From: Crazy AMD K7 <100megabit@mail.ru>
To: sct@redhat.com
Cc: linux-kernel@vger.kernel.org
Subject: Oops with process kjournald
Date: Mon, 9 Jan 2006 00:06:12 +0300 [thread overview]
Message-ID: <13543542701.20060109000612@mail.ru> (raw)
[-- Attachment #1: Type: text/plain, Size: 400 bytes --]
Hello Stephen and all others.
I am using RedHat Linux 7.3 (kernel 2.4.32) on pentium machine.
A feew days ago I have installed a Promise sataII150tx2plus (20575 chipset)
card and a new 250Gb HDD.
Periodically I have Ooopses in
/var/log/messages the ksymoops report on then is attached.
The filesystem is ext3. Is any ideas why did this happened?
How to reproduce the Ooops I do not know.
What to do?
[-- Attachment #2: oops003.txt --]
[-- Type: text/plain, Size: 3401 bytes --]
ksymoops 2.4.4 on i586 2.4.32. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.32/ (default)
-m /boot/System.map-2.4.32 (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Jan 8 00:30:23 SERVER-39 kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000019
Jan 8 00:30:23 SERVER-39 kernel: c0162847
Jan 8 00:30:23 SERVER-39 kernel: *pde = 00000000
Jan 8 00:30:23 SERVER-39 kernel: Oops: 0000
Jan 8 00:30:23 SERVER-39 kernel: CPU: 0
Jan 8 00:30:23 SERVER-39 kernel: EIP: 0010:[<c0162847>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Jan 8 00:30:23 SERVER-39 kernel: EFLAGS: 00010206
Jan 8 00:30:23 SERVER-39 kernel: eax: c3a9feb0 ebx: 00000001 ecx: c3326ce0 edx: 00000003
Jan 8 00:30:23 SERVER-39 kernel: esi: c0930cd8 edi: 00000000 ebp: c0930be0 esp: c3a9fe44
Jan 8 00:30:23 SERVER-39 kernel: ds: 0018 es: 0018 ss: 0018
Jan 8 00:30:23 SERVER-39 kernel: Process kjournald (pid: 126, stackpage=c3a9f000)
Jan 8 00:30:23 SERVER-39 kernel: Stack: 00000000 00000000 00000000 00000003 c3326ce0 c07eba90 00001a2c c11f9374
Jan 8 00:30:23 SERVER-39 kernel: 00000202 c01d0728 00000202 00000000 c11f9374 00000001 c11ccc00 c01d099c
Jan 8 00:30:24 SERVER-39 kernel: c11f9374 00000000 c11f9374 c09e9000 c09e9000 00000008 c01d0c42 c11ccc00
Jan 8 00:30:24 SERVER-39 kernel: Call Trace: [<c01d0728>] [<c01d099c>] [<c01d0c42>] [<c0165996>] [<c0165800>]
Jan 8 00:30:24 SERVER-39 kernel: [<c0105576>] [<c0165820>]
Jan 8 00:30:24 SERVER-39 kernel: Code: 8b 43 18 a9 04 00 00 00 75 41 83 e0 02 74 1a ff 43 10 8b 54
>>EIP; c0162847 <journal_commit_transaction+327/12cc> <=====
Trace; c01d0728 <scsi_queue_next_request+38/f0>
Trace; c01d099c <__scsi_end_request+1bc/1d0>
Trace; c01d0c42 <scsi_io_completion+1a2/450>
Trace; c0165996 <kjournald+176/2d0>
Trace; c0165800 <commit_timeout+0/10>
Trace; c0105576 <arch_kernel_thread+26/30>
Trace; c0165820 <kjournald+0/2d0>
Code; c0162847 <journal_commit_transaction+327/12cc>
00000000 <_EIP>:
Code; c0162847 <journal_commit_transaction+327/12cc> <=====
0: 8b 43 18 mov 0x18(%ebx),%eax <=====
Code; c016284a <journal_commit_transaction+32a/12cc>
3: a9 04 00 00 00 test $0x4,%eax
Code; c016284f <journal_commit_transaction+32f/12cc>
8: 75 41 jne 4b <_EIP+0x4b> c0162892 <journal_commit_transaction+372/12cc>
Code; c0162851 <journal_commit_transaction+331/12cc>
a: 83 e0 02 and $0x2,%eax
Code; c0162854 <journal_commit_transaction+334/12cc>
d: 74 1a je 29 <_EIP+0x29> c0162870 <journal_commit_transaction+350/12cc>
Code; c0162856 <journal_commit_transaction+336/12cc>
f: ff 43 10 incl 0x10(%ebx)
Code; c0162859 <journal_commit_transaction+339/12cc>
12: 8b 54 00 00 mov 0x0(%eax,%eax,1),%edx
1 warning issued. Results may not be reliable.
[-- Attachment #3: oops002.txt --]
[-- Type: text/plain, Size: 3391 bytes --]
ksymoops 2.4.4 on i586 2.4.32. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.32/ (default)
-m /boot/System.map-2.4.32 (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Jan 6 23:56:19 SERVER-39 kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000019
Jan 6 23:56:19 SERVER-39 kernel: c0162847
Jan 6 23:56:19 SERVER-39 kernel: *pde = 00000000
Jan 6 23:56:19 SERVER-39 kernel: Oops: 0000
Jan 6 23:56:19 SERVER-39 kernel: CPU: 0
Jan 6 23:56:19 SERVER-39 kernel: EIP: 0010:[<c0162847>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Jan 6 23:56:19 SERVER-39 kernel: EFLAGS: 00010283
Jan 6 23:56:19 SERVER-39 kernel: eax: 00000001 ebx: 00000001 ecx: c2c8b920 edx: c2c8b920
Jan 6 23:56:19 SERVER-39 kernel: esi: c0930cd8 edi: 00000000 ebp: c219be20 esp: c375fe44
Jan 6 23:56:19 SERVER-39 kernel: ds: 0018 es: 0018 ss: 0018
Jan 6 23:56:19 SERVER-39 kernel: Process kjournald (pid: 126, stackpage=c375f000)
Jan 6 23:56:19 SERVER-39 kernel: Stack: 00000000 00000000 00000000 00000000 c062e8c0 c0dbbd90 000012f1 00000000
Jan 6 23:56:19 SERVER-39 kernel: c11f9374 c11f9374 00000202 c01d0728 00000202 00000000 c11f9374 00000001
Jan 6 23:56:19 SERVER-39 kernel: c11ccc00 c01d099c c11f9374 00000000 c11f9374 c11cccb8 c11f9374 00000008
Jan 6 23:56:19 SERVER-39 kernel: Call Trace: [<c01d0728>] [<c01d099c>] [<c0110fed>] [<c0165996>] [<c0165800>]
Jan 6 23:56:19 SERVER-39 kernel: [<c0105576>] [<c0165820>]
Jan 6 23:56:19 SERVER-39 kernel: Code: 8b 43 18 a9 04 00 00 00 75 41 83 e0 02 74 1a ff 43 10 8b 54
>>EIP; c0162847 <journal_commit_transaction+327/12cc> <=====
Trace; c01d0728 <scsi_queue_next_request+38/f0>
Trace; c01d099c <__scsi_end_request+1bc/1d0>
Trace; c0110fed <schedule+2dd/310>
Trace; c0165996 <kjournald+176/2d0>
Trace; c0165800 <commit_timeout+0/10>
Trace; c0105576 <arch_kernel_thread+26/30>
Trace; c0165820 <kjournald+0/2d0>
Code; c0162847 <journal_commit_transaction+327/12cc>
00000000 <_EIP>:
Code; c0162847 <journal_commit_transaction+327/12cc> <=====
0: 8b 43 18 mov 0x18(%ebx),%eax <=====
Code; c016284a <journal_commit_transaction+32a/12cc>
3: a9 04 00 00 00 test $0x4,%eax
Code; c016284f <journal_commit_transaction+32f/12cc>
8: 75 41 jne 4b <_EIP+0x4b> c0162892 <journal_commit_transaction+372/12cc>
Code; c0162851 <journal_commit_transaction+331/12cc>
a: 83 e0 02 and $0x2,%eax
Code; c0162854 <journal_commit_transaction+334/12cc>
d: 74 1a je 29 <_EIP+0x29> c0162870 <journal_commit_transaction+350/12cc>
Code; c0162856 <journal_commit_transaction+336/12cc>
f: ff 43 10 incl 0x10(%ebx)
Code; c0162859 <journal_commit_transaction+339/12cc>
12: 8b 54 00 00 mov 0x0(%eax,%eax,1),%edx
1 warning issued. Results may not be reliable.
[-- Attachment #4: oops001.txt --]
[-- Type: text/plain, Size: 3309 bytes --]
ksymoops 2.4.4 on i586 2.4.32. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.32/ (default)
-m /boot/System.map-2.4.32 (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Jan 6 18:04:46 SERVER-39 kernel: Unable to handle kernel paging request at virtual address 5b5b5b73
Jan 6 18:04:46 SERVER-39 kernel: c0162847
Jan 6 18:04:46 SERVER-39 kernel: *pde = 00000000
Jan 6 18:04:46 SERVER-39 kernel: Oops: 0000
Jan 6 18:04:46 SERVER-39 kernel: CPU: 0
Jan 6 18:04:46 SERVER-39 kernel: EIP: 0010:[<c0162847>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Jan 6 18:04:46 SERVER-39 kernel: EFLAGS: 00010287
Jan 6 18:04:46 SERVER-39 kernel: eax: 00000001 ebx: 5b5b5b5b ecx: c3ab0740 edx: c3ab0740
Jan 6 18:04:46 SERVER-39 kernel: esi: c0930cd8 edi: 5b5b5b5b ebp: c178c670 esp: c3a5be44
Jan 6 18:04:46 SERVER-39 kernel: ds: 0018 es: 0018 ss: 0018
Jan 6 18:04:46 SERVER-39 kernel: Process kjournald (pid: 126, stackpage=c3a5b000)
Jan 6 18:04:46 SERVER-39 kernel: Stack: 00000000 00000000 00000000 00000000 c1d137e0 c0512e80 00001a9f 00000000
Jan 6 18:04:46 SERVER-39 kernel: 00000001 00000001 00000000 00000000 c0321000 c11cccb8 c11f9374 00000038
Jan 6 18:04:46 SERVER-39 kernel: 00000000 00000001 00000038 00000246 c11ccc00 00000001 00000038 c01e241e
Jan 6 18:04:46 SERVER-39 kernel: Call Trace: [<c01e241e>] [<c0110fed>] [<c0165996>] [<c0165800>] [<c0105576>]
Jan 6 18:04:46 SERVER-39 kernel: [<c0165820>]
Jan 6 18:04:46 SERVER-39 kernel: Code: 8b 43 18 a9 04 00 00 00 75 41 83 e0 02 74 1a ff 43 10 8b 54
>>EIP; c0162847 <journal_commit_transaction+327/12cc> <=====
Trace; c01e241e <rw_intr+1be/1d0>
Trace; c0110fed <schedule+2dd/310>
Trace; c0165996 <kjournald+176/2d0>
Trace; c0165800 <commit_timeout+0/10>
Trace; c0105576 <arch_kernel_thread+26/30>
Trace; c0165820 <kjournald+0/2d0>
Code; c0162847 <journal_commit_transaction+327/12cc>
00000000 <_EIP>:
Code; c0162847 <journal_commit_transaction+327/12cc> <=====
0: 8b 43 18 mov 0x18(%ebx),%eax <=====
Code; c016284a <journal_commit_transaction+32a/12cc>
3: a9 04 00 00 00 test $0x4,%eax
Code; c016284f <journal_commit_transaction+32f/12cc>
8: 75 41 jne 4b <_EIP+0x4b> c0162892 <journal_commit_transaction+372/12cc>
Code; c0162851 <journal_commit_transaction+331/12cc>
a: 83 e0 02 and $0x2,%eax
Code; c0162854 <journal_commit_transaction+334/12cc>
d: 74 1a je 29 <_EIP+0x29> c0162870 <journal_commit_transaction+350/12cc>
Code; c0162856 <journal_commit_transaction+336/12cc>
f: ff 43 10 incl 0x10(%ebx)
Code; c0162859 <journal_commit_transaction+339/12cc>
12: 8b 54 00 00 mov 0x0(%eax,%eax,1),%edx
1 warning issued. Results may not be reliable.
next reply other threads:[~2006-01-08 21:05 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-01-08 21:06 Crazy AMD K7 [this message]
-- strict thread matches above, loose matches on Subject: below --
2006-01-04 12:27 Oops with Process kjournald Crazy AMD K7
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=13543542701.20060109000612@mail.ru \
--to=100megabit@mail.ru \
--cc=linux-kernel@vger.kernel.org \
--cc=sct@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox