[1.454380] bug:unable to handle kernel NULL pointer dereference at 00000000000005d0
[1.474020] IP: [<ffffffff8144375b>] dsfw_rx_handle+0x1bb/0x370
[1.487902] PGD 139c25067 PUD 135301067 PMD 0
[1.497467] oops:0000 [#1] SMP
[1.503342] Modules linked in:
[1.508646] cpu:0 pid:3 comm:ksoftirqd/0 not tainted 3.10.52-waf #133
[1.524811] Hardware name:to is filled by O.E.M. To being filled by o.e.m./to is filled by O.E.M., BIOS 4.6.4 01/06/2012
[1.552962] task:ffff88013b0c0ba0 ti:ffff88013b0d4000 task.ti:ffff88013b0d4000
[1.571471] rip:0010:[<ffffffff8144375b>] [<ffffffff8144375b>] dsfw_rx_handle+0x1bb/0x370
[1.592629] rsp:0018:ffff88013b0d5c98 eflags:00010202
[1.604640] Rax:00000000fffffffe rbx:ffff8801353c4d00 RCX:00000000001978FD
[1.622107] rdx:0000000000000043 rsi:ffff88012bb00180 rdi:00000000000005a8
[1.639575] Rbp:00000000000005a8 r08:0000000000016d20 r09:0000000000000000
[1.657043] r10:0000000000000000 r11:ffff88011d1e2e2a r12:0000000000000001
[1.674511] r13:0000000000020063 r14:ffff8801378ea3d0 r15:000000000000003e
[1.691981] fs:0000000000000000 (0000) gs:ffff88013fa00000 (0000) knlgs:0000000000000000
[1.712308] cs:0010 ds:0000 es:0000 cr0:0000000080050033
[1.725618] cr2:00000000000005d0 cr3:00000001353c6000 cr4:00000000000407b0
[1.743085] dr0:0000000000000000 dr1:0000000000000000 dr2:0000000000000000
[1.760553] dr3:0000000000000000 dr6:00000000ffff0ff0 dr7:0000000000000400
[1.778019] Stack:
[1.780151] ffff8801378ea3e0 ffffc90001cc3988 ffff8801353c4d00 ffffffff812b87f6
[1.798609] ffff88013b008900 ffff880137e87d00 ffff880137edc680 ffff88013b0d5d64
[1.817064] ffffc90001cc39b0 0001397200000100 ffff880137edc000 ffffffff814435a0
[1.835520] Call Trace:
[1.838954] [<ffffffff812b87f6>]? E1000e_clean_rx_irq_nff+0x256/0xbc0
[1.854861] [<ffffffff814435a0>]? Dsfw_fif_recv+0x70/0x70
[1.867650] [<ffffffff812b91ce>]? E1000e_poll+0x6e/0x1c0
[1.880179] [<ffffffff81389a68>]? net_rx_action+0x88/0x170
[1.893228] [<ffffffff81037f46>]? __do_softirq+0xd6/0x290
[1.906015] [<ffffffff81038129>]? run_ksoftirqd+0x29/0x40
[1.918806] [<ffffffff810591d3>]? smpboot_thread_fn+0x103/0x190
[1.933156] [<ffffffff810590d0>]? lg_global_unlock+0x60/0x60
[1.946723] [<ffffffff81052088>]? Kthread+0xb8/0xc0
[1.957954] [<ffffffff81051fd0>]? __kthread_parkme+0x80/0x80
[1.971522] [<ffffffff814e121c>]? Ret_from_fork+0x7c/0xb0
[1.984311] [<ffffffff81051fd0>]? __kthread_parkme+0x80/0x80
[1.997877] code:00 98 C1 E0 85 F0 98 9d Bayi F4 98 9d Bayi, Ed, 0f, EB 4d 0f 1f 44 00 00 48 DB-------------<48> 8b 5d E8 6c FD FF FF-C0-E8 8b-d4-xx-F8
[2.053478] RIP [<ffffffff8144375b>] dsfw_rx_handle+0x1bb/0x370
[2.067594] RSP <ffff88013b0d5c98>
[2.074145] Cr2:00000000000005d0
For example
[2.053478] RIP [<ffffffff8144375b>] dsfw_rx_handle+0x1bb/0x370
FFFFFFFF8144375B is the virtual address of the instruction in memory
Dsfw_rx_handle is a function (symbol name)
0x1bb/0x370, 0x370 is the length of the function compiled into machine code, 0X1BB is ffffffff8144375b this instruction in relation to
Offset of the Dsfw_rx_handle function entry
GDB positioning
# GDB Vmlinux
GNU gdb (Ubuntu/linaro 7.4-2012.04-0ubuntu2.1) 7.4-2012.04
Copyright (C) Free Software Foundation, Inc.
License gplv3+: GNU GPL version 3 or later This was free software:you was free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "Show copying"
and "Show warranty" for details.
This GDB is configured as "X86_64-linux-gnu".
For bugs reporting instructions, please see:
Reading symbols From/home/wesley/dvlp/waf/trunk/build/linux-3.10.52/vmlinux...done.
(GDB) L *dsfw_rx_handle+0x1bb/0x370
GDB locates Oops Call trace