From: Nicholas H. <he...@se...> - 2002-10-17 15:38:35
|
I can cause a node to oops everytime with the attached script. I am running bproc-3.2.0 on 2.4.18, with the procfs locking patch. Here is the oops fed through ksymoops after rebooting. Unable to handle kernel NULL pointer dereference at virtual address 00000010 *pde = 00000000 OOps: ---- CPU: 0 EIP: 0010:[<e095357f>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010202 Process ps (pid: 788, stackpage=de02b000) Call Trace: [<c015c410>] [<c01343e1>] [<c015a593>] [<c013b1f6>] [<c010734b>] Code: 8b 40 10 c3 90 8b 82 94 00 00 00 8b 40 7c c3 89 f6 f6 50 20 >>EIP; e095357f <[bproc]send_recv_process+ff/145> <===== Trace; c015c410 <proc_pid_status+110/3f0> Trace; c01343e1 <__alloc_pages+41/180> Trace; c015a593 <proc_info_read+63/120> Trace; c013b1f6 <sys_read+96/120> Trace; c010734b <system_call+33/38> Code; e095357f <[bproc]send_recv_process+ff/145> 00000000 <_EIP>: Code; e095357f <[bproc]send_recv_process+ff/145> <===== 0: 8b 40 10 mov 0x10(%eax),%eax <===== Code; e0953582 <[bproc]send_recv_process+102/145> 3: c3 ret Code; e0953583 <[bproc]send_recv_process+103/145> 4: 90 nop Code; e0953584 <[bproc]send_recv_process+104/145> 5: 8b 82 94 00 00 00 mov 0x94(%edx),%eax Code; e095358a <[bproc]send_recv_process+10a/145> b: 8b 40 7c mov 0x7c(%eax),%eax Code; e095358d <[bproc]send_recv_process+10d/145> e: c3 ret Code; e095358e <[bproc]send_recv_process+10e/145> f: 89 f6 mov %esi,%esi Code; e0953590 <[bproc]send_recv_process+110/145> 11: f6 50 20 notb 0x20(%eax) Nic -- Nicholas Henke Linux Cluster Systems Programmer he...@se... - 215.573.8149 |