Re: 2.4.0-test8/pre6 OOPS on load of sb.o

2000-09-07 Thread Keith Owens

On Fri, 8 Sep 2000 10:15:13 +0930, 
"Sheldon Easterbrook" <[EMAIL PROTECTED]> wrote:
>I'm still getting this, except I've changed from RedHat 6.2 to Debian 2.2.
>Sep  8 08:50:36 Defiant kernel: EIP:=
>0010:[fat:__insmod_fat_S.bss_L2240+26305/51066103]=0A=

Please do not use quoted-printable to mail to l-k, plain text without
MIME is much better.

The EIP and code have been stamped on by klogd.  Stop klogd and restart
with "-x" and reproduce the problem.  Then you get a clean oops to
report to l-k.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



2.4.0-test8/pre6 OOPS on load of sb.o

2000-09-07 Thread Sheldon Easterbrook

Hi,

I'm still getting this, except I've changed from RedHat 6.2 to Debian 2.2.

Cheers,

Sheldon.

PS I am not on the list.


ksymoops 2.3.4 on i686 2.4.0-test8.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.4.0-test8/ (default)
 -m /boot/System.map-2.4.0-test8 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Sep  8 08:50:36 Defiant kernel: Unable to handle kernel paging request at virtual 
address c482ace0
Sep  8 08:50:36 Defiant kernel: c481d461
Sep  8 08:50:36 Defiant kernel: *pde = 03faf063
Sep  8 08:50:36 Defiant kernel: Oops: 
Sep  8 08:50:36 Defiant kernel: CPU:0
Sep  8 08:50:36 Defiant kernel: EIP:
0010:[fat:__insmod_fat_S.bss_L2240+26305/51066103]
Sep  8 08:50:36 Defiant kernel: EFLAGS: 00010282
Sep  8 08:50:36 Defiant kernel: eax: c482ace0   ebx: c3b7f8a0   ecx: 0003   edx: 
0003
Sep  8 08:50:36 Defiant kernel: esi: c2fca320   edi: 0003   ebp: 0003   esp: 
c2f6df00
Sep  8 08:50:36 Defiant kernel: ds: 0018   es: 0018   ss: 0018
Sep  8 08:50:36 Defiant kernel: Process au (pid: 195, stackpage=c2f6d000)
Sep  8 08:50:36 Defiant kernel: Stack:  c2fca320 c2de5ce0 c3fb07a0  
c2fca320 c2de5ce0 c3fb07a0 
Sep  8 08:50:36 Defiant kernel:72616863 6a616d2d 312d726f c11b0034 0287 
c012bbe2 c2de5ce0 c2fca320 
Sep  8 08:50:36 Defiant kernel:c2fca320 c2de5ce0  c012aee5 c2de5ce0 
c2fca320  c11bd000 
Sep  8 08:50:36 Defiant kernel: Call Trace: [chrdev_open+62/76] [dentry_open+189/340] 
[filp_open+82/92] [sys_open+56/180] [system_call+51/56] 
Sep  8 08:50:36 Defiant kernel: Code: 8b 10 85 d2 74 19 52 e8 ab b3 8f fb 83 c4 04 85 
c0 74 10 8b 
Using defaults from ksymoops -t elf32-i386 -a i386

Code;   Before first symbol
 <_EIP>:
Code;   Before first symbol
   0:   8b 10 mov(%eax),%edx
Code;  0002 Before first symbol
   2:   85 d2 test   %edx,%edx
Code;  0004 Before first symbol
   4:   74 19 je 1f <_EIP+0x1f> 001f Before first symbol
Code;  0006 Before first symbol
   6:   52push   %edx
Code;  0007 Before first symbol
   7:   e8 ab b3 8f fbcall   fb8fb3b7 <_EIP+0xfb8fb3b7> fb8fb3b7 

Code;  000c Before first symbol
   c:   83 c4 04  add$0x4,%esp
Code;  000f Before first symbol
   f:   85 c0 test   %eax,%eax
Code;  0011 Before first symbol
  11:   74 10 je 23 <_EIP+0x23> 0023 Before first symbol
Code;  0013 Before first symbol
  13:   8b 00 mov(%eax),%eax

Sep  8 08:50:38 Defiant kernel: Unable to handle kernel paging request at virtual 
address c482ace0
Sep  8 08:50:38 Defiant kernel: c481d461
Sep  8 08:50:38 Defiant kernel: *pde = 03faf063
Sep  8 08:50:38 Defiant kernel: Oops: 
Sep  8 08:50:38 Defiant kernel: CPU:0
Sep  8 08:50:38 Defiant kernel: EIP:
0010:[fat:__insmod_fat_S.bss_L2240+26305/51066103]
Sep  8 08:50:38 Defiant kernel: EFLAGS: 00010282
Sep  8 08:50:38 Defiant kernel: eax: c482ace0   ebx: c3b7f8a0   ecx: 0003   edx: 
0003
Sep  8 08:50:38 Defiant kernel: esi: c2b7b480   edi: 0003   ebp: 0003   esp: 
c2b8ff00
Sep  8 08:50:38 Defiant kernel: ds: 0018   es: 0018   ss: 0018
Sep  8 08:50:38 Defiant kernel: Process rplayd (pid: 214, stackpage=c2b8f000)
Sep  8 08:50:38 Defiant kernel: Stack:  c2b7b480 c2de5ce0 c3fb07a0  
c2b7b480 c2de5ce0 c3fb07a0 
Sep  8 08:50:38 Defiant kernel:c2b8e000 0001 c013480d 001d 0287 
c012bbe2 c2de5ce0 c2b7b480 
Sep  8 08:50:38 Defiant kernel:c2b7b480 c2de5ce0  c012aee5 c2de5ce0 
c2b7b480  c38c6000 
Sep  8 08:50:38 Defiant kernel: Call Trace: [permission+149/244] [chrdev_open+62/76] 
[dentry_open+189/340] [filp_open+82/92] [sys_open+56/180] [system_call+51/56] 
Sep  8 08:50:38 Defiant kernel: Code: 8b 10 85 d2 74 19 52 e8 ab b3 8f fb 83 c4 04 85 
c0 74 10 8b 

Code;   Before first symbol
 <_EIP>:
Code;   Before first symbol
   0:   8b 10 mov(%eax),%edx
Code;  0002 Before first symbol
   2:   85 d2 test   %edx,%edx
Code;  0004 Before first symbol
   4:   74 19 je 1f <_EIP+0x1f> 001f Before first symbol
Code;  0006 Before first symbol
   6:   52push   %edx
Code;  0007 Before first symbol
   7:   e8 ab b3 8f fbcall   fb8fb3b7 <_EIP+0xfb8fb3b7> fb8fb3b7 

Code;  000c Before firs