On Wed, Jul 04, 2012 at 01:47:56AM +0300, Sami Liedes wrote: > I've seen this before: An overly long "Modules linked in:" line causes > a large gap in netconsole output.
I managed to capture the entire output using netconsole by modifying the kernel to not output the list of modules. Sami ------------------------------------------------------------ [ 125.827919] netpoll: netconsole: local port 4444 [ 125.827946] netpoll: netconsole: local IP 192.168.1.2 [ 125.827969] netpoll: netconsole: interface 'eth0' [ 125.827990] netpoll: netconsole: remote port 1194 [ 125.828011] netpoll: netconsole: remote IP 192.168.1.73 [ 125.828034] netpoll: netconsole: remote ethernet address 00:1c:10:44:47:2c [ 125.828169] console [netcon0] enabled [ 125.828193] netconsole: network logging started [ 247.787472] ------------[ cut here ]------------ [ 247.787536] WARNING: at fs/btrfs/extent_io.c:4522 read_extent_buffer+0xe6/0x110 [btrfs]() [ 247.787573] Hardware name: System Product Name [ 247.787594] Modules linked in: <omitted> [last unloaded: scsi_wait_scan] [ 247.787632] Pid: 1146, comm: btrfs-endio-met Tainted: G W 3.4.4-modded-oops+ #1 [ 247.787674] Call Trace: [ 247.787692] [<ffffffff8103905a>] warn_slowpath_common+0x7a/0xb0 [ 247.787794] [<ffffffff810390a5>] warn_slowpath_null+0x15/0x20 [ 247.787835] [<ffffffffa01d7d86>] read_extent_buffer+0xe6/0x110 [btrfs] [ 247.787877] [<ffffffffa01cf03d>] btrfs_node_key+0x1d/0x20 [btrfs] [ 247.787917] [<ffffffffa02054d0>] __readahead_hook.isra.5+0x3c0/0x420 [btrfs] [ 247.787959] [<ffffffffa020585f>] btree_readahead_hook+0x1f/0x40 [btrfs] [ 247.787999] [<ffffffffa01ab841>] btree_readpage_end_io_hook+0x111/0x260 [btrfs] [ 247.788043] [<ffffffffa01d3442>] ? find_first_extent_bit_state+0x22/0x80 [btrfs] [ 247.788087] [<ffffffffa01d408b>] end_bio_extent_readpage+0xcb/0xa30 [btrfs] [ 247.788129] [<ffffffffa01aae61>] ? end_workqueue_fn+0x31/0x50 [btrfs] [ 247.788161] [<ffffffff81158988>] bio_endio+0x18/0x30 [ 247.788194] [<ffffffffa01aae6c>] end_workqueue_fn+0x3c/0x50 [btrfs] [ 247.788234] [<ffffffffa01e1847>] worker_loop+0x157/0x560 [btrfs] [ 247.788272] [<ffffffffa01e16f0>] ? btrfs_queue_worker+0x310/0x310 [btrfs] [ 247.788306] [<ffffffff81058e5e>] kthread+0x8e/0xa0 [ 247.788332] [<ffffffff81419064>] kernel_thread_helper+0x4/0x10 [ 247.788360] [<ffffffff81058dd0>] ? flush_kthread_worker+0x70/0x70 [ 247.788389] [<ffffffff81419060>] ? gs_change+0x13/0x13 [ 247.788413] ---[ end trace e93713a9d40cd06e ]--- [ 247.788444] general protection fault: 0000 [#1] SMP [ 247.788473] CPU 5 [ 247.788484] Modules linked in: <omitted> [last unloaded: scsi_wait_scan] [ 247.788523] [ 247.788533] Pid: 1146, comm: btrfs-endio-met Tainted: G W 3.4.4-modded-oops+ #1 System manufacturer System Product Name/P8P67 EVO [ 247.788595] RIP: 0010:[<ffffffff811e83ed>] [<ffffffff811e83ed>] memcpy+0xd/0x110 [ 247.788632] RSP: 0000:ffff8802152f3ba8 EFLAGS: 00010202 [ 247.788656] RAX: ffff8802152f3c8f RBX: 0000000000000011 RCX: 0000000000000002 [ 247.788687] RDX: 0000000000000001 RSI: 0005080000000003 RDI: ffff8802152f3c8f [ 247.788719] RBP: ffff8802152f3bf0 R08: 0000000000000000 R09: 0000000000000000 [ 247.788750] R10: ffff880207dd89c0 R11: ffff8801f3a90780 R12: ffff8802152f3ca0 [ 247.788782] R13: ffff8801c1d5b830 R14: 0000000000000048 R15: 0000000000000011 [ 247.788814] FS: 0000000000000000(0000) GS:ffff88021ed40000(0000) knlGS:0000000000000000 [ 247.788850] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 247.788876] CR2: 00000000038942a0 CR3: 00000001c26ce000 CR4: 00000000000407e0 [ 247.788907] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 247.788939] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 247.788971] Process btrfs-endio-met (pid: 1146, threadinfo ffff8802152f2000, task ffff8801f4192ca0) [ 247.789009] Stack: [ 247.789021] ffffffffa01d7d5b ffff8802010b7000 0000000000008003 0000000000001000 [ 247.789066] ffff8802152f3c58 00000000000003dd ffff88021032fa20 ffff8802152f3c58 [ 247.789112] 6669646e65230a29 ffff8802152f3c00 ffffffffa01cf03d ffff8802152f3cd0 [ 247.789157] Call Trace: [ 247.789184] [<ffffffffa01d7d5b>] ? read_extent_buffer+0xbb/0x110 [btrfs] [ 247.789226] [<ffffffffa01cf03d>] btrfs_node_key+0x1d/0x20 [btrfs] [ 247.789265] [<ffffffffa02054d0>] __readahead_hook.isra.5+0x3c0/0x420 [btrfs] [ 247.789308] [<ffffffffa020585f>] btree_readahead_hook+0x1f/0x40 [btrfs] [ 247.789348] [<ffffffffa01ab841>] btree_readpage_end_io_hook+0x111/0x260 [btrfs] [ 247.789391] [<ffffffffa01d3442>] ? find_first_extent_bit_state+0x22/0x80 [btrfs] [ 247.789434] [<ffffffffa01d408b>] end_bio_extent_readpage+0xcb/0xa30 [btrfs] [ 247.789475] [<ffffffffa01aae61>] ? end_workqueue_fn+0x31/0x50 [btrfs] [ 247.789506] [<ffffffff81158988>] bio_endio+0x18/0x30 [ 247.789539] [<ffffffffa01aae6c>] end_workqueue_fn+0x3c/0x50 [btrfs] [ 247.789578] [<ffffffffa01e1847>] worker_loop+0x157/0x560 [btrfs] [ 247.789616] [<ffffffffa01e16f0>] ? btrfs_queue_worker+0x310/0x310 [btrfs] [ 247.789648] [<ffffffff81058e5e>] kthread+0x8e/0xa0 [ 247.789672] [<ffffffff81419064>] kernel_thread_helper+0x4/0x10 [ 247.789700] [<ffffffff81058dd0>] ? flush_kthread_worker+0x70/0x70 [ 247.789729] [<ffffffff81419060>] ? gs_change+0x13/0x13 [ 247.789753] Code: 4e 48 83 c4 08 5b 5d c3 66 0f 1f 44 00 00 e8 eb fb ff ff eb e1 90 90 90 90 90 90 90 90 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c [ 247.790092] RIP [<ffffffff811e83ed>] memcpy+0xd/0x110 [ 247.790120] RSP <ffff8802152f3ba8> [ 247.790138] ---[ end trace e93713a9d40cd06f ]---
signature.asc
Description: Digital signature