Re: Oops descriptions, your post to linux-kernel

Bryn Paul Arnold Jones (bpaj@gytha.demon.co.uk)
Thu, 7 Mar 1996 15:34:48 +0000 (GMT)


On Thu, 7 Mar 1996, Ingo Molnar wrote:
> here is your original oops report, in case you dont have it handy :)
>
Bugger, I used ksymoops on it, then forgot to post it *bop me on the head
for being so silly*

> > Unable to handle kernel paging request at virtual address c182b583
> > current->tss.cr3 = 00679000,
> > *pde = 00001067
> > *pte = 00000000
> > Oops: 0000
> > CPU: 0
> > EIP: 0010:[<0182b583>]
> > EFLAGS: 00013246
> > eax: 00000000 ebx: 00000000 ecx: 0067ef24 edx: 00000000
> > esi: 006a1fc0 edi: 00b097c0 ebp: bffff7ec esp: 0067ef40
> > ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> > Process X (pid: 312, process nr: 26, stackpage=0067e000)
> > Stack: 00b097c0 0182b025 0182b1e6 00000047 000000f4 01829040 00b097c0 006a1fc0
> > 00000000 00121601 00b097c0 006a1fc0 006a1fc0 00000000 00917000 0011fbc6
> > 00b097c0 006a1fc0 00000000 bffff814 00000802 00b097c0 0011fc7e 00917000
> > Call Trace: [<0182b025>] [<0182b1e6>] [<01829040>] [<00121601>] [<0011fbc6>] [<0011fc7e>] [<0010a469>]
> > Code: <1>Unable to handle kernel paging request at virtual address c182b583
> > current->tss.cr3 = 00679000,
> > *pde = 00001067
> > *pte = 00000000
> > Oops: 0000
> > CPU: 0
> > EIP: 0010:[<0010a9eb>]
> > EFLAGS: 00013212
> > eax: 00000010 ebx: 0000002b ecx: 0182b583 edx: 00eca018
> > esi: 00000000 edi: 0067f000 ebp: 0067ef04 esp: 0067eeac
> > ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
> > Process X (pid: 312, process nr: 26, stackpage=0067e000)
> > Stack: 0000002b 00000000 0002b000 0067ef04 00000000 01800000 02000000 01800000
> > 00000018 0010fe5b 00174d9e 0067ef04 00000000 0010fbb8 006a1fc0 00b097c0
> > bffff7ec 00d886c8 0009e000 0010a61b 0067ef04 00000000 00000000 0067ef24
> > Call Trace: [<01800000>] [<02000000>] [<01800000>] [<0010fe5b>] [<0010fbb8>] [<0010a61b>] [<0182b583>]
> > [<0182b025>] [<0182b1e6>] [<01829040>] [<00121601>] [<0011fbc6>] [<0011fc7e>] [<0010a469>]
> > Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
>
>
> thanks again for your involvement in the Linux Project,
>
> -- mingo
>
here is the ksymoopsed out out.
Using `/usr/src/linux/System.map' to map addresses to symbols.

Trace: 182b025
Trace: 182b1e6
Trace: 1829040
Trace: 121601 <chrdev_open+31/3c>
Trace: 11fbc6 <do_open+e2/168>
Trace: 11fc7e <sys_open+32/58>
Trace: 10a469 <system_call+59/a0>

Using `/usr/src/linux/System.map' to map addresses to symbols.

>>EIP: 10a9eb <die_if_kernel+27f/2c0>
Trace: 1800000
Trace: 2000000
Trace: 1800000
Trace: 10fe5b <do_page_fault+2a3/2ac>
Trace: 10fe5b <do_page_fault+2a3/2ac>
Trace: 10a61b <error_code+4b/60>
Trace: 182b583
Trace: 182b025
Trace: 182b1e6
Trace: 1829040
Trace: 121601 <chrdev_open+31/3c>
Trace: 11fbc6 <do_open+e2/168>
Trace: 11fc7e <sys_open+32/58>
Trace: 10a469 <system_call+59/a0>

Code: 10a9eb <die_if_kernel+27f/2c0> movb %fs:(%esi,%ecx,1),%al
Code: 10a9ef <die_if_kernel+283/2c0> popl %fs
Code: 10a9f1 <die_if_kernel+285/2c0> movb %al,%dl
Code: 10a9f3 <die_if_kernel+287/2c0> andl $0xff,%edx
Code: 10a9f9 <die_if_kernel+28d/2c0> movl %edx,0x10(%esp,1)
Code: 10a9fd <die_if_kernel+291/2c0> pushl %edx
Code: 10a9fe <die_if_kernel+292/2c0> pushl $0x90909000

--
PGP key available from any good server   \ Overload -- core meltdown sequence 
1024/EB275221 1995/09/05 Bryn P. A. Jones |            initiated.
<bpaj@gytha.demon.co.uk> (use this key)  / This space is intentionally left   
fingerprint:  83 AF D8 65 BC 52 74 31   |  blank, apart from this text ;-)
              67 1A 5F 31 F5 A0 9C 82    \____________________________________