Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 24348 Details for
Bug 39272
gentoo-source-2.4.22-r5 freeze as distccd server
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Output from ksymoops
ksymoops-out.txt (text/plain), 3.65 KB, created by
Canek Peláez Valdés
on 2004-01-24 11:38:45 UTC
(
hide
)
Description:
Output from ksymoops
Filename:
MIME Type:
Creator:
Canek Peláez Valdés
Created:
2004-01-24 11:38:45 UTC
Size:
3.65 KB
patch
obsolete
>ksymoops 2.4.9 on i686 2.4.22-gentoo-r5. Options used > -V (default) > -k /proc/ksyms (default) > -l /proc/modules (default) > -o /lib/modules/2.4.22-gentoo-r5/ (default) > -m /usr/src/linux/System.map (default) > >Warning: You did not tell me where to find symbol information. I will >assume that the log matches the kernel and modules that are running >right now and I'll use the default options above for symbol resolution. >If the current kernel and/or modules do not match the log, you can get >more accurate output by telling me the kernel version and where to find >map, modules, ksyms etc. ksymoops -h explains the options. > >kernel BUG at page_alloc.c:116! >invalid operand: 0000 >CPU: 0 >EIP: 0010:[<c01bc901>] Tainted: P >Using defaults from ksymoops -t elf32-i386 -a i386 >EFLAGS: 00010202 >eax: 00000001 ebx: c1553f14 ecx: c1553f14 edx: 00000001 >esi: 00000000 edi: dc143120 ebp: 00000004 esp: c013dd60 >ds: 0018 es: 0018 ss: 0018 >Process swaper (pid:0, stackpage=c013d000) >Stack: 01010101 c5655200 c5655200 0011cd9d 000431d1 0011cd9b 4012b894 00003bee > 00000001 dc1430c0 dc143120 00000004 c026c2ac c90c7d80 dc1430c0 dc1430f0 > c026c2e3 dc1430c0 dba36cc0 c8d70a3c c026c402 dc1430c0 c8d70a3c c8d70980 >Call Trace: [<c026c2ac>] [<c026c2e3>] [<c026c402>] [<c028e3a9>] [<c029377f>] > [<c028e9dc>] [<c0291d47>] [<c0299538>] [<c0299aec>] [<c027ed0c>] [<c027f04c>] > [<f8db0878>] [<c02702e3>] [<c027040d>] [<c0270524>] [<c01a4b9d>] [<c018fbbf>] > [<c018c100>] [<c0192353>] [<c018c100>] [<c018c100>] [<c018c123>] [<c018c174>] >Code: 0f 0b 74 00 2d 20 2c c0 e9 47 fd ff ff 89 f6 55 57 56 53 83 > > >>>EIP; c01bc901 <__free_pages_ok+2f1/300> <===== > >>>ebx; c1553f14 <_end+127035c/38a3b4a8> >>>ecx; c1553f14 <_end+127035c/38a3b4a8> >>>edi; dc143120 <_end+1be5f568/38a3b4a8> >>>esp; c013dd60 <init_task_union+1d60/2000> > >Trace; c026c2ac <skb_release_data+7c/a0> >Trace; c026c2e3 <kfree_skbmem+13/70> >Trace; c026c402 <__kfree_skb+c2/110> >Trace; c028e3a9 <tcp_clean_rtx_queue+139/390> >Trace; c029377f <tcp_write_xmit+16f/2b0> >Trace; c028e9dc <tcp_ack+dc/390> >Trace; c0291d47 <tcp_rcv_state_process+1c7/aa7> >Trace; c0299538 <tcp_v4_do_rcv+a8/130> >Trace; c0299aec <tcp_v4_rcv+52c/700> >Trace; c027ed0c <ip_local_deliver+13c/170> >Trace; c027f04c <ip_rcv+30c/410> >Trace; f8db0878 <[8139too]rtl8139_rx_interrupt+178/320> >Trace; c02702e3 <netif_receive_skb+c3/180> >Trace; c027040d <process_backlog+6d/110> >Trace; c0270524 <net_rx_action+74/130> >Trace; c01a4b9d <do_softirq+bd/c0> >Trace; c018fbbf <do_IRQ+cf/e0> >Trace; c018c100 <default_idle+0/30> >Trace; c0192353 <call_do_IRQ+5/a> >Trace; c018c100 <default_idle+0/30> >Trace; c018c100 <default_idle+0/30> >Trace; c018c123 <default_idle+23/30> >Trace; c018c174 <cpu_idle+24/30> > >Code; c01bc901 <__free_pages_ok+2f1/300> >00000000 <_EIP>: >Code; c01bc901 <__free_pages_ok+2f1/300> <===== > 0: 0f 0b ud2a <===== >Code; c01bc903 <__free_pages_ok+2f3/300> > 2: 74 00 je 4 <_EIP+0x4> >Code; c01bc905 <__free_pages_ok+2f5/300> > 4: 2d 20 2c c0 e9 sub $0xe9c02c20,%eax >Code; c01bc90a <__free_pages_ok+2fa/300> > 9: 47 inc %edi >Code; c01bc90b <__free_pages_ok+2fb/300> > a: fd std >Code; c01bc90c <__free_pages_ok+2fc/300> > b: ff (bad) >Code; c01bc90d <__free_pages_ok+2fd/300> > c: ff 89 f6 55 57 56 decl 0x565755f6(%ecx) >Code; c01bc913 <rmqueue+3/260> > 12: 53 push %ebx >Code; c01bc914 <rmqueue+4/260> > 13: 83 00 00 addl $0x0,(%eax) > > <0>Kernel panic: Aiee, killing interrupt handler! > >1 warning issued. Results may not be reliable.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 39272
:
24347
| 24348 |
24351