OOps with 2.1.87 and smbd

Dietmar Kling (s_dkling@student.uni-ulm.de)
Wed, 18 Feb 1998 19:10:02 +0100


Hello,

when somebody tries to connect to my samba-server in order to print this oopses do occur
This is a libc6 system

Back to 2.1.84 == fine

Regards
Dietmar

shm_swap_in: id=1 too big. proc mem corrupted
sage repeated 24 times
shm_open: unused id=1 PANIC
Unable to handle kernel NULL pointer dereference at virtual address 00000021
current->tss.cr3 = 003c1000, ^_r3 = 003c1000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c01367b4>]
EFLAGS: 00010286
eax: 000000b6 ebx: c041cb00 ecx: ffffffff edx: c0d9da4c
esi: 00000001 edi: 00019000 ebp: c03c6020 esp: c03f9c88
ds: 0018 es: 0018 ss: 0018
Process smbd (pid: 182, process nr: 35, stackpage=c03f9000)
Stack: c041cb00 400ea000 00019000 c011aab6 c041cb00 c0688000 c03f9db4 c03f8000
c0d8a9a0 c041cb40 c0128b30 c03c6020 c0688000 c03f9db4 c03f9e74 c0d8a9a0
c0128c21 c01f3771 c03f9db4 c03f9e74 c0d8a9a0 c0ffeca0 00000000 c03f8000
Call Trace: [<c011aab6>] [<c0128b30>] [<c0128c21>] [<c01f3771>] [<c01304dd>] [<c0129057>] [<c01292db>]
[<c0129300>] [<c01089ff>] [<c010991e>]
Code: 66 89 41 22 a1 b0 6c 26 c0 89 41 18 66 8b 41 24 89 c7 66 4f
exit_mmap: map count is 2
shm_open: unused id=1 PANIC
Unable to handle kernel NULL pointer dereference at virtual address 00000021
current->tss.cr3 = 003bb000, ^_r3 = 003bb000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c01367b4>]
EFLAGS: 00010286
eax: 000000b7 ebx: c041cb80 ecx: ffffffff edx: c0d9da4c
esi: 00000001 edi: 00019000 ebp: c03c6020 esp: c03f7c88
ds: 0018 es: 0018 ss: 0018
Process smbd (pid: 183, process nr: 35, stackpage=c03f7000)
Stack: c041cb80 400ea000 00019000 c011aab6 c041cb80 c0688000 c03f7db4 c03f6000
c0d8a2e0 c041cbc0 c0128b30 c03c6020 c0688000 c03f7db4 c03f7e74 c0d8a2e0
c0128c21 c01f3771 c03f7db4 c03f7e74 c0d8a2e0 c0ffeca0 00000000 c03f6000
Call Trace: [<c011aab6>] [<c0128b30>] [<c0128c21>] [<c01f3771>] [<c01304dd>] [<c0129057>] [<c01292db>]
[<c0129300>] [<c01089ff>] [<c010991e>]
Code: 66 89 41 22 a1 b0 6c 26 c0 89 41 18 66 8b 41 24 89 c7 66 4f
exit_mmap: map count is 2
shm_open: unused id=1 PANIC
Unable to handle kernel NULL pointer dereference at virtual address 00000021
current->tss.cr3 = 00f41000, ^_r3 = 00f41000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c01367b4>]
EFLAGS: 00010286
eax: 000000bb ebx: c041c9c0 ecx: ffffffff edx: c0d9da4c
esi: 00000001 edi: 00019000 ebp: c0427000 esp: c03f7c88
ds: 0018 es: 0018 ss: 0018
Process smbd (pid: 187, process nr: 35, stackpage=c03f7000)
Stack: c041c9c0 400ea000 00019000 c011aab6 c041c9c0 c0688000 c03f7db4 c03f6000
c0d8abe0 c041ca00 c0128b30 c0427000 c0688000 c03f7db4 c03f7e74 c0d8abe0
c0128c21 c01f3771 c03f7db4 c03f7e74 c0d8abe0 c0ffeca0 00000000 c03f6000
Call Trace: [<c011aab6>] [<c0128b30>] [<c0128c21>] [<c01f3771>] [<c01304dd>] [<c0129057>] [<c01292db>]
[<c0129300>] [<c01089ff>] [<c010991e>]
Code: 66 89 41 22 a1 b0 6c 26 c0 89 41 18 66 8b 41 24 89 c7 66 4f
exit_mmap: map count is 2
Unable to handle kernel NULL pointer dereference at virtual address 00000021
current->tss.cr3 = 00101000, ^_r3 = 00101000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c01367b4>]
EFLAGS: 00010286
eax: 000000b5 ebx: c041c280 ecx: ffffffff edx: c0d9da4c
esi: 00000001 edi: 00019000 ebp: c0feaf60 esp: c0067f6c
ds: 0018 es: 0018 ss: 0018
Process smbd (pid: 181, process nr: 34, stackpage=c0067000)
Stack: c041c280 400ea000 00019000 c011aab6 c041c280 c0feaf60 400cd0cc 00000000
bffffaa0 c041c080 c0112129 c0feaf60 c0066000 c01166df c0feaf60 c0066000
400cd0cc 00000000 bffffaa0 c0116852 00000000 c010991e 00000000 08097ca0
Call Trace: [<c011aab6>] [<c0112129>] [<c01166df>] [<c0116852>] [<c010991e>]
Code: 66 89 41 22 a1 b0 6c 26 c0 89 41 18 66 8b 41 24 89 c7 66 4f

Using `System.map' to map addresses to symbols.

>>EIP: c01367b4 <shm_close+38/6c>
Trace: c011aab6 <exit_mmap+6e/f4>
Trace: c0128b30 <exec_mmap+20/a4>
Trace: c0128c21 <flush_old_exec+6d/230>
Trace: c01f3771 <tvecs+24b1/9aac>
Trace: c01304dd <load_elf_binary+599/c08>
Trace: c0129057 <search_binary_handler+4b/160>
Trace: c01292db <do_execve+16f/1d8>
Trace: c0129300 <do_execve+194/1d8>
Trace: c01089ff <sys_execve+2f/48>
Trace: c010991e <system_call+3a/40>
Code: c01367b4 <shm_close+38/6c>
Code: c01367b4 <shm_close+38/6c> 66 89 41 22 movw %ax,0x22(%ecx)
Code: c01367b8 <shm_close+3c/6c> a1 b0 6c 26 c0 movl 0xc0266cb0,%eax
Code: c01367bd <shm_close+41/6c> 89 41 18 movl %eax,0x18(%ecx)
Code: c01367c6 <shm_close+4a/6c> 66 8b 41 24 movw 0x24(%ecx),%ax
Code: c01367ca <shm_close+4e/6c> 89 c7 movl %eax,%edi
Code: c01367cc <shm_close+50/6c> 66 4f decw %di
>>EIP: c01367b4 <shm_close+38/6c>
Trace: c011aab6 <exit_mmap+6e/f4>
Trace: c0128b30 <exec_mmap+20/a4>
Trace: c0128c21 <flush_old_exec+6d/230>
Trace: c01f3771 <tvecs+24b1/9aac>
Trace: c01304dd <load_elf_binary+599/c08>
Trace: c0129057 <search_binary_handler+4b/160>
Trace: c01292db <do_execve+16f/1d8>
Trace: c0129300 <do_execve+194/1d8>
Trace: c01089ff <sys_execve+2f/48>
Trace: c010991e <system_call+3a/40>
Code: c01367b4 <shm_close+38/6c>
Code: c01367b4 <shm_close+38/6c> 66 89 41 22 movw %ax,0x22(%ecx)
Code: c01367b8 <shm_close+3c/6c> a1 b0 6c 26 c0 movl 0xc0266cb0,%eax
Code: c01367bd <shm_close+41/6c> 89 41 18 movl %eax,0x18(%ecx)
Code: c01367c6 <shm_close+4a/6c> 66 8b 41 24 movw 0x24(%ecx),%ax
Code: c01367ca <shm_close+4e/6c> 89 c7 movl %eax,%edi
Code: c01367cc <shm_close+50/6c> 66 4f decw %di
>>EIP: c01367b4 <shm_close+38/6c>
Trace: c011aab6 <exit_mmap+6e/f4>
Trace: c0128b30 <exec_mmap+20/a4>
Trace: c0128c21 <flush_old_exec+6d/230>
Trace: c01f3771 <tvecs+24b1/9aac>
Trace: c01304dd <load_elf_binary+599/c08>
Trace: c0129057 <search_binary_handler+4b/160>
Trace: c01292db <do_execve+16f/1d8>
Trace: c0129300 <do_execve+194/1d8>
Trace: c01089ff <sys_execve+2f/48>
Trace: c010991e <system_call+3a/40>
Code: c01367b4 <shm_close+38/6c>
Code: c01367b4 <shm_close+38/6c> 66 89 41 22 movw %ax,0x22(%ecx)
Code: c01367b8 <shm_close+3c/6c> a1 b0 6c 26 c0 movl 0xc0266cb0,%eax
Code: c01367bd <shm_close+41/6c> 89 41 18 movl %eax,0x18(%ecx)
Code: c01367c6 <shm_close+4a/6c> 66 8b 41 24 movw 0x24(%ecx),%ax
Code: c01367ca <shm_close+4e/6c> 89 c7 movl %eax,%edi
Code: c01367cc <shm_close+50/6c> 66 4f decw %di
>>EIP: c01367b4 <shm_close+38/6c>
Trace: c011aab6 <exit_mmap+6e/f4>
Trace: c0112129 <mmput+19/30>
Trace: c01166df <do_exit+a7/20c>
Trace: c0116852 <sys_exit+e/10>
Trace: c010991e <system_call+3a/40>
Code: c01367b4 <shm_close+38/6c>
Code: c01367b4 <shm_close+38/6c> 66 89 41 22 movw %ax,0x22(%ecx)
Code: c01367b8 <shm_close+3c/6c> a1 b0 6c 26 c0 movl 0xc0266cb0,%eax
Code: c01367bd <shm_close+41/6c> 89 41 18 movl %eax,0x18(%ecx)
Code: c01367c6 <shm_close+4a/6c> 66 8b 41 24 movw 0x24(%ecx),%ax
Code: c01367ca <shm_close+4e/6c> 89 c7 movl %eax,%edi
Code: c01367cc <shm_close+50/6c> 66 4f decw %di

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu