2 oops in 2.0.22

Mon, 28 Oct 1996 23:10:44 -0500 (EST)

I just got these non-fatal oops. They repeated twice in the same
order. In the case of the

Linux neko 2.0.22 #1 Mon Oct 21 19:23:49 EDT 1996 i586

total: used: free: shared: buffers: cached:
Mem: 31834112 27172864 4661248 16105472 4808704 13398016
Swap: 33550336 3092480 30457856

This is a pentium 75 that I recently increased the external clock rate
from 50Mhz to 66Mhz, so it's a pentium 100 now :) I don't think that
the overclocking has anything to do with it.

I'm also running a small program that just eats CPU time.

nicholas 2906 99.5 0.5 752 160 p3 R N 22:07 52:52 ./eatcputime

This machine is also acting as a server for a nfsboot client that also
has its swap file on this computer, ie, *LOTS* of nfs i/o going on.

Universal NFS Server 2.2beta16

rpc.nfsd died and even after restarting it, my nfsboot client is dead

As I sit here I watch more of these oops appear in the logs. Mostly
(almost all) nfsd, so I presume the xterm was incedental. I attempted
to kill off rpc.nfsd and rpc.mountd, but only mountd died.

I'm also getting these wedged within the oops:

03:02 rw=1, want=1049411486, limit=1546272

Process rpc.nfsd (pid: 67, process nr: 19, stackpage=0067b000)
Stack: 0014d06f 01e7f72c 00000000 00d1050c 012f01c0 00000000 00d104d8 00000000
00000000 001c5728 00000400 00000000 0000022e 0008bc00 00000000 01e7f72c
ffffffe4 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call Trace: [<0014d06f>] [<0012018e>] [<00114f2e>] [<0010a552>]
Code: c3 8d 76 00 c7 41 2c 00 00 00 00 c3 83 ec 0c 55 57 56 53 8b
general protection: 0000
CPU: 0
EIP: 0010:[<00110269>]
EFLAGS: 00010282
eax: 34000000 ebx: 458bb855 ecx: 001a52d4 edx: 8b000001
esi: 019add90 edi: 001a52d0 ebp: 00471ec8 esp: 00471ebc
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018

Using `/boot/System.map' to map addresses to symbols.

Trace: 14d06f <ext2_file_write+2b7/45c>
Trace: 12018e <sys_write+10e/148>
Trace: 114f2e <sys_time+1a/2c>
Trace: 10a552 <system_call+52/80>

Code: ret
Code: leal 0x0(%esi),%esi
Code: movl $0x0,0x2c(%ecx)
Code: ret
Code: subl $0xc,%esp
Code: pushl %ebp
Code: pushl %edi
Code: pushl %esi
Code: pushl %ebx
Code: movl (%eax),%eax
Code: nop
Code: nop
>>EIP: 110269 <wake_up+35/e4>

Process xterm (pid: 2950, process nr: 19, stackpage=00471000)
Stack: 019add90 019add90 00000000 00471f54 00120c6e 001a52d4 00d108b8 00152ab0
019add90 019ade18 00000001 00008000 00471f54 00d108b8 019add90 00471f54
00000001 00471f8c 00000000 00128e8b 00d108b8 019add90 00000001 00008000
Call Trace: [<00120c6e>] [<00152ab0>] [<00128e8b>] [<00129330>] [<0011fa09>] [<0011fb8f>] [<00

Code: 8b 02 83 f8 02 74 07 8b 02 83 f8 01 75 5f 9c 5e fa c7 02 00
general protection: 0000
CPU: 0
EIP: 0010:[<0012b994>]
EFLAGS: 00010286
eax: f000ef6f ebx: 0067dc0c ecx: 00000000 edx: 00000000
esi: 00000000 edi: f000ef6f ebp: 006d6810 esp: 00471e00

Using `/boot/System.map' to map addresses to symbols.

Trace: 120c6e <iput+8e/17c>
Trace: 152ab0 <ext2_follow_link+134/150>
Trace: 128e8b <follow_link+67/70>
Trace: 129330 <open_namei+228/3c4>
Trace: 11fa09 <do_open+59/124>
Trace: 11fb8f <sys_open+3f/78>

Code: movl (%edx),%eax
Code: cmpl $0x2,%eax
Code: je 0000000e <_EIP+e>
Code: movl (%edx),%eax
Code: cmpl $0x1,%eax
Code: jne 0000006d <_EIP+6d>
Code: pushf
Code: popl %esi
Code: cli
Code: movl $0x90900000,(%edx)
>>EIP: 12b994 <locks_remove_locks+c/38>

Nicholas J. Leon                                          nicholas@binary9.net
"Elegance through Simplicity"                  http://www.binary9.net/nicholas
                      [--Powered by a Linux/GNU System--]