Oops in 2.1.24

A Guy called Tyketto (tyketto@corona.unomaha.edu)
Tue, 28 Jan 1997 23:21:40 -0600 (CST)


Heya everyone..

Just compiled 2.1.24 clean, and rebooted to the kernel.. so far, so
good.. I have binfmt_aout, binfmt_java, floppy, idecd, ppp, minix, fat, vfat,
nfs, smbfs, and psaux compiled as modules.. so far, they sseem to work fine
with the modules snapshot from 970118.

Up until rebooting.. as it remounted my drives, it wouldn't remount
/dev/hda1 as vfat (I'm using the kernel daemon, and it's started after the
root fs is mounted). got to my prompt, logged in, manually tried to mount the
drive, and insmod oops'ed on me with the following.. btw, current setup: gcc
2.7.2.1, libc-5.4.17, binutils-2.7.0.3, on a Pentium 120.

I saw the previous post about insmod oopsing with nfs or sound
modules, but didn't think it owuld be the same with mounting a drive.. but oh
well.. c'est la vie.. Overall, I'm pleased with the 2.1.x and 2.0.x series..
Seeing how this is the first oops I've had since 1.1.87, I'm very much
impressed. keep up the work, and code munching.. and maybe.. just maybe, we'll
drive Micro$oft out of business.. ;)

BL.

--- snip ---

Unable to handle kernel paging request at virtual address 6c613261
current->tss.cr3 = 0096a000, Lr3 = 0096a000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01165c0>]
EFLAGS: 00010246
eax: 00000000 ebx: c1830b60 ecx: ffffffff edx: 00000020
esi: 6c613261 edi: 6c613261 ebp: 000003ef esp: c096df68
ds: 0018 es: 0018 ss: 0018
Process insmod (pid: 98, process nr: 23, stackpage=c096d000)
Stack: fffffffe 08054cc0 00000400 c182c000 00000000 00000000 00000400 c1830e4f
08054db8 080550af 0000001f c011688d c182c000 08054cc0 00000011 bffffdec
c0a71018 00000400 bffffdec bffffda8 c010a530 c0941000 c010a3f8 08054b38
Call Trace: [<c182c000>] [<c1830e4f>] [<c011688d>] [<c182c000>] [<c010a530>] [<c010a3f8>]
Code: f2 ae f7 d1 49 89 ce 8d 6c 2e 01 ff 44 24 28 83 c3 08 39 54

Using `/System.map' to map addresses to symbols.

>>EIP: c01165c0 <qm_symbols+1dc/23c>
Trace: c182c000
Trace: c1830e4f
Trace: c011688d <sys_query_module+181/1b0>
Trace: c182c000
Trace: c010a530 <error_code+30/40>
Trace: c010a3f8 <system_call+38/40>

Code: c01165c0 <qm_symbols+1dc/23c> repnz scasb %es:(%edi),%al
Code: c01165c2 <qm_symbols+1de/23c> notl %ecx
Code: c01165c4 <qm_symbols+1e0/23c> decl %ecx
Code: c01165c5 <qm_symbols+1e1/23c> movl %ecx,%esi
Code: c01165c7 <qm_symbols+1e3/23c> leal 0x1(%esi,%ebp,1),%ebp
Code: c01165cb <qm_symbols+1e7/23c> incl 0x28(%esp,1)
Code: c01165cf <qm_symbols+1eb/23c> addl $0x8,%ebx
Code: c01165d2 <qm_symbols+1ee/23c> cmpl %edx,0xffffff90(%eax,%eax,1)
Code: c01165d6 <qm_symbols+1f2/23c> nop
Code: c01165d7 <qm_symbols+1f3/23c> nop

--- snip ---

-- 
Brad Littlejohn                         | Email:        tyketto@unomaha.edu
Unix Systems Administrator,             |         bradl@otto.bf.rmit.edu.au
WebMaster, NewsMaster.. Smeghead! :)    |   http://www.unomaha.edu/~tyketto
    PGP: 1024/E9DF4D85 67 6B 33 D0 B9 95 F4 37  4B D1 CE BD 48 B0 06 93