Re: Oops w/2.1.105 and ACs patches and parport problems

David B. Rees (dbr@oto.dyn.ml.org)
Tue, 09 Jun 1998 06:57:52 -0700 (PDT)


On 09-Jun-98 Tim Waugh wrote:
>
> The oops isn't useful without running ksymoops on it (you can find it in
> the scripts directory). Can you reproduce the oops at all?

Oops, forgot about that. The oops and ksymoops is in this mesg. Briefly,
here's what I was doing. I was in the /proc/parport/0 dir and poking around in
there. the parport modules were loaded. Then I unloaded the modules, and typed
'ls' in /proc/parport/0 (which is now nonexistant). Voila! "Segmentation
fault" is printed to console, and kernel Oops.

> With regard to printing not working, does typing "dmesg" reveal any
> messages from parport?

Yes, most notably:
lp: driver loaded but no devices found

-Dave

----------
Unable to handle kernel paging request at virtual address 00800028
current->tss.cr3 = 006c3000, %cr3 = 006c3000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0144087>]
EFLAGS: 00010246
eax: 00800028 ebx: 00000001 ecx: c1494000 edx: 00000000
esi: c22045a0 edi: c2c8dc80 ebp: 00001103 esp: c1495f80
ds: 0018 es: 0018 ss: 0018
Process ls (pid: 1237, process nr: 72, stackpage=c1495000)
Stack: c2c8dc80 c297db4c ffffffec 00000400 c012e47f c2c8dc80 c1495fb0 c012e35c
c1494000 00000003 08056e28 bffff874 08056e5c 08056e50 000003f4 ffffffea
c01097c8 00000003 08056e50 00000400 00000003 08056e28 bffff874 0000008d
Call Trace: [<c012e47f>] [<c012e35c>] [<c01097c8>]
Code: 66 8b 00 25 ff ff 00 00 50 53 6a 02 68 83 9a 1b c0 8b 4c 24
-----------
Using `/System.map' to map addresses to symbols.

>>EIP: c0144087 <proc_readdir+83/114>
Trace: c012e47f <sys_getdents+a3/124>
Trace: c012e35c <filldir>
Trace: c01097c8 <system_call+38/40>
Code: c0144087 <proc_readdir+83/114>
Code: c0144087 <proc_readdir+83/114> 66 8b 00 movw (%eax),%ax
Code: c014408a <proc_readdir+86/114> 25 ff ff 00 00 andl $0xffff,%eax
Code: c014408f <proc_readdir+8b/114> 50 pushl %eax
Code: c0144090 <proc_readdir+8c/114> 53 pushl %ebx
Code: c0144091 <proc_readdir+8d/114> 6a 02 pushl $0x2
Code: c0144093 <proc_readdir+8f/114> 68 83 9a 1b c0 pushl $0xc01b9a83
Code: c0144098 <proc_readdir+94/114> 8b 4c 24 00 movl 0x0(%esp,1),%ecx
Code: c014409c <proc_readdir+98/114> 90 nop
Code: c014409d <proc_readdir+99/114> 90 nop
Code: c014409e <proc_readdir+9a/114> 90 nop

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu