More Oopses with pre11b

Alfredo Sanjuan (alfre@ibd.es)
Mon, 4 May 1998 20:44:53 +0200


Hi Alan, I hope that your new job at Red Hat will be more happy that I was
after looking this morning my new Oopses... :-(. Some news for the "long
awaited" pre12?

Alfredo

-----------------
stack segment: 0000
CPU: 0
EIP: 0010:[<033abc1b>]
EFLAGS: 00010a92
eax: 033a067b ebx: 01ffec0c ecx: 03106bf8 edx: 0310606f
esi: 00000124 edi: 00000000 ebp: 95662dd4 esp: 0390ed5c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process innd (pid: 166, process nr: 16, stackpage=0390e000)
Stack: 00136373 01ffec0c 01ffec0c 03106c90 00136677 01ffec0c 03106c90
03106c90
01ffec0c 00000000 00145cc2 03106c90 00000000 01ffec0c 02ca0a24
8be60330
02ca0a50 02ca075c 00000000 0029030e 0019383c 0019003c 00000051
00000000
Call Trace: [<00136373>] [<00136677>] [<00145cc2>] [<00146e87>] [<0013e863>]
[<00137750>] [<001171db>]
[<0010a5fb>] [<0013665a>] [<00143683>] [<00143aaa>] [<0014e4fe>]
[<001344cb>] [<00122330>] [<0010a675>]
Code: 00 6c 0d 75 6e 03 00 00 00 53 ae 59 21 53 ae 59 21 1c e6 45
Aiee, killing interrupt handler

Using `/System.map' to map addresses to symbols.

Trace: 136373 <sock_wfree+23/2c>
Trace: 136677 <kfree_skb+bb/f8>
Trace: 145cc2 <tcp_ack+566/8c0>
Trace: 146e87 <tcp_rcv+7ff/960>
Trace: 13e863 <ip_rcv+3a7/4d8>
Trace: 137750 <net_bh+fc/11c>
Trace: 1171db <do_bottom_half+3b/60>
Trace: 10a5fb <handle_bottom_half+b/20>
Trace: 13665a <kfree_skb+9e/f8>
Trace: 143683 <cleanup_rbuf+53/94>
Trace: 143aaa <tcp_recvmsg+3e6/408>
Trace: 14e4fe <inet_recvmsg+72/88>
Trace: 1344cb <sock_read+ab/c0>
Trace: 122330 <sys_read+c0/e8>
Trace: 10a675 <system_call+55/80>

Code: addb %ch,0x75(%ebp,%ecx,1)
Code: outsb %ds:(%esi),(%dx)
Code: addl (%eax),%eax
Code: addb %al,(%eax)
Code: pushl %ebx
Code: scasb %es:(%edi),%al
Code: popl %ecx
Code: andl %edx,0xffffffae(%ebx)
Code: popl %ecx
Code: andl %ebx,(%esi,8)
Code: incl %ebp

------------------------------
stack segment: 0000
CPU: 0
EIP: 0010:[<033abc1b>]
EFLAGS: 00010217
eax: 033a067b ebx: 01ffec0c ecx: 03106df4 edx: 0310606f
esi: 00000114 edi: 00000000 ebp: 95662dd5 esp: 0018c6f8
ds: 0018 es: 0018 fs: 002b gs: 0018 ss: 0018
Process swapper (pid: 0, process nr: 0, stackpage=0018a8cc)
Stack: 00136373 01ffec0c 01ffec0c 03106e7c 00136677 01ffec0c 03106e7c
03106e7c
01ffec0c 00000000 00145cc2 03106e7c 00000000 01ffec0c 0157b340
8be60331
0157b36c 00007d78 00000000 0029030e 0019383c 0019003c 00000051
00000002
Call Trace: [<00136373>] [<00136677>] [<00145cc2>] [<00146e87>] [<0013e863>]
[<00137750>] [<001171db>]
[<0010a5fb>] [<001096b4>] [<0010a675>] [<001093a8>] [<00109235>]
Code: 00 6c 0d 75 6e 03 00 00 00 53 ae 59 21 53 ae 59 21 1c e6 45
Aiee, killing interrupt handler
kfree of non-kmalloced memory: 0018c914, next= 00000000, order=0
kfree of non-kmalloced memory: 0018c904, next= 00000000, order=0
kfree of non-kmalloced memory: 0018ce18, next= 00000000, order=0
idle task may not sleep
idle task may not sleep
idle task may not sleep
idle task may not sleep
idle task may not sleep

Using `/System.map' to map addresses to symbols.

Trace: 136373 <sock_wfree+23/2c>
Trace: 136677 <kfree_skb+bb/f8>
Trace: 145cc2 <tcp_ack+566/8c0>
Trace: 146e87 <tcp_rcv+7ff/960>
Trace: 13e863 <ip_rcv+3a7/4d8>
Trace: 137750 <net_bh+fc/11c>
Trace: 1171db <do_bottom_half+3b/60>
Trace: 10a5fb <handle_bottom_half+b/20>
Trace: 1096b4 <sys_idle+5c/70>
Trace: 10a675 <system_call+55/80>
Trace: 1093a8 <init>
Trace: 109235 <start_kernel+1c5/1d0>

Code: addb %ch,0x75(%ebp,%ecx,1)
Code: outsb %ds:(%esi),(%dx)
Code: addl (%eax),%eax
Code: addb %al,(%eax)
Code: pushl %ebx
Code: scasb %es:(%edi),%al
Code: popl %ecx
Code: andl %edx,0xffffffae(%ebx)
Code: popl %ecx
Code: andl %ebx,(%esi,8)
Code: incl %ebp

-------------------
general protection: 0000
CPU: 0
EIP: 0010:[<033abc22>]
EFLAGS: 00010216
eax: 513a7933 ebx: 01ffec0c ecx: 03106bf8 edx: 0310606f
esi: 00000115 edi: 00000000 ebp: 00195ae0 esp: 0018c428
ds: 0018 es: 0018 fs: 002b gs: 0000 ss: 0018
Process swapper (pid: 0, process nr: 0, stackpage=0018a8cc)
Stack: 00136373 01ffec0c 01ffec0c 03106c80 00136677 01ffec0c 03106c80
00000300
00000000 00000300 00136af2 03106c80 00000000 00000300 03106c4a
001794b5
03106c80 00000000 00000001 00000000 03106c80 00195b78 00000246
00000fc4
Call Trace: [<00136373>] [<00136677>] [<00136af2>] [<001794b5>] [<0013752b>]
[<0013757a>] [<00140fa1>]
[<0014868f>] [<001486c4>] [<001462a0>] [<0014653d>] [<00146f3d>]
[<0013e863>] [<00137750>] [<001171db>]
[<0010a5fb>] [<00115cbf>] [<00116038>] [<0010ac2b>] [<05000000>]
[<04800000>] [<0010af89>] [<0010af4c>]
[<0010a800>] [<00136373>] [<00136677>] [<00145cc2>] [<00146e87>]
[<0013e863>] [<00137750>] [<001171db>]
[<0010a5fb>] [<001096b4>] [<0010a675>] [<001093a8>] [<00109235>]
Code: 00 00 53 ae 59 21 53 ae 59 21 1c e6 45 86 1c e6 45 86 53 ae
Aiee, killing interrupt handler

Using `/System.map' to map addresses to symbols.

Trace: 136373 <sock_wfree+23/2c>
Trace: 136677 <kfree_skb+bb/f8>
Trace: 136af2 <dev_kfree_skb+3e/4c>
Trace: 1794b5 <el3_start_xmit+199/200>
Trace: 13752b <do_dev_queue_xmit+1e7/21c>
Trace: 13757a <dev_queue_xmit+1a/24>
Trace: 140fa1 <ip_queue_xmit+161/1b4>
Trace: 14868f <tcp_send_ack+1eb/234>
Trace: 1486c4 <tcp_send_ack+220/234>
Trace: 1462a0 <tcp_queue+fc/184>
Trace: 14653d <tcp_data+215/220>
Trace: 146f3d <tcp_rcv+8b5/960>
Trace: 13e863 <ip_rcv+3a7/4d8>
Trace: 137750 <net_bh+fc/11c>
Trace: 1171db <do_bottom_half+3b/60>
Trace: 10a5fb <handle_bottom_half+b/20>
Trace: 115cbf <exit_notify+3b/1e8>
Trace: 116038 <do_exit+1cc/200>
Trace: 10ac2b <die_if_kernel+2bf/2c8>
Trace: 5000000
Trace: 4800000
Trace: 10af89 <do_stack_segment+3d/44>
Trace: 10af89 <do_stack_segment+3d/44>
Trace: 10a800 <error_code+40/50>
Trace: 136373 <sock_wfree+23/2c>
Trace: 136677 <kfree_skb+bb/f8>
Trace: 145cc2 <tcp_ack+566/8c0>
Trace: 146e87 <tcp_rcv+7ff/960>
Trace: 13e863 <ip_rcv+3a7/4d8>
Trace: 137750 <net_bh+fc/11c>
Trace: 1171db <do_bottom_half+3b/60>
Trace: 10a5fb <handle_bottom_half+b/20>
Trace: 1096b4 <sys_idle+5c/70>
Trace: 10a675 <system_call+55/80>
Trace: 1093a8 <init>
Trace: 109235 <start_kernel+1c5/1d0>

Code: addb %al,(%eax)
Code: pushl %ebx
Code: scasb %es:(%edi),%al
Code: popl %ecx
Code: andl %edx,0xffffffae(%ebx)
Code: popl %ecx
Code: andl %ebx,(%esi,8)
Code: incl %ebp
Code: xchgb %bl,(%esi,8)
Code: incl %ebp
Code: xchgb %dl,0xffffffae(%ebx)
Code:

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu