Re: pre-patch-2.0.31-9 OOPSs

Dr. Werner Fink (werner@suse.de)
Thu, 11 Sep 1997 13:12:25 +0200


>
> Someone mentioned that my old gcc (2.7.2) might be the cause of my OOPS's,
> so today I compiled the kernel on a RedHat 4.2 machine with gcc 2.7.2.1,
> and of course, I got a huge oops as soon as I started up trn. I'm running
> inn 1.5.1-6 and trn locally. Inn is fed via rnews via uucp batch.

Try an other machine or check your hardware configuration, remove all
components, put piece by piece back and ceck any piece and its correct
integration in the system by booting and testing ... it looks like a real
hardware problem.

Werner

>
> The first part here is pulled from the screen so I could run it
> through ksymoops; the decoded OOPS's are from syslog. Let me know if
> you want more/less raw output, or if these are even at all helpful.
> The first oops may not be included in the first set from ksymoops,
> since it scrolled off.
>
> Meanwhile, my system has locked up when I wasnt home several times, so
> I'd declare at least this patched version of 2.0.31 very unstable. I
> will be going back to 2.0.30, which at least hasn't hung on me,
> although I did get a few oops's from it. I don't know if unpatched
> 2.0.31 is any better or not.
>
> This is from 2.0.31p9 plus several patches that Werner Fink suggested I try.
>
> Output from ksymoops:
>
> Using `/boot/System.map' to map addresses to symbols.
>
> Trace: 10ce2d <do_IRQ+2d/50>
> Trace: 124fb3 <sys_read+b3/100>
> Trace: 10aaa9 <system_call+55/7c>
>
> Code: movl 0x50(%eax),%eax
> Code: testl %eax,%eax
> Code: je 0000002a <_EIP+2a>
> Code: cmpl %esi,0x8(%eax)
> Code: jbe 0000001a <_EIP+1a>
> Code: movl %eax,%edx
> Code: cmpl %esi,0x4(%edx)
> Code: jbe 0000002a <_EIP+2a>
> Code: movl (%eax),%eax
> Code: nop
> Code: nop
> Code: nop
>
> Using `/boot/System.map' to map addresses to symbols.
>
> >>EIP: 117d69 <do_exit+99/1f0>
> Trace: 10aff3 <die_if_kernel+2c3/2e0>
> Trace: 2000000
> Trace: 1800000
> Trace: 10b48c <do_general_protection+2c/60>
> Trace: 10b48c <do_general_protection+2c/60>
> Trace: 10ac0c <error_code+40/48>
> Trace: 11ba06 <verify_area+36/1e0>
> Trace: 10ce2d <do_IRQ+2d/50>
> Trace: 124fb3 <sys_read+b3/100>
> Trace: 10aaa9 <system_call+55/7c>
>
> Code: 117d69 <do_exit+99/1f0> movl (%ebx),%eax
> Code: 117d6b <do_exit+9b/1f0> leal 0xffffffff(%eax),%ecx
> Code: 117d6e <do_exit+9e/1f0> movl %ecx,(%ebx)
> Code: 117d70 <do_exit+a0/1f0> cmpl $0x1,%eax
> Code: 117d73 <do_exit+a3/1f0> jne 117d8a <do_exit+ba/1f0>
> Code: 117d75 <do_exit+a5/1f0> pushl %ebx
> Code: 117d76 <do_exit+a6/1f0> call 11d160 <exit_mmap>
> Code: 117d7b <do_exit+ab/1f0> pushl %ebx
> Code: 117d7c <do_exit+ac/1f0> call 90909018 <_EIP+90909018>
>
> Using `/boot/System.map' to map addresses to symbols.
>
> >>EIP: 117e12 <do_exit+142/1f0>
> Trace: 10aff3 <die_if_kernel+2c3/2e0>
> Trace: 2000000
> Trace: 1800000
> Trace: 10b48c <do_general_protection+2c/60>
> Trace: 10b48c <do_general_protection+2c/60>
> Trace: 10ac0c <error_code+40/48>
> Trace: 117d69 <do_exit+99/1f0>
> Trace: 10aff3 <die_if_kernel+2c3/2e0>
> Trace: 2000000
> Trace: 1800000
> Trace: 10b48c <do_general_protection+2c/60>
> Trace: 10b48c <do_general_protection+2c/60>
> Trace: 10ac0c <error_code+40/48>
> Trace: 11ba06 <verify_area+36/1e0>
> Trace: 10ce2d <do_IRQ+2d/50>
> Trace: 124fb3 <sys_read+b3/100>
> Trace: 10aaa9 <system_call+55/7c>
>
> Code: 117e12 <do_exit+142/1f0> movl (%ebx),%eax
> Code: 117e14 <do_exit+144/1f0> leal 0xffffffff(%eax),%ecx
> Code: 117e17 <do_exit+147/1f0> movl %ecx,(%ebx)
> Code: 117e19 <do_exit+149/1f0> cmpl $0x1,%eax
> Code: 117e1c <do_exit+14c/1f0> jne 117e39 <do_exit+169/1f0>
> Code: 117e1e <do_exit+14e/1f0> movl 0x8(%ebx),%eax
> Code: 117e21 <do_exit+151/1f0> pushl %eax
> Code: 117e22 <do_exit+152/1f0> call 125d50 <iput>
> Code: 117e27 <do_exit+157/1f0> nop
> Code: 117e28 <do_exit+158/1f0> nop
> Code: 117e29 <do_exit+159/1f0> nop
>
>
> [from syslog]
>
> general protection: 0000
> CPU: 0
> EIP: 0010:[verify_area+54/480]
> EFLAGS: 00010202
> eax: 61e3e238 ebx: 00000000 ecx: 40007000 edx: 00000000
> esi: 40007000 edi: 00000400 ebp: 00b1d9d8 esp: 00f64f80
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process trn (pid: 6279, process nr: 36, stackpage=00f64000)
> Stack: 00000000 0091dd00 00000400 00b1d9d8 0010ce2d 00000005 00124fb3 00000001
> 40007000 00000400 00d1a810 08083728 00000400 bffffafc 0010aaa9 00000006
> 40007000 00000400 08083728 00000400 bffffafc ffffffda 400d002b 0000002b
> Call Trace: [do_IRQ+45/80] [sys_read+179/256] [system_call+85/124]
> Code: 8b 40 50 85 c0 74 23 39 70 08 76 0e 89 c2 39 72 04 76 17 8b
> general protection: 0000
> CPU: 0
> EIP: 0010:[do_exit+153/496]
> EFLAGS: 00010246
> eax: 00667000 ebx: 61e3e238 ecx: 00101000 edx: 00d1a810
> esi: 00000014 edi: 00f65000 ebp: 00f64f44 esp: 00f64ee8
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process trn (pid: 6279, process nr: 36, stackpage=00f64000)
> Stack: 0009002b 00000014 00f65000 00f64f44 0010aff3 0000000b 001a06b9 00670000
> 40007000 00000400 00b1d9d8 0000008b 02000000 01800000 00000018 0010b48c
> 001a0772 00f64f44 00670000 0010b460 0010ac0c 00f64f44 00670000 00000000
> Call Trace: [die_if_kernel+707/736] [<02000000>] [wd:wd_probe+-49156/160] [do_general_protection+44/96] [do_general_protection+0/96] [error_code+64/72] [verify_area+54/480]
> [do_IRQ+45/80] [sys_read+179/256] [system_call+85/124]
> Code: 8b 03 8d 48 ff 89 0b 83 f8 01 75 15 53 e8 e5 53 00 00 53 e8
> general protection: 0000
> CPU: 0
> EIP: 0010:[do_exit+322/496]
> EFLAGS: 00010206
> eax: 00d1a810 ebx: 6049ea78 ecx: 0068f808 edx: 0068f000
> esi: 00000100 edi: 00000009 ebp: 0068f810 esp: 00f64e50
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process trn (pid: 6279, process nr: 36, stackpage=00f64000)
> Stack: 0009002b 00000014 00f65000 00f64eac 0010aff3 0000000b 001a06b9 00f60000
> 00000014 00f65000 00f64f44 000000e8 02000000 01800000 001c0018 0010b48c
> 001a0772 00f64eac 00f60000 0010b460 0010ac0c 00f64eac 00f60000 61e3e238
> Call Trace: [die_if_kernel+707/736] [<02000000>] [wd:wd_probe+-49156/160] [do_general_protection+44/96] [do_general_protection+0/96] [error_code+64/72] [do_exit+153/496]
> [die_if_kernel+707/736] [<02000000>] [wd:wd_probe+-49156/160] [do_general_protection+44/96] [do_general_protection+0/96] [error_code+64/72] [verify_area+54/480] [do_IRQ+45/80]
> [sys_read+179/256] [system_call+85/124]
> Code: 8b 03 8d 48 ff 89 0b 83 f8 01 75 1b 8b 43 08 50 e8 29 df 00
>
>