Re: 2.0.36: 3 GPF's in 3 Days

Christof Damian (damian@mediaconsult.com)
Wed, 30 Dec 1998 11:51:11 +0000


Pete Harlan wrote:
>
> Hi,
>
> After 20+ days with no trouble on a webserver (2.0.36, no modules, no
> serial, WD80x3 SMC ethernet, 300Mhz PII 192MB, ASUS P2L97S with
> onboard Adaptec 7880 scsi), got these over the course of three days.
> gcc 2.7.2.1.

I get GPF at the same location on a PPro 200, 64MB, DPT3224, NE2000, gcc
2.7.2

I think it might be a broken network card and will try to exchange it
next week.

general protection: 0000
CPU: 0
EIP: 0010:[<00146034>]
EFLAGS: 00010203
eax: f000e987 ebx: 00000000 ecx: 01235c30 edx: f000f84d
esi: 01235ccc edi: 000001a8 ebp: 01235c0c esp: 01757ee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 8440, process nr: 35, stackpage=01757000)
Stack: 01235c0c 01757f7c 00000000 00000000 1cdd86c1 01235c30 00000000
000001a8
03a2d414 01598c48 0cde7d66 00150d9a 01235c0c 01757f78 00000e58
00000000
00000000 01757f7c 00001000 01598c00 081b4d7c 01598c90 00135d8f
01598c90
Call Trace: [<00150d9a>] [<00135d8f>] [<00122cd0>] [<0010a892>]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87
>>EIP: 146034 <tcp_recvmsg+170/40c>
Trace: 150d9a <inet_recvmsg+72/88>
Trace: 135d8f <sock_read+ab/c0>
Trace: 122cd0 <sys_read+c0/e8>
Trace: 10a892 <system_call+52/80>

Code: 146034 <tcp_recvmsg+170/40c> movb 0xd(%eax),%al
Code: 146037 <tcp_recvmsg+173/40c> testb $0x2,%al
Code: 146039 <tcp_recvmsg+175/40c> je 14603f <tcp_recvmsg+17b/40c>
Code: 14603b <tcp_recvmsg+177/40c> decl 0x10(%esp,1)
Code: 14603f <tcp_recvmsg+17b/40c> movl 0x10(%esp,1),%edi
Code: 146043 <tcp_recvmsg+17f/40c> cmpl %edi,0x30(%ebx)
Code: 146046 <tcp_recvmsg+182/40c> ja 90909018 <_EIP+90909018>

>
> general protection: 0000
> CPU: 0
> EIP: 0010:[tcp_recvmsg+368/1036]
> EFLAGS: 00010213
> eax: f000e987 ebx: 00000000 ecx: 0bd41834 edx: f000f84d
> nnesi: 0bd418d0 edi: 000001a0 ebp: 0bd41810 esp: 09f98ee8
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process httpsd (pid: 3273, process nr: 25, stackpage=09f98000)
> Stack: 0bd41810 09f98f7c 00000000 00000000 10580f0b 0bd41834 00000000 000001a0
> 09a2c018 0a3f3f48 005905b8 0015011e 0bd41810 09f98f78 00000e60 00000000
> 00000000 09f98f7c 00001000 0a3f3f00 08119884 0a3f3f90 00136a63 0a3f3f90
> Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
> [sys_read+192/232] [system_call+85/128]
> Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87
>
> general protection: 0000
> CPU: 0
> EIP: 0010:[tcp_recvmsg+368/1036]
> EFLAGS: 00010207
> eax: f000e987 ebx: 00000000 ecx: 0bdcc834 edx: f000f84d
> esi: 0bdcc8d0 edi: 0000019a ebp: 0bdcc810 esp: 0bdbfee8
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process httpsd (pid: 2896, process nr: 27, stackpage=0bdbf000)
> Stack: 0bdcc810 0bdbff7c 00000000 00000000 10580fb1 0bdcc834 00000000 0000019a
> 0b567414 08502d48 00590664 0015011e 0bdcc810 0bdbff78 00000e66 00000000
> 00000000 0bdbff7c 00001000 08502d00 08119884 08502d90 00136a63 08502d90
> Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
> [sys_read+192/232] [system_call+85/128]
> Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87
>
> general protection: 0000
> CPU: 0
> EIP: 0010:[tcp_recvmsg+368/1036]
> EFLAGS: 00010213
> eax: f000e987 ebx: 00000000 ecx: 05bb3438 edx: f000f84d
> esi: 05bb34d4 edi: 000001a2 ebp: 05bb3414 esp: 021daee8
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process httpsd (pid: 25309, process nr: 27, stackpage=021da000)
> Stack: 05bb3414 021daf7c 00000000 00000000 102b832a 05bb3438 00000000 000001a2
> 0bcc5c0c 0a148048 002c79d5 0015011e 05bb3414 021daf78 00000e5e 00000000
> 00000000 021daf7c 00001000 0a148000 08119884 0a148090 00136a63 0a148090
> Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
> [sys_read+192/232] [system_call+85/128]
> Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87
>
> general protection: 0000
> CPU: 0
> EIP: 0010:[tcp_recvmsg+368/1036]
> EFLAGS: 00010212
> eax: f000e987 ebx: 00000000 ecx: 07905438 edx: f000f84d
> esi: 079054d4 edi: 000001a5 ebp: 07905414 esp: 06e3bee8
> ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
> Process httpsd (pid: 17189, process nr: 69, stackpage=06e3b000)
> Stack: 07905414 06e3bf7c 00000000 00000000 02c160d6 07905438 00000000 000001a5
> 0696e018 09533248 f2c2577e 0015011e 07905414 06e3bf78 00000e5b 00000000
> 00000000 06e3bf7c 00001000 09533200 08119884 09533290 00136a63 09533290
> Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
> [sys_read+192/232] [system_call+85/128]
> Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87
>
> --
> Pete Harlan
> harlan@pointofchoice.com
>
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.rutgers.edu
> Please read the FAQ at http://www.tux.org/lkml/

-- 
Christof Damian                
Technical Director
http://mediaconsult.com/

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/