Oops, 2.0.31-pre2

Peter Nagy (tegla@katalin.csoma.elte.hu)
Sat, 2 Aug 1997 04:32:19 +0200 (MET DST)


This happened under heavy load (compiling perl interpreter)
(Processor is Cyrix 486DX2/50 with 16M ram so everything is heavy load ;)

apparently the vma structures are screwed up somewhere :(

Oops: 0002
CPU: 0
EIP: 0010:[<0013043f>]
EFLAGS: 00010202
eax: 4000599c ebx: 00000664 ecx: 00000664 edx: 4000599d
esi: 4000599c edi: 0000000a ebp: 00000003 esp: 00a2fca0
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process sh (pid: 30649, process nr: 34, stackpage=00a2f000)
Stack: 00df9078 4000599c 00130934 4000599c 0000000a 00000003 0000002b 00000002
001ebd84 00000812 00005840 4000599c 400059bc 0000000a 00000001 40000000
00df9018 001fd480 001312d5 00a2fdac 001ff6e4 00a2fd78 fffffff8 00a2fe6c
Call Trace: [<00130934>] [<001312d5>] [<00120018>] [<00140015>] [<0012b2ff>] [<0012b565>] [<0012b58a>]
[<00109f32>] [<0010a809>]
Code: 64 c6 00 00 4b 75 f6 5b 5e c3 8d b4 26 00 00 00 00 83 ec 0c

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 13043f <padzero+2f/40>
Trace: 130934 <load_elf_interp+264/300>
Trace: 1312d5 <load_elf_binary+7d5/b90>
Trace: 120018 <swap_out_vma+278/460>
Trace: 140015 <unix_fd_copy+85/b0>
Trace: 12b2ff <search_binary_handler+3f/160>
Trace: 12b565 <do_execve+145/1c0>
Trace: 12b58a <do_execve+16a/1c0>
Trace: 109f32 <sys_execve+32/60>
Trace: 10a809 <system_call+55/7c>

Code: 13043f <padzero+2f/40> movb $0x0,%fs:(%eax)
Code: 130443 <padzero+33/40> decl %ebx
Code: 130444 <padzero+34/40> jne fffffffd <_EIP+fffffffd>
Code: 130446 <padzero+36/40> popl %ebx
Code: 130447 <padzero+37/40> popl %esi
Code: 130448 <padzero+38/40> ret
Code: 130449 <padzero+39/40> leal 0x0(%esi,1),%esi
Code: 130450 <create_elf_tables> subl $0xc,%esp
Code: 130453 <create_elf_tables+3/280>

binfmt_elf.o: file format elf32-i386

Disassembly of section .text:
[cut]
00000040 <padzero> pushl %esi
00000041 <padzero+1> pushl %ebx
00000042 <padzero+2> movl 0xc(%esp,1),%esi
00000046 <padzero+6> movl %esi,%ebx
00000048 <padzero+8> andl $0xfff,%ebx
0000004e <padzero+e> je 00000076 <padzero+36>
00000050 <padzero+10> movl $0x1000,%ecx
00000055 <padzero+15> subl %ebx,%ecx
00000057 <padzero+17> movl %ecx,%ebx
00000059 <padzero+19> pushl %ebx
0000005a <padzero+1a> pushl %esi
0000005b <padzero+1b> pushl $0x1
0000005d <padzero+1d> call 0000005e <padzero+1e>
00000062 <padzero+22> addl $0xc,%esp
00000065 <padzero+25> testl %eax,%eax
00000067 <padzero+27> jne 00000076 <padzero+36>
00000069 <padzero+29> movl %esi,%edx
0000006b <padzero+2b> nop
0000006c <padzero+2c> movl %edx,%eax
0000006e <padzero+2e> incl %edx
0000006f <padzero+2f> movb $0x0,%fs:(%eax)
00000073 <padzero+33> decl %ebx
00000074 <padzero+34> jne 0000006c <padzero+2c>
00000076 <padzero+36> popl %ebx
00000077 <padzero+37> popl %esi
00000078 <padzero+38> ret
[cut]