[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: O2 boot



Thomas, someone just reported a similar problem to what Giuseppe has
been seeing.  See below.

* dleecurt@cc.usu.edu <dleecurt@cc.usu.edu> [2008-03-12 18:09]:
>  Ok here you go, it seemed like there was more when I was using the graphical
> console.
> 
> CPU 0 Unable to handle kernel paging request at virtual address 0000000000000000,
> epc == 98000000013f1160, ra == 98000000013f1160
> Oops[#1]:
> Cpu 0
> $ 0   : 0000000000000000 ffffffff9005fce0 ffffffffffffff86 0000000000000007
> $ 4   : 98000000008d3140 0000000000000006 0000000000024000 0000000000000000
> $ 8   : 9800000000864690 0000000000000079 180000800a208000 404000030a0808ff
> $12   : 0000000000000008 ffffffff801e6dc8 0000000000000000 ffffffff80434000
> $16   : 980000000ed37140 980000000ebf7ae8 980000000ebf7b50 0000000000000000
> $20   : 980000000ebf7b60 9800000000b473c0 98000000013eba20 000000007f81af73
> $24   : 0000000000000000 ffffffff80074648                                  
> $28   : 980000000ebf4000 980000000ebf7ad0 000000000046cf0c 98000000013f1160
> Hi    : 0000000000000000
> Lo    : 0000000000000000
> epc   : 98000000013f1160 0x98000000013f1160     Not tainted
> ra    : 98000000013f1160 0x98000000013f1160
> Status: 9005fce3    KX SX UX KERNEL EXL IE 
> Cause : 00000008
> BadVA : 0000000000000000
> PrId  : 00002732
> Modules linked in:
> Process parted_devices (pid: 5436, threadinfo=980000000ebf4000,
> task=980000000091e068)
> Stack : 980000000ebf7de0 9800000000b2b850 980000000ed37088 0000000000000101
>         0000000000000000 98000000013f1160 00000018ffffff86 0000000000000000
>         0200000000000001 000006d600000000 0000000000000000 9800000000b473c0
>         980000000ebf7bc0 9800000000803190 0000000000000000 ffffffff8028e544
>         980000000ebf7de0 980000000ebf7bd0 980000000ec3d530 0000000000200200
>         980000000ec3d530 ffffffff800b6cf4 980000000ea66009 980000000ebf7be0
>         980000000ff21740 980000000ebf7de0 0000000000000000 0000000000000101
>         980000000ee17120 980000000ebf7be0 4600002800000000 1000000000000000
>         980000000ebf7b60 00000010ffffff86 0000000000000000 0200000000000001
>         000006d600000000 0000000000000000 980000000ebf7de0 980000000047e638
>         ...
> Call Trace:
> [<ffffffff8028e544>] cdrom_open+0x3b4/0xf70
> [<ffffffff800b6cf4>] d_kill+0x84/0xa8
> [<ffffffff800ad67c>] link_path_walk+0x154/0x298
> [<ffffffff800ad668>] link_path_walk+0x140/0x298
> [<ffffffff801df9d8>] kobject_get+0x20/0x38
> [<ffffffff801d4768>] get_disk+0x88/0xc0
> [<ffffffff801d47b0>] exact_lock+0x10/0x28
> [<ffffffff80285208>] sr_block_open+0xb8/0x138
> [<ffffffff800d6558>] blkdev_open+0x0/0xc0
> [<ffffffff800d6050>] do_open+0x98/0x328
> [<ffffffff800d6558>] blkdev_open+0x0/0xc0
> [<ffffffff800d65a0>] blkdev_open+0x48/0xc0
> [<ffffffff8009dcd4>] __dentry_open+0x104/0x2a8
> [<ffffffff8009dfa8>] do_filp_open+0x48/0x58
> [<ffffffff8009dfa8>] do_filp_open+0x48/0x58
> [<ffffffff8009dadc>] get_unused_fd+0x5c/0x150
> [<ffffffff8009e01c>] do_sys_open+0x64/0x130
> [<ffffffff8001ba68>] handle_sys+0x128/0x144
> [<ffffffff800a4628>] sys_readlink+0x0/0x18
> [<ffffffff8005fcf3>] sys_init_module+0x882/0x1b28
> 
> 
> Code: 00000000  00000000  00000000 <98000000> 013f3aa0  98000000  013f3aa0 
> 98000000  013f1cc0 
> 
> Thanks for the help.
> Lee
> ---- Msg sent via @=WebMail - http://webmail.usu.edu/

-- 
Martin Michlmayr
http://www.cyrius.com/


Reply to: