Oops with 2.0.34 (final)

Alfredo Sanjuan (alfre@ibd.es)
Fri, 5 Jun 1998 10:46:02 +0200


This is a Pentium 200, running as news server with the latest 2.0.34 kernel,
10 hours uptime...

general protection: 0000
CPU: 0
EIP: 0010:[<001113a2>]
EFLAGS: 00010202
eax: 001113ab ebx: 4159f84c ecx: 4159f84c edx: ffff0ff0
esi: 08098c94 edi: 4159f7f8 ebp: 00000020 esp: 02b73f8c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process innwatch (pid: 23857, process nr: 4, stackpage=02b73000)
Stack: 00111378 08098c74 4009f6c0 00000020 fffffff4 00000025 4159f7f8
0325c414
bffff504 0010a800 02b73fbc 00000007 400a0d88 4009f6c0 4009f6a0
08098c74
4009f6c0 00000020 4009f6c0 0000002b 0000002b 0000002b 0000002b
ffffffff
Call Trace: [<00111378>] [<0010a800>]
Code: ff 49 00 0f 88 c5 97 06 00 31 c0 85 ff 74 23 8b 57 50 85 d2

Using `/System.map' to map addresses to symbols.

>>EIP: 1113a2 <do_page_fault+2a/308>
Trace: 1113a2 <do_page_fault+2a/308>
Trace: 10a800 <error_code+40/50>

Code: 1113a2 <do_page_fault+2a/308> decl 0x0(%ecx)
Code: 1113a5 <do_page_fault+2d/308> js 17ab70 <down_failed>
Code: 1113ab <do_page_fault+33/308> xorl %eax,%eax
Code: 1113ad <do_page_fault+35/308> testl %edi,%edi
Code: 1113af <do_page_fault+37/308> je 1113d4 <do_page_fault+5c/308>
Code: 1113b1 <do_page_fault+39/308> movl 0x50(%edi),%edx
Code: 1113b4 <do_page_fault+3c/308> testl %edx,%edx
Code: 1113b6 <do_page_fault+3e/308>

/alfredo

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu