Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 21514 Details for
Bug 34715
"emerge tetex" makes gcc trigger a kernel panic
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
ksymoops output
ksymout.txt (text/plain), 9.90 KB, created by
Geoff Thorpe
on 2003-11-30 12:39:55 UTC
(
hide
)
Description:
ksymoops output
Filename:
MIME Type:
Creator:
Geoff Thorpe
Created:
2003-11-30 12:39:55 UTC
Size:
9.90 KB
patch
obsolete
>ksymoops 2.4.9 on i686 2.4.23. Options used > -V (default) > -k /proc/ksyms (default) > -l /proc/modules (default) > -o /lib/modules/2.4.23/ (default) > -m /usr/src/linux/System.map (default) > >Warning: You did not tell me where to find symbol information. I will >assume that the log matches the kernel and modules that are running >right now and I'll use the default options above for symbol resolution. >If the current kernel and/or modules do not match the log, you can get >more accurate output by telling me the kernel version and where to find >map, modules, ksyms etc. ksymoops -h explains the options. > >No modules in ksyms, skipping objects >Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file? >Error (regular_file): read_system_map stat /usr/src/linux/System.map failed >Unable to handle kernel NULL pointer dereference at virtual address 00000000 >*pde = 00000000 >Oops: 0000 >CPU: 0 >EIP: 0010:[<c0150022>] Not tainted >Using defaults from ksymoops -t elf32-i386 -a i386 >EFLAGS: 00010292 >eax: fffffff8 ebx: fffffff8 ecx: c030a9e8 edx: f7e6ffd0 >esi: f7e7f400 edi: 00000000 ebp: 00000000 esp: f7e6ff08 >ds: 0018 es: 0018 ss: 0018 >Process kupdated (pid: 7, stackpage=f7e6f000) >Stack: f7e6ff14 f7e6e000 f7e7f45c f7e7f400 f7e6e560 f7e6e000 c014ef95 fffffff8 > 00000000 f7e6e560 f7e6ffd0 c013eb78 f7e6e560 f7e6ffd0 c013eeb4 c0319ce0 > 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 >Call Trace: [<c014ef95>] [<c013eb78>] [<c013eeb4>] [<c0107382>] [<c013eda0>] > [<c0105000>] [<c01057de>] [<c013eda0>] >Code: 8b 43 08 8b 57 04 89 50 04 89 02 c7 47 04 00 00 00 00 8b 93 > > >>>EIP; c0150022 <update_atime+162/2a0> <===== > >>>ecx; c030a9e8 <files_lock+24/23c> > >Trace; c014ef95 <__mark_inode_dirty+2d5/430> >Trace; c013eb78 <try_to_free_buffers+188/1e0> >Trace; c013eeb4 <block_sync_page+2e4/340> >Trace; c0107382 <__up_wakeup+1272/1690> >Trace; c013eda0 <block_sync_page+1d0/340> >Trace; c0105000 <empty_zero_page+1000/1370> >Trace; c01057de <machine_power_off+1fe/410> >Trace; c013eda0 <block_sync_page+1d0/340> > >Code; c0150022 <update_atime+162/2a0> >00000000 <_EIP>: >Code; c0150022 <update_atime+162/2a0> <===== > 0: 8b 43 08 mov 0x8(%ebx),%eax <===== >Code; c0150025 <update_atime+165/2a0> > 3: 8b 57 04 mov 0x4(%edi),%edx >Code; c0150028 <update_atime+168/2a0> > 6: 89 50 04 mov %edx,0x4(%eax) >Code; c015002b <update_atime+16b/2a0> > 9: 89 02 mov %eax,(%edx) >Code; c015002d <update_atime+16d/2a0> > b: c7 47 04 00 00 00 00 movl $0x0,0x4(%edi) >Code; c0150034 <update_atime+174/2a0> > 12: 8b 93 00 00 00 00 mov 0x0(%ebx),%edx > >Please submit a full bug report. >Unable to handle kernel paging request at virtual address 8b0cec83 >8b0cec83 >*pde = 00000000 >Oops: 0000 >CPU: 0 >EIP: 0010:[<8b0cec83>] Not tainted >EFLAGS: 00010282 >eax: c032a7e0 ebx: 00000001 ecx: f06c88c0 edx: 8b0cec83 >esi: f06c88c0 edi: f7e83000 ebp: 00000000 esp: f0711f18 >ds: 0018 es: 0018 ss: 0018 >Process sandbox (pid: 1266, stackpage=f0711000) >Stack: c014ed56 f06c88c0 3fca3da5 00000005 00000005 c014ff2b f06c88c0 00000001 > 00000000 c0137806 f06c88c0 c18529cc 00000000 00000005 00002cb0 f06c88c0 > c18529cc 0804dbf0 00000000 ffffffea 00000005 c01378e4 f66f8ec0 f66f8ee0 >Call Trace: [<c014ed56>] [<c014ff2b>] [<c0137806>] [<c01378e4>] [<c013a463>] > [<c01073cf>] >Code: Bad EIP value. > > >>>EIP; 8b0cec83 Before first symbol <===== > >>>eax; c032a7e0 <init_task_union+27e0/79c0> > >Trace; c014ed56 <__mark_inode_dirty+96/430> >Trace; c014ff2b <update_atime+6b/2a0> >Trace; c0137806 <alloc_pages_node+1546/22e0> >Trace; c01378e4 <alloc_pages_node+1624/22e0> >Trace; c013a463 <default_llseek+2a3/cd0> >Trace; c01073cf <__up_wakeup+12bf/1690> > >kernel BUG at prints.c:341! >invalid operand: 0000 >CPU: 0 >EIP: 0010:[<c01b3138>] Not tainted >EFLAGS: 00010282 >eax: 0000005d ebx: f7c28800 ecx: 00000001 edx: c0308ddc >esi: 00000001 edi: f523fdd4 ebp: 00000002 esp: f523fd20 >ds: 0018 es: 0018 ss: 0018 >Process emerge (pid: 1086, stackpage=f52f000) >Stack: c02c745a c038fda0 c038c600 f7c28800 c01c21bd f7c28800 c02d31c0 f8b36920 > 00000000 00000000 00000000 f7c28800 00000003 f523fdd4 f8b36970 c01c272d > f523fdd4 f7c28800 00000001 00000003 00000018 3fca3da5 c0248c6e 00000000 >Call Trace: [<c01c21bd>] [<c01c272d>] [<c0248c6e>] [<c01c1494>] [<c01c15e7>] > [<c01ab4a2>] [<c0129828>] [<c01282bb>] [<c013b402>] [<c012ae05>] [<c01188f7>] > [<c011d4b7>] [<c0122f3c>] [<c0123115>] [<c010710e>] [<c011d7e0>] [<c0116410>] > [<c0107408>] >Code: 0f 0b 55 01 6d 74 2c c0 85 db 74 0e 0f b7 43 08 89 04 24 e8 > > >>>EIP; c01b3138 <load_nls_default+2ab68/41d60> <===== > >>>edx; c0308ddc <abi_defhandler_libcso+1a4/288> > >Trace; c01c21bd <load_nls_default+39bed/41d60> >Trace; c01c272d <load_nls_default+3a15d/41d60> >Trace; c0248c6e <fbcon_cfb16_clear+15e/190> >Trace; c01c1494 <load_nls_default+38ec4/41d60> >Trace; c01c15e7 <load_nls_default+39017/41d60> >Trace; c01ab4a2 <load_nls_default+22ed2/41d60> >Trace; c0129828 <vmalloc_to_page+1b8/610> >Trace; c01282bb <pm_find+42b/500> >Trace; c013b402 <fput+102/130> >Trace; c012ae05 <do_brk+3b5/630> >Trace; c01188f7 <remove_wait_queue+2f7/880> >Trace; c011d4b7 <exit_mm+3e7/5a0> >Trace; c0122f3c <exit_sighand+13c/140> >Trace; c0123115 <dequeue_signal+65/500> >Trace; c010710e <__up_wakeup+ffe/1690> >Trace; c011d7e0 <complete_and_exit+170/1540> >Trace; c0116410 <__verify_write+1c0/8d0> >Trace; c0107408 <__up_wakeup+12f8/1690> > >Code; c01b3138 <load_nls_default+2ab68/41d60> >00000000 <_EIP>: >Code; c01b3138 <load_nls_default+2ab68/41d60> <===== > 0: 0f 0b ud2a <===== >Code; c01b313a <load_nls_default+2ab6a/41d60> > 2: 55 push %ebp >Code; c01b313b <load_nls_default+2ab6b/41d60> > 3: 01 6d 74 add %ebp,0x74(%ebp) >Code; c01b313e <load_nls_default+2ab6e/41d60> > 6: 2c c0 sub $0xc0,%al >Code; c01b3140 <load_nls_default+2ab70/41d60> > 8: 85 db test %ebx,%ebx >Code; c01b3142 <load_nls_default+2ab72/41d60> > a: 74 0e je 1a <_EIP+0x1a> >Code; c01b3144 <load_nls_default+2ab74/41d60> > c: 0f b7 43 08 movzwl 0x8(%ebx),%eax >Code; c01b3148 <load_nls_default+2ab78/41d60> > 10: 89 04 24 mov %eax,(%esp,1) >Code; c01b314b <load_nls_default+2ab7b/41d60> > 13: e8 00 00 00 00 call 18 <_EIP+0x18> > >Unable to handle kernel NULL pointer dereference at virtual address 00000003 > 00000003 >*pde = 00000000 >Oops: 0000 >CPU: 0 >EIP: 0010:[<00000003>] Not tainted >EFLAGS: 00010206 >eax: c022c940 ebx: 00000001 ecx: f640a900 edx: 00000003 >esi: f640a900 edi: f7e5f000 ebp: 00000002 esp: c19b7e44 >ds: 0018 es: 0018 ss: 0018 >Process init (pid: 1, stackpage=c19b7000) >Stack: c014ed56 f640a900 3fca3da5 ffffff91 c19b7e7c c014ff2b f640a900 00000001 > f7e7bc40 c029abe8 f640a900 00000002 c030a2b8 c030a48c f74dcec0 c19ac380 > c0133df4 00000a00 00038a00 00000009 00000001 c013d8bb dac9e4e0 f7711080 >Call Trace: [<c014ed56>] [<c014ff2b>] [<c029abe8>] [<c0133df4>] [<c013d8bb>] > [<c029b04e>] [<c024e5cd>] [<c024d58f>] [<c014c8ed>] [<c024e19d>] [<c024f0c7>] > [<c01073cf>] >Code: Bad EIP value. > > >>>EIP; 00000003 Before first symbol <===== > >>>eax; c022c940 <scsi_free+7340/e170> > >Trace; c014ed56 <__mark_inode_dirty+96/430> >Trace; c014ff2b <update_atime+6b/2a0> >Trace; c029abe8 <ip_nat_helper_unregister+2898/6e50> >Trace; c0133df4 <__alloc_pages+64/270> >Trace; c013d8bb <generic_commit_write+4b/90> >Trace; c029b04e <ip_nat_helper_unregister+2cfe/6e50> >Trace; c024e5cd <sock_create+58d/1240> >Trace; c024d58f <sock_map_fd+14f/180> >Trace; c014c8ed <lease_get_mtime+67d/c90> >Trace; c024e19d <sock_create+15d/1240> >Trace; c024f0c7 <sock_create+1087/1240> >Trace; c01073cf <__up_wakeup+12bf/1690> > > <0>Kernel panic: Attempted to kill init! >Unable to handle kernel NULL pointer dereference at virtual address 00000018 >c02639f3 >*pde = 00000000 >Oops: 0000 >CPU: 0 >EIP: 0010:[<c02639f3>] Not tainted >EFLAGS: 00010207 >eax: f5c7cc84 ebx: c19b7934 ecx: 00000000 edx: 00000000 >esi: c19b792c edi: 4882cb18 ebp: f6e646c0 esp: c19b7920 >ds: 0018 es: 0018 ss: 0018 >Process init (pid: 1, stackpage=c19b7000) >Stack: 00000000 00000000 c0321fc8 f6f1b280 f5c7cc84 c19b7a4c c19b79d4 00000286 > c19b79d4 c19b797c 00000286 00000001 c19b79d4 c19b797c c01a3a06 c19b79d4 > c19b7be0 f6776000 f6952320 c0258de0 c19b799c f7e5b800 f53920c0 f7e5b800 >Call Trace: [<c01a3a06>] [<c0258de0>] [<c0284847>] [<c0250cea>] [<c025014c>] >Code: 8b 4a 18 39 cf 74 17 39 cf 8d 42 04 0f 42 c2 89 03 8b 10 83 > > >>>EIP; c02639f3 <ip_route_output_key+1133/1890> <===== > >Trace; c01a3a06 <load_nls_default+1b436/41d60> >Trace; c0258de0 <neigh_lookup+20/a0> >Trace; c0284847 <arp_find+227/260> >Trace; c0250cea <alloc_skb+aa/330> >Trace; c025014c <sock_alloc_send_pskb+bc/1b0> > >Code; c02639f3 <ip_route_output_key+1133/1890> >00000000 <_EIP>: >Code; c02639f3 <ip_route_output_key+1133/1890> <===== > 0: 8b 4a 18 mov 0x18(%edx),%ecx <===== >Code; c02639f6 <ip_route_output_key+1136/1890> > 3: 39 cf cmp %ecx,%edi >Code; c02639f8 <ip_route_output_key+1138/1890> > 5: 74 17 je 1e <_EIP+0x1e> >Code; c02639fa <ip_route_output_key+113a/1890> > 7: 39 cf cmp %ecx,%edi >Code; c02639fc <ip_route_output_key+113c/1890> > 9: 8d 42 04 lea 0x4(%edx),%eax >Code; c02639ff <ip_route_output_key+113f/1890> > c: 0f 42 c2 cmovb %edx,%eax >Code; c0263a02 <ip_route_output_key+1142/1890> > f: 89 03 mov %eax,(%ebx) >Code; c0263a04 <ip_route_output_key+1144/1890> > 11: 8b 10 mov (%eax),%edx >Code; c0263a06 <ip_route_output_key+1146/1890> > 13: 83 00 00 addl $0x0,(%eax) > > <0>Kernel panic: Aiee, killing interrupt handler! > >2 warnings and 1 error issued. Results may not be reliable.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 34715
: 21514 |
21515
|
21516