gpm Ugh backtrace

George (greerga@nidhogg.ham.muohio.edu)
Sat, 28 Mar 1998 00:57:47 -0500 (EST)


After switching from X while machine was under moderate load and
immediately trying to move the mouse as soon as the text screen appeared:

Ugh at c0112195

<Oops here was forced for backtrace...mouse is now unusable.> :)

Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 03720000, ^Lr3 = 03720000
*pde = 00000000
Oops: 0002
CPU: 1
EIP: 0010:[<c01121a9>]
EFLAGS: 00010247
eax: 00000001 ebx: 00000001 ecx: c3b2a000 edx: 00000000
esi: 0804e4b3 edi: 0804e4b3 ebp: 00001000 esp: c377be8c
ds: 0018 es: 0018 ss: 0018
Process gpm (pid: 106, process nr: 24, stackpage=c377b000)
Stack: c01a0197 c0112195 c377a000 0804e4b3 c3c92000 00001000 00000000 c377bf14
00000000 c01868fd c010a1b2 c377bec0 00000000 0804e4b3 00000002 0804e4b5
0804e4b3 c3c92000 00001000 00000002 00000018 00000018 ffffffff c019b3e6
Call Trace: [<c01a0197>] [<c0112195>] [<c01868fd>] [<c010a1b2>] [<c019b3e6>] [<c0195369>] [<c01862d2>]
[<c0182075>] [<c0186154>] [<c01298f9>] [<c0181f5c>] [<c010a03a>]
Code: c7 05 00 00 00 00 00 00 00 00 83 c4 08 89 e0 25 00 e0 ff ff
Using `/System.map-2.1.91' to map addresses to symbols.

>>EIP: c01121a9 <do_page_fault+7d/3e4>
Trace: c01a0197 <bad_pmd_string+1b0/35d>
Trace: c0112195 <do_page_fault+69/3e4>
Trace: c01868fd <change_termios+195/1a0>
Trace: c010a1b2 <error_code+32/40>
Trace: c019b3e6 <__generic_copy_from_user+36/40>
Trace: c0195369 <rs_write+119/22c>
Trace: c01862d2 <write_chan+17e/224>
Trace: c0182075 <tty_write+119/170>
Trace: c01862d2 <write_chan+17e/224>
Trace: c01298f9 <sys_write+139/1bc>
Trace: c0182075 <tty_write+119/170>
Trace: c010a03a <system_call+3a/40>
Code: c01121a9 <do_page_fault+7d/3e4>
Code: c01121a9 <do_page_fault+7d/3e4> c7 05 00 00 00 movl $0x0,0x0
Code: c01121ae <do_page_fault+82/3e4> 00 00 00 00 00
Code: c01121b9 <do_page_fault+8d/3e4> 83 c4 08 addl $0x8,%esp
Code: c01121bc <do_page_fault+90/3e4> 89 e0 movl %esp,%eax
Code: c01121be <do_page_fault+92/3e4> 25 00 e0 ff ff andl $0xffffe000,%eax

Obviously, the do_page_fault Oops portion is bogus because I had to force
the oops somewhere and after the sti() looked like a good place.

-George

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu