2.0.36: 3 GPF's in 3 Days

Pete Harlan (harlan@pointofchoice.com)
Tue, 29 Dec 1998 17:12:21 -0600 (CST)


Hi,

After 20+ days with no trouble on a webserver (2.0.36, no modules, no
serial, WD80x3 SMC ethernet, 300Mhz PII 192MB, ASUS P2L97S with
onboard Adaptec 7880 scsi), got these over the course of three days.
gcc 2.7.2.1.

general protection: 0000
CPU: 0
EIP: 0010:[tcp_recvmsg+368/1036]
EFLAGS: 00010213
eax: f000e987 ebx: 00000000 ecx: 0bd41834 edx: f000f84d
nnesi: 0bd418d0 edi: 000001a0 ebp: 0bd41810 esp: 09f98ee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpsd (pid: 3273, process nr: 25, stackpage=09f98000)
Stack: 0bd41810 09f98f7c 00000000 00000000 10580f0b 0bd41834 00000000 000001a0
09a2c018 0a3f3f48 005905b8 0015011e 0bd41810 09f98f78 00000e60 00000000
00000000 09f98f7c 00001000 0a3f3f00 08119884 0a3f3f90 00136a63 0a3f3f90
Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
[sys_read+192/232] [system_call+85/128]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87

general protection: 0000
CPU: 0
EIP: 0010:[tcp_recvmsg+368/1036]
EFLAGS: 00010207
eax: f000e987 ebx: 00000000 ecx: 0bdcc834 edx: f000f84d
esi: 0bdcc8d0 edi: 0000019a ebp: 0bdcc810 esp: 0bdbfee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpsd (pid: 2896, process nr: 27, stackpage=0bdbf000)
Stack: 0bdcc810 0bdbff7c 00000000 00000000 10580fb1 0bdcc834 00000000 0000019a
0b567414 08502d48 00590664 0015011e 0bdcc810 0bdbff78 00000e66 00000000
00000000 0bdbff7c 00001000 08502d00 08119884 08502d90 00136a63 08502d90
Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
[sys_read+192/232] [system_call+85/128]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87

general protection: 0000
CPU: 0
EIP: 0010:[tcp_recvmsg+368/1036]
EFLAGS: 00010213
eax: f000e987 ebx: 00000000 ecx: 05bb3438 edx: f000f84d
esi: 05bb34d4 edi: 000001a2 ebp: 05bb3414 esp: 021daee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpsd (pid: 25309, process nr: 27, stackpage=021da000)
Stack: 05bb3414 021daf7c 00000000 00000000 102b832a 05bb3438 00000000 000001a2
0bcc5c0c 0a148048 002c79d5 0015011e 05bb3414 021daf78 00000e5e 00000000
00000000 021daf7c 00001000 0a148000 08119884 0a148090 00136a63 0a148090
Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
[sys_read+192/232] [system_call+85/128]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87

general protection: 0000
CPU: 0
EIP: 0010:[tcp_recvmsg+368/1036]
EFLAGS: 00010212
eax: f000e987 ebx: 00000000 ecx: 07905438 edx: f000f84d
esi: 079054d4 edi: 000001a5 ebp: 07905414 esp: 06e3bee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpsd (pid: 17189, process nr: 69, stackpage=06e3b000)
Stack: 07905414 06e3bf7c 00000000 00000000 02c160d6 07905438 00000000 000001a5
0696e018 09533248 f2c2577e 0015011e 07905414 06e3bf78 00000e5b 00000000
00000000 06e3bf7c 00001000 09533200 08119884 09533290 00136a63 09533290
Call Trace: [inet_recvmsg+114/136] [sock_read+171/192]
[sys_read+192/232] [system_call+85/128]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87

--
Pete Harlan
harlan@pointofchoice.com

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/