Re[2]: Kennel Panic


From: Rob Fowler (orchid_at_mianos.com)
Date: 2002-07-26 11:45:30 UTC



Sorry, I probably should have sent this to the mail list instead of direct.

On Thu, 25 Jul 2002 17:02:53 +0300
Jouni Malinen <jkmaline_at_cc.hut.fi> wrote:

> 
> I would like to get call trace from that and parsed with ksymoops (i.e.,
> function names). If this is too much problem, then at least EIP and
> first few entries in the Call Trace resolved manually (kernel functions
> from System.map and Host AP symbols by manually loading the modules with
> 'insmod -m hostap_pci.o > hostap_pci.map'.
> 

I made a new system with a serial console so I can easily capture stuff. (I cou;d run kgdb on it now if needed).

Running ksymoops

Reading Oops report from the terminal
Oops: 0002
CPU: 0
Oops: 0002
EIP: 0010:[<c01c4b9e>] Not tainted EFLAGS: 00010206

CPU:    0
eax: c01c555c   ebx: c7765148   ecx: c7765120   edx: 3ad43b00
EIP:    0010:[<c01c4b9e>]    Not tainted
Using defaults from ksymoopsesi: c12f2a8e edi: c776514e ebp: c7765148 esp: c0243eac  -t elf32-i386 -a i386
EFLAGS: 00010206ds: 0018 es: 0018 ss: 0018

eax: c01c555c ebx: c7765148 ecx: c7765120 edx: 3ad43b00 Process swapper (pid: 0, stackpage=c0243000) esi: c12f2a8e edi: c776514e ebp: c7765148 esp: c0243eac Stack: c01c526e c7765120 c7765120 c7765120 c7e43d40 c12f2a80 00082000 c78d2000 ds: 0018 es: 0018 ss: 0018

       00000000 04083d40 c01ecfa0 c7765120 c12f2a88 00000004 00000000 00000001 Process swapper (pid: 0, stackpage=c0243000)

       00000000 c7e43d40 c7e43d40 c78d2000 c0243f24 ffffffff c0243f20 c7e43d40 Stack: c01c526e c7765120 c7765120 c7765120 c7e43d40 c12f2a80 00082000 c78d2000

       00000000 04083d40 c01ecfa0 c7765120 c12f2a88 00000004 00000000 00000001 Call Trace: [<c01c526e>] [<c01ecfa0>] [<c01c22ed>] [<c011685a>] [<c010818d>]

       00000000 c7e43d40 c7e43d40 c78d2000 c0243f24 ffffffff c0243f20 c7e43d40 [<c0109f88>] [<c0105383>] [<c010e895>] [<c010e78c>] [<c01053e7>] [<c0105000>]  

Call Trace: [<c01c526e>] [<c01ecfa0>] [<c01c22ed>] [<c011685a>] [<c010818d>]

   [<c0105027>]
   [<c0109f88>] [<c0105383>] [<c010e895>] [<c010e78c>] [<c01053e7>] [<c0105000>]

   [<c0105027>]
Code: 89 42 10 8b 12 85 d2 75 f1 c3 8b 4c 24 04 8b 41 60 8b 51 30 Code: 89 42 10 8b 12 85 d2 75 f1 c3 8b 4c 24 04 8b 41 60 8b 51 30  <0>Kernel panic: Aiee, killing interrupt handler! In interrupt handler - not syncing  

>>EIP; c01c4b9e <neigh_suspect+1a/24> <=====

>>eax; c01c555c <neigh_resolve_output+0/194>
>>ebx; c7765148 <_end+74bf37c/860a234>
>>ecx; c7765120 <_end+74bf354/860a234>
>>esi; c12f2a8e <_end+104ccc2/860a234>
>>edi; c776514e <_end+74bf382/860a234>
>>ebp; c7765148 <_end+74bf37c/860a234>
>>esp; c0243eac <init_task_union+1eac/2000>

Trace; c01c526e <neigh_update+22e/334>
Trace; c01ecfa0 <arp_rcv+3f8/458>
Trace; c01c22ed <net_rx_action+135/210>
Trace; c011685a <do_softirq+5a/ac>
Trace; c010818d <do_IRQ+a1/b4>
Trace; c0109f88 <call_do_IRQ+5/d>
Trace; c0105383 <default_idle+23/28>
Trace; c010e895 <apm_cpu_idle+109/13c>
Trace; c010e78c <apm_cpu_idle+0/13c>
Trace; c01053e7 <cpu_idle+3f/54>
Trace; c0105000 <_stext+0/0>
Trace; c0105027 <rest_init+27/28>

Code; c01c4b9e <neigh_suspect+1a/24>
00000000 <_EIP>:
Code; c01c4b9e <neigh_suspect+1a/24> <=====

   0:   89 42 10                  mov    %eax,0x10(%edx)   <=====
Code;  c01c4ba1 <neigh_suspect+1d/24>
   3:   8b 12                     mov    (%edx),%edx
Code;  c01c4ba3 <neigh_suspect+1f/24>
   5:   85 d2                     test   %edx,%edx
Code;  c01c4ba5 <neigh_suspect+21/24>
   7:   75 f1                     jne    fffffffa <_EIP+0xfffffffa> c01c4b98 <neigh_suspect+14/24>
Code;  c01c4ba7 <neigh_suspect+23/24>
   9:   c3                        ret    
Code;  c01c4ba8 <neigh_connect+0/28>
   a:   8b 4c 24 04               mov    0x4(%esp,1),%ecx
Code;  c01c4bac <neigh_connect+4/28>
   e:   8b 41 60                  mov    0x60(%ecx),%eax
Code;  c01c4baf <neigh_connect+7/28>
  11:   8b 51 30                  mov    0x30(%ecx),%edx

 <0>Kernel panic: Aiee, killing interrupt handler!



This archive was generated by hypermail 2.1.4.