2.0.31-pre9 oopses

Harold Campbell (hcamp@cmpu.net)
Thu, 11 Sep 1997 19:56:10 -0500 (CDT)


This machine serves over a hundred virtual web sites, runs DNS, and was
running an rc5client. It's a pentium II with 128M ram, Adaptec 2940uw,
NE2k as a module.

general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010286
eax: e14cc000 ebx: 00f90802 ecx: 00000400 edx: 00000172
esi: 00000802 edi: 002fb970 ebp: 00000400 esp: 05dd6e8c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 13638, process nr: 21, stackpage=05dd6000)
Stack: 00f99798 002fb970 00000802 00000001 00000000 00000172 001258fd
00000802
002fb970 00000400 05dd6f3c 00000004 00000000 00f3f0fc 002fb970
00000802
00000100 00f99a18 01d90802 00000000 00f99a18 001550b0 010b3ccc
05dd6f38
Call Trace: [brw_page+313/900] [ext2_lookup+180/368]
[generic_readpage+115/128]
[generic_file_read+1058/1508] [generic_file_read+1281/1508]
[sys_read+192/232] [
system_call+85/128]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010292
eax: 87180715 ebx: 00160821 ecx: 00000821 edx: 00000834
esi: 00000821 edi: 00165015 ebp: 00000400 esp: 067a0b10
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process bash (pid: 13361, process nr: 108, stackpage=067a0000)
Stack: 00165015 067a0821 00165015 00000400 001c4c90 00000834 00124c64
00000821
00165015 00000400 00165015 067a0c3c 001c4c90 00165015 00000001
00153ab4
00000821 00165015 00000400 00000000 00165015 00000095 00f3fbd0
00000400
Call Trace: [init_gendisk+177/348] [init_gendisk+177/348] [getblk+52/944]
[init_
gendisk+177/348] [init_gendisk+177/348] [init_gendisk+177/348]
[ext2_alloc_block
+128/412]
[init_gendisk+177/348] [init_gendisk+177/348] [getblk+52/944]
[block_getb
lk+348/612] [init_gendisk+177/348] [ext2_getblk+260/556]
[ext2_file_write+389/11
16] [__brelse+34/68]
[ext2_create+341/360] [dump_write+28/44] [writenote+167/200]
[dump_write+
28/44] [elf_core_dump+2488/2640]
[serial:register_serial_R3425f38c+-22948/332] [
dev_queue_xmit+26/36] [serial:register_serial_R3425f38c+-22948/332]
[ip_queue_xmit+375/460]
[serial:register_serial_R3425f38c+-22948/332] [kf
ree_skbmem+67/80] [sock_rfree+19/32] [ext2_lookup+129/368]
[ext2_lookup+180/368]
[sys_sigreturn+27/448] [do_signal+495/632]
[signal_return+18/64]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010296
eax: e14cc000 ebx: 06b70821 ecx: 00000400 edx: 00000172
esi: 00000821 edi: 00002953 ebp: 00000400 esp: 04799e68
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 13920, process nr: 75, stackpage=04799000)
Stack: 06b76898 00002953 00000821 00000000 00000000 00000172 001258fd
00000821
00002953 00000400 04799f18 00000008 00000000 01536bd0 00002953
00000821
00000100 06b76898 04790821 04799f3c 00000004 00000000 01536bd0
04799f14
Call Trace: [brw_page+313/900] [generic_readpage+115/128]
[try_to_read_ahead+40/
296] [try_to_read_ahead+269/296] [generic_file_read+680/1508]
[sys_read+192/232]
[system_call+85/128]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010296
eax: c718053a ebx: 00ee0802 ecx: 00000400 edx: 000008fd
esi: 00000802 edi: 002fb0ff ebp: 00000400 esp: 06af3e8c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 13949, process nr: 30, stackpage=06af3000)
Stack: 00ee1418 002fb0ff 00000802 00000001 00000000 000008fd 001258fd
00000802
002fb0ff 00000400 06af3f3c 00000004 00000000 01e983f0 002fb0ff
00000802
00000100 00f41098 00800802 00000000 00f41098 001550b0 010b3ccc
06af3f38
Call Trace: [brw_page+313/900] [ext2_lookup+180/368]
[generic_readpage+115/128]
[generic_file_read+1058/1508] [generic_file_read+1281/1508]
[sys_read+192/232] [
system_call+85/128]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010286
eax: d8980777 ebx: 00df0821 ecx: 00000400 edx: 00000064
esi: 00000821 edi: 0001f845 ebp: 00000400 esp: 05617e8c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 14115, process nr: 101, stackpage=05617000)
Stack: 00dfe198 0001f845 00000821 00000003 00000000 00000064 001258fd
00000821
0001f845 00000400 05617f3c 00000004 00000000 02c0d5e8 0001f845
00000821
00000100 00dfe118 01d90821 00000000 00dfe118 00dfe298 00dfe218
05617f38
Call Trace: [brw_page+313/900] [generic_readpage+115/128]
[generic_file_read+105
8/1508] [generic_file_read+1281/1508] [sys_read+192/232]
[system_call+85/128]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010286
eax: da980317 ebx: 06b50821 ecx: 00000400 edx: 00000067
esi: 00000821 edi: 0001f846 ebp: 00000400 esp: 05e15e68
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 14209, process nr: 84, stackpage=05e15000)
Stack: 06b53118 0001f846 00000821 00000000 00000000 00000067 001258fd
00000821
0001f846 00000400 05e15f18 00000008 00000000 02c0d5e8 0001f846
00000821
00000100 06b53118 00000821 00dfe318 030d0598 00000000 00dfe368
05e15f14
Call Trace: [brw_page+313/900] [generic_readpage+115/128]
[try_to_read_ahead+40/
296] [try_to_read_ahead+269/296] [generic_file_read+680/1508]
[sys_read+192/232]
[system_call+85/128]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+52/172]
EFLAGS: 00010296
eax: 999807b7 ebx: 06c60802 ecx: 00000400 edx: 000008d9
esi: 00000802 edi: 002fb0db ebp: 00000400 esp: 0632ae8c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 14283, process nr: 84, stackpage=0632a000)
Stack: 06c6ca18 002fb0db 00000802 00000001 00000000 000008d9 001258fd
00000802
002fb0db 00000400 0632af3c 00000004 00000000 02c384ec 002fb0db
00000802
00000100 06c6ca98 00d70802 00000000 06c6ca98 001550b0 010b3ccc
0632af38
Call Trace: [brw_page+313/900] [ext2_lookup+180/368]
[generic_readpage+115/128]
[generic_file_read+1058/1508] [generic_file_read+1281/1508]
[sys_read+192/232] [
system_call+85/128]
Code: 39 38 75 24 66 39 58 04 75 1e 39 68 20 74 22 56 e8 43 fa ff

-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GCS+++>$ GS++ d-(--) s+:-- a19 C++++ UL++$ P+ L++(+++)>++++
E- N++ o? K? w-- M-- PS+ PE+(++) Y+ t+ 5 R tv(+) b+(++)>+++
D+ G e>++++ h- r(+++) y+
------END GEEK CODE BLOCK------