Re: 2.0.36pre10 oops

Andrew J. Anderson (andrew@db.erau.edu)
Sat, 26 Sep 1998 22:07:01 -0400 (EDT)


On Sat, 26 Sep 1998 teamwork@freemail.c3.hu wrote:

> Have you tried 2.0.36pre12? This version is supposed to be _THE_ version
> Alan will send to Linus.
>
> I am interested to know if the final _STABLE_ version of 2.0.36 will
> give you any more oops or not.

Unfortunately, yes, I am still able to trigger an oops doing a bru backup
of my system. It does not oops while doing a tar, so it is most odd. I
don't think it's hardware related, because I have seen no other symptoms
of bad ram or flaky equipment. So far I am only able to trigger this
using bru from BRU2000-15.0P-2.

I am in the process of relocating, so I will be unavailable for several
days before I can test anything else (hence the reasons for doing the
backups :) Suggestions in the mean time are welcome, however.

At any rate, here is the oops. Additional information will be available
after Thursday if neeeded. Just for reference: 486DX4-133, PCI BusLogic
932 backing up a Quantum 6.4 ST SCSI on channel 1 to an HP C1533A DDS2 DAT
on channel 0 of the BusLogic.

Unable to handle kernel paging request at virtual address d26b0148
current->tss.cr3 = 00101000, %cr3 = 00101000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<00122e29>]
EFLAGS: 00010202
eax: 126b0148 ebx: 44933452 ecx: 00000000 edx: 0023bfc4
esi: 00000000 edi: 00000ffe ebp: 00004000 esp: 0009af88
ds: 0018 es: 0018 fs: 0018 gs: 0018 ss: 0018
Process kswapd (pid: 3, process nr: 3, stackpage=0009a000)
Stack: 0023bfc4 00000000 00000ffe 00004000 00112955 0011ebde 0023bfc4 00000006
00000001 00000003 00000000 00000002 00000000 00122668 00000006 00000000
00000001 00000004 00fcafdc 00000000 00000e00 00122891 00000003 00000000
Call Trace: [<00112955>] [<0011ebde>] [<00122668>] [<00122891>] [<00109906>] [<00122750>]
Code: 87 08 89 c8 85 c0 74 0f ff 05 b0 fa 1a 00 50 e8 13 0b 00 00

Using `../System.map' to map addresses to symbols.

>>EIP: 122e29 <__free_page+39/100>
Trace: 112955 <schedule+15/2b0>
Trace: 11ebde <shrink_mmap+18e/210>
Trace: 122668 <try_to_free_page+58/d0>
Trace: 122891 <kswapd+141/150>
Trace: 109906 <init+46/370>
Trace: 122891 <kswapd+141/150>

Code: 122e29 <__free_page+39/100>
Code: 122e29 <__free_page+39/100> 87 08 xchgl %ecx,(%eax)
Code: 122e2b <__free_page+3b/100> 89 c8 movl %ecx,%eax
Code: 122e2d <__free_page+3d/100> 85 c0 testl %eax,%eax
Code: 122e2f <__free_page+3f/100> 74 0f je 122e40 <__free_page+50/100>
Code: 122e31 <__free_page+41/100> ff 05 b0 fa 1a incl 0x1afab0
Code: 122e3c <__free_page+4c/100> 00
Code: 122e3d <__free_page+4d/100> 50 pushl %eax
Code: 122e3e <__free_page+4e/100> e8 13 0b 00 00 call 123950 <swap_free>
Code: 122e49 <__free_page+59/100>

This is the previous oops from 2.0.36pre10 for comparison:

general protection: 0000
CPU: 0
EIP: 0010:[<0011eba7>]
EFLAGS: 00010203
eax: 00001124 ebx: 00299fe8 ecx: 00000006 edx: 5799569b
esi: 00000000 edi: 00000fe0 ebp: 00004000 esp: 0209aec0
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process bru (pid: 986, process nr: 67, stackpage=0209a000)
Stack: 00000006 00000001 00000000 00000000 01864900 00000000 00122668 00000006
00000000 00000001 00000003 00000098 00000000 01864900 001231d6 00000003
00000000 00000001 00013000 00040000 00000000 01864900 0029999c 0003f000
Call Trace: [<00122668>] [<001231d6>] [<0011ee88>] [<0011f310>] [<00125e1c>] [<0010ade9>]
Code: ff 4a 30 39 5a 58 75 05 8b 03 89 42 58 8b 13 85 d2 74 06 8b

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 11eba7 <shrink_mmap+157/210>
Trace: 122668 <try_to_free_page+58/d0>
Trace: 1231d6 <__get_free_pages+1b6/1d0>
Trace: 11ee88 <try_to_read_ahead+28/130>
Trace: 11f310 <generic_file_read+2c0/630>
Trace: 125e1c <sys_read+cc/100>
Trace: 10ade9 <system_call+55/7c>

Code: 11eba7 <shrink_mmap+157/210>
Code: 11eba7 <shrink_mmap+157/210> ff 4a 30 decl 0x30(%edx)
Code: 11ebaa <shrink_mmap+15a/210> 39 5a 58 cmpl %ebx,0x58(%edx)
Code: 11ebad <shrink_mmap+15d/210> 75 05 jne 11ebb4 <shrink_mmap+164/210>
Code: 11ebaf <shrink_mmap+15f/210> 8b 03 movl (%ebx),%eax
Code: 11ebb7 <shrink_mmap+167/210> 89 42 58 movl %eax,0x58(%edx)
Code: 11ebba <shrink_mmap+16a/210> 8b 13 movl (%ebx),%edx
Code: 11ebbc <shrink_mmap+16c/210> 85 d2 testl %edx,%edx
Code: 11ebbe <shrink_mmap+16e/210> 74 06 je 11ebc0 <shrink_mmap+170/210>
Code: 11ebc0 <shrink_mmap+170/210> 8b 00 movl (%eax),%eax
Code: 11ebc8 <shrink_mmap+178/210> 90 nop
Code: 11ebc9 <shrink_mmap+179/210> 90 nop
Code: 11ebca <shrink_mmap+17a/210> 90 nop

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Andrew Anderson http://amelia.db.erau.edu/~andrew/
if(!(family_tree=fork())){redneck=TRUE;}

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/