- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
>>>IP: [<c1089460>] module_put+0x20/0x90>>>
This is probably the faulting IP inside module_put() function.From what I have been able to understand this function increments some use count and it is operating in kernel mode.Unfortunately there is no disassembly of code which led to crash only raw machine code bytes.This function receives a pointer to structure module so the first thing to check it can be thevalidity of the pointer,but there is no present any segfault signal so I suppose that pointer is valid.By reading the description of the module_put one of the causes of this function failure is when the module is removed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
:>>> unable to handle kernel paging request at 45c05004>>>
This is also interesting.I do not know if the failure of handling paging request can be related to kernel oops.
Can you provide a stack trace from GDB?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sergey Kostrov wrote:
>># Initiall error:
>>/tmp/install.Zp3obY/li_gen_bash.LFcsMo: 6462: ./insmod-sep3: Permission denied
Do you have right Access Rights to that folder?
Yes, but this file doesn't have executable bit.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It is kernel oops.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
>># Initiall error:
>>/tmp/install.Zp3obY/li_gen_bash.LFcsMo: 6462: ./insmod-sep3: Permission denied
>>#the file is indeed not executable
>>ls -la ./intel.pset.root.mews2206_06.19.17.40.28.2013/tools/insmod-sep3
>>-rw-rw-r-- 1 root root 6332 2013-05-27 14:56 ./intel.pset.root.mews2206_06.19.17.40.28.2013/tools/insmod-sep3
Was it possible reason that the user extracted (installation) tar file on Windows then copied whole directory onto Linux?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
>>>Was it possible reason that the user extracted (installation) tar file on Windows then copied whole directory onto Linux? >.>
There is also a kernel oops error reported. Do you think that this can be related to unsufficient user permission?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Nope.
All was done under linux.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Evgeniy G. wrote:I don't know what happened on your side, are you using customized OS? Any changed in kernel?
Nope.
All was done under linux.
Another idea is to install VTune Amplifier XE 2013 on regular OS, for example - RHEL, SUSE, etc. Then copy all directory (default - /opt/intel/vtune_amplifier_xe_2013 to the target, I mean your Ubuntu). You only need to do extra things:
1. cd /opt/intel/vtune_amplifier_xe_2013/sepdk/src, build drivers & install drivers.
2. run "source /opt/intel/vtune_amplifier_xe_2013/amplxe-vars.sh"
You can run amplxe-gui or amplxe-cl as usual. You can see there is no installation required in my suggestion.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This is a different call stack so do you still have a kernel oops?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
have an Oops, installer is stuck.
lsmod is impossible, etc...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I meant to obtain call stack during the rash with GDB and if this is not possible can you post (opened by GDB) saved dump of oops?
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page