pre-patch-2.0.31-9 OOPSs

Steven S. Dick (ssd@nevets.oau.org)
Thu, 11 Sep 1997 01:41:48 -0400 (EDT)


Someone mentioned that my old gcc (2.7.2) might be the cause of my OOPS's,
so today I compiled the kernel on a RedHat 4.2 machine with gcc 2.7.2.1,
and of course, I got a huge oops as soon as I started up trn. I'm running
inn 1.5.1-6 and trn locally. Inn is fed via rnews via uucp batch.

The first part here is pulled from the screen so I could run it
through ksymoops; the decoded OOPS's are from syslog. Let me know if
you want more/less raw output, or if these are even at all helpful.
The first oops may not be included in the first set from ksymoops,
since it scrolled off.

Meanwhile, my system has locked up when I wasnt home several times, so
I'd declare at least this patched version of 2.0.31 very unstable. I
will be going back to 2.0.30, which at least hasn't hung on me,
although I did get a few oops's from it. I don't know if unpatched
2.0.31 is any better or not.

This is from 2.0.31p9 plus several patches that Werner Fink suggested I try.

Output from ksymoops:

Using `/boot/System.map' to map addresses to symbols.

Trace: 10ce2d <do_IRQ+2d/50>
Trace: 124fb3 <sys_read+b3/100>
Trace: 10aaa9 <system_call+55/7c>

Code: movl 0x50(%eax),%eax
Code: testl %eax,%eax
Code: je 0000002a <_EIP+2a>
Code: cmpl %esi,0x8(%eax)
Code: jbe 0000001a <_EIP+1a>
Code: movl %eax,%edx
Code: cmpl %esi,0x4(%edx)
Code: jbe 0000002a <_EIP+2a>
Code: movl (%eax),%eax
Code: nop
Code: nop
Code: nop

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 117d69 <do_exit+99/1f0>
Trace: 10aff3 <die_if_kernel+2c3/2e0>
Trace: 2000000
Trace: 1800000
Trace: 10b48c <do_general_protection+2c/60>
Trace: 10b48c <do_general_protection+2c/60>
Trace: 10ac0c <error_code+40/48>
Trace: 11ba06 <verify_area+36/1e0>
Trace: 10ce2d <do_IRQ+2d/50>
Trace: 124fb3 <sys_read+b3/100>
Trace: 10aaa9 <system_call+55/7c>

Code: 117d69 <do_exit+99/1f0> movl (%ebx),%eax
Code: 117d6b <do_exit+9b/1f0> leal 0xffffffff(%eax),%ecx
Code: 117d6e <do_exit+9e/1f0> movl %ecx,(%ebx)
Code: 117d70 <do_exit+a0/1f0> cmpl $0x1,%eax
Code: 117d73 <do_exit+a3/1f0> jne 117d8a <do_exit+ba/1f0>
Code: 117d75 <do_exit+a5/1f0> pushl %ebx
Code: 117d76 <do_exit+a6/1f0> call 11d160 <exit_mmap>
Code: 117d7b <do_exit+ab/1f0> pushl %ebx
Code: 117d7c <do_exit+ac/1f0> call 90909018 <_EIP+90909018>

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 117e12 <do_exit+142/1f0>
Trace: 10aff3 <die_if_kernel+2c3/2e0>
Trace: 2000000
Trace: 1800000
Trace: 10b48c <do_general_protection+2c/60>
Trace: 10b48c <do_general_protection+2c/60>
Trace: 10ac0c <error_code+40/48>
Trace: 117d69 <do_exit+99/1f0>
Trace: 10aff3 <die_if_kernel+2c3/2e0>
Trace: 2000000
Trace: 1800000
Trace: 10b48c <do_general_protection+2c/60>
Trace: 10b48c <do_general_protection+2c/60>
Trace: 10ac0c <error_code+40/48>
Trace: 11ba06 <verify_area+36/1e0>
Trace: 10ce2d <do_IRQ+2d/50>
Trace: 124fb3 <sys_read+b3/100>
Trace: 10aaa9 <system_call+55/7c>

Code: 117e12 <do_exit+142/1f0> movl (%ebx),%eax
Code: 117e14 <do_exit+144/1f0> leal 0xffffffff(%eax),%ecx
Code: 117e17 <do_exit+147/1f0> movl %ecx,(%ebx)
Code: 117e19 <do_exit+149/1f0> cmpl $0x1,%eax
Code: 117e1c <do_exit+14c/1f0> jne 117e39 <do_exit+169/1f0>
Code: 117e1e <do_exit+14e/1f0> movl 0x8(%ebx),%eax
Code: 117e21 <do_exit+151/1f0> pushl %eax
Code: 117e22 <do_exit+152/1f0> call 125d50 <iput>
Code: 117e27 <do_exit+157/1f0> nop
Code: 117e28 <do_exit+158/1f0> nop
Code: 117e29 <do_exit+159/1f0> nop

[from syslog]

general protection: 0000
CPU: 0
EIP: 0010:[verify_area+54/480]
EFLAGS: 00010202
eax: 61e3e238 ebx: 00000000 ecx: 40007000 edx: 00000000
esi: 40007000 edi: 00000400 ebp: 00b1d9d8 esp: 00f64f80
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process trn (pid: 6279, process nr: 36, stackpage=00f64000)
Stack: 00000000 0091dd00 00000400 00b1d9d8 0010ce2d 00000005 00124fb3 00000001
40007000 00000400 00d1a810 08083728 00000400 bffffafc 0010aaa9 00000006
40007000 00000400 08083728 00000400 bffffafc ffffffda 400d002b 0000002b
Call Trace: [do_IRQ+45/80] [sys_read+179/256] [system_call+85/124]
Code: 8b 40 50 85 c0 74 23 39 70 08 76 0e 89 c2 39 72 04 76 17 8b
general protection: 0000
CPU: 0
EIP: 0010:[do_exit+153/496]
EFLAGS: 00010246
eax: 00667000 ebx: 61e3e238 ecx: 00101000 edx: 00d1a810
esi: 00000014 edi: 00f65000 ebp: 00f64f44 esp: 00f64ee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process trn (pid: 6279, process nr: 36, stackpage=00f64000)
Stack: 0009002b 00000014 00f65000 00f64f44 0010aff3 0000000b 001a06b9 00670000
40007000 00000400 00b1d9d8 0000008b 02000000 01800000 00000018 0010b48c
001a0772 00f64f44 00670000 0010b460 0010ac0c 00f64f44 00670000 00000000
Call Trace: [die_if_kernel+707/736] [<02000000>] [wd:wd_probe+-49156/160] [do_general_protection+44/96] [do_general_protection+0/96] [error_code+64/72] [verify_area+54/480]
[do_IRQ+45/80] [sys_read+179/256] [system_call+85/124]
Code: 8b 03 8d 48 ff 89 0b 83 f8 01 75 15 53 e8 e5 53 00 00 53 e8
general protection: 0000
CPU: 0
EIP: 0010:[do_exit+322/496]
EFLAGS: 00010206
eax: 00d1a810 ebx: 6049ea78 ecx: 0068f808 edx: 0068f000
esi: 00000100 edi: 00000009 ebp: 0068f810 esp: 00f64e50
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process trn (pid: 6279, process nr: 36, stackpage=00f64000)
Stack: 0009002b 00000014 00f65000 00f64eac 0010aff3 0000000b 001a06b9 00f60000
00000014 00f65000 00f64f44 000000e8 02000000 01800000 001c0018 0010b48c
001a0772 00f64eac 00f60000 0010b460 0010ac0c 00f64eac 00f60000 61e3e238
Call Trace: [die_if_kernel+707/736] [<02000000>] [wd:wd_probe+-49156/160] [do_general_protection+44/96] [do_general_protection+0/96] [error_code+64/72] [do_exit+153/496]
[die_if_kernel+707/736] [<02000000>] [wd:wd_probe+-49156/160] [do_general_protection+44/96] [do_general_protection+0/96] [error_code+64/72] [verify_area+54/480] [do_IRQ+45/80]
[sys_read+179/256] [system_call+85/124]
Code: 8b 03 8d 48 ff 89 0b 83 f8 01 75 1b 8b 43 08 50 e8 29 df 00