2.2.100 Oops

daniel@lillfab.se
Tue, 6 Jul 1999 15:56:20 +0200 (CEST)


Hello!

I just got the same oops twice with two days in between the second time
it killed the machine.

It is an AMD K5-100 w/ 64MB RAM and is our SMB/kNFS file server. It also
imports some file systems with nfs and autofs. I is lightly loaded.

[the second oops is typed of the console screen so there might be a
typo somewhere]

Best regars,
Daniel

Options used: -V (default)
-o /lib/modules/2.2.10/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /usr/src/linux/System.map (default)
-c 1 (default)

You did not tell me where to find symbol information. I will assume
that the log matches the kernel and modules that are running right now
and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

Jul 4 04:22:22 trillian kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000000
Jul 4 04:22:22 trillian kernel: current->tss.cr3 = 00101000, pr3 = 00101000
Jul 4 04:22:22 trillian kernel: *pde = 00000000
Jul 4 04:22:22 trillian kernel: Oops: 0002
Jul 4 04:22:22 trillian kernel: CPU: 0
Jul 4 04:22:23 trillian kernel: EIP: 0010:[<c011e0f5>]
Jul 4 04:22:23 trillian kernel: EFLAGS: 00010282
Jul 4 04:22:23 trillian kernel: eax: 0000003d ebx: c009e740 ecx: c000c000 edx: 0000003b
Jul 4 04:22:23 trillian kernel: esi: c1ebb980 edi: 00000282 ebp: 00000000 esp: c000df6c
Jul 4 04:22:23 trillian kernel: ds: 0018 es: 0018 ss: 0018
Jul 4 04:22:23 trillian kernel: Process kswapd (pid: 4, process nr: 4, stackpage=c000d000)
Jul 4 04:22:23 trillian kernel: Stack: c1ebba40 c0227a90 c0090000 c1ebb9dc c010ef6b c0124055 c009e740 c1ebb980
Jul 4 04:22:23 trillian kernel: c1ebb980 c1ebba40 c012499f c1ebb980 c1ebb980 c0227a90 000000ff 00000030
Jul 4 04:22:23 trillian kernel: c000c000 c0119fd2 c0227a90 00000015 00000006 c011ed13 00000006 00000030
Jul 4 04:22:23 trillian kernel: Call Trace: [<c010ef6b>] [<c0124055>] [<c012499f>] [<c0119fd2>] [<c011ed13>] [<c018bc10>] [<c011edbf>]
Jul 4 04:22:23 trillian kernel: [<c0106000>] [<c0106513>]
Jul 4 04:22:23 trillian kernel: Code: c7 05 00 00 00 00 00 00 00 00 5b 5e 5f 5d 83 c4 0c c3 90 53

>>EIP: c011e0f5 <kmem_cache_free+151/170>
Trace: c010ef6b <__wake_up+3b/48>
Trace: c0124055 <put_unused_buffer_head+21/4c>
Trace: c012499f <try_to_free_buffers+4f/88>
Trace: c0119fd2 <shrink_mmap+da/12c>
Trace: c011ed13 <do_try_to_free_pages+23/78>
Trace: c018bc10 <tvecs+1420/50c8>
Trace: c011edbf <kswapd+57/c8>
Trace: c0106000 <get_options+0/74>
Code: c011e0f5 <kmem_cache_free+151/170> 00000000 <_EIP>: <===
Code: c011e0f5 <kmem_cache_free+151/170> 0: c7 05 00 00 00 movl $0x0,0x0 <===
Code: c011e0fa <kmem_cache_free+156/170> 5: 00 00 00 00 00
Code: c011e0ff <kmem_cache_free+15b/170> a: 5b popl %ebx
Code: c011e100 <kmem_cache_free+15c/170> b: 5e popl %esi
Code: c011e101 <kmem_cache_free+15d/170> c: 5f popl %edi
Code: c011e102 <kmem_cache_free+15e/170> d: 5d popl %ebp
Code: c011e103 <kmem_cache_free+15f/170> e: 83 c4 0c addl $0xc,%esp
Code: c011e106 <kmem_cache_free+162/170> 11: c3 ret
Code: c011e107 <kmem_cache_free+163/170> 12: 90 nop
Code: c011e108 <kmem_cache_free+164/170> 13: 53 pushl %ebx

4 warnings issued. Results may not be reliable.
Options used: -V (default)
-o /lib/modules/2.2.10/ (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-m /usr/src/linux/System.map (default)
-c 1 (default)

You did not tell me where to find symbol information. I will assume
that the log matches the kernel and modules that are running right now
and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

Unable to handle kernel NULL pointer derefernce at virtual address xxxxxxx
current->tss.cr3 = 00101000, %cr3 = 00101000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c011e0f5>]
EFLAGS: 00010282
eax: 0000003d ebx: c009e740 ecx: c000c000 edx: xxxxxxxx
esi: c1ebb980 edi: 00000282 ebp: 00000000 esp: c000df6c
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 4, process nr: 4, stackpage=c000d000)
Stack: c1ebba40 c0227a40 c0090000 c1ebb9dc c010ef6b c0124055 c009e740 c1ebb980
c1ebb980 c2ebba40 c0124997 c1ebb980 c1ebb980 c0227a90 000000ff 00000030
c000c000 c0119fd2 c0227a90 00000015 00000006 c011ed13 00000006 00000030
Call Trace: [<c010ef6b>] [<c0124055>] [<c012499f>] [<c0119fd2>] [<c011ed13>]
[<c018bc10>] [<c011edbf>] [<c0106000>] [<c0106513>]
Code: c7 05 00 00 00 00 00 00 00 00 5b 5e 5f 5d 83 c9 0c c3 90 53

>>EIP: c011e0f5 <kmem_cache_free+151/170>
Trace: c010ef6b <__wake_up+3b/48>
Trace: c0124055 <put_unused_buffer_head+21/4c>
Trace: c012499f <try_to_free_buffers+4f/88>
Trace: c0119fd2 <shrink_mmap+da/12c>
Trace: c011ed13 <do_try_to_free_pages+23/78>
Trace: c018bc10 <tvecs+1420/50c8>
Code: c011e0f5 <kmem_cache_free+151/170> 00000000 <_EIP>: <===
Code: c011e0f5 <kmem_cache_free+151/170> 0: c7 05 00 00 00 movl $0x0,0x0 <===
Code: c011e0fa <kmem_cache_free+156/170> 5: 00 00 00 00 00
Code: c011e0ff <kmem_cache_free+15b/170> a: 5b popl %ebx
Code: c011e100 <kmem_cache_free+15c/170> b: 5e popl %esi
Code: c011e101 <kmem_cache_free+15d/170> c: 5f popl %edi
Code: c011e102 <kmem_cache_free+15e/170> d: 5d popl %ebp
Code: c011e103 <kmem_cache_free+15f/170> e: 83 c9 0c orl $0xc,%ecx
Code: c011e106 <kmem_cache_free+162/170> 11: c3 ret
Code: c011e107 <kmem_cache_free+163/170> 12: 90 nop
Code: c011e108 <kmem_cache_free+164/170> 13: 53 pushl %ebx

Kernel panic: VFS: LRU block list corrupted

4 warnings issued. Results may not be reliable.

-- 
Daniel Engström - Lilla Fabriken AB - Technical Support
daniel@lillfab.se - Work related.  5116@telia.com - Private.

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/