1.3.95 oopses

Robert L Krawitz (rlk@tiac.net)
Fri, 26 Apr 1996 11:26:07 -0400


This was in the process of backing up my system to SCSI tape (reading
from a Rush Limbaugh filesystem).

invalid operand: 0000
CPU: 0
EIP: 0010:[<00000007>]
EFLAGS: 00010613
eax: 001cb568 ebx: 01fbdc0c ecx: 001cb568 edx: 001cb568
esi: 001cb568 edi: 00000000 ebp: 01db0ddc esp: 01db0db8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process find (pid: 20626, process nr: 30, stackpage=01db0000)
Stack: 0038cc7c 01db0df0 fffffc18 001cb568 0038cc7c 01db0df0 000351d2 00000206
00000000 000351d2 00122445 00000815 000351d2 001eddf4 01fbdc0c 01db0df0
0012398f 0038cc7c 00000000 0038cc7c 001572ea 00000815 000351d2 00000200
Call Trace: [<00122445>] [<0012398f>] [<001572ea>] [<0015ab3e>] [<00122f00>] [<0015ae30>] [<0015b049>]
[<00159f2b>] [<0015ca63>] [<00121c85>] [<0015b7d6>] [<001299ce>] [<00129bd4>] [<00129c6c>] [<00127f25>]
[<0010a3e9>]
Code: f0 c3 e2 00 f0 fd 00 00 f0 fd 00 00 f0 54 ff 00 f0 fd 00 00

% ksymoops System.map < ../oops.1
Using `System.map' to map addresses to symbols.

Trace: 122445 <__wait_on_buffer+91/f0>
Trace: 12398f <bread+67/88>
Trace: 1572ea <fat_bread+26/98>
Trace: 15ab3e <raw_scan_sector+1e/23c>
Trace: 122f00 <refill_freelist+4a4/52c>
Trace: 15ae30 <raw_scan_nonroot+5c/ac>
Trace: 15b049 <fat_subdirs+5d/68>
Trace: 159f2b <fat_read_inode+1fb/3d4>
Trace: 15ca63 <msdos_read_inode+f/14>
Trace: 121c85 <__iget+125/1e8>
Trace: 15b7d6 <msdos_lookup+122/1e8>
Trace: 1299ce <lookup+da/f4>
Trace: 129bd4 <_namei+54/bc>
Trace: 129c6c <lnamei+30/48>
Trace: 127f25 <sys_newlstat+29/58>
Trace: 10a3e9 <system_call+59/a0>

Code: lock ret
Code: loop 00000004 <_EIP+4>
Code: lock std
Code: addb %al,(%eax)
Code: lock std
Code: addb %al,(%eax)
Code: lock pushl %esp
Code: incl (%eax)
Code: lock std
Code: addb %al,(%eax)

invalid operand: 0000
CPU: 0
EIP: 0010:[<00000007>]
EFLAGS: 00010613
eax: 001cb568 ebx: 01fa0c0c ecx: 001cb568 edx: 001cb568
esi: 001cb568 edi: 00000000 ebp: 00512da8 esp: 00512d84
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process afio (pid: 25890, process nr: 30, stackpage=00512000)
Stack: 0096fbf4 00512dbc fffffc18 001cb568 0096fbf4 00512dbc 00000007 00000206
00000000 00000007 00122445 00000805 00000cd4 00000cd4 01fa0c0c 00512dbc
0012398f 0096fbf4 00000000 0096fbf4 001572ea 00000805 00000007 00000200
Call Trace: [<00122445>] [<0012398f>] [<001572ea>] [<0015750c>] [<0015ae4c>] [<0015b049>] [<00159f2b>]
[<0015ca63>] [<00121c85>] [<0015b7d6>] [<001299ce>] [<00129aed>] [<00129d1e>] [<00120704>] [<0012082a>]
[<0010a3e9>]
Code: f0 c3 e2 00 f0 fd 00 00 f0 fd 00 00 f0 54 ff 00 f0 fd 00 00

[2(rlk)||{!7}<rlk-ppp-1>/mnt/sandbox4/linux-1.3]
% ksymoops System.map < ../oops.2
Using `System.map' to map addresses to symbols.

Trace: 122445 <__wait_on_buffer+91/f0>
Trace: 12398f <bread+67/88>
Trace: 1572ea <fat_bread+26/98>
Trace: 15750c <fat_access+5c/2fc>
Trace: 15ae4c <raw_scan_nonroot+78/ac>
Trace: 15b049 <fat_subdirs+5d/68>
Trace: 159f2b <fat_read_inode+1fb/3d4>
Trace: 15ca63 <msdos_read_inode+f/14>
Trace: 121c85 <__iget+125/1e8>
Trace: 15b7d6 <msdos_lookup+122/1e8>
Trace: 1299ce <lookup+da/f4>
Trace: 129aed <dir_namei+95/128>
Trace: 129d1e <open_namei+52/3fc>
Trace: 120704 <do_open+74/168>
Trace: 12082a <sys_open+32/58>
Trace: 10a3e9 <system_call+59/a0>

Code: lock ret
Code: loop 00000004 <_EIP+4>
Code: lock std
Code: addb %al,(%eax)
Code: lock std
Code: addb %al,(%eax)
Code: lock pushl %esp
Code: incl (%eax)
Code: lock std
Code: addb %al,(%eax)