From: Rob Fowler (orchid_at_mianos.com)
Date: 2002-07-26 11:45:30 UTC
Sorry, I probably should have sent this to the mail list instead of
direct.
On Thu, 25 Jul 2002 17:02:53 +0300
Jouni Malinen <jkmaline_at_cc.hut.fi> wrote:
> > I would like to get call trace from that and parsed with ksymoops (i.e., > function names). If this is too much problem, then at least EIP and > first few entries in the Call Trace resolved manually (kernel functions > from System.map and Host AP symbols by manually loading the modules with > 'insmod -m hostap_pci.o > hostap_pci.map'. >
Running ksymoops
Reading Oops report from the terminal
Oops: 0002
CPU: 0
Oops: 0002
EIP: 0010:[<c01c4b9e>] Not tainted
EFLAGS: 00010206
CPU: 0 eax: c01c555c ebx: c7765148 ecx: c7765120 edx: 3ad43b00 EIP: 0010:[<c01c4b9e>] Not taintedUsing defaults from ksymoopsesi: c12f2a8e edi: c776514e ebp: c7765148 esp: c0243eac -t elf32-i386 -a i386
eax: c01c555c ebx: c7765148 ecx: c7765120 edx: 3ad43b00 Process swapper (pid: 0, stackpage=c0243000) esi: c12f2a8e edi: c776514e ebp: c7765148 esp: c0243eac Stack: c01c526e c7765120 c7765120 c7765120 c7e43d40 c12f2a80 00082000 c78d2000 ds: 0018 es: 0018 ss: 0018
00000000 04083d40 c01ecfa0 c7765120 c12f2a88 00000004 00000000 00000001 Process swapper (pid: 0, stackpage=c0243000)
00000000 c7e43d40 c7e43d40 c78d2000 c0243f24 ffffffff c0243f20 c7e43d40 Stack: c01c526e c7765120 c7765120 c7765120 c7e43d40 c12f2a80 00082000 c78d2000
00000000 04083d40 c01ecfa0 c7765120 c12f2a88 00000004 00000000 00000001 Call Trace: [<c01c526e>] [<c01ecfa0>] [<c01c22ed>] [<c011685a>] [<c010818d>]
00000000 c7e43d40 c7e43d40 c78d2000 c0243f24 ffffffff c0243f20 c7e43d40 [<c0109f88>] [<c0105383>] [<c010e895>] [<c010e78c>] [<c01053e7>] [<c0105000>]
Call Trace: [<c01c526e>] [<c01ecfa0>] [<c01c22ed>] [<c011685a>] [<c010818d>]
[<c0105027>]
[<c0109f88>] [<c0105383>] [<c010e895>] [<c010e78c>] [<c01053e7>] [<c0105000>]
[<c0105027>]
Code: 89 42 10 8b 12 85 d2 75 f1 c3 8b 4c 24 04 8b 41 60 8b 51 30
Code: 89 42 10 8b 12 85 d2 75 f1 c3 8b 4c 24 04 8b 41 60 8b 51 30
<0>Kernel panic: Aiee, killing interrupt handler!
In interrupt handler - not syncing
>>EIP; c01c4b9e <neigh_suspect+1a/24> <=====
>>eax; c01c555c <neigh_resolve_output+0/194>
>>ebx; c7765148 <_end+74bf37c/860a234>
>>ecx; c7765120 <_end+74bf354/860a234>
>>esi; c12f2a8e <_end+104ccc2/860a234>
>>edi; c776514e <_end+74bf382/860a234>
>>ebp; c7765148 <_end+74bf37c/860a234>
>>esp; c0243eac <init_task_union+1eac/2000>
Trace; c01c526e <neigh_update+22e/334> Trace; c01ecfa0 <arp_rcv+3f8/458> Trace; c01c22ed <net_rx_action+135/210> Trace; c011685a <do_softirq+5a/ac> Trace; c010818d <do_IRQ+a1/b4> Trace; c0109f88 <call_do_IRQ+5/d> Trace; c0105383 <default_idle+23/28> Trace; c010e895 <apm_cpu_idle+109/13c> Trace; c010e78c <apm_cpu_idle+0/13c> Trace; c01053e7 <cpu_idle+3f/54> Trace; c0105000 <_stext+0/0> Trace; c0105027 <rest_init+27/28>
Code; c01c4b9e <neigh_suspect+1a/24>
00000000 <_EIP>:
Code; c01c4b9e <neigh_suspect+1a/24> <=====
0: 89 42 10 mov %eax,0x10(%edx) <===== Code; c01c4ba1 <neigh_suspect+1d/24> 3: 8b 12 mov (%edx),%edx Code; c01c4ba3 <neigh_suspect+1f/24> 5: 85 d2 test %edx,%edx Code; c01c4ba5 <neigh_suspect+21/24> 7: 75 f1 jne fffffffa <_EIP+0xfffffffa> c01c4b98 <neigh_suspect+14/24> Code; c01c4ba7 <neigh_suspect+23/24> 9: c3 ret Code; c01c4ba8 <neigh_connect+0/28> a: 8b 4c 24 04 mov 0x4(%esp,1),%ecx Code; c01c4bac <neigh_connect+4/28> e: 8b 41 60 mov 0x60(%ecx),%eax Code; c01c4baf <neigh_connect+7/28> 11: 8b 51 30 mov 0x30(%ecx),%edx
<0>Kernel panic: Aiee, killing interrupt handler!