Panic with latest sources.

Matthew Dillon dillon at apollo.backplane.com
Tue Feb 10 19:21:58 PST 2004


:CPU: AMD Athlon(tm) Processor (805.65-MHz 686-class CPU)
:  Origin = "AuthenticAMD"  Id = 0x622  Stepping = 2
: 
:Features=0x183f9ff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,P
:A
:T,PSE36,MMX,FXSR>
:  AMD Features=0xc0400000<AMIE,DSP,3DNow!>
:real memory  = 268369920 (262080K bytes)
:
:
:Fatal trap 12: page fault while in kernel mode
:fault virtual address   = 0x0
:fault code              = supervisor write, page not present
:instruction pointer     = 0x8:0xc0273363
:stack pointer           = 0x10:0xc03fad40
:frame pointer           = 0x10:0xc03fad84
:code segment            = base 0x0, limit 0xfffff, type 0x1b
:                        = DPL 0, pres 1, def32 1, gran 1
:processor eflags        = interrupt enabled, resume, IOPL = 0
:current process         = 0 (thread0)
:current thread          = pri 44 (CRIT)
:interrupt mask          = net tty bio cam
:kernel: type 12 trap, code=2
:Stopped at      0xc0273363:     repe stosl      %es:(%edi)
:db> where
:(null)(0,3f7c00,405000,0,c0121cac) at 0xc0273363
:(null)(3f7000,0,0,0,0) at 0xc017717d
:(null)() at 0xc0121cac
:db>
:
:---------------------------------------
:Robin P. Blanchard
:Systems Integration Specialist

    To help track this down you need to do a 'nm -n' on the kernel binary
    you booted that generated this error.  It's faulting early enough
    that DDB can't generate symbols.

    EMail the nm output to me privately (it's quite a lot of junk so no need
    to bloat the list with it).  Or, alternatively, you can weed out the
    symbols & addresses which bracket the instruction addresses above and
    post just those.

					-Matt
					Matthew Dillon 
					<dillon at xxxxxxxxxxxxx>





More information about the Kernel mailing list