Jan Harkes <[EMAIL PROTECTED]> writes: > On Wed, Jun 26, 2002 at 03:32:49PM +0200, Steffen Neumann wrote: > > We've got a Directory that hangs on access: > > /coda/vol/festival/src/festdoc-1.4.2/speech_tools/doc/speechtools [...] > However, if you are able to unlock ls on that directory with '^C', > the deadlock must be in venus. Nope ^C (or ^Z) is hopeless, only killing the xterm helps, so the deadlock is in the kernel.
[...]
> > whatever is neccessary if someone tells me what to do.
> Could you run the oops through ksymoops, typically "dmesg | ksymoops"
Thanks to Frank Loemker we now have the right combination
of ksymoops, System.map, kernel and whoknowswhatelse. See below.
Machine is still up and running, so we can throw whatever
neccessary at it ;-)
Yours,
Steffen
ksymoops 2.4.5 on i686 2.4.18. Options used
-v /coda/homes/floemker/vmlinux (specified)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.18/ (default)
-m /coda/homes/floemker/System.map (specified)
8139too Fast Ethernet driver 0.9.24
Unable to handle kernel NULL pointer dereference at virtual address 00000008
c01230ea
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01230ea>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010286
eax: 00000000 ebx: 00000000 ecx: d44cd3e0 edx: d44cd3e0
esi: c0000000 edi: d44cd3e0 ebp: 00000108 esp: d6fedea4
ds: 0018 es: 0018 ss: 0018
Process bpbkar (pid: 27843, stackpage=d6fed000)
Stack: 00000000 c0000000 d44cd3e0 00000108 00000200 00000001 00000000 00000108
e6a68660 c0123795 d44cd3e0 d6fedf18 d6fedeec c01236bc d6fec000 c0000000
d44cd3e0 00000001 00000000 00000108 ce28ea00 00000000 c0134d78 d44cd3e0
Call Trace: [<c0123795>] [<c01236bc>] [<c0134d78>] [<e88996aa>] [<c013a3c0>]
[<e889957e>] [<c013a3c0>] [<c013a1ab>] [<c013a3c0>] [<c013a4e2>] [<c013a3c0>]
[<c0106b03>]
Code: 8b 40 08 8b b8 ac 00 00 00 8b 4f 20 89 4c 24 20 0f b7 51 30
>>EIP; c01230ea <do_generic_file_read+e/404> <=====
>>ecx; d44cd3e0 <_end+14244028/285c2c48>
>>edx; d44cd3e0 <_end+14244028/285c2c48>
>>esi; c0000000 Before first symbol
>>edi; d44cd3e0 <_end+14244028/285c2c48>
>>esp; d6fedea4 <_end+16d64aec/285c2c48>
Trace; c0123795 <generic_file_read+81/134>
Trace; c01236bc <file_read_actor+0/58>
Trace; c0134d78 <kernel_read+50/60>
Trace; e88996aa <[coda]coda_venus_readdir+102/130>
Trace; c013a3c0 <filldir+0/d8>
Trace; e889957e <[coda]coda_readdir+46/70>
Trace; c013a3c0 <filldir+0/d8>
Trace; c013a1ab <vfs_readdir+5b/7c>
Trace; c013a3c0 <filldir+0/d8>
Trace; c013a4e2 <sys_getdents+4a/98>
Trace; c013a3c0 <filldir+0/d8>
Trace; c0106b03 <system_call+2f/34>
Code; c01230ea <do_generic_file_read+e/404>
00000000 <_EIP>:
Code; c01230ea <do_generic_file_read+e/404> <=====
0: 8b 40 08 mov 0x8(%eax),%eax <=====
Code; c01230ed <do_generic_file_read+11/404>
3: 8b b8 ac 00 00 00 mov 0xac(%eax),%edi
Code; c01230f3 <do_generic_file_read+17/404>
9: 8b 4f 20 mov 0x20(%edi),%ecx
Code; c01230f6 <do_generic_file_read+1a/404>
c: 89 4c 24 20 mov %ecx,0x20(%esp,1)
Code; c01230fa <do_generic_file_read+1e/404>
10: 0f b7 51 30 movzwl 0x30(%ecx),%edx
msg03217/pgp00000.pgp
Description: PGP signature
