Dave Kleikamp wrote:
On Monday 13 January 2003 02:30, Francesc Guasch wrote:

I also noticed it cores when it

Could you please run this through ksymoops?
It was easier than I thought, sorry for being so late.
I attach the output.

hope this helps.

--
frankie
No modules in ksyms, skipping objects
Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file?
Jan 17 16:14:08 barraxova kernel: Unable to handle kernel NULL pointer dereferenJan 17 
16:14:08 barraxova kernel: c0148f41
Jan 17 16:14:08 barraxova kernel: *pde = 00000000
Jan 17 16:14:08 barraxova kernel: Oops: 0000
Jan 17 16:14:08 barraxova kernel: CPU:    0
Jan 17 16:14:08 barraxova kernel: EIP:    0010:[<c0148f41>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Jan 17 16:14:08 barraxova kernel: EFLAGS: 00010246
Jan 17 16:14:08 barraxova kernel: eax: 00000000   ebx: c735fc80   ecx: 00000000
Jan 17 16:14:08 barraxova kernel: esi: c735fc80   edi: 00000000   ebp: c735fc80
Jan 17 16:14:08 barraxova kernel: ds: 0018   es: 0018   ss: 0018
Jan 17 16:14:08 barraxova kernel: Process mount (pid: 1372, stackpage=c84a1000)
Jan 17 16:14:08 barraxova kernel: Stack: c735fc80 c014a2f0 c735fc80 ce5ea200 ca340c00 
c735fc80 c019bd7a c735fc80
Jan 17 16:14:08 barraxova kernel:        00001601 c02a4fa8 00001601 00001601 c029c530 
ca340c00 c029c530 00000000
Jan 17 16:14:08 barraxova kernel:        c013c51d ca340c00 00000000 00000000 00001601 
c197c280 c0113ae6 00000282
Jan 17 16:14:08 barraxova kernel: Call Trace: [<c014a2f0>]  (0xc84a1e3c))
Jan 17 16:14:08 barraxova kernel: [<c019bd7a>]  (0xc84a1e50))
Jan 17 16:14:08 barraxova kernel: [<c013c51d>]  (0xc84a1e78))
Jan 17 16:14:08 barraxova kernel: [<c0113ae6>]  (0xc84a1e90))
Jan 17 16:14:08 barraxova kernel: [<c013c6fc>]  (0xc84a1ee0))
Jan 17 16:14:08 barraxova kernel: [<c011b7b4>]  (0xc84a1ef4))
Jan 17 16:14:08 barraxova kernel: [<c014c266>]  (0xc84a1f14))
Jan 17 16:14:08 barraxova kernel: [<c014c51b>]  (0xc84a1f44))
Jan 17 16:14:08 barraxova kernel: [<c014c37c>]  (0xc84a1f80))
Jan 17 16:14:08 barraxova kernel: [<c014c89c>]  (0xc84a1f94))
Jan 17 16:14:08 barraxova kernel: [<c010880b>]  (0xc84a1fc0))
Jan 17 16:14:08 barraxova kernel: Code: 8b 40 04 85 c0 74 08 53 ff d0 59 eb 11 8Error 
(Oops_code_values): invalid value 0x8 in Code line, must be 2, 4, 8 or 16
digits, value ignored


>>EIP; c0148f41 <destroy_inode+21/50>   <=====

Trace; c014a2f0 <iput+190/1a0>
Trace; c019bd7a <jfs_read_super+26a/2a0>
Trace; c013c51d <get_sb_bdev+1ed/260>
Trace; c0113ae6 <do_page_fault+256/45b>
Trace; c013c6fc <do_kern_mount+5c/110>
Trace; c011b7b4 <tasklet_hi_action+44/70>
Trace; c014c266 <do_add_mount+76/140>
Trace; c014c51b <do_mount+14b/170>
Trace; c014c37c <copy_mount_options+4c/a0>
Trace; c014c89c <sys_mount+7c/c0>
Trace; c010880b <system_call+33/38>

Code;  c0148f41 <destroy_inode+21/50>
00000000 <_EIP>:
Code;  c0148f41 <destroy_inode+21/50>   <=====
   0:   8b 40 04                  mov    0x4(%eax),%eax   <=====
Code;  c0148f44 <destroy_inode+24/50>
   3:   85 c0                     test   %eax,%eax
Code;  c0148f46 <destroy_inode+26/50>
   5:   74 08                     je     f <_EIP+0xf> c0148f50 <destroy_inode+30/50>
Code;  c0148f48 <destroy_inode+28/50>
   7:   53                        push   %ebx
Code;  c0148f49 <destroy_inode+29/50>
   8:   ff d0                     call   *%eax
Code;  c0148f4b <destroy_inode+2b/50>
   a:   59                        pop    %ecx
Code;  c0148f4c <destroy_inode+2c/50>
   b:   eb 11                     jmp    1e <_EIP+0x1e> c0148f5f <destroy_inode+3f/50>

Reply via email to