[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#294164: kernel-image-2.6.10-1-386: kernel oops when launching jvm



Package: kernel-image-2.6.10-1-386
Version: 2.6.10-4
Severity: important

I experienced an oops when launching a Java Virtual Machine. I cannot
reproduce this bug since it oopsed only once, it worked when I tried again.
However I have the feeling the kernel should never oops :)

The JVM is the same for months, it never oopsed on a 2.6.8 kernel.
Attached is the ksymoops information.

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i586)
Kernel: Linux 2.6.10-1-386
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)

Versions of packages kernel-image-2.6.10-1-386 depends on:
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities
ii  fileutils                     5.2.1-2    The GNU file management utilities 
ii  initrd-tools                  0.1.77     tools to create initrd image for p
ii  module-init-tools             3.2-pre1-2 tools for managing Linux kernel mo

-- no debconf information
Unable to handle kernel NULL pointer dereference at virtual address 00000055
c0111534
*pde = 00000000
Oops: 0000 [#1]
CPU:    0
EIP:    0060:[do_emu+23/1107]    Not tainted VLI
EFLAGS: 00210202   (2.6.10-1-386) 
eax: c2a36000   ebx: 0000002d   ecx: 0000007b   edx: 00000000
esi: 00000000   edi: 0000002d   ebp: bfff62e0   esp: c2a37f88
ds: 007b   es: 007b   ss: 0068
Stack: bfff600c c2a36000 bfff5f0c ab521a20 c2a36000 c01022ce bfff5fa0 00000000 
       bfff6288 0000002d 0000002d 00000063 c011151d bfff62e0 c0103a9b 0000002d 
       ab506e48 0000002d 00000063 00000001 bfff62e0 00000063 0000007b 0000007b 
Call Trace:
Code: 0f be 02 01 c3 8d 42 01 89 45 00 0f b7 c3 5a 5b 5e 5f 5d c3 55 57 56 53 83 ec 28 8b 7c 24 3c 31 f6 b8 00 e0 ff ff 21 e0 ff 40 14 <8b> 47 28 89 44 24 24 8b 5c 24 24 8a 13 80 fa 0f 0f 85 d1 02 00 
Using defaults from ksymoops -t elf32-i386 -a i386


>>eax; c2a36000 <pg0+26b1000/3fc79400>
>>esp; c2a37f88 <pg0+26b2f88/3fc79400>

Code;  ffffffd5 <__kernel_rt_sigreturn+1b95/????>
00000000 <_EIP>:
Code;  ffffffd5 <__kernel_rt_sigreturn+1b95/????>
   0:   0f be 02                  movsbl (%edx),%eax
Code;  ffffffd8 <__kernel_rt_sigreturn+1b98/????>
   3:   01 c3                     add    %eax,%ebx
Code;  ffffffda <__kernel_rt_sigreturn+1b9a/????>
   5:   8d 42 01                  lea    0x1(%edx),%eax
Code;  ffffffdd <__kernel_rt_sigreturn+1b9d/????>
   8:   89 45 00                  mov    %eax,0x0(%ebp)
Code;  ffffffe0 <__kernel_rt_sigreturn+1ba0/????>
   b:   0f b7 c3                  movzwl %bx,%eax
Code;  ffffffe3 <__kernel_rt_sigreturn+1ba3/????>
   e:   5a                        pop    %edx
Code;  ffffffe4 <__kernel_rt_sigreturn+1ba4/????>
   f:   5b                        pop    %ebx
Code;  ffffffe5 <__kernel_rt_sigreturn+1ba5/????>
  10:   5e                        pop    %esi
Code;  ffffffe6 <__kernel_rt_sigreturn+1ba6/????>
  11:   5f                        pop    %edi
Code;  ffffffe7 <__kernel_rt_sigreturn+1ba7/????>
  12:   5d                        pop    %ebp
Code;  ffffffe8 <__kernel_rt_sigreturn+1ba8/????>
  13:   c3                        ret    
Code;  ffffffe9 <__kernel_rt_sigreturn+1ba9/????>
  14:   55                        push   %ebp
Code;  ffffffea <__kernel_rt_sigreturn+1baa/????>
  15:   57                        push   %edi
Code;  ffffffeb <__kernel_rt_sigreturn+1bab/????>
  16:   56                        push   %esi
Code;  ffffffec <__kernel_rt_sigreturn+1bac/????>
  17:   53                        push   %ebx
Code;  ffffffed <__kernel_rt_sigreturn+1bad/????>
  18:   83 ec 28                  sub    $0x28,%esp
Code;  fffffff0 <__kernel_rt_sigreturn+1bb0/????>
  1b:   8b 7c 24 3c               mov    0x3c(%esp),%edi
Code;  fffffff4 <__kernel_rt_sigreturn+1bb4/????>
  1f:   31 f6                     xor    %esi,%esi
Code;  fffffff6 <__kernel_rt_sigreturn+1bb6/????>
  21:   b8 00 e0 ff ff            mov    $0xffffe000,%eax
Code;  fffffffb <__kernel_rt_sigreturn+1bbb/????>
  26:   21 e0                     and    %esp,%eax
Code;  fffffffd <__kernel_rt_sigreturn+1bbd/????>
  28:   ff 40 14                  incl   0x14(%eax)
Code;  00000000 Before first symbol
  2b:   8b 47 28                  mov    0x28(%edi),%eax
Code;  00000003 Before first symbol
  2e:   89 44 24 24               mov    %eax,0x24(%esp)
Code;  00000007 Before first symbol
  32:   8b 5c 24 24               mov    0x24(%esp),%ebx
Code;  0000000b Before first symbol
  36:   8a 13                     mov    (%ebx),%dl
Code;  0000000d Before first symbol
  38:   80 fa 0f                  cmp    $0xf,%dl
Code;  00000010 Before first symbol
  3b:   0f                        .byte 0xf
Code;  00000011 Before first symbol
  3c:   85 d1                     test   %edx,%ecx
Code;  00000013 Before first symbol
  3e:   02 00                     add    (%eax),%al

Reply to: