Oops 2.2.2-ac7

Jeremy Hansen (jeremy@iuinc.com)
Tue, 2 Mar 1999 22:13:38 -0500 (EST)


I'm using the 2.2.0 raid0145 patches, with a hand patched
genhd.c

line: 268
add_partition(hd, current_minor, this_sector+START_SECT(p)*sector_size,
NR_SECTS(p)*sector_size, ptype(p)*sector_size);

line 566:
add_partition(hd, minor, first_sector+START_SECT(p)*sector_size,
NR_SECTS(p)*sector_size, ptype(p)*sector_size);

-- Versions installed: (if some fields are empty or looks
-- unusual then possibly you have very old versions)
Linux home2 2.2.2-ac7 #1 Mon Mar 1 22:51:44 EST 1999 i686 unknown
Kernel modules 2.1.121
Gnu C egcs-2.90.27 980315 (egcs-1.0.2 release)
Binutils 2.9.1.0.4
Linux C Library 2.0.7
Dynamic linker ldd (GNU libc) 2.0.7
Linux C++ Library 2.8.0
Procps 1.2.7
Mount 2.9
Net-tools 1.50
Kbd 0.94
Sh-utils 1.16

Options used: -V (default)
-o /lib/modules/2.2.2-ac7/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /usr/src/linux/System.map (default)
-c 1 (default)

You did not tell me where to find symbol information. I will assume
that the log matches the kernel and modules that are running right now
and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c019c122>]
EFLAGS: 00010216
eax: 07265637 ebx: b0396612 ecx: d0008358 edx: 00000008
esi: 72656373 edi: 00000002 ebp: 00000010 esp: c6fe9c40
ds: 0018 es: 0018 ss: 0018
Process nfsd (pid: 320, process nr: 19, stackpage=c6fe9000)
Stack: 00000000 cbd8e840 d0006000 d0008358 d0004000 00fac08e c01395ad
00000004
c018d9bb cffe05e0 00000901 c6645852 c6645854 00000002 c6645844
c019c3c6
00000901 c6645852 c6645854 00000002 00000000 c019c56b 00000000
c6645844
Call Trace: [<d0006000>] [<d0008358>] [<d0004000>] [<c01395ad>]
[<c018d9bb>] [<c019c3c6>] [<c019c56b>]
[<c01be55b>] [<c018d9bb>] [<c018da53>] [<c0186477>] [<c0125ac6>]
[<c0125d03>] [<c011b6a4>] [<c011ba42>]
[<c011bdcd>] [<c011bd24>] [<c011bd74>] [<c014eb6b>] [<c0176c0f>]
[<c011bd74>] [<c014c952>] [<c014c2d7>]
[<c014c218>] [<c018317b>] [<c01842c6>] [<c014c218>] [<c014c171>]
[<c0107497>]
Code: 8b 03 8b 53 08 01 d0 39 c6 7c 1f 8b 59 04 85 db 75 18 56 68

>>EIP: c019c122 <raid0_map+8a/128>
Trace: d0006000 <_end+fd83a30/fda5a7c>
Trace: d0008358 <_end+fd85d88/fda5a7c>
Trace: d0004000 <_end+fd81a30/fda5a7c>
Trace: c01395ad <read_block_bitmap+39/88>
Trace: c018d9bb <md_map+3f/44>
Trace: c01be55b <requeue_sd_request+df3/e04>
Trace: c0125d03 <generic_readpage+d7/e4>
Trace: c011bdcd <generic_file_read+59/74>
Trace: c011bd74 <generic_file_read+0/74>
Trace: c014c218 <nfsd_dispatch+0/14c>
Trace: c0107497 <kernel_thread+23/30>
Code: c019c122 <raid0_map+8a/128> 00000000 <_EIP>:
Code: c019c122 <raid0_map+8a/128> 0: 8b 03 movl (%ebx),%eax
Code: c019c124 <raid0_map+8c/128> 2: 8b 53 08 movl 0x8(%ebx),%edx
Code: c019c127 <raid0_map+8f/128> 5: 01 d0 addl %edx,%eax
Code: c019c129 <raid0_map+91/128> 7: 39 c6 cmpl %eax,%esi
Code: c019c12b <raid0_map+93/128> 9: 7c 1f jl 2a <_EIP+0x2a> c019c14c <raid0_map+b4/128>
Code: c019c12d <raid0_map+95/128> b: 8b 59 04 movl 0x4(%ecx),%ebx
Code: c019c130 <raid0_map+98/128> e: 85 db testl %ebx,%ebx
Code: c019c132 <raid0_map+9a/128> 10: 75 18 jne 2a <_EIP+0x2a> c019c14c <raid0_map+b4/128>
Code: c019c134 <raid0_map+9c/128> 12: 56 pushl %esi
Code: c019c135 <raid0_map+9d/128> 13: 68 00 00 00 00 pushl $0x0

Unable to handle kernel paging request at virtual address 39660974
current->tss.cr3 = 00101000, %cr3 = 00101000

2 warnings issued. Results may not be reliable.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/