From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 22 Jan 2001 17:26:03 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 22 Jan 2001 17:25:54 -0500 Received: from 239-ZARA-X4.libre.retevision.es ([62.82.232.239]:4100 "EHLO head.redvip.net") by vger.kernel.org with ESMTP id ; Mon, 22 Jan 2001 17:25:38 -0500 Message-ID: <3A6C5058.C5AA7681@zaralinux.com> Date: Mon, 22 Jan 2001 16:23:04 +0100 From: Jorge Nerin X-Mailer: Mozilla 4.75 [es] (X11; U; Linux 2.4.1-pre9 i586) X-Accept-Language: es-ES, es, en MIME-Version: 1.0 To: linux-kernel@vger.kernel.org, linux-smp@vger.kernel.org Subject: kernel BUG at slab.c:1542! (2.4.1-pre9) Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9 compiled with kgcc, and the same bug in pre1, pre4 & pre9. I only need to run xfontsel and the xfs dies, every time, prefectly reproductable. Using XFree86-xfs-4.0.1-1, and this XFree packages: XFree86-4.0.1-1 XFree86-tools-4.0.1-1 XFree86-xdm-4.0.1-1 XFree86-libs-4.0.1-1 XFree86-xfs-4.0.1-1 XFree86-75dpi-fonts-4.0.1-1 XFree86-SVGA-3.3.6-33 XFree86-twm-4.0.1-1 XFree86-VGA16-3.3.6-33 XFree86-Xnest-4.0.1-1 XFree86-devel-4.0.1-1 XFree86-V4L-4.0.1-1 Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and also some patches are welcome. ksymoops 2.3.4 on i586 2.4.1-pre9. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.1-pre9/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. activating NMI Watchdog ... done. cpu: 0, clocks: 668150, slice: 222716 cpu: 1, clocks: 668150, slice: 222716 8139too Fast Ethernet driver 0.9.13 loaded invalid operand: 0000 CPU: 1 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010292 eax: 0000001b ebx: c27cc680 ecx: 00000008 edx: c5802ca0 esi: 00000003 edi: c4310000 ebp: c4310000 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 00000606 c27cc680 00000003 c4310000 c4310000 c0111d3b c5fe3f0c 000001a8 c0196cfa 0003fff4 00000003 00000000 c5c96c20 c4310000 00000ff0 00000206 c01963fe 0003fff0 00000003 c2f8a164 0003ffec c01d1550 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 >>EIP; c012c056 <===== Trace; c0111d3b Trace; c0196cfa Trace; c01963fe Trace; c01d1550 Trace; c01d167e Trace; c01d1550 Trace; c0193fad Trace; c01d1550 Trace; c0194260 Trace; c01942e2 Trace; c0134763 Trace; c01348c9 Trace; c0108fc7 Code; c012c056 00000000 <_EIP>: Code; c012c056 <===== 0: 0f 0b ud2a <===== Code; c012c058 2: 83 c4 0c add $0xc,%esp Code; c012c05b 5: 90 nop Code; c012c05c 6: 8d 74 26 00 lea 0x0(%esi,1),%esi Code; c012c060 a: 31 c0 xor %eax,%eax Code; c012c062 c: 5b pop %ebx Code; c012c063 d: 5e pop %esi Code; c012c064 e: 5f pop %edi Code; c012c065 f: 5d pop %ebp Code; c012c066 10: 83 c4 0c add $0xc,%esp Code; c012c069 13: c3 ret 1 warning issued. Results may not be reliable. kernel BUG at slab.c:1542! invalid operand: 0000 CPU: 1 EIP: 0010:[kmalloc+274/296] EFLAGS: 00010292 eax: 0000001b ebx: c27cc680 ecx: 00000008 edx: c5802ca0 esi: 00000003 edi: c4310000 ebp: c4310000 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 00000606 c27cc680 00000003 c4310000 c4310000 c0111d3b c5fe3f0c 000001a8 c0196cfa 0003fff4 00000003 00000000 c5c96c20 c4310000 00000ff0 00000206 c01963fe 0003fff0 00000003 c2f8a164 0003ffec c01d1550 Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416] [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784] [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784] [sock_sendmsg+129/164] [unix_stream_sendmsg+0/784] [sock_readv_writev+140/152] [sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+65/84] [system_call+55/64] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 -- Jorge Nerin - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org Please read the FAQ at http://www.tux.org/lkml/