New Oops with 2.0.34

Alfredo Sanjuan (alfre@ibd.es)
Tue, 9 Jun 1998 11:39:28 +0200


This is with clean 2.0.34 (+ 3c509 v1.16 from Donald). Ligth load.

general protection: 0000
CPU: 0
EIP: 0010:[<001113a2>]
EFLAGS: 00010206
eax: 001113ab ebx: 75fbdbed ecx: 75fbdbed edx: ffff0ff0
esi: 4009f768 edi: 75fbdb99 ebp: 0809b954 esp: 035a9f8c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process config.status (pid: 6566, process nr: 102, stackpage=035a9000)
Stack: 00111378 0809bf14 4009f760 0809b954 08098358 00000001 75fbdb99
035aa018
00000000 0010a800 035a9fbc 00000007 400a0d88 0809ba18 4009f760
0809bf14
4009f760 0809b954 4009f6a8 0000002b 0000002b 0000002b 0000002b
ffffffff
Call Trace: [<00111378>] [<0010a800>]
Code: ff 49 00 0f 88 c5 97 06 00 31 c0 85 ff 74 23 8b 57 50 85 d2

Using `/System.map' to map addresses to symbols.

>>EIP: 1113a2 <do_page_fault+2a/308>
Trace: 1113a2 <do_page_fault+2a/308>
Trace: 10a800 <error_code+40/50>

Code: 1113a2 <do_page_fault+2a/308> decl 0x0(%ecx)
Code: 1113a5 <do_page_fault+2d/308> js 17ab70 <down_failed>
Code: 1113ab <do_page_fault+33/308> xorl %eax,%eax
Code: 1113ad <do_page_fault+35/308> testl %edi,%edi
Code: 1113af <do_page_fault+37/308> je 1113d4 <do_page_fault+5c/308>
Code: 1113b1 <do_page_fault+39/308> movl 0x50(%edi),%edx
Code: 1113b4 <do_page_fault+3c/308> testl %edx,%edx
Code: 1113b6 <do_page_fault+3e/308>

/alfredo

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu