed                     test   %ebp,%ebp
Code;  c0124ac6 <groups_search+4d/6a>
  30:   7e 0e                     jle    40 <_EIP+0x40>
Code;  c0124ac8 <groups_search+4f/6a>
  32:   8d 71 01                  lea    0x1(%ecx),%esi
Code;  c0124acb <groups_search+52/6a>
  35:   39 de                     cmp    %ebx,%esi
Code;  c0124acd <groups_search+54/6a>
  37:   7c c0                     jl     fffffff9 <_EIP+0xfffffff9>
Code;  c0124acf <groups_search+56/6a>
  39:   31 c0                     xor    %eax,%eax
Code;  c0124ad1 <groups_search+58/6a>
  3b:   5b                        pop    %ebx
Code;  c0124ad2 <groups_search+59/6a>
  3c:   5e                        pop    %esi
Code;  c0124ad3 <groups_search+5a/6a>
  3d:   5f                        pop    %edi
Code;  c0124ad4 <groups_search+5b/6a>
  3e:   5d                        pop    %ebp
Code;  c0124ad5 <groups_search+5c/6a>
  3f:   c3                        ret    

Sep  9 10:01:11 mudlark kernel:  <1>Unable to handle kernel NULL pointer dereference at virtual address 00000624
Sep  9 10:01:11 mudlark kernel: c0124ac1
Sep  9 10:01:12 mudlark kernel: *pde = 35c24067
Sep  9 10:01:12 mudlark kernel: Oops: 0000 [#3]
Sep  9 10:01:12 mudlark kernel: CPU:    0
Sep  9 10:01:12 mudlark kernel: EIP:    0060:[<c0124ac1>]    Not tainted VLI
Sep  9 10:01:12 mudlark kernel: EFLAGS: 00010202   (2.6.9-rc1-bk14) 
Sep  9 10:01:12 mudlark kernel: eax: 00000000   ebx: 00000312   ecx: 00000189   edx: 00000189
Sep  9 10:01:12 mudlark kernel: esi: 00000000   edi: c1921880   ebp: 00000000   esp: f6dcbe60
Sep  9 10:01:12 mudlark kernel: ds: 007b   es: 007b   ss: 0068
Sep  9 10:01:12 mudlark kernel: Stack: f6dca000 00000001 f7d01c50 f6dcbf60 c0124caf c1921880 00000000 f7866001 
Sep  9 10:01:12 mudlark kernel:        000041ed c015b4b6 00000000 c16b1620 c013e9a2 c16b1620 00000ca0 f7958800 
Sep  9 10:01:12 mudlark kernel:        c013d673 c16b8480 00000001 f763c000 00328970 f7958800 00000001 c013f7ef 
Sep  9 10:01:12 mudlark kernel: Call Trace:
Sep  9 10:01:12 mudlark kernel:  [<c0124caf>] in_group_p+0x42/0x76
Sep  9 10:01:12 mudlark kernel:  [<c015b4b6>] link_path_walk+0xcd5/0xd78
Sep  9 10:01:12 mudlark kernel:  [<c013e9a2>] do_wp_page+0x2df/0x361
Sep  9 10:01:12 mudlark kernel:  [<c013d673>] pte_alloc_map+0x7c/0x9a
Sep  9 10:01:12 mudlark kernel:  [<c013f7ef>] handle_mm_fault+0x14c/0x174
Sep  9 10:01:12 mudlark kernel:  [<c015b7d2>] path_lookup+0x80/0x13c
Sep  9 10:01:12 mudlark kernel:  [<c015be78>] open_namei+0x85/0x5f2
Sep  9 10:01:12 mudlark kernel:  [<c011a4eb>] do_wait+0x1b7/0x4c6
Sep  9 10:01:12 mudlark kernel:  [<c014c7eb>] filp_open+0x3e/0x64
Sep  9 10:01:12 mudlark kernel:  [<c014ca6a>] get_unused_fd+0x37/0xd9
Sep  9 10:01:12 mudlark kernel:  [<c014cbcb>] sys_open+0x49/0x89
Sep  9 10:01:12 mudlark kernel:  [<c0103f61>] sysenter_past_esp+0x52/0x71
Sep  9 10:01:12 mudlark kernel: Code: 1f 8d 0c 10 d1 f9 83 f9 ff 8d 81 ff 03 00 00 89 cd 0f 4f c1 c1 f8 0a 89 c2 8b 84 87 8c 00 00 00 c1 e2 0a 29 d5 89 ea 8b 6c 24 18 <2b> 2c 90 85 ed 7e 0e 8d 71 01 39 de 7c c0 31 c0 5b 5e 5f 5d c3 


>>EIP; c0124ac1 <groups_search+48/6a>   <=====

>>edi; c1921880 <pg0+1451880/3fb2e400>
>>esp; f6dcbe60 <pg0+368fbe60/3fb2e400>

Trace; c0124caf <in_group_p+42/76>
Trace; c015b4b6 <link_path_walk+cd5/d78>
Trace; c013e9a2 <do_wp_page+2df/361>
Trace; c013d673 <pte_alloc_map+7c/9a>
Trace; c013f7ef <handle_mm_fault+14c/174>
Trace; c015b7d2 <path_lookup+80/13c>
Trace; c015be78 <open_namei+85/5f2>
Trace; c011a4eb <do_wait+1b7/4c6>
Trace; c014c7eb <filp_open+3e/64>
Trace; c014ca6a <get_unused_fd+37/d9>
Trace; c014cbcb <sys_open+49/89>
Trace; c0103f61 <sysenter_past_esp+52/71>

Code;  c0124a96 <groups_search+1d/6a>
00000000 <_EIP>:
Code;  c0124a96 <groups_search+1d/6a>
   0:   1f                        pop    %ds
Code;  c0124a97 <groups_search+1e/6a>
   1:   8d 0c 10                  lea    (%eax,%edx,1),%ecx
Code;  c0124a9a <groups_search+21/6a>
   4:   d1 f9                     sar    %ecx
Code;  c0124a9c <groups_search+23/6a>
   6:   83 f9 ff                  cmp    $0xffffffff,%ecx
Code;  c0124a9f <groups_search+26/6a>
   9:   8d 81 ff 03 00 00         lea    0x3ff(%ecx),%eax
Code;  c0124aa5 <groups_search+2c/6a>
   f:   89 cd                     mov    %ecx,%ebp
Code;  c0124aa7 <groups_search+2e/6a>
  11:   0f 4f c1                  cmovg  %ecx,%eax
Code;  c0124aaa <groups_search+31/6a>
  14:   c1 f8 0a                  sar    $0xa,%eax
Code;  c0124aad <groups_search+34/6a>
  17:   89 c2                     mov    %eax,%edx
Code;  c0124aaf <groups_search+36/6a>
  19:   8b 84 87 8c 00 00 00      mov    0x8c(%edi,%eax,4),%eax
Code;  c0124ab6 <groups_search+3d/6a>
  20:   c1 e2 0a                  shl    $0xa,%edx
Code;  c0124ab9 <groups_search+40/6a>
  23:   29 d5                     sub    %edx,%ebp
Code;  c0124abb <groups_search+42/6a>
  25:   89 ea                     mov    %ebp,%edx
Code;  c0124abd <groups_search+44/6a>
  27:   8b 6c 24 18               mov    0x18(%esp),%ebp
Code;  c0124ac1 <groups_search+48/6a>   <=====
  2b:   2b 2c 90                  sub    (%eax,%edx,4),%ebp   <=====
Code;  c0124ac4 <groups_search+4b/6a>
  2e:   85 ed                     test   %ebp,%ebp
Code;  c0124ac6 <groups_search+4d/6a>
  30:   7e 0e                     jle    40 <_EIP+0x40>
Code;  c0124ac8 <groups_search+4f/6a>
  32:   8d 71 01                  lea    0x1(%ecx),%esi
Code;  c0124acb <groups_search+52/6a>
  35:   39 de                     cmp    %ebx,%esi
Code;  c0124acd <groups_search+54/6a>
  37:   7c c0                     jl     fffffff9 <_EIP+0xfffffff9>
Code;  c0124acf <groups_search+56/6a>
  39:   31 c0                     xor    %eax,%eax
Code;  c0124ad1 <groups_search+58/6a>
  3b:   5b                        pop    %ebx
Code;  c0124ad2 <groups_search+59/6a>
  3c:   5e                        pop    %esi
Code;  c0124ad3 <groups_search+5a/6a>
  3d:   5f                        pop    %edi
Code;  c0124ad4 <groups_search+5b/6a>
  3e:   5d                        pop    %ebp
Code;  c0124ad5 <groups_search+5c/6a>
  3f:   c3                        ret    


1 error issued.  Results may not be reliable.

             reply	other threads:[~2004-09-09  0:56 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-09-09  0:54 Peter Williams [this message]
2004-09-09  8:06 ` [2.6.9-rc1-bk14 Oops] In groups_search() Andrew Morton
2004-09-09 23:58   ` Peter Williams
2004-09-10  0:14     ` Andrew Morton
2004-09-10  1:53       ` Peter Williams
2004-09-10  3:06         ` Andrew Morton
2004-09-10  5:45           ` Peter Williams
2004-09-10  6:18             ` Andrew Morton
2004-09-10  6:28               ` Peter Williams
2004-09-10  6:37                 ` Tim Hockin
2004-09-10  7:05                   ` Peter Williams
2004-09-10  6:52                 ` Andrew Morton
2004-09-10  7:43                   ` Peter Williams
2004-09-10  7:49                     ` Andrew Morton
2004-09-10  7:54                     ` Andrew Morton
2004-09-10  8:13                       ` Peter Williams
2004-09-10  8:46                         ` Peter Williams
2004-09-10  8:54                           ` Andrew Morton
2004-09-10 10:55                             ` Peter Williams
2004-09-10 13:04                             ` Peter Williams

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=413FA9AE.90304@bigpond.net.au \
    --to=pwil3058@bigpond.net.au \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.