Bug#294164: kernel-image-2.6.10-1-386: kernel oops when launching jvm
Package: kernel-image-2.6.10-1-386
Version: 2.6.10-4
Severity: important
I experienced an oops when launching a Java Virtual Machine. I cannot
reproduce this bug since it oopsed only once, it worked when I tried again.
However I have the feeling the kernel should never oops :)
The JVM is the same for months, it never oopsed on a 2.6.8 kernel.
Attached is the ksymoops information.
-- System Information:
Debian Release: 3.1
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i586)
Kernel: Linux 2.6.10-1-386
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) (ignored: LC_ALL set to C)
Versions of packages kernel-image-2.6.10-1-386 depends on:
ii coreutils [fileutils] 5.2.1-2 The GNU core utilities
ii fileutils 5.2.1-2 The GNU file management utilities
ii initrd-tools 0.1.77 tools to create initrd image for p
ii module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo
-- no debconf information
Unable to handle kernel NULL pointer dereference at virtual address 00000055
c0111534
*pde = 00000000
Oops: 0000 [#1]
CPU: 0
EIP: 0060:[do_emu+23/1107] Not tainted VLI
EFLAGS: 00210202 (2.6.10-1-386)
eax: c2a36000 ebx: 0000002d ecx: 0000007b edx: 00000000
esi: 00000000 edi: 0000002d ebp: bfff62e0 esp: c2a37f88
ds: 007b es: 007b ss: 0068
Stack: bfff600c c2a36000 bfff5f0c ab521a20 c2a36000 c01022ce bfff5fa0 00000000
bfff6288 0000002d 0000002d 00000063 c011151d bfff62e0 c0103a9b 0000002d
ab506e48 0000002d 00000063 00000001 bfff62e0 00000063 0000007b 0000007b
Call Trace:
Code: 0f be 02 01 c3 8d 42 01 89 45 00 0f b7 c3 5a 5b 5e 5f 5d c3 55 57 56 53 83 ec 28 8b 7c 24 3c 31 f6 b8 00 e0 ff ff 21 e0 ff 40 14 <8b> 47 28 89 44 24 24 8b 5c 24 24 8a 13 80 fa 0f 0f 85 d1 02 00
Using defaults from ksymoops -t elf32-i386 -a i386
>>eax; c2a36000 <pg0+26b1000/3fc79400>
>>esp; c2a37f88 <pg0+26b2f88/3fc79400>
Code; ffffffd5 <__kernel_rt_sigreturn+1b95/????>
00000000 <_EIP>:
Code; ffffffd5 <__kernel_rt_sigreturn+1b95/????>
0: 0f be 02 movsbl (%edx),%eax
Code; ffffffd8 <__kernel_rt_sigreturn+1b98/????>
3: 01 c3 add %eax,%ebx
Code; ffffffda <__kernel_rt_sigreturn+1b9a/????>
5: 8d 42 01 lea 0x1(%edx),%eax
Code; ffffffdd <__kernel_rt_sigreturn+1b9d/????>
8: 89 45 00 mov %eax,0x0(%ebp)
Code; ffffffe0 <__kernel_rt_sigreturn+1ba0/????>
b: 0f b7 c3 movzwl %bx,%eax
Code; ffffffe3 <__kernel_rt_sigreturn+1ba3/????>
e: 5a pop %edx
Code; ffffffe4 <__kernel_rt_sigreturn+1ba4/????>
f: 5b pop %ebx
Code; ffffffe5 <__kernel_rt_sigreturn+1ba5/????>
10: 5e pop %esi
Code; ffffffe6 <__kernel_rt_sigreturn+1ba6/????>
11: 5f pop %edi
Code; ffffffe7 <__kernel_rt_sigreturn+1ba7/????>
12: 5d pop %ebp
Code; ffffffe8 <__kernel_rt_sigreturn+1ba8/????>
13: c3 ret
Code; ffffffe9 <__kernel_rt_sigreturn+1ba9/????>
14: 55 push %ebp
Code; ffffffea <__kernel_rt_sigreturn+1baa/????>
15: 57 push %edi
Code; ffffffeb <__kernel_rt_sigreturn+1bab/????>
16: 56 push %esi
Code; ffffffec <__kernel_rt_sigreturn+1bac/????>
17: 53 push %ebx
Code; ffffffed <__kernel_rt_sigreturn+1bad/????>
18: 83 ec 28 sub $0x28,%esp
Code; fffffff0 <__kernel_rt_sigreturn+1bb0/????>
1b: 8b 7c 24 3c mov 0x3c(%esp),%edi
Code; fffffff4 <__kernel_rt_sigreturn+1bb4/????>
1f: 31 f6 xor %esi,%esi
Code; fffffff6 <__kernel_rt_sigreturn+1bb6/????>
21: b8 00 e0 ff ff mov $0xffffe000,%eax
Code; fffffffb <__kernel_rt_sigreturn+1bbb/????>
26: 21 e0 and %esp,%eax
Code; fffffffd <__kernel_rt_sigreturn+1bbd/????>
28: ff 40 14 incl 0x14(%eax)
Code; 00000000 Before first symbol
2b: 8b 47 28 mov 0x28(%edi),%eax
Code; 00000003 Before first symbol
2e: 89 44 24 24 mov %eax,0x24(%esp)
Code; 00000007 Before first symbol
32: 8b 5c 24 24 mov 0x24(%esp),%ebx
Code; 0000000b Before first symbol
36: 8a 13 mov (%ebx),%dl
Code; 0000000d Before first symbol
38: 80 fa 0f cmp $0xf,%dl
Code; 00000010 Before first symbol
3b: 0f .byte 0xf
Code; 00000011 Before first symbol
3c: 85 d1 test %edx,%ecx
Code; 00000013 Before first symbol
3e: 02 00 add (%eax),%al
Reply to: