2.0.14 Oops with named 4.9.4 (fwd)

Neil McNeight (mcneight@umich.edu)
Wed, 4 Sep 1996 18:05:19 -0400 (EDT)


Third attempt to get this to the list...

-Neil

---------- Forwarded message ----------
Date: Sun, 1 Sep 1996 17:37:24 -0400 (EDT)
From: Neil McNeight <mcneight@umich.edu>
To: linux-kernel@vger.rutgers.edu
Subject: 2.0.14 Oops with named 4.9.4

Greetings.

I have gotten kernel panics in the past, but have usually ignored them
because my memory is unstable and needs replacing. However, the system has
become a little more unstable since I did two things:

1) I upgraded from 2.0.6 to 2.0.14

2) I installed a new system BIOS

Can someone decipher this for me and tell me what is going on? Especially
disturbing is the seg fault at the end of ksymoops. Even the debugger is
screwed up on my system :/

Upon startup, the machine went through the rc scripts fine and got to the
login prompt. I had left the machine and when I came back, I saw this
kernel panic (plural perhaps?):

Oops: 0000
CPU: 0
EIP: 0010:[<0012b8eb>]
EFLAGS: 00010087
eax: 00bff000 ebx: 00000207 ecx: 00bff024 edx: 0000012a
esi: 00bdbe9c edi: 00000000 ebp: 00000008 esp: 00bdbe70
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process named (pid: 57, process nr: 12, stackpage=00bdb000)
Stack: 00000008 00bdbf14 0012bb7e 00bdbe9c 00000100 00000000 bffff9a0 bffff9ec
00000000 00000008 00bff000 00000003 00bff000 0012bdd7 00000100 00bdbf54
00bdbf14 00bdbed4 00bdbf74 00bdbf34 00bdbef4 bffff9ec 00000100 bffff8fc
Call Trace: [<0012bb7e>] [<0012bdd7>] [<0010eeb7>] [<0010a3e2>]
Code: 39 4a 04 75 f8 8b 41 04 89 42 04 c7 41 04 00 00 00 00 53 9d
general protection: 0000
CPU: 0
EIP: 0010:[<0010fcde>]
EFLAGS: 00010286
eax: 0000012a ebx: 0000012a ecx: 00000000 edx: ef5af000
esi: 00bada0c edi: 00badbcc ebp: 00bdbd4c esp: 00bdbd40
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process named (pid: 57, process nr: 12, stackpage=00bdb000)
Stack: 00bc3018 00bada0c 00bada0c 00000001 0014e39f 00badbcc 0014e7ad 00bc3018
00bad988 00000000 00135ea0 00bada0c 00000000 00bad988 00bad988 00bad988
00b6a810 001360d9 00bada0c 00ff6500 00120538 00bad988 00ff6500 00000000
Call Trace: [<0014e39f>] [<0014e7ad>] [<00135ea0>] [<001360d9>] [<00120538>] [<001205a8>] [<00114bba>]
[<0010a972>] [<02000000>] [<01800000>] [<0010f84f>] [<0010f5bc>] [<0014eff6>] [<0010a56d>] [<0012b8eb>]
[<0012bb7e>] [<0012bdd7>] [<0010eeb7>] [<0010a3e2>]
Code: 8b 02 83 f8 01 75 61 9c 5e fa c7 02 00 00 00 00 83 7a 4c 00

After cutting and pasting with gpm (beats writing it out by hand...) I ran
it through ksymoops and it gives me this:

/usr/src/linux# ./scripts/ksymoops System.map < ~/oops2.0.14
Using `System.map' to map addresses to symbols.

>>EIP: 12b8eb <free_wait+47/64>
Trace: 12bb7e <do_select+1f2/238>
Trace: 12bdd7 <sys_select+183/254>
Trace: 10eeb7 <old_select+3f/50>
Trace: 10a3e2 <system_call+52/80>

Code: 12b8eb <free_wait+47/64> cmpl %ecx,0x4(%edx)
Code: 12b8ee <free_wait+4a/64> jne fffffffd <_EIP+fffffffd>
Code: 12b8f0 <free_wait+4c/64> movl 0x4(%ecx),%eax
Code: 12b8f3 <free_wait+4f/64> movl %eax,0x4(%edx)
Code: 12b8f6 <free_wait+52/64> movl $0x0,0x4(%ecx)
Code: 12b8fd <free_wait+59/64> pushl %ebx
Code: 12b8fe <free_wait+5a/64> popf
Code: 12b8ff <free_wait+5b/64> >>EIP: 10fcde <wake_up_interruptible+22/d8>
Trace: 14e39f <def_callback1+17/1c>
Trace: 14e7ad <inet_release+1d/74>
Trace: 135ea0 <sock_release+5c/9c>
Trace: 1360d9 <sock_close+25/2c>
Trace: 120538 <__fput+1c/40>
Trace: 1205a8 <close_fp+4c/5c>
Trace: 114bba <do_exit+116/1f0>
Trace: 10a972 <die_if_kernel+2b6/2c0>
Trace: 2000000
Trace: 1800000
Trace: 10f84f <do_page_fault+293/29c>
Trace: 10f84f <do_page_fault+293/29c>
Trace: 14eff6 <inet_select+22/2c>
Trace: 10a56d <error_code+3d/50>
Trace: 12b8eb <free_wait+47/64>
Trace: 12bb7e <do_select+1f2/238>
Trace: 12bdd7 <sys_select+183/254>
Trace: 10eeb7 <old_select+3f/50>
Trace: 10a3e2 <system_call+52/80>

Segmentation fault
shack {root@tty2} 5:22pm
/usr/src/linux#

Any help is appreciated.

-Neil

-----------------------------------------------+--------------------------
"Why are both drug addicts and computer" | Neil McNeight
"aficionados both called users?" | mcneight@umich.edu
-Clifford Stoll | Ann Arbor, MI USA
"Silicon Snake Oil" | PGP key available
-----------------------------------------------+--------------------------