Re: [patch] drivers/usb/usb.c: auto loading of USB bus driver

Upshur Parks (uwpark@wm.edu)
Tue, 21 Dec 1999 10:48:22 -0500


Running the 2.3.34 kernel last night I got this oops its a dual p2 350 with
a 3c509b card

ksymoops 0.7c on i686 2.3.34. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.3.34/ (default)
-m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

No modules in ksyms, skipping objects
Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod
file?
cpu: 1, clocks: 1002388, slice: 334129, nr: 2.
cpu: 0, clocks: 1002388, slice: 334129, nr: 1.
eip: c0213050
invalid operand: 0000
CPU: 1
EIP: 0010:[<c021307c>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010092
eax: 00000038 ebx: c1288e60 ecx: c02b163c edx: c02b163c
esi: c1288e60 edi: c1288e00 ebp: 00000286 esp: c784df1c
ds: 0018 es: 0018 ss: 0018
Process ifconfig (pid: 179, stackpage=c784d000)
Stack: 0000004e c02c9020 c78390c8 00000000 00000400 c019c1d4 c02c9020
000000c8
c02c9020 c019c2d0 c78390c8 c02c9020 c12890c0 00000400 00000000
c7839000
c0172230 c7839000 c784df90 00000000 00000400 c7d56840 ffffffea
00000000
Call Trace: [<c019c1d4>] [<c019c2d0>] [<c0172230>] [<c013c3a6>] [<c010bfc0>]
Code: 0f 0b 83 c4 0c f0 0f ba 2b 00 0f 82 fb 4c 03 00 8b 54 24 14

>>EIP; c021307c <el3_get_stats+40/a8> <=====
Trace; c019c1d4 <sprintf_stats+14/a4>
Trace; c019c2d0 <dev_get_info+6c/bc>
Trace; c0172230 <proc_file_read+108/244>
Trace; c013c3a6 <sys_read+106/128>
Trace; c010bfc0 <system_call+34/38>
Code; c021307c <el3_get_stats+40/a8>
00000000 <_EIP>:
Code; c021307c <el3_get_stats+40/a8> <=====
0: 0f 0b ud2a <=====
Code; c021307e <el3_get_stats+42/a8>
2: 83 c4 0c addl $0xc,%esp
Code; c0213081 <el3_get_stats+45/a8>
5: f0 0f ba 2b 00 lock btsl $0x0,(%ebx)
Code; c0213086 <el3_get_stats+4a/a8>
a: 0f 82 fb 4c 03 00 jb 34d0b <_EIP+0x34d0b> c0247d87
<stext_lock+4f03/825c>
Code; c021308c <el3_get_stats+50/a8>
10: 8b 54 24 14 movl 0x14(%esp,1),%edx

eip: c0213050
invalid operand: 0000
CPU: 0
EIP: 0010:[<c021307c>]
EFLAGS: 00010092
eax: 00000038 ebx: c1288e60 ecx: c02b163c edx: c02b163c
esi: c1288e60 edi: c1288e00 ebp: 00000286 esp: c7813f1c
ds: 0018 es: 0018 ss: 0018
Process ifconfig (pid: 208, stackpage=c7813000)
Stack: 0000004e c02c9020 c77ec0c8 00000000 00000400 c019c1d4 c02c9020
000000c8
c02c9020 c019c2d0 c77ec0c8 c02c9020 c12890c0 00000400 00000000
c77ec000
c0172230 c77ec000 c7813f90 00000000 00000400 c7d56cc0 ffffffea
00000000
Call Trace: [<c019c1d4>] [<c019c2d0>] [<c0172230>] [<c013c3a6>] [<c010bfc0>]
Code: 0f 0b 83 c4 0c f0 0f ba 2b 00 0f 82 fb 4c 03 00 8b 54 24 14

>>EIP; c021307c <el3_get_stats+40/a8> <=====
Trace; c019c1d4 <sprintf_stats+14/a4>
Trace; c019c2d0 <dev_get_info+6c/bc>
Trace; c0172230 <proc_file_read+108/244>
Trace; c013c3a6 <sys_read+106/128>
Trace; c010bfc0 <system_call+34/38>
Code; c021307c <el3_get_stats+40/a8>
00000000 <_EIP>:
Code; c021307c <el3_get_stats+40/a8> <=====
0: 0f 0b ud2a <=====
Code; c021307e <el3_get_stats+42/a8>
2: 83 c4 0c addl $0xc,%esp
Code; c0213081 <el3_get_stats+45/a8>
5: f0 0f ba 2b 00 lock btsl $0x0,(%ebx)
Code; c0213086 <el3_get_stats+4a/a8>
a: 0f 82 fb 4c 03 00 jb 34d0b <_EIP+0x34d0b> c0247d87
<stext_lock+4f03/825c>
Code; c021308c <el3_get_stats+50/a8>
10: 8b 54 24 14 movl 0x14(%esp,1),%edx

eip: c0213050
invalid operand: 0000
CPU: 1
EIP: 0010:[<c021307c>]
EFLAGS: 00010092
eax: 00000038 ebx: c1288e60 ecx: c02b163c edx: c02b163c
esi: c1288e60 edi: c1288e00 ebp: 00000286 esp: c782bf1c
ds: 0018 es: 0018 ss: 0018
Process ifconfig (pid: 241, stackpage=c782b000)
Stack: 0000004e c02c9020 c78730c8 00000000 00000400 c019c1d4 c02c9020
000000c8
c02c9020 c019c2d0 c78730c8 c02c9020 c12890c0 00000400 00000000
c7873000
c0172230 c7873000 c782bf90 00000000 00000400 c7d56180 ffffffea
00000000
Call Trace: [<c019c1d4>] [<c019c2d0>] [<c0172230>] [<c013c3a6>] [<c010bfc0>]
Code: 0f 0b 83 c4 0c f0 0f ba 2b 00 0f 82 fb 4c 03 00 8b 54 24 14

>>EIP; c021307c <el3_get_stats+40/a8> <=====
Trace; c019c1d4 <sprintf_stats+14/a4>
Trace; c019c2d0 <dev_get_info+6c/bc>
Trace; c0172230 <proc_file_read+108/244>
Trace; c013c3a6 <sys_read+106/128>
Trace; c010bfc0 <system_call+34/38>
Code; c021307c <el3_get_stats+40/a8>
00000000 <_EIP>:
Code; c021307c <el3_get_stats+40/a8> <=====
0: 0f 0b ud2a <=====
Code; c021307e <el3_get_stats+42/a8>
2: 83 c4 0c addl $0xc,%esp
Code; c0213081 <el3_get_stats+45/a8>
5: f0 0f ba 2b 00 lock btsl $0x0,(%ebx)
Code; c0213086 <el3_get_stats+4a/a8>
a: 0f 82 fb 4c 03 00 jb 34d0b <_EIP+0x34d0b> c0247d87
<stext_lock+4f03/825c>
Code; c021308c <el3_get_stats+50/a8>
10: 8b 54 24 14 movl 0x14(%esp,1),%edx

2 warnings issued. Results may not be reliable.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/