public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* oops in 2.4.17
@ 2002-01-15  0:47 rob
  0 siblings, 0 replies; 3+ messages in thread
From: rob @ 2002-01-15  0:47 UTC (permalink / raw)
  To: linux-kernel

Hi

The ksymoops output is below

This happened when I started screen after logging in just after
booting. I'm not able to reproduce it. I've had a few hangs recently
on this machine so I'm trying to find out if it's software or
hardware.

config at http://mur.org.uk/~robbie/config-2.4.17

Script started on Tue Jan 15 00:29:48 2002
linux:~#uname -a
Linux linux 2.4.17 #1 SMP Mon Dec 31 00:09:27 GMT 2001 i686 unknown
linux:~#cat /proc/cpuinfo
processor	: 0
vendor_id	: GenuineIntel
cpu family	: 6
model		: 5
model name	: Pentium II (Deschutes)
stepping	: 2
cpu MHz		: 451.028
cache size	: 512 KB
fdiv_bug	: no
hlt_bug		: no
f00f_bug	: no
coma_bug	: no
fpu		: yes
fpu_exception	: yes
cpuid level	: 2
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 mmx fxsr
bogomips	: 897.84

processor	: 1
vendor_id	: GenuineIntel
cpu family	: 6
model		: 5
model name	: Pentium II (Deschutes)
stepping	: 2
cpu MHz		: 451.028
cache size	: 512 KB
fdiv_bug	: no
hlt_bug		: no
f00f_bug	: no
coma_bug	: no
fpu		: yes
fpu_exception	: yes
cpuid level	: 2
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 mmx fxsr
bogomips	: 901.12

linux:~#lspci
00:00.0 Host bridge: Intel Corporation 440BX/ZX - 82443BX/ZX Host bridge (rev 03)
00:01.0 PCI bridge: Intel Corporation 440BX/ZX - 82443BX/ZX AGP bridge (rev 03)
00:07.0 ISA bridge: Intel Corporation 82371AB PIIX4 ISA (rev 02)
00:07.1 IDE interface: Intel Corporation 82371AB PIIX4 IDE (rev 01)
00:07.2 USB Controller: Intel Corporation 82371AB PIIX4 USB (rev 01)
00:07.3 Bridge: Intel Corporation 82371AB PIIX4 ACPI (rev 02)
00:0b.0 SCSI storage controller: Adaptec AIC-7880U
00:11.0 Unknown mass storage controller: Promise Technology, Inc. 20267 (rev 02)
00:12.0 Unknown mass storage controller: Promise Technology, Inc. 20267 (rev 02)
00:13.0 Ethernet controller: Intel Corporation 82557 [Ethernet Pro 100] (rev 08)
00:14.0 Unknown mass storage controller: Promise Technology, Inc. 20267 (rev 02)
linux:~#cat oops2.txt
ksymoops 2.4.3 on i686 2.4.17.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.17/ (default)
     -m /boot/System.map-2.4.17 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Warning (compare_maps): mismatch on symbol partition_name  , ksyms_base says c01f3160, System.map says c01530b0.  Ignoring ksyms_base entry
invalid operand: 0000
CPU:    0
EIP:    0010:[<c0145df1>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 5a5a5a00   ebx: dc418c40   ecx: dc454d60   edx: dc418c70
esi: dcbf2d40   edi: c1941f20   ebp: dc418c40   esp: dc45feb8
ds: 0018   es: 0018   ss: 0018
Process screen (pid: 716, stackpage=dc45f000)
Stack: dc454d60 c016bd29 dc418c40 dc454d60 fffffff4 df32fb80 dc45e000 dc418c40 
       c1941f28 c02abba0 de3a7001 0023ee05 df6dbf40 c180ae20 c0145549 00000246 
       00000000 df32fb80 df32fbe8 df330b40 00000246 c0145c83 c1806288 000001f0 
Call Trace: [<c016bd29>] [<c0145549>] [<c0145c83>] [<c013d67e>] [<c013ddb7>] 
   [<c013e01a>] [<c013e491>] [<c013b0cd>] [<c0141626>] [<c0106d7b>] 
Code: 0f 0b f0 fe 0d a0 e6 2f c0 0f 88 bb bc 10 00 85 c9 74 12 8b 

>>EIP; c0145df0 <d_instantiate+10/44>   <=====
Trace; c016bd28 <devfs_lookup+1c0/20c>
Trace; c0145548 <dput+18/144>
Trace; c0145c82 <d_alloc+1a/178>
Trace; c013d67e <real_lookup+7a/108>
Trace; c013ddb6 <link_path_walk+596/7e0>
Trace; c013e01a <path_walk+1a/1c>
Trace; c013e490 <__user_walk+34/50>
Trace; c013b0cc <sys_stat64+18/70>
Trace; c0141626 <sys_ioctl+1ea/1f4>
Trace; c0106d7a <system_call+32/38>
Code;  c0145df0 <d_instantiate+10/44>
00000000 <_EIP>:
Code;  c0145df0 <d_instantiate+10/44>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c0145df2 <d_instantiate+12/44>
   2:   f0 fe 0d a0 e6 2f c0      lock decb 0xc02fe6a0
Code;  c0145df8 <d_instantiate+18/44>
   9:   0f 88 bb bc 10 00         js     10bcca <_EIP+0x10bcca> c0251aba <stext_lock+2cf2/8d98>
Code;  c0145dfe <d_instantiate+1e/44>
   f:   85 c9                     test   %ecx,%ecx
Code;  c0145e00 <d_instantiate+20/44>
  11:   74 12                     je     25 <_EIP+0x25> c0145e14 <d_instantiate+34/44>
Code;  c0145e02 <d_instantiate+22/44>
  13:   8b 00                     mov    (%eax),%eax


2 warnings issued.  Results may not be reliable.
linux:~#exit

Script done on Tue Jan 15 00:38:14 2002


-- 
Rob Murray

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Oops in 2.4.17
@ 2002-01-18  1:58 Josh Pieper
  0 siblings, 0 replies; 3+ messages in thread
From: Josh Pieper @ 2002-01-18  1:58 UTC (permalink / raw)
  To: linux-kernel

This is an oops I can get somehwat repeatably on my SMP system by compiling
a large program with make -j2.  This was captured when compiling evolution
1.0.1.  The kernel is 2.4.17, however it has been occuring for
all of 2.4 and possibly earlier.  Don't know if it is a hardware problem or
not.  Any help?  I can provide any information needed.

Please cc me, I am not subscribed.

Thanks,
Josh Pieper

---------------

Module                  Size  Used by    Tainted: P  
serial                 44640   0 
emu10k1                55488   1 
sound                  54540   0  [emu10k1]
soundcore               3844   7  [emu10k1 sound]
ac97_codec              9408   0  [emu10k1]
lp                      5568   0 
parport_pc             12356   1 
parport                15072   1  [lp parport_pc]
vfat                    9340   0  (unused)
fat                    29976   0  [vfat]
tuner                   8036   1  (autoclean)
tvaudio                 9792   1  (autoclean)
bttv                   58432   0  (unused)
videodev                4896   2  [bttv]
i2c-algo-bit            7052   1  [bttv]
i2c-core               13056   0  [tuner tvaudio bttv i2c-algo-bit]
8139too                12832   1 


-----------------

ksymoops 2.4.3 on i686 2.4.17.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.17/ (default)
     -m /boot/System.map-2.4.17 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Jan 17 19:13:53 zaphod kernel: invalid operand: 0000
Jan 17 19:13:53 zaphod kernel: CPU:    0
Jan 17 19:13:53 zaphod kernel: EIP:    0010:[rmqueue+405/456]    Tainted: P 
Jan 17 19:13:53 zaphod kernel: EFLAGS: 00010202
Jan 17 19:13:53 zaphod kernel: eax: 00000040   ebx: c028b240   ecx: c028b228   edx: 000041c5
Jan 17 19:13:53 zaphod kernel: esi: c1107140   edi: 00000000   ebp: 00000001   esp: c89d9e80
Jan 17 19:13:53 zaphod kernel: ds: 0018   es: 0018   ss: 0018
Jan 17 19:13:53 zaphod kernel: Process sh (pid: 18295, stackpage=c89d9000)
Jan 17 19:13:53 zaphod kernel: Stack: c028b39c 000001ff 00000001 00000000 000031c5 00000286 00000000 c028b228 
Jan 17 19:13:53 zaphod kernel:        c012dadf 000001d2 00000000 00000001 cb22d4e0 c028b228 c028b398 000001d2 
Jan 17 19:13:53 zaphod kernel:        c85ea000 c012d932 c1112280 c0123fbf c7735cc0 080ca2d0 00000001 cb22d4e0 
Jan 17 19:13:53 zaphod kernel: Call Trace: [__alloc_pages+51/356] [_alloc_pages+22/24] [do_wp_page+147/392] [handle_mm_fault+135/188] [do_page_fault+382/1208] 
Jan 17 19:13:53 zaphod kernel: Code: 0f 0b 8b 46 18 a8 80 74 02 0f 0b 89 f0 eb 1c 47 83 c5 0c 83 
Using defaults from ksymoops -t elf32-i386 -a i386

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   8b 46 18                  mov    0x18(%esi),%eax
Code;  00000004 Before first symbol
   5:   a8 80                     test   $0x80,%al
Code;  00000006 Before first symbol
   7:   74 02                     je     b <_EIP+0xb> 0000000a Before first symbol
Code;  00000008 Before first symbol
   9:   0f 0b                     ud2a   
Code;  0000000a Before first symbol
   b:   89 f0                     mov    %esi,%eax
Code;  0000000c Before first symbol
   d:   eb 1c                     jmp    2b <_EIP+0x2b> 0000002a Before first symbol
Code;  0000000e Before first symbol
   f:   47                        inc    %edi
Code;  00000010 Before first symbol
  10:   83 c5 0c                  add    $0xc,%ebp
Code;  00000012 Before first symbol
  13:   83 00 00                  addl   $0x0,(%eax)

Jan 17 19:13:53 zaphod kernel:  invalid operand: 0000
Jan 17 19:13:53 zaphod kernel: CPU:    1
Jan 17 19:13:53 zaphod kernel: EIP:    0010:[rmqueue+405/456]    Tainted: P 
Jan 17 19:13:53 zaphod kernel: EFLAGS: 00010202
Jan 17 19:13:53 zaphod kernel: eax: 0000004c   ebx: c028b24c   ecx: c028b228   edx: 000041c4
Jan 17 19:13:53 zaphod kernel: esi: c1107100   edi: 00000001   ebp: 00000002   esp: c7541f2c
Jan 17 19:13:53 zaphod kernel: ds: 0018   es: 0018   ss: 0018
Jan 17 19:13:53 zaphod kernel: Process sh (pid: 18298, stackpage=c7541000)
Jan 17 19:13:53 zaphod kernel: Stack: c028b37c 00000200 00000000 00000001 000031c4 00000286 00000001 c028b228 
Jan 17 19:13:53 zaphod kernel:        c012dadf 000001f0 bfffea20 00000000 00000011 c028b228 c028b378 000001f0 
Jan 17 19:13:53 zaphod kernel:        00000003 c012d932 c7540000 c012dc1a c01162cb c7540000 bfffea20 00000000 
Jan 17 19:13:53 zaphod kernel: Call Trace: [__alloc_pages+51/356] [_alloc_pages+22/24] [__get_free_pages+10/24] [do_fork+67/1776] [sys_fork+20/28] 
Jan 17 19:13:53 zaphod kernel: Code: 0f 0b 8b 46 18 a8 80 74 02 0f 0b 89 f0 eb 1c 47 83 c5 0c 83 

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   8b 46 18                  mov    0x18(%esi),%eax
Code;  00000004 Before first symbol
   5:   a8 80                     test   $0x80,%al
Code;  00000006 Before first symbol
   7:   74 02                     je     b <_EIP+0xb> 0000000a Before first symbol
Code;  00000008 Before first symbol
   9:   0f 0b                     ud2a   
Code;  0000000a Before first symbol
   b:   89 f0                     mov    %esi,%eax
Code;  0000000c Before first symbol
   d:   eb 1c                     jmp    2b <_EIP+0x2b> 0000002a Before first symbol
Code;  0000000e Before first symbol
   f:   47                        inc    %edi
Code;  00000010 Before first symbol
  10:   83 c5 0c                  add    $0xc,%ebp
Code;  00000012 Before first symbol
  13:   83 00 00                  addl   $0x0,(%eax)

Jan 17 19:18:34 zaphod kernel:  invalid operand: 0000
Jan 17 19:18:34 zaphod kernel: CPU:    0
Jan 17 19:18:34 zaphod kernel: EIP:    0010:[__free_pages_ok+26/516]    Tainted: P 
Jan 17 19:18:34 zaphod kernel: EFLAGS: 00013286
Jan 17 19:18:34 zaphod kernel: eax: c1107100   ebx: c1107100   ecx: c1107100   edx: c1cfde50
Jan 17 19:18:34 zaphod kernel: esi: c1107100   edi: 00000000   ebp: 00000134   esp: ca897dc8
Jan 17 19:18:34 zaphod kernel: ds: 0018   es: 0018   ss: 0018
Jan 17 19:18:34 zaphod kernel: Process XFree86 (pid: 303, stackpage=ca897000)
Jan 17 19:18:34 zaphod kernel: Stack: c1107100 c1107100 00000010 00000134 c01355ec c1107100 000001d2 c76822a0 
Jan 17 19:18:34 zaphod kernel:        c012c796 c012dc79 c76822a0 c012ce77 00000020 000001d2 00000020 00000006 
Jan 17 19:18:34 zaphod kernel:        ca896000 ca896000 00000c20 000001d2 c028b228 c012d0e6 00000006 00000014 
Jan 17 19:18:34 zaphod kernel: Call Trace: [try_to_release_page+60/68] [lru_cache_del+18/28] [page_cache_release+45/48] [shrink_cache+611/924] [shrink_caches+86/124] 
Jan 17 19:18:34 zaphod kernel: Code: 0f 0b 89 d8 2b 05 8c cb 30 c0 c1 f8 06 3b 05 80 cb 30 c0 72 

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   89 d8                     mov    %ebx,%eax
Code;  00000004 Before first symbol
   4:   2b 05 8c cb 30 c0         sub    0xc030cb8c,%eax
Code;  0000000a Before first symbol
   a:   c1 f8 06                  sar    $0x6,%eax
Code;  0000000c Before first symbol
   d:   3b 05 80 cb 30 c0         cmp    0xc030cb80,%eax
Code;  00000012 Before first symbol
  13:   72 00                     jb     15 <_EIP+0x15> 00000014 Before first symbol


1 warning issued.  Results may not be reliable.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Oops in 2.4.17
@ 2002-05-07 16:47 Mark Hindley
  0 siblings, 0 replies; 3+ messages in thread
From: Mark Hindley @ 2002-05-07 16:47 UTC (permalink / raw)
  To: Kernel Mailing List

Got this today with 2.4.17

I am just about to try 2.4.18. Apologies if this is a known issue.

Let me know if you want any more info. 

Mark

ksymoops 2.3.7 on i586 2.4.17.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.17/ (default)
     -m /boot/System.map-2.4.17 (specified)

May  7 17:19:14 titan kernel: invalid operand: 0000
May  7 17:19:14 titan kernel: CPU:    0
May  7 17:19:15 titan kernel: EIP:    0010:[add_page_to_hash_queue+26/40]    Not tainted
May  7 17:19:15 titan kernel: EFLAGS: 00013286
May  7 17:19:15 titan kernel: eax: c106ffc0   ebx: c106ffc0   ecx: c100f140   edx: c106ffd0
May  7 17:19:15 titan kernel: esi: 00000001   edi: c1128d18   ebp: 00354d00   esp: c3099e5c
May  7 17:19:15 titan kernel: ds: 0018   es: 0018   ss: 0018
May  7 17:19:15 titan kernel: Process X (pid: 20413, stackpage=c3099000)
May  7 17:19:15 titan kernel: Stack: c011e45f 00354d00 c106ffc0 c01fada0 c0124e43 c106ffc0 c01fada0 00354d00 
May  7 17:19:15 titan kernel:        c1128d18 c106ffc0 00000000 06364a6d c0124fd7 c106ffc0 00354d00 00000000 
May  7 17:19:15 titan kernel:        00000005 00000008 c2e683c0 c011c412 00354d00 00354b00 00000000 c20ee858 
May  7 17:19:15 titan kernel: Call Trace: [add_to_page_cache_unique+95/120] [add_to_swap_cache+99/160] [read_swap_cache_async+103/160] [swapin_readahead+62/76] [do_swap_page+48/232] 
May  7 17:19:15 titan kernel: Code: 0f 0b 8d 74 26 00 ff 05 c0 ab 1f c0 c3 90 8b 4c 24 04 8b 41 
Using defaults from ksymoops -t elf32-i386 -a i386

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   8d 74 26 00               lea    0x0(%esi,1),%esi
Code;  00000006 Before first symbol
   6:   ff 05 c0 ab 1f c0         incl   0xc01fabc0
Code;  0000000c Before first symbol
   c:   c3                        ret    
Code;  0000000d Before first symbol
   d:   90                        nop    
Code;  0000000e Before first symbol
   e:   8b 4c 24 04               mov    0x4(%esp,1),%ecx
Code;  00000012 Before first symbol
  12:   8b 41 00                  mov    0x0(%ecx),%eax


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2002-05-08  6:47 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-01-18  1:58 Oops in 2.4.17 Josh Pieper
  -- strict thread matches above, loose matches on Subject: below --
2002-05-07 16:47 Mark Hindley
2002-01-15  0:47 oops " rob

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox