linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [OPPS] 2.4.5-ac15
@ 2001-06-29 11:21 James Stevenson
  0 siblings, 0 replies; 2+ messages in thread
From: James Stevenson @ 2001-06-29 11:21 UTC (permalink / raw)
  To: linux-kernel

ksymoops 2.3.7 on i686 2.4.5-ac15  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.5-ac15 (default)
     -m /boot/System.map-2.4.5-ac15 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

invalid operand: 0000 
CPU:    0 
EIP:    0010:c0218c>] 
EFLAGS: 00210202 
esi: 00007000   ed c1000010   ebp: 00007000  sp: c0ed3ea0 
ds: 0018   es: 0018   ss: 0018 
Process Maelstrom (pid: 30242, stackpage=c0ed3000) 
Stack: 000068d0 00200286 00000000 c024fdb4 000000e0 c024ffac 00000000 c024ffa8  
       c012b292 00000007 00000001 00000000 c0ed3f54 c0baa2c0 c6c1fe8c c012b478  
       c013e1e3 c4561120 c0baa2c0 00000000 00000145 c01b5477 c0baa2c0 c6c1fe8c  
Call Trace: [<c012b292>] [<c012b478>] [<c013e1e3>] [<c01b5477>] [<c01b075f>]  
   [<c013e41c>] [<c013e8b9>] [<c0119152>] [<c0106cb7>]  
Code: 0f 0b 89 d8 eb 14 45 83 c7 0c 83 fd 09 0f 86 f5 fd ff ff ff  
Using defaults from ksymoops -t elf32-i386 -a i386

Trace; c012b292 <__alloc_pages+62/230>
Trace; c012b478 <__get_free_pages+18/30>
Trace; c013e1e3 <__pollwait+33/1070>
Trace; c01b5477 <datagram_poll+27/190>
Trace; c01b075f <sock_recvmsg+3df/5e0>
Trace; c013e41c <__pollwait+26c/1070>
Trace; c013e8b9 <__pollwait+709/1070>
Trace; c0119152 <get_fast_time+7e2/910>
Trace; c0106cb7 <__up_wakeup+113b/2594>
Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   89 d8                     mov    %ebx,%eax
Code;  00000004 Before first symbol
   4:   eb 14                     jmp    1a <_EIP+0x1a> 0000001a Before first symbol
Code;  00000006 Before first symbol
   6:   45                        inc    %ebp
Code;  00000007 Before first symbol
   7:   83 c7 0c                  add    $0xc,%edi
Code;  0000000a Before first symbol
   a:   83 fd 09                  cmp    $0x9,%ebp
Code;  0000000d Before first symbol
   d:   0f 86 f5 fd ff ff         jbe    fffffe08 <_EIP+0xfffffe08> fffffe08 <END_OF_CODE+377951b5/????>
Code;  00000013 Before first symbol
  13:   ff 00                     incl   (%eax)


^ permalink raw reply	[flat|nested] 2+ messages in thread

* [OPPS] 2.4.5-ac15
@ 2001-06-23 20:08 James Stevenson
  0 siblings, 0 replies; 2+ messages in thread
From: James Stevenson @ 2001-06-23 20:08 UTC (permalink / raw)
  To: Linux Kernel


Hi

when using eject to eject a cd from an atapi cd writer that had the
tray locked by cdreored (which had messed up)

i got the following opps on 2.4.5-ac15

Attached devices:
Host: scsi0 Channel: 00 Id: 00 Lun: 00
  Vendor: HP       Model: CD-Writer+ 7200  Rev: 3.01
  Type:   CD-ROM                           ANSI SCSI revision: 02
Host: scsi0 Channel: 00 Id: 01 Lun: 00
  Vendor: ATAPI    Model: CD-ROM 44X       Rev: T4C2
  Type:   CD-ROM                           ANSI SCSI revision: 02


ksymoops 2.3.7 on i586 2.4.5-ac15-js1.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.5-ac15-js1/ (default)
     -m /boot/System.map-2.4.5-ac15-js1 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

No modules in ksyms, skipping objects
Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file?
Error (regular_file): read_system_map stat /boot/System.map-2.4.5-ac15-js1 failed
Unable to handle kernel paging request at virtual address f6f5f251
c011cd0d
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c011cd0d>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010082
eax: f6f5f201   ebx: cb40e000   ecx: f6f5f1fd   edx: 00000050
esi: 00000246   edi: 00000005   ebp: cb40ff94   esp: cb40ff74
ds: 0018   es: 0018   ss: 0018
Stack: 00000000 00000000 c0107a40 00000000 c0107ae4 00000005 cb40ff94 cb40e000
       00000005 00000000 00030001 c996d202 00000000 00000000 00000000 00000000
       00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call Trace: [<c0107a40>] [<c0107ae4>]
Code: 83 3c 02 01 75 07 c7 04 02 00 00 00 00 8d 47 ff 0f b3 83 50

>>EIP; c011cd0d <force_sig_info+3d/a0>   <=====
Trace; c0107a40 <__up_wakeup+1ec4/2594>
Trace; c0107ae4 <__up_wakeup+1f68/2594>
Code;  c011cd0d <force_sig_info+3d/a0>
00000000 <_EIP>:
Code;  c011cd0d <force_sig_info+3d/a0>   <=====
   0:   83 3c 02 01               cmpl   $0x1,(%edx,%eax,1)   <=====
Code;  c011cd11 <force_sig_info+41/a0>
   4:   75 07                     jne    d <_EIP+0xd> c011cd1a <force_sig_info+4a/a0>
Code;  c011cd13 <force_sig_info+43/a0>
   6:   c7 04 02 00 00 00 00      movl   $0x0,(%edx,%eax,1)
Code;  c011cd1a <force_sig_info+4a/a0>
   d:   8d 47 ff                  lea    0xffffffff(%edi),%eax
Code;  c011cd1d <force_sig_info+4d/a0>
  10:   0f b3 83 50 00 00 00      btr    %eax,0x50(%ebx)

 <1>Unable to handle kernel paging request at virtual address f6f5f251
c011cd0d
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c011cd0d>]
EFLAGS: 00010082
eax: f6f5f201   ebx: cb40e000   ecx: f6f5f1fd   edx: 00000050
esi: 00000246   edi: 00000005   ebp: cb40fbb4   esp: cb40fb94
ds: 0018   es: 0018   ss: 0018
Stack: 00000000 00000000 c0107a40 00000000 c0107ae4 00000005 cb40fbb4 cb40e000
       00000005 00000000 00030001 c996d202 00000000 00000000 00000000 00000000
       cbf95504 c8a6f520 00000000 00000000 c5bdb0c0 cbfc3220 c0334150 00000286
Call Trace: [<c0107a40>] [<c0107ae4>] [<c01c781f>] [<c01c4455>] [<c01b923e>]
   [<c0106e08>] [<c01ba410>] [<c01ba773>] [<c01bac34>] [<c01d4740>] [<c01080da>]
   [<c010825d>] [<c010a51e>] [<c01080d0>] [<c010825d>] [<c010a51e>] [<c01080d0>]
   [<c010825d>] [<c010a51e>] [<c0119072>] [<c010828f>] [<f6f5f251>] [<c010a51e>]
   [<f6f5f251>] [<c0107282>] [<c011cd0d>] [<c01128f7>] [<c0112560>] [<c0106e08>]
   [<f6f5f1fd>] [<f6f5f201>] [<c011cd0d>] [<c0107a40>] [<c0107ae4>]
Code: 83 3c 02 01 75 07 c7 04 02 00 00 00 00 8d 47 ff 0f b3 83 50

>>EIP; c011cd0d <force_sig_info+3d/a0>   <=====
Trace; c0107a40 <__up_wakeup+1ec4/2594>
Trace; c0107ae4 <__up_wakeup+1f68/2594>
Trace; c01c781f <proc_print_scsidevice+27f/340>
Trace; c01c4455 <scsi_release_command+195/1e0>
Trace; c01b923e <atapi_output_bytes+3e/70>
Trace; c0106e08 <__up_wakeup+128c/2594>
Trace; c01ba410 <ide_wait_stat+3d0/440>
Trace; c01ba773 <ide_stall_queue+2c3/310>
Trace; c01bac34 <ide_intr+124/150>
Trace; c01d4740 <scsi_free+8820/11130>
Trace; c01080da <__up_wakeup+255e/2594>
Trace; c010825d <enable_irq+ed/130>
Trace; c010a51e <disable_irq_nosync+1c6e/3430>
Trace; c01080d0 <__up_wakeup+2554/2594>
Trace; c010825d <enable_irq+ed/130>
Trace; c010a51e <disable_irq_nosync+1c6e/3430>
Trace; c01080d0 <__up_wakeup+2554/2594>
Trace; c010825d <enable_irq+ed/130>
Trace; c010a51e <disable_irq_nosync+1c6e/3430>
Trace; c0119072 <get_fast_time+7d2/910>
Trace; c010828f <enable_irq+11f/130>
Trace; f6f5f251 <END_OF_CODE+36c27105/????>
Trace; c010a51e <disable_irq_nosync+1c6e/3430>
Trace; f6f5f251 <END_OF_CODE+36c27105/????>
Trace; c0107282 <__up_wakeup+1706/2594>
Trace; c011cd0d <force_sig_info+3d/a0>
Trace; c01128f7 <__verify_write+607/910>
Trace; c0112560 <__verify_write+270/910>
Trace; c0106e08 <__up_wakeup+128c/2594>
Trace; f6f5f1fd <END_OF_CODE+36c270b1/????>
Trace; f6f5f201 <END_OF_CODE+36c270b5/????>
Trace; c011cd0d <force_sig_info+3d/a0>
Trace; c0107a40 <__up_wakeup+1ec4/2594>
Trace; c0107ae4 <__up_wakeup+1f68/2594>
Code;  c011cd0d <force_sig_info+3d/a0>
00000000 <_EIP>:
Code;  c011cd0d <force_sig_info+3d/a0>   <=====
   0:   83 3c 02 01               cmpl   $0x1,(%edx,%eax,1)   <=====
Code;  c011cd11 <force_sig_info+41/a0>
   4:   75 07                     jne    d <_EIP+0xd> c011cd1a <force_sig_info+4a/a0>
Code;  c011cd13 <force_sig_info+43/a0>
   6:   c7 04 02 00 00 00 00      movl   $0x0,(%edx,%eax,1)
Code;  c011cd1a <force_sig_info+4a/a0>
   d:   8d 47 ff                  lea    0xffffffff(%edi),%eax
Code;  c011cd1d <force_sig_info+4d/a0>
  10:   0f b3 83 50 00 00 00      btr    %eax,0x50(%ebx)

 <0>Kernel panic: Aiee, killing interrupt handler!

2 warnings and 1 error issued.  Results may not be reliable.

-- 
---------------------------------------------
Web: http://www.stev.org
Mobile: +44 07779080838
E-Mail: mistral@stev.org
  8:00pm  up 12 min,  2 users,  load average: 0.02, 0.39, 0.32


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2001-06-29 10:21 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2001-06-29 11:21 [OPPS] 2.4.5-ac15 James Stevenson
  -- strict thread matches above, loose matches on Subject: below --
2001-06-23 20:08 James Stevenson

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).