Oops: 0000 in bootup of 2.3.99-pre4

From: Matthew Hanselman (mjhans@quiq.com)
Date: Tue Apr 11 2000 - 23:29:09 EST


Here's an oops I get upon bootup. Since it happens before the logger
started, I had to write the oops down by hand; if anything looks way out
of whack, I may have miscopied (ugh).

Strange part: I had been running 2.3.99-pre3 for about a week, then
rebooted tonight and got a similar oops (I don't remember changing sys
params). I d/l'd pre4 to see if it would fix it, and get an oops in the
same spot in the boot sequence.

This happens every time I try to reboot, so any reproducing questions,
mail away... :)

Details:
  Dell Precision Dual PIII 800
  Adaptec 7899, 2 Quantum disks
  2.3.99-pre4 built with ide-scsi (I say only b/c the oops happens right
    after the init of the Adaptec card)
  1 gig RAM
  ... what else is relevant?

The oops, after pumping through ksymoops; after it follows the "before":

ksymoops 2.3.4 on i686 2.2.14-5.0smp. Options used
     -V (specified)
     -K (specified)
     -l /lib/modules/2.3.99-pre4/ (specified)
     -o /lib/modules/2.3.99-pre4/ (specified)
     -m /usr/src/linux-2.3.99-pre4/System.map (specified)

No modules in ksyms, skipping objects
No ksyms, skipping lsmod
Unable to handle kernel paging request at virtual address 656c6f95
c01516e5
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01516e5>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 00000000 ebx: ffffffd8 ecx: c23b6000 edx: c23b6000
esi: 656c6f73 edi: c23b6000 ebp: 00000000 esp: c233df28
ds: 0018 es: 0018 ss: 0018
Process swapper (pid: 1, stackpage=c233d000)
Stack: 00000000 c23b6000 00000002 c233c000 00000000 c02dc7b4 c23b600 00000006
       c0140fe7 c23b6000 00000003 00000000 c233df68 c233c000 c233c00 00000000
       c23b6000 c0261525 00000000 00000000 00000000 c0141343 c23b600 00000002
Call Trace: [<c0140fe7>] [<c0261525>] [<c0141343>] [<c010a49c>] [<c0261525>] [<c0110018>] [<c0260018>]
       [<c010719c>] [<c01075bb>]
Code: 0f b7 46 22 25 00 f0 ff ff 66 3d 00 a0 0f 84 49 01 00 00 bb

>>EIP; c01516e5 <open_namei+48d/604> <=====
Trace; c0140fe7 <filp_open+3b/5c>
Trace; c0261525 <stext_lock+6d71/8ccc>
Trace; c0141343 <sys_open+a7/250>
Trace; c010a49c <system_call+34/38>
Trace; c0261525 <stext_lock+6d71/8ccc>
Trace; c0110018 <mask_and_ack_8259A+130/170>
Trace; c0260018 <stext_lock+5864/8ccc>
Trace; c010719c <init+104/238>
Trace; c01075bb <kernel_thread+23/30>
Code; c01516e5 <open_namei+48d/604>
00000000 <_EIP>:
Code; c01516e5 <open_namei+48d/604> <=====
   0: 0f b7 46 22 movzwl 0x22(%esi),%eax <=====
Code; c01516e9 <open_namei+491/604>
   4: 25 00 f0 ff ff and $0xfffff000,%eax
Code; c01516ee <open_namei+496/604>
   9: 66 3d 00 a0 cmp $0xa000,%ax
Code; c01516f2 <open_namei+49a/604>
   d: 0f 84 49 01 00 00 je 15c <_EIP+0x15c> c0151841 <open_namei+5e9/604>
Code; c01516f8 <open_namei+4a0/604>
  13: bb 00 00 00 00 mov $0x0,%ebx

NMI Watchdog detected LOCKUP on CPU0, registers:
CPU: 0
EIP: 0010:[<c0124b6a>]
EFLAGS: 00000002
eax: c23f6000 ebx: c23f4000 ecx: c02f40a8 edx: c02f40a8
esi: 00000001 edi: c233c000 ebp: c233c000 esp: c233ddf4
ds: 0018 es: 0018 ss: 0018
Process swapper (pid: 1, stackpage=c233d000)
Stack: c233c4fc c233c4dc 00000286 656c6f95 c0124ff0 c01250a6 00000000 656c6f73
       c233c000 656c6f95 c010a9a0 c233c4dc c233c000 c010a9f5 0000000b 00000000
       c01177dd c026a57e c233def4 00000000 c233c000 656c6f73 c23b6000 00000000
Call Trace: [<c0124ff0>] [<c01250a6>] [<c010a9a0>] [<c010a9f5>] [<c01177dd>] [<c026a57e>] [<c0144f81>]
       [<c01633cc>] [<c0163654>] [<c0211814>] [<c019d68b>] [<c010a5c5>] [<c01516e5>] [<c0140fe7>] [<c0261525>]
       [<c0141343>] [<c010a49c>] [<c0261525>] [<c0110018>] [<c0260018>] [<c010719c>] [<c01075bb>]
Code: 8b 43 7c 89 83 80 00 00 00 8b 80 84 00 00 00 89 83 8c 00 00

>>EIP; c0124b6a <exit_notify+206/364> <=====
Trace; c0124ff0 <do_exit+328/470>
Trace; c01250a6 <do_exit+3de/470>
Trace; c010a9a0 <die+80/d8>
Trace; c010a9f5 <die+d5/d8>
Trace; c01177dd <do_page_fault+3c5/4c8>
Trace; c026a57e <error_table+3b5e/7908>
Trace; c0144f81 <bread+45/68>
Trace; c01633cc <ext2_read_inode+fc/404>
Trace; c0163654 <ext2_read_inode+384/404>
Trace; c0211814 <vgacon_scroll+1e8/210>
Trace; c019d68b <scrup+6b/108>
Trace; c010a5c5 <error_code+2d/38>
Trace; c01516e5 <open_namei+48d/604>
Trace; c0140fe7 <filp_open+3b/5c>
Trace; c0261525 <stext_lock+6d71/8ccc>
Trace; c0141343 <sys_open+a7/250>
Trace; c010a49c <system_call+34/38>
Trace; c0261525 <stext_lock+6d71/8ccc>
Trace; c0110018 <mask_and_ack_8259A+130/170>
Trace; c0260018 <stext_lock+5864/8ccc>
Trace; c010719c <init+104/238>
Trace; c01075bb <kernel_thread+23/30>
Code; c0124b6a <exit_notify+206/364>
00000000 <_EIP>:
Code; c0124b6a <exit_notify+206/364> <=====
   0: 8b 43 7c mov 0x7c(%ebx),%eax <=====
Code; c0124b6d <exit_notify+209/364>
   3: 89 83 80 00 00 00 mov %eax,0x80(%ebx)
Code; c0124b73 <exit_notify+20f/364>
   9: 8b 80 84 00 00 00 mov 0x84(%eax),%eax
Code; c0124b79 <exit_notify+215/364>
   f: 89 83 8c 00 00 00 mov %eax,0x8c(%ebx)

Before running through ksymoops:

Unable to handle kernel paging request at virtual address 656c6f95
 printing eip:
c01516e5
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01516e5>]
EFLAGS: 00010202
eax: 00000000 ebx: ffffffd8 ecx: c23b6000 edx: c23b6000
esi: 656c6f73 edi: c23b6000 ebp: 00000000 esp: c233df28
ds: 0018 es: 0018 ss: 0018
Process swapper (pid: 1, stackpage=c233d000)
Stack: 00000000 c23b6000 00000002 c233c000 00000000 c02dc7b4 c23b600 00000006
       c0140fe7 c23b6000 00000003 00000000 c233df68 c233c000 c233c00 00000000
       c23b6000 c0261525 00000000 00000000 00000000 c0141343 c23b600 00000002
Call Trace: [<c0140fe7>] [<c0261525>] [<c0141343>] [<c010a49c>] [<c0261525>] [<c0110018>] [<c0260018>]
       [<c010719c>] [<c01075bb>]
Code: 0f b7 46 22 25 00 f0 ff ff 66 3d 00 a0 0f 84 49 01 00 00 bb
NMI Watchdog detected LOCKUP on CPU0, registers:
CPU: 0
EIP: 0010:[<c0124b6a>]
EFLAGS: 00000002
eax: c23f6000 ebx: c23f4000 ecx: c02f40a8 edx: c02f40a8
esi: 00000001 edi: c233c000 ebp: c233c000 esp: c233ddf4
ds: 0018 es: 0018 ss: 0018
Process swapper (pid: 1, stackpage=c233d000)
Stack: c233c4fc c233c4dc 00000286 656c6f95 c0124ff0 c01250a6 00000000 656c6f73
       c233c000 656c6f95 c010a9a0 c233c4dc c233c000 c010a9f5 0000000b 00000000
       c01177dd c026a57e c233def4 00000000 c233c000 656c6f73 c23b6000 00000000
Call Trace: [<c0124ff0>] [<c01250a6>] [<c010a9a0>] [<c010a9f5>] [<c01177dd>] [<c026a57e>] [<c0144f81>]
       [<c01633cc>] [<c0163654>] [<c0211814>] [<c019d68b>] [<c010a5c5>] [<c01516e5>] [<c0140fe7>] [<c0261525>]
       [<c0141343>] [<c010a49c>] [<c0261525>] [<c0110018>] [<c0260018>] [<c010719c>] [<c01075bb>]
Code: 8b 43 7c 89 83 80 00 00 00 8b 80 84 00 00 00 89 83 8c 00 00
console shuts up ...

                                                        - Matt

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sat Apr 15 2000 - 21:00:17 EST