From: Evgeny Sinelnikov <sin@altlinux.ru> To: ALT Linux kernel packages development <devel-kernel@altlinux.ru> Subject: [d-kernel] 2.6.1-alt5 splash oops Date: Tue, 27 Jan 2004 23:08:40 +0300 Message-ID: <200401272309.22787.sin@altlinux.ru> (raw) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 В чем может быть причина? Во время последней перезагрузки получил oops: ksymoops 2.4.9 on i686 2.6.1-std26-up-alt5. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.1-std26-up-alt5/ (default) -m /boot/System.map-2.6.1-std26-up-alt5 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed ksymoops: No such file or directory No modules in ksyms, skipping objects No ksyms, skipping lsmod Jan 27 22:20:39 localhost kernel: Unable to handle kernel paging request at virtual address cddaeb2a Jan 27 22:20:39 localhost kernel: c021adcf Jan 27 22:20:39 localhost kernel: *pde = 00000021 Jan 27 22:20:39 localhost kernel: Oops: 0000 [#1] Jan 27 22:20:39 localhost kernel: CPU: 0 Jan 27 22:20:39 localhost kernel: EIP: 0060:[splash_renderc+223/432] Tainted: PF Jan 27 22:20:39 localhost kernel: EIP: 0060:[<c021adcf>] Tainted: PF Using defaults from ksymoops -t elf32-i386 -a i386 Jan 27 22:20:39 localhost kernel: EFLAGS: 00010202 Jan 27 22:20:39 localhost kernel: eax: 00000001 ebx: cddaeb2a ecx: cc9b4b2a edx: 00000000 Jan 27 22:20:39 localhost kernel: esi: 00000000 edi: 00000000 ebp: 0000ad55 esp: c4159dc4 Jan 27 22:20:39 localhost kernel: ds: 007b es: 007b ss: 0068 Jan 27 22:20:39 localhost kernel: Stack: 00000800 00000010 00000000 00000000 00000001 000002c0 00000140 000 Jan 27 22:20:39 localhost kernel: c03993a0 c021b448 cd9ae000 c03993a0 00000007 00000000 c0399589 000 Jan 27 22:20:39 localhost kernel: 00000195 00000010 00000008 00000002 c11ec000 c03993a0 0000000c c02 Jan 27 22:20:39 localhost kernel: Call Trace: Jan 27 22:20:39 localhost kernel: [<c021b448>] splash_cursor+0x118/0x1b0 Jan 27 22:20:39 localhost kernel: [<c0214210>] fbcon_cursor+0x3e0/0x430 Jan 27 22:20:39 localhost kernel: [<c01da9dd>] hide_cursor+0x4d/0x90 Jan 27 22:20:39 localhost kernel: [<c01dac48>] redraw_screen+0x128/0x130 Jan 27 22:20:39 localhost kernel: [<c01db2ac>] vc_resize+0x3dc/0x4b0 Jan 27 22:20:39 localhost kernel: [<c0218727>] splash_status+0xe7/0x150 Jan 27 22:20:39 localhost kernel: [<c021898f>] splash_write_proc+0x13f/0x3e0 Jan 27 22:20:39 localhost kernel: [<c0183f0e>] proc_file_write+0x2e/0x40 Jan 27 22:20:39 localhost kernel: [<c0154f5a>] vfs_write+0xaa/0xf0 Jan 27 22:20:39 localhost kernel: [<c015501d>] sys_write+0x2d/0x50 Jan 27 22:20:39 localhost kernel: [<c010b187>] syscall_call+0x7/0xb Jan 27 22:20:39 localhost kernel: Code: 66 8b 03 89 c2 81 e2 ff ff 00 00 8d b6 00 00 00 00 83 c3 02 >>EIP; c021adcf <splash_renderc+df/1b0> <===== >>ebx; cddaeb2a <__crc_poll_freewait+738cd9/193d29c> >>ecx; cc9b4b2a <__crc_pci_get_subsys+695fb/15bd5d> >>esp; c4159dc4 <__crc_generic_read_dir+1ba30b/277905> Trace; c021b448 <splash_cursor+118/1b0> Trace; c0214210 <fbcon_cursor+3e0/430> Trace; c01da9dd <hide_cursor+4d/90> Trace; c01dac48 <redraw_screen+128/130> Trace; c01db2ac <vc_resize+3dc/4b0> Trace; c0218727 <splash_status+e7/150> Trace; c021898f <splash_write_proc+13f/3e0> Trace; c0183f0e <proc_file_write+2e/40> Trace; c0154f5a <vfs_write+aa/f0> Trace; c015501d <sys_write+2d/50> Trace; c010b187 <syscall_call+7/b> Code; c021adcf <splash_renderc+df/1b0> 00000000 <_EIP>: Code; c021adcf <splash_renderc+df/1b0> <===== 0: 66 8b 03 mov (%ebx),%ax <===== Code; c021add2 <splash_renderc+e2/1b0> 3: 89 c2 mov %eax,%edx Code; c021add4 <splash_renderc+e4/1b0> 5: 81 e2 ff ff 00 00 and $0xffff,%edx Code; c021adda <splash_renderc+ea/1b0> b: 8d b6 00 00 00 00 lea 0x0(%esi),%esi Code; c021ade0 <splash_renderc+f0/1b0> 11: 83 c3 02 add $0x2,%ebx 1 warning and 1 error issued. Results may not be reliable. - -- Sin -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) iD8DBQFAFsVTHC/AO6kh2soRAs89AKCEaAVFkqfWG3jGed6hC+++oWGXUwCdFLzM wjlcs3XD7qhk+QidKyQSMGw= =BOlQ -----END PGP SIGNATURE-----
next reply other threads:[~2004-01-27 20:08 UTC|newest] Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top 2004-01-27 20:08 Evgeny Sinelnikov [this message] 2004-01-27 21:11 ` Alexey Kotovich
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=200401272309.22787.sin@altlinux.ru \ --to=sin@altlinux.ru \ --cc=devel-kernel@altlinux.ru \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux kernel packages development This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/devel-kernel/0 devel-kernel/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 devel-kernel devel-kernel/ http://lore.altlinux.org/devel-kernel \ devel-kernel@altlinux.org devel-kernel@altlinux.ru devel-kernel@altlinux.com public-inbox-index devel-kernel Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.devel-kernel AGPL code for this site: git clone https://public-inbox.org/public-inbox.git