Hello,

I just bought Linux Mandrake 7.2. The problem described applies to (at
least) the kernel used to boot the installation.
It OCCURS just after the detection of the buses and harddisks:
        hda: ....
        hdc: ....
        hdd: ....
        Unable to handle kernel NULL pointer dereference at virtual address 00000014
[see attached OOPS-TRACE, not absolutely sure this kernel matches this
System.map.]

Kernel version: 2.2.17
Kernel 2.2.14, 2.0, and 2.4-pre7 are known to WORK on my machine. I am
not sure if something was BROKEN in this specific release, or because
of certain options customized by Mandrake (for the installation)?

SYSTEM DESCRIPTION:
 Intel Pentium 133
 Host bridge: VIA Technologies VT 82C585 Apollo VP1/VPX (rev 2)
 48MB RAM
 NE2000 ethernet adapter
I also tried with BIOS safe options (e.g. no power management)

I hope you can point me out where to look for the problem. If you need
more information, please contact me.

Best regards,
-- 
Wouter Verheijen
[EMAIL PROTECTED]

processor       : 0
vendor_id       : GenuineIntel
cpu family      : 5
model           : 2
model name      : Pentium 75 - 200
stepping        : 6
cpu MHz         : 132.875605
fdiv_bug        : no
hlt_bug         : no
sep_bug         : no
f00f_bug        : yes
coma_bug        : no
fpu             : yes
fpu_exception   : yes
cpuid level     : 1
wp              : yes
flags           : fpu vme de pse tsc msr mce cx8
bogomips        : 53.04

ksymoops 0.7c on i586 2.2.14-15mdk.  Options used
     -V (specified)
     -K (specified)
     -L (specified)
     -O (specified)
     -m /boot/System.map-2.2.17-21mdk (specified)

Unable to handle kernel NULL pointer dereference at virtual address 00000014
current->tss.cr3 = 00101000, %cr3 = 00101000
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c0108c59>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010002
eax: 00000000   ebx: 00000202     ecx: fffffff4       edx: fffffe80
esi: 00000004   edi: c02404d8     ebp: c0240498       esp: e2f19ee8
ds: 0018        es: 0018       ss: 0018
Process swapper (pid: 1, process nr: 1, stackpage=c2f19000)
Stack:  c0108c73 fffffff4 0000600a c016c67c fffffff4 0000004b 00000008 c01eea40
               c02404d8 00000000 00000039 00000053 00000001 08181e23 c0181e45 c02404d8
               00000008 c02404d8 00000000 c0240498 00000246 00000021 0053cfd8 c2f152e0
Call Trace: [<c0108c7>] [<c016c67c>] [<c0181e45>] [<c0181ff1>] [<c017d504>] 
[c017ddbf>] [<c0106000>]
        [<c010600>] [<c010615e>] [<c01065f3>]
Code: 8b 40 14 ff d0 83 c4 04 53 9d 5b c3 8d 76 00 53 8b 5c 24 08

>>EIP; c0108c59 <copy_segments+45/98>   <=====
Trace; 0c0108c7 Before first symbol
Trace; c016c67c <tcp_make_synack+100/334>
Trace; c0181e45 <drive_is_flashcard+b5/128>
Trace; c0181ff1 <ide_output_data+29/88>
Trace; c017d504 <unix_dgram_recvmsg+10c/154>
Trace; 0c010600 Before first symbol
Trace; c010615e <do_linuxrc+c6/d4>
Trace; c01065f3 <amd_get_mtrr+17/68>
Code;  c0108c59 <copy_segments+45/98>
00000000 <_EIP>:
Code;  c0108c59 <copy_segments+45/98>   <=====
   0:   8b 40 14                  mov    0x14(%eax),%eax   <=====
Code;  c0108c5c <copy_segments+48/98>
   3:   ff d0                     call   *%eax
Code;  c0108c5e <copy_segments+4a/98>
   5:   83 c4 04                  add    $0x4,%esp
Code;  c0108c61 <copy_segments+4d/98>
   8:   53                        push   %ebx
Code;  c0108c62 <copy_segments+4e/98>
   9:   9d                        popf   
Code;  c0108c63 <copy_segments+4f/98>
   a:   5b                        pop    %ebx
Code;  c0108c64 <copy_segments+50/98>
   b:   c3                        ret    
Code;  c0108c65 <copy_segments+51/98>
   c:   8d 76 00                  lea    0x0(%esi),%esi
Code;  c0108c68 <copy_segments+54/98>
   f:   53                        push   %ebx
Code;  c0108c69 <copy_segments+55/98>
  10:   8b 5c 24 08               mov    0x8(%esp,1),%ebx

Reply via email to