Dave Kleikamp wrote:
On Monday 13 January 2003 02:30, Francesc Guasch wrote:
I also noticed it cores when it
Could you please run this through ksymoops?
It was easier than I thought, sorry for being so late.
I attach the output.
hope this helps.
--
frankie
No modules in ksyms, skipping objects
Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file?
Jan 17 16:14:08 barraxova kernel: Unable to handle kernel NULL pointer dereferenJan 17
16:14:08 barraxova kernel: c0148f41
Jan 17 16:14:08 barraxova kernel: *pde = 00000000
Jan 17 16:14:08 barraxova kernel: Oops: 0000
Jan 17 16:14:08 barraxova kernel: CPU: 0
Jan 17 16:14:08 barraxova kernel: EIP: 0010:[<c0148f41>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Jan 17 16:14:08 barraxova kernel: EFLAGS: 00010246
Jan 17 16:14:08 barraxova kernel: eax: 00000000 ebx: c735fc80 ecx: 00000000
Jan 17 16:14:08 barraxova kernel: esi: c735fc80 edi: 00000000 ebp: c735fc80
Jan 17 16:14:08 barraxova kernel: ds: 0018 es: 0018 ss: 0018
Jan 17 16:14:08 barraxova kernel: Process mount (pid: 1372, stackpage=c84a1000)
Jan 17 16:14:08 barraxova kernel: Stack: c735fc80 c014a2f0 c735fc80 ce5ea200 ca340c00
c735fc80 c019bd7a c735fc80
Jan 17 16:14:08 barraxova kernel: 00001601 c02a4fa8 00001601 00001601 c029c530
ca340c00 c029c530 00000000
Jan 17 16:14:08 barraxova kernel: c013c51d ca340c00 00000000 00000000 00001601
c197c280 c0113ae6 00000282
Jan 17 16:14:08 barraxova kernel: Call Trace: [<c014a2f0>] (0xc84a1e3c))
Jan 17 16:14:08 barraxova kernel: [<c019bd7a>] (0xc84a1e50))
Jan 17 16:14:08 barraxova kernel: [<c013c51d>] (0xc84a1e78))
Jan 17 16:14:08 barraxova kernel: [<c0113ae6>] (0xc84a1e90))
Jan 17 16:14:08 barraxova kernel: [<c013c6fc>] (0xc84a1ee0))
Jan 17 16:14:08 barraxova kernel: [<c011b7b4>] (0xc84a1ef4))
Jan 17 16:14:08 barraxova kernel: [<c014c266>] (0xc84a1f14))
Jan 17 16:14:08 barraxova kernel: [<c014c51b>] (0xc84a1f44))
Jan 17 16:14:08 barraxova kernel: [<c014c37c>] (0xc84a1f80))
Jan 17 16:14:08 barraxova kernel: [<c014c89c>] (0xc84a1f94))
Jan 17 16:14:08 barraxova kernel: [<c010880b>] (0xc84a1fc0))
Jan 17 16:14:08 barraxova kernel: Code: 8b 40 04 85 c0 74 08 53 ff d0 59 eb 11 8Error
(Oops_code_values): invalid value 0x8 in Code line, must be 2, 4, 8 or 16
digits, value ignored
>>EIP; c0148f41 <destroy_inode+21/50> <=====
Trace; c014a2f0 <iput+190/1a0>
Trace; c019bd7a <jfs_read_super+26a/2a0>
Trace; c013c51d <get_sb_bdev+1ed/260>
Trace; c0113ae6 <do_page_fault+256/45b>
Trace; c013c6fc <do_kern_mount+5c/110>
Trace; c011b7b4 <tasklet_hi_action+44/70>
Trace; c014c266 <do_add_mount+76/140>
Trace; c014c51b <do_mount+14b/170>
Trace; c014c37c <copy_mount_options+4c/a0>
Trace; c014c89c <sys_mount+7c/c0>
Trace; c010880b <system_call+33/38>
Code; c0148f41 <destroy_inode+21/50>
00000000 <_EIP>:
Code; c0148f41 <destroy_inode+21/50> <=====
0: 8b 40 04 mov 0x4(%eax),%eax <=====
Code; c0148f44 <destroy_inode+24/50>
3: 85 c0 test %eax,%eax
Code; c0148f46 <destroy_inode+26/50>
5: 74 08 je f <_EIP+0xf> c0148f50 <destroy_inode+30/50>
Code; c0148f48 <destroy_inode+28/50>
7: 53 push %ebx
Code; c0148f49 <destroy_inode+29/50>
8: ff d0 call *%eax
Code; c0148f4b <destroy_inode+2b/50>
a: 59 pop %ecx
Code; c0148f4c <destroy_inode+2c/50>
b: eb 11 jmp 1e <_EIP+0x1e> c0148f5f <destroy_inode+3f/50>