Kernel 2.3.8 OPPS!

jpeck@bna.com
Thu, 1 Jul 1999 09:18:09 -0400


I beleive that I ALSA 0.3.2 caused this opps, when I tired
to unload the modules. But I'm not sure cuz I found the
opps much later (the reason that I say it was ALSA, cuz
around the time that I got this oops (inthe logs) my system
REFUSED to unload modules what-so-ever) If there is ANY
other info you all need, please email me.. (BTW, I'm not on
the mailing list, so I guess it'll have to be email.)

Options used: -V (default)
-o /lib/modules/2.2.10/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /usr/src/linux/System.map (default)
-c 1 (default)

You did not tell me where to find symbol information. I
will assume
that the log matches the kernel and modules that are running
right now
and I'll use the default options above for symbol
resolution.
If the current kernel and/or modules do not match the log,
you can get
more accurate output by telling me the kernel version and
where to find
map, modules, ksyms etc. ksymoops -h explains the options.

Jun 29 20:28:04 phoenix kernel: Unable to handle kernel
paging request at virtual address 75716021
Jun 29 20:28:04 phoenix kernel: current->tss.cr3 = 02f42000,
pr3 = 02f42000
Jun 29 20:28:04 phoenix kernel: *pde = 00000000
Jun 29 20:28:04 phoenix kernel: Oops: 0000
Jun 29 20:28:04 phoenix kernel: CPU: 0
Jun 29 20:28:04 phoenix kernel: EIP: 0010:[<c6815d14>]
Jun 29 20:28:04 phoenix kernel: EFLAGS: 00010016
Jun 29 20:28:04 phoenix kernel: eax: 75715f71 ebx:
c193644c ecx: c6817258 edx: 75715f71
Jun 29 20:28:04 phoenix kernel: esi: c1419448 edi:
00000010 ebp: 00000000 esp: c1447f54
Jun 29 20:28:04 phoenix kernel: ds: 0018 es: 0018 ss:
0018
Jun 29 20:28:04 phoenix kernel: Process rmmod (pid: 5500,
process nr: 71, stackpage=c1447000)
Jun 29 20:28:04 phoenix kernel: Stack: c193644c c68534d0
c6843847 00000010 c1419448 c19379b4 c3e03df0 00000000
Jun 29 20:28:04 phoenix kernel: bffff9d8 c685abc1
c1419448 00000000 c685a000 c685acb6 00000000 c685a000
Jun 29 20:28:04 phoenix kernel: c01163c0 c685a000
fffffff0 00000001 c011598e c685a000 00000000 c1446000
Jun 29 20:28:04 phoenix kernel: Call Trace: [<c68534d0>]
[<c6843847>] [<c685abc1>] [<c685a000>] [<c685acb6>]
[<c685a000>] [<c01163c0>]
Jun 29 20:28:04 phoenix kernel: [<c685a000>]
[<c011598e>] [<c685a000>] [<c0108fc8>]
Jun 29 20:28:04 phoenix kernel: Code: 8b 82 b0 00 00 00 39
d8 74 06 89 c2 85 d2 75 f0 85 d2 75 4c

>>EIP: c6815d14 <snd_info_minor_unregister+427c/45b4>
Trace: c68534d0 <snd_sb16dsp_new_mixer+37c/10ef8>
Trace: c6843847 <snd_pcm1_interrupt_record+cb/1c0>
Trace: c685abc1 <snd_sb16dsp_new_mixer+7a6d/10ef8>
Trace: c685a000 <snd_sb16dsp_new_mixer+6eac/10ef8>
Trace: c685acb6 <snd_sb16dsp_new_mixer+7b62/10ef8>
Trace: c685a000 <snd_sb16dsp_new_mixer+6eac/10ef8>
Trace: c01163c0 <exit_mm+32c/c18>
Trace: c685a000 <snd_sb16dsp_new_mixer+6eac/10ef8>
Code: c6815d14 <snd_info_minor_unregister+427c/45b4> 00000000

<_EIP>: <===
Code: c6815d14 <snd_info_minor_unregister+427c/45b4> 0:
8b 82 b0 00 00 movl 0xb0(%edx),%eax <===
Code: c6815d19 <snd_info_minor_unregister+4281/45b4> 5:
00
Code: c6815d1a <snd_info_minor_unregister+4282/45b4> 6:
39 d8 cmpl %ebx,%eax
Code: c6815d1c <snd_info_minor_unregister+4284/45b4> 8:
74 06 je c6815d24
<snd_info_minor_unregister+428c/45b4>
Code: c6815d1e <snd_info_minor_unregister+4286/45b4> a:
89 c2 movl %eax,%edx
Code: c6815d20 <snd_info_minor_unregister+4288/45b4> c:
85 d2 testl %edx,%edx
Code: c6815d22 <snd_info_minor_unregister+428a/45b4> e:
75 f0 jne 0 <_EIP>
Code: c6815d24 <snd_info_minor_unregister+428c/45b4> 10:
85 d2 testl %edx,%edx
Code: c6815d26 <snd_info_minor_unregister+428e/45b4> 12:
75 4c jne c6815d74
<snd_info_minor_unregister+42dc/45b4>

4 warnings and 1 error issued. Results may not be reliable.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/