1.3.73 oops, destroy_sock (&more, long)

Jeff Epler (jepler@inetnebr.com)
Wed, 13 Mar 1996 07:57:29 -0600 (CST)


(Setup: 1.3.73. gcc 2.7.2. i386. diald is only interesting piece of
software, unless kerneld counts (slip as a loaded module). The slip link
was up at the time of the oopses.)

I had rebooted a few minutes earlier. Then, from cron 'netdate' got run.
This happened:

Mar 12 21:00:00 craie /USR/SBIN/CROND[314]: (root) CMD (/usr/sbin/netdate falcon herbie cse unlinfo 2>&1 > /dev/null)
Mar 12 21:00:01 craie modprobe: Can't locate module binfmt-1824
Mar 12 21:00:02 craie modprobe: Can't locate module binfmt-1824
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007f20c, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007f604, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007f800, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007f9fc, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007fbf8, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007fdf4, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: kfree of non-kmalloced memory: 0007f010, next= 07200720, order=119539488
Mar 12 21:00:28 craie linux: Unable to handle kernel paging request at virtual address c7200724
Mar 12 21:00:28 craie linux: current->tss.cr3 = 00101000, %cr3 = 00101000
Mar 12 21:00:28 craie linux: *pde = 00000000
Mar 12 21:00:28 craie linux: Oops: 0002
Mar 12 21:00:28 craie linux: CPU: 0
Mar 12 21:00:28 craie linux: EIP: 0010:[<00148a65>]
Mar 12 21:00:28 craie linux: EFLAGS: 00010003
Mar 12 21:00:28 craie linux: eax: 0007d114 ebx: 00000216 ecx: 0005aedc edx: 07200720
Mar 12 21:00:28 craie linux: esi: 0033da9c edi: 0033da04 ebp: 00000001 esp: 0022af14
Mar 12 21:00:28 craie linux: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Mar 12 21:00:28 craie linux: Process diald (pid: 223, process nr: 22, stackpage=0022a000)
Mar 12 21:00:28 craie linux: Stack: 0033da04 0025e284 0025e284 0013aefa 0033da04 0033da04 0014927c 0033da04
Mar 12 21:00:28 craie linux: 00000000 0025e200 00000000 00132d37 0025e284 00000000 0025e200 0025e200
Mar 12 21:00:28 craie linux: 0000000b 0022afbc 00132f60 0025e284 0081f3f0 0011fc2a 0025e200 0081f3f0
Mar 12 21:00:28 craie linux: Call Trace: [<0013aefa>] [<0014927c>] [<00132d37>] [<00132f60>] [<0011fc2a>] [<00114aaa>] [<0010a0e7>]
Mar 12 21:00:28 craie linux: [<0010a3f2>]
Mar 12 21:00:28 craie linux: Code: 89 72 04 89 97 98 00 00 00 c7 00 00 00 00 00 c7 40 04 00 00
Mar 12 21:00:29 craie linux: Unable to handle kernel paging request at virtual address c7200724
Mar 12 21:00:29 craie linux: current->tss.cr3 = 003d4000, %cr3 = 003d4000
Mar 12 21:00:29 craie linux: *pde = 00000000
Mar 12 21:00:29 craie linux: Oops: 0002
Mar 12 21:00:29 craie linux: CPU: 0
Mar 12 21:00:29 craie linux: EIP: 0010:[<0010fdf5>]
Mar 12 21:00:29 craie linux: EFLAGS: 00010002
Mar 12 21:00:29 craie linux: eax: 07200720 ebx: 00000246 ecx: 0007aea8 edx: 07200720
Mar 12 21:00:29 craie linux: esi: 0054b414 edi: 0054b414 ebp: 0007ae88 esp: 0007ae84
Mar 12 21:00:29 craie linux: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Mar 12 21:00:29 craie linux: Corrupted stack page
Mar 12 21:00:29 craie linux: Process netdate (pid: 317, process nr: 27, stackpage=0007a000)
Mar 12 21:00:29 craie linux: Stack: 0072f414 0007aebc 0010f9b1 0007aea8 07200720 07200720 07200720 07200720
Mar 12 21:00:29 craie linux: 07200720 07200720 07200720 07200720 07200720 07200720 07200720 07200720
Mar 12 21:00:29 craie linux: 07200720 07200720 07200720 07200720 07200720 07200720 07200720 07200720
Mar 12 21:00:29 craie linux: Call Trace: [<0010f9b1>]
Mar 12 21:00:29 craie linux: Code: 89 42 04 89 10 c7 41 04 00 00 00 00 c7 01 00 00 00 00 b8 01
Mar 12 21:00:29 craie linux: Unable to handle kernel paging request at virtual address c7200720
Mar 12 21:00:29 craie linux: current->tss.cr3 = 00101000, %cr3 = 00101000
Mar 12 21:00:29 craie linux: *pde = 00000000
Mar 12 21:00:29 craie linux: Oops: 0000
Mar 12 21:00:29 craie linux: CPU: 0
Mar 12 21:00:29 craie linux: EIP: 0010:[<0010fad6>]
Mar 12 21:00:29 craie linux: EFLAGS: 00010002
Mar 12 21:00:29 craie linux: eax: 00148e00 ebx: 0007aed4 ecx: 00000000 edx: 07200720
Mar 12 21:00:29 craie linux: esi: 00285884 edi: 00285844 ebp: 0007ad7c esp: 0007ad70
Mar 12 21:00:29 craie linux: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Mar 12 21:00:29 craie linux: Corrupted stack page
Mar 12 21:00:29 craie linux: Process netdate (pid: 317, process nr: 27, stackpage=0007a000)
Mar 12 21:00:29 craie linux: Stack: 0075a808 00285884 00285884 00000003 00148e2a 00285844 00149235 0075a808
Mar 12 21:00:29 craie linux: 00285800 00000000 00132d37 00285884 00000000 00285800 00285800 0000000b
Mar 12 21:00:29 craie linux: 0007ae48 00132f60 00285884 0081f5a0 0011fc2a 00285800 0081f5a0 00000005
Mar 12 21:00:29 craie linux: Call Trace: [<00148e2a>] [<00149235>] [<00132d37>] [<00132f60>] [<0011fc2a>] [<00114aaa>] [<0010a8ab>]
Mar 12 21:00:29 craie linux: [<01800000>] [<01000000>] [<00180018>] [<0010f644>] [<0010f3a4>] [<0010a4bb>] [<0010fdf5>] [<0010f9b1>]
Mar 12 21:00:29 craie linux: Code: 8b 02 83 f8 01 75 61 9c 5e fa c7 02 00 00 00 00 83 7a 4c 00
Mar 12 21:00:29 craie linux: release: netdate kernel stack corruption. Aiee
Mar 12 21:00:43 craie shutdown: rebooted by ghost: for maintenance; bounce, bounce
Mar 12 21:00:43 craie syslogd: exiting on signal 15

Running ksymoops on the oopses above, I get

Using `/boot/System.map.1373' to map addresses to symbols.

>>EIP: 148a65 <destroy_sock+d1/294>
Trace: 13aefa <packet_close+9a/a0>
Trace: 14927c <inet_release+64/6c>
Trace: 132d37 <sock_release+5b/94>
Trace: 132f60 <sock_close+24/2c>
Trace: 11fc2a <close_fp+5e/84>
Trace: 114aaa <do_exit+de/1b0>
Trace: 10a0e7 <do_signal+21b/364>
Trace: 10a3f2 <signal_return+12/40>

Code: 148a65 <destroy_sock+d1/294> movl %esi,0x4(%edx)
Code: 148a68 <destroy_sock+d4/294> movl %edx,0x98(%edi)
Code: 148a6e <destroy_sock+da/294> movl $0x0,(%eax)
Code: 148a74 <destroy_sock+e0/294> movl $0x90000000,0x4(%eax)
Code: 148a7b <destroy_sock+e7/294> nop
>>EIP: 10fdf5 <del_timer+15/34>
Trace: 10f9b1 <schedule+289/294>

Using `/boot/System.map.1373' to map addresses to symbols.

>>EIP: 10fdf5 <del_timer+15/34>
Trace: 10f9b1 <schedule+289/294>

Code: 10fdf5 <del_timer+15/34> movl %eax,0x4(%edx)
Code: 10fdf8 <del_timer+18/34> movl %edx,(%eax)
Code: 10fdfa <del_timer+1a/34> movl $0x0,0x4(%ecx)
Code: 10fe01 <del_timer+21/34> movl $0x0,(%ecx)
Code: 10fe07 <del_timer+27/34> movl $0x90900001,%eax
Using `/boot/System.map.1373' to map addresses to symbols.

>>EIP: 10fdf5 <del_timer+15/34>
Trace: 10f9b1 <schedule+289/294>

Code: 10fdf5 <del_timer+15/34> movl %eax,0x4(%edx)
Code: 10fdf8 <del_timer+18/34> movl %edx,(%eax)
Code: 10fdfa <del_timer+1a/34> movl $0x0,0x4(%ecx)
Code: 10fe01 <del_timer+21/34> movl $0x0,(%ecx)
Code: 10fe07 <del_timer+27/34> movl $0x90900001,%eax
Using `/boot/System.map.1373' to map addresses to symbols.

>>EIP: 10fad6 <wake_up_interruptible+22/d8>
Trace: 148e2a <def_callback1+16/1c>
Trace: 149235 <inet_release+1d/6c>
Trace: 132d37 <sock_release+5b/94>
Trace: 132f60 <sock_close+24/2c>
Trace: 11fc2a <close_fp+5e/84>
Trace: 114aaa <do_exit+de/1b0>
Trace: 10a8ab <die_if_kernel+29f/2a8>
Trace: 1800000
Trace: 1000000
Trace: 180018 <sequencer_read+24/1c4>
Trace: 10f644 <do_page_fault+2a0/2a8>
Trace: 10f644 <do_page_fault+2a0/2a8>
Trace: 10a4bb <error_code+4b/60>
Trace: 10fdf5 <del_timer+15/34>
Trace: 10f9b1 <schedule+289/294>

Code: 10fad6 <wake_up_interruptible+22/d8> movl (%edx),%eax
Code: 10fad8 <wake_up_interruptible+24/d8> cmpl $0x1,%eax
Code: 10fadb <wake_up_interruptible+27/d8> jne 10fb3e <wake_up_interruptible+8a/d8>
Code: 10fadd <wake_up_interruptible+29/d8> pushf
Code: 10fade <wake_up_interruptible+2a/d8> popl %esi
Code: 10fadf <wake_up_interruptible+2b/d8> cli
Code: 10fae0 <wake_up_interruptible+2c/d8> movl $0x0,(%edx)
Code: 10fae6 <wake_up_interruptible+32/d8> cmpl $0x0,0x4c(%edx)
Using `/boot/System.map.1373' to map addresses to symbols.

>>EIP: 10fad6 <wake_up_interruptible+22/d8>
Trace: 148e2a <def_callback1+16/1c>
Trace: 149235 <inet_release+1d/6c>
Trace: 132d37 <sock_release+5b/94>
Trace: 132f60 <sock_close+24/2c>
Trace: 11fc2a <close_fp+5e/84>
Trace: 114aaa <do_exit+de/1b0>
Trace: 10a8ab <die_if_kernel+29f/2a8>
Trace: 1800000
Trace: 1000000
Trace: 180018 <sequencer_read+24/1c4>
Trace: 10f644 <do_page_fault+2a0/2a8>
Trace: 10f644 <do_page_fault+2a0/2a8>
Trace: 10a4bb <error_code+4b/60>
Trace: 10fdf5 <del_timer+15/34>
Trace: 10f9b1 <schedule+289/294>

In mail, from my atrun, I got the message sent at 21:00:03 (ie before the
oopses):
/bin/sh: /usr/local/sbin/atrun: cannot execute binary file

However, the binary in /usr/local/sbin/atrun is just fine and worked after
the reboot.

Jeff