fat oops in 1.3.97

Robert L Krawitz (rlk@tiac.net)
Tue, 30 Apr 1996 12:47:41 -0400


CPU: 0
EIP: 0010:[<00000007>]
EFLAGS: 00010e82
eax: 001cb740 ebx: 013f1c0c ecx: 001cb740 edx: 001cb740
esi: 001cb740 edi: 00000000 ebp: 003a7e84 esp: 003a7e60
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process afio (pid: 14053, process nr: 28, stackpage=003a7000)
Stack: 0098c1dc 003a7e98 fffffc18 001cb740 0098c1dc 003a7e98 bfffe854 00000202
00000000 bfffe854 001224b5 0098c1dc 01859540 001ee4f0 013f1c0c 003a7e98
001238d1 0098c1dc 0098c1dc 00157684 0098c1dc 0000001f 00158d63 001ee4f0
Call Trace: [<001224b5>] [<001238d1>] [<00157684>] [<00158d63>] [<00120d5a>] [<0010a3f9>]
Code: f0 c3 e2 00 f0 fd 00 00 f0 fd 00 00 f0 54 ff 00 f0 fd 00 00

% ksymoops System.map < ../oops.4
Using `System.map' to map addresses to symbols.

Trace: 1224b5 <__wait_on_buffer+91/f0>
Trace: 1238d1 <__brelse+11/44>
Trace: 157684 <fat_brelse+1c/40>
Trace: 158d63 <fat_file_read+39f/408>
Trace: 120d5a <sys_read+aa/bc>
Trace: 10a3f9 <system_call+59/a0>

Code: lock ret
Code: loop 00000004 <_EIP+4>
Code: lock std
Code: addb %al,(%eax)
Code: lock std
Code: addb %al,(%eax)
Code: lock pushl %esp
Code: incl (%eax)
Code: lock std
Code: addb %al,(%eax)