Oops in 2.0.36 when insmod:ing 3c59x.c 0.99H

Daniel Deimert (daniel.deimert@intermec.com)
Thu, 10 Dec 1998 16:51:17 +0100


--------------2FA115E1FEF07DD4F3AD4DDC
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit

Hi Donald and Alan!

I am not sure if this is a problem with the 3c59x.c 0.99H driver or with
the 2.0.36 kernel, so I send it to both of you.

What happened:
===========

When I ifup:ed eth0 and let kerneld load the newly compiled 3c59x.c 0.99H I
got several
Oopses and a lot of processes (X, squid, samba etc) died on the spot.
Quite unexpected behaviour :)

There was other errors as well, on paging requests. And the Oopses looked
funny - look at the second Oops Code: segment.

FIRST OOPS

general protection: 0000
CPU: 0
EIP: 0010:[do_dev_queue_xmit+121/504]
EFLAGS: 00010202
eax: 0dc396e8 ebx: 00000001 ecx: 0dc396e8 edx: 66736864
esi: 0dc396e8 edi: 0dc39038 ebp: 1538f810 esp: 16cc5e2c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process X (pid: 471, process nr: 8, stackpage=16cc5000)
Stack: 0dc396e8 0c39c810 0dc39038 1538f810 00000000 7e0c010a 0013c846
0dc396e8
1538f810 00000001 00146671 0dc396e8 1538f810 00000001 0dc396e8
0c39c810
00007d78 0dc3904c 69d9a8c0 0014d430 0c39c810 1538f810 0dc396e8
00000000
Call Trace: [dev_queue_xmit+26/36] [ip_queue_xmit+485/568]
[tcp_write_xmit+432/504] [tcp_ack+1492/2284] [kfree_skb+235/244]
[alloc_skb+100/332] [tcp_rcv+2113/2468]
[ip_rcv+1083/1448] [net_bh+252/284] [do_bottom_half+59/96]
[handle_bottom_half+11/24]
Code: ff 82 10 01 00 00 8b 92 00 01 00 00 eb 03 90 89 ea 89 d5 89

(ksymoops refuses to decode this one)

SECOND OOPS

Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<18817c0c>]
EFLAGS: 00010246
eax: 12eec668 ebx: 00000001 ecx: 12eec668 edx: 18817c0c
esi: 12eec668 edi: 179960b0 ebp: 17996018 esp: 16732e20
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0013c7fb 12eec668 17996018 12eec668 08291018 12eec038 17996018
00000000
00000246 0013c846 12eec668 17996018 00000001 00146671 12eec668
17996018
00000001 12eec668 08291018 00007d78 12eec04c 7701010a 0014d430
08291018
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>]
[<0014bb38>] [<00152f73>] [<0014ccf1>]
[<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>

Using `/boot/System.map' to map addresses to symbols.

Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>

THIRD OOPS

Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010 ebx: 0000002b ecx: 18817c0c edx: 17ac1c0c
esi: 00000000 edi: 16733000 ebp: 16732de4 esp: 16732d88
ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0019002b 00000000 00017000 16732de4 16861018 18800000 19000000
18800000
16860018 00111b9e 0019df29 16732de4 00000000 001118d0 12eec668
179960b0
17996018 00000246 09b4e298 1300c144 0010aa24 16732de4 00000000
00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>]
[<00111b9e>] [<001118d0>] [<0010aa24>]
[<18817c0c>] [<00130018>] [<18817c0c>] [<0013c7fb>] [<0013c846>]
[<00146671>] [<0014d430>] [<0014bb38>]
[<00152f73>] [<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>]
[<001185c3>] [<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Using `/boot/System.map' to map addresses to symbols.

>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 130018 <create_elf_tables+1c0/274>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>

Code: 10adbc <die_if_kernel+280/2c0>
Code: 10adbc <die_if_kernel+280/2c0> 64 8a 04 0e movb
%fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0> 0f a1 popl %fs
Code: 10adc2 <die_if_kernel+286/2c0> 88 c2 movb %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0> 81 e2 ff 00 00 andl $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0> 00
Code: 10add0 <die_if_kernel+294/2c0> 89 54 24 10 movl
%edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0> 52 pushl %edx
Code: 10add5 <die_if_kernel+299/2c0> 68 00 90 90 90 pushl $0x90909000

FOURTH OOPS
Aiee, killing interrupt handler
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<18817c0c>]
EFLAGS: 00010246
eax: 162d7888 ebx: 00000001 ecx: 162d7888 edx: 18817c0c
esi: 162d7888 edi: 179960b0 ebp: 17996018 esp: 16e3ae20
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0013c7fb 162d7888 17996018 162d7888 0dbaa414 162d7828 17996018
00000000
00000246 0013c846 162d7888 17996018 00000001 00146671 162d7888
17996018
00000001 162d7888 0dbaa414 00007d78 162d783c 54d5a8c0 0014d430
0dbaa414
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>]
[<0014bb38>] [<0014ccf1>] [<1881f801>]
[<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>

Using `/boot/System.map' to map addresses to symbols.

Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>

FIFTH OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010 ebx: 0000002b ecx: 18817c0c edx: 17ac1c0c
esi: 00000000 edi: 16e3b000 ebp: 16e3ade4 esp: 16e3ad88
ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0019002b 00000000 00017000 16e3ade4 17b33018 18800000 19000000
18800000
17b30018 00111b9e 0019df29 16e3ade4 00000000 001118d0 162d7888
179960b0
17996018 1300c164 16ee6e98 1300fc0e 0010aa24 16e3ade4 00000000
00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>]
[<00111b9e>] [<001118d0>] [<0010aa24>]
[<18817c0c>] [<00140018>] [<18817c0c>] [<0013c7fb>] [<0013c846>]
[<00146671>] [<0014d430>] [<0014bb38>]
[<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>]
[<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Aiee, killing interrupt handler

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 140018 <unix_sendmsg+ac/3dc>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>

Code: 10adbc <die_if_kernel+280/2c0>
Code: 10adbc <die_if_kernel+280/2c0> 64 8a 04 0e movb
%fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0> 0f a1 popl %fs
Code: 10adc2 <die_if_kernel+286/2c0> 88 c2 movb %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0> 81 e2 ff 00 00 andl $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0> 00
Code: 10add0 <die_if_kernel+294/2c0> 89 54 24 10 movl
%edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0> 52 pushl %edx
Code: 10add5 <die_if_kernel+299/2c0> 68 00 90 90 90 pushl $0x90909000

--
Daniel.Deimert@intermec.com     Intermec Printer AB, Göteborg, Sweden
http://www.intermec.com/        Intermec Identification Systems Division

--------------2FA115E1FEF07DD4F3AD4DDC Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit

<!doctype html public "-//w3c//dtd html 4.0 transitional//en"> Hi Donald and Alan!

I am not sure if this is a problem with the 3c59x.c 0.99H driver or with the 2.0.36 kernel, so I send it to both of you.

What happened:
===========

When I ifup:ed eth0 and let kerneld load the newly compiled 3c59x.c 0.99H I got several
Oopses and a lot of processes (X, squid, samba etc) died on the spot.  Quite unexpected behaviour :)

There was other errors as well, on paging requests. And the Oopses looked funny - look at the second Oops Code: segment.

FIRST OOPS

general protection: 0000
CPU:    0
EIP:    0010:[do_dev_queue_xmit+121/504]
EFLAGS: 00010202
eax: 0dc396e8   ebx: 00000001   ecx: 0dc396e8   edx: 66736864
esi: 0dc396e8   edi: 0dc39038   ebp: 1538f810   esp: 16cc5e2c
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process X (pid: 471, process nr: 8, stackpage=16cc5000)
Stack: 0dc396e8 0c39c810 0dc39038 1538f810 00000000 7e0c010a 0013c846 0dc396e8
       1538f810 00000001 00146671 0dc396e8 1538f810 00000001 0dc396e8 0c39c810
       00007d78 0dc3904c 69d9a8c0 0014d430 0c39c810 1538f810 0dc396e8 00000000
Call Trace: [dev_queue_xmit+26/36] [ip_queue_xmit+485/568] [tcp_write_xmit+432/504] [tcp_ack+1492/2284] [kfree_skb+235/244] [alloc_skb+100/332] [tcp_rcv+2113/2468]
       [ip_rcv+1083/1448] [net_bh+252/284] [do_bottom_half+59/96] [handle_bottom_half+11/24]
Code: ff 82 10 01 00 00 8b 92 00 01 00 00 eb 03 90 89 ea 89 d5 89

(ksymoops refuses to decode this one)
 

SECOND OOPS

Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<18817c0c>]
EFLAGS: 00010246
eax: 12eec668   ebx: 00000001   ecx: 12eec668   edx: 18817c0c
esi: 12eec668   edi: 179960b0   ebp: 17996018   esp: 16732e20
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0013c7fb 12eec668 17996018 12eec668 08291018 12eec038 17996018 00000000
       00000246 0013c846 12eec668 17996018 00000001 00146671 12eec668 17996018
       00000001 12eec668 08291018 00007d78 12eec04c 7701010a 0014d430 08291018
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>] [<00152f73>] [<0014ccf1>]
       [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>

Using `/boot/System.map' to map addresses to symbols.

Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
 

THIRD OOPS

Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010   ebx: 0000002b   ecx: 18817c0c   edx: 17ac1c0c
esi: 00000000   edi: 16733000   ebp: 16732de4   esp: 16732d88
ds: 0018   es: 0018   fs: 0010   gs: 002b   ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0019002b 00000000 00017000 16732de4 16861018 18800000 19000000 18800000
       16860018 00111b9e 0019df29 16732de4 00000000 001118d0 12eec668 179960b0
       17996018 00000246 09b4e298 1300c144 0010aa24 16732de4 00000000 00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>] [<00111b9e>] [<001118d0>] [<0010aa24>]
       [<18817c0c>] [<00130018>] [<18817c0c>] [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>]
       [<00152f73>] [<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Using `/boot/System.map' to map addresses to symbols.

>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 130018 <create_elf_tables+1c0/274>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>

Code: 10adbc <die_if_kernel+280/2c0> 
Code: 10adbc <die_if_kernel+280/2c0>  64 8a 04 0e       movb   %fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0>  0f a1             popl   %fs
Code: 10adc2 <die_if_kernel+286/2c0>  88 c2             movb   %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0>  81 e2 ff 00 00    andl   $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0>  00 
Code: 10add0 <die_if_kernel+294/2c0>  89 54 24 10       movl   %edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0>  52                pushl  %edx
Code: 10add5 <die_if_kernel+299/2c0>  68 00 90 90 90    pushl  $0x90909000


FOURTH OOPS
Aiee, killing interrupt handler
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<18817c0c>]
EFLAGS: 00010246
eax: 162d7888   ebx: 00000001   ecx: 162d7888   edx: 18817c0c
esi: 162d7888   edi: 179960b0   ebp: 17996018   esp: 16e3ae20
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0013c7fb 162d7888 17996018 162d7888 0dbaa414 162d7828 17996018 00000000 
       00000246 0013c846 162d7888 17996018 00000001 00146671 162d7888 17996018 
       00000001 162d7888 0dbaa414 00007d78 162d783c 54d5a8c0 0014d430 0dbaa414 
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>] [<0014ccf1>] [<1881f801>] 
       [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>] 
Code: <1>



Using `/boot/System.map' to map addresses to symbols.

Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>



FIFTH OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010   ebx: 0000002b   ecx: 18817c0c   edx: 17ac1c0c
esi: 00000000   edi: 16e3b000   ebp: 16e3ade4   esp: 16e3ad88
ds: 0018   es: 0018   fs: 0010   gs: 002b   ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0019002b 00000000 00017000 16e3ade4 17b33018 18800000 19000000 18800000 
       17b30018 00111b9e 0019df29 16e3ade4 00000000 001118d0 162d7888 179960b0 
       17996018 1300c164 16ee6e98 1300fc0e 0010aa24 16e3ade4 00000000 00000001 
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>] [<00111b9e>] [<001118d0>] [<0010aa24>] 
       [<18817c0c>] [<00140018>] [<18817c0c>] [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>] 
       [<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>] 
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68 
Aiee, killing interrupt handler


Using `/boot/System.map' to map addresses to symbols.

>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 140018 <unix_sendmsg+ac/3dc>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>

Code: 10adbc <die_if_kernel+280/2c0> 
Code: 10adbc <die_if_kernel+280/2c0>  64 8a 04 0e       movb   %fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0>  0f a1             popl   %fs
Code: 10adc2 <die_if_kernel+286/2c0>  88 c2             movb   %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0>  81 e2 ff 00 00    andl   $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0>  00 
Code: 10add0 <die_if_kernel+294/2c0>  89 54 24 10       movl   %edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0>  52                pushl  %edx
Code: 10add5 <die_if_kernel+299/2c0>  68 00 90 90 90    pushl  $0x90909000



 

-- 
Daniel.Deimert@intermec.com     Intermec Printer AB, Göteborg, Sweden
http://www.intermec.com/        Intermec Identification Systems Division

  --------------2FA115E1FEF07DD4F3AD4DDC-- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/