- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
Enlace copiado
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
>>>IP: [<c1089460>] module_put+0x20/0x90>>>
This is probably the faulting IP inside module_put() function.From what I have been able to understand this function increments some use count and it is operating in kernel mode.Unfortunately there is no disassembly of code which led to crash only raw machine code bytes.This function receives a pointer to structure module so the first thing to check it can be thevalidity of the pointer,but there is no present any segfault signal so I suppose that pointer is valid.By reading the description of the module_put one of the causes of this function failure is when the module is removed.
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
:>>> unable to handle kernel paging request at 45c05004>>>
This is also interesting.I do not know if the failure of handling paging request can be related to kernel oops.
Can you provide a stack trace from GDB?
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
Sergey Kostrov wrote:
>># Initiall error:
>>/tmp/install.Zp3obY/li_gen_bash.LFcsMo: 6462: ./insmod-sep3: Permission denied
Do you have right Access Rights to that folder?
Yes, but this file doesn't have executable bit.
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
It is kernel oops.
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
>># Initiall error:
>>/tmp/install.Zp3obY/li_gen_bash.LFcsMo: 6462: ./insmod-sep3: Permission denied
>>#the file is indeed not executable
>>ls -la ./intel.pset.root.mews2206_06.19.17.40.28.2013/tools/insmod-sep3
>>-rw-rw-r-- 1 root root 6332 2013-05-27 14:56 ./intel.pset.root.mews2206_06.19.17.40.28.2013/tools/insmod-sep3
Was it possible reason that the user extracted (installation) tar file on Windows then copied whole directory onto Linux?
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
>>>Was it possible reason that the user extracted (installation) tar file on Windows then copied whole directory onto Linux? >.>
There is also a kernel oops error reported. Do you think that this can be related to unsufficient user permission?
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
Nope.
All was done under linux.
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
Evgeniy G. wrote:I don't know what happened on your side, are you using customized OS? Any changed in kernel?
Nope.
All was done under linux.
Another idea is to install VTune Amplifier XE 2013 on regular OS, for example - RHEL, SUSE, etc. Then copy all directory (default - /opt/intel/vtune_amplifier_xe_2013 to the target, I mean your Ubuntu). You only need to do extra things:
1. cd /opt/intel/vtune_amplifier_xe_2013/sepdk/src, build drivers & install drivers.
2. run "source /opt/intel/vtune_amplifier_xe_2013/amplxe-vars.sh"
You can run amplxe-gui or amplxe-cl as usual. You can see there is no installation required in my suggestion.
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
This is a different call stack so do you still have a kernel oops?
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
have an Oops, installer is stuck.
lsmod is impossible, etc...
- Marcar como nuevo
- Favorito
- Suscribir
- Silenciar
- Suscribirse a un feed RSS
- Resaltar
- Imprimir
- Informe de contenido inapropiado
I meant to obtain call stack during the rash with GDB and if this is not possible can you post (opened by GDB) saved dump of oops?
- Suscribirse a un feed RSS
- Marcar tema como nuevo
- Marcar tema como leído
- Flotar este Tema para el usuario actual
- Favorito
- Suscribir
- Página de impresión sencilla