public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [Fwd: kernel BUG at page_alloc.c:207!]
@ 2002-07-15  8:24 Mika Liljeberg
  0 siblings, 0 replies; only message in thread
From: Mika Liljeberg @ 2002-07-15  8:24 UTC (permalink / raw)
  To: linux-kernel

[-- Attachment #1: Type: text/plain, Size: 413 bytes --]

[ And the same thing in ISO-8859-1 encoding... :-| ]

I caught two instances of the above BUG() in rmque() after [decoded
oopses attached]. The kernel is 2.4.17, untainted but with a few patches
(low-latency, o1, elevator, lkcd). I've got a full kernel crash dump
from the second instance in case it is needed.

I'm currently running 2.4.18 and just the lkcd patch in order to see if
the problem recurs.

	MikaL


[-- Attachment #2: crash.txt --]
[-- Type: text/plain, Size: 5742 bytes --]

ksymoops 2.4.5 on i686 2.4.17o1-ll-elv-lkcd.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.17o1-ll-elv-lkcd/ (default)
     -m /boot/System.map-2.4.17o1-ll-elv-lkcd (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

No modules in ksyms, skipping objects
Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file?
Jul 14 20:50:46 devil kernel: kernel BUG at page_alloc.c:207!
Jul 14 20:50:46 devil kernel: invalid operand: 0000
Jul 14 20:50:46 devil kernel: CPU:    0
Jul 14 20:50:47 devil kernel: EIP:    0010:[rmqueue+642/788]    Not tainted
Jul 14 20:50:47 devil kernel: EFLAGS: 00013286
Jul 14 20:50:47 devil kernel: eax: 00000020   ebx: 00000000   ecx: 0111b4b3   edx: 00005c45
Jul 14 20:50:47 devil kernel: esi: c0333328   edi: c13d0204   ebp: 00000000   esp: d66b3e3c
Jul 14 20:50:47 devil kernel: ds: 0018   es: 0018   ss: 0018
Jul 14 20:50:47 devil kernel: Process XFree86 (pid: 441, stackpage=d66b3000)
Jul 14 20:50:47 devil kernel: Stack: c02cba2b 000000cf c0333488 000001ff d7d96210 00000000 0000d5ad 00003282 
Jul 14 20:50:47 devil kernel:        c0333334 00000000 c033330c c013908f 000001d2 4357b000 d7d96210 d7d96210 
Jul 14 20:50:47 devil kernel:        c033330c c0333484 000001d2 ffffffef c0138e0e 00104000 c012c233 4357b000 
Jul 14 20:50:47 devil kernel: Call Trace: [__alloc_pages+51/356] [_alloc_pages+22/24] [do_anonymous_page+131/444] [do_no_page+54/584] [handle_mm_fault+157/408] 
Jul 14 20:50:48 devil kernel: Code: 0f 0b 83 c4 08 90 8d 74 26 00 8b 47 18 a8 80 74 19 68 d1 00 
Using defaults from ksymoops -t elf32-i386 -a i386


>>ecx; 0111b4b3 Before first symbol
>>edx; 00005c45 Before first symbol
>>esi; c0333328 <contig_page_data+c8/340>
>>edi; c13d0204 <END_OF_CODE+fa7f00/????>
>>esp; d66b3e3c <END_OF_CODE+1628bb38/????>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   83 c4 08                  add    $0x8,%esp
Code;  00000005 Before first symbol
   5:   90                        nop    
Code;  00000006 Before first symbol
   6:   8d 74 26 00               lea    0x0(%esi,1),%esi
Code;  0000000a Before first symbol
   a:   8b 47 18                  mov    0x18(%edi),%eax
Code;  0000000d Before first symbol
   d:   a8 80                     test   $0x80,%al
Code;  0000000f Before first symbol
   f:   74 19                     je     2a <_EIP+0x2a> 0000002a Before first symbol
Code;  00000011 Before first symbol
  11:   68 d1 00 00 00            push   $0xd1

Jul 14 20:53:09 devil kernel: kernel BUG at page_alloc.c:207!
Jul 14 20:53:09 devil kernel: invalid operand: 0000
Jul 14 20:53:09 devil kernel: CPU:    0
Jul 14 20:53:09 devil kernel: EIP:    0010:[rmqueue+642/788]    Not tainted
Jul 14 20:53:09 devil kernel: EFLAGS: 00013286
Jul 14 20:53:09 devil kernel: eax: 00000020   ebx: 00000000   ecx: 0111b4b3   edx: 000066c8
Jul 14 20:53:09 devil kernel: esi: c0333328   edi: c13d01c0   ebp: 00000000   esp: c2d67e3c
Jul 14 20:53:09 devil kernel: ds: 0018   es: 0018   ss: 0018
Jul 14 20:53:09 devil kernel: Process XFree86 (pid: 11493, stackpage=c2d67000)
Jul 14 20:53:09 devil kernel: Stack: c02cba2b 000000cf c0333488 000001ff d7d96a30 00000000 0000d5ac 00003282 
Jul 14 20:53:09 devil kernel:        c0333328 00000000 c033330c c013908f 000001d2 41c14000 d7d96a30 d7d96a30 
Jul 14 20:53:09 devil kernel:        c033330c c0333484 000001d2 000152ce c0138e0e 00104000 c012c233 41c14000 
Jul 14 20:53:09 devil kernel: Call Trace: [__alloc_pages+51/356] [_alloc_pages+22/24] [do_anonymous_page+131/444] [do_no_page+54/584] [handle_mm_fault+157/408] 
Jul 14 20:53:10 devil kernel: Code: 0f 0b 83 c4 08 90 8d 74 26 00 8b 47 18 a8 80 74 19 68 d1 00 


>>ecx; 0111b4b3 Before first symbol
>>edx; 000066c8 Before first symbol
>>esi; c0333328 <contig_page_data+c8/340>
>>edi; c13d01c0 <END_OF_CODE+fa7ebc/????>
>>esp; c2d67e3c <END_OF_CODE+293fb38/????>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   0f 0b                     ud2a   
Code;  00000002 Before first symbol
   2:   83 c4 08                  add    $0x8,%esp
Code;  00000005 Before first symbol
   5:   90                        nop    
Code;  00000006 Before first symbol
   6:   8d 74 26 00               lea    0x0(%esi,1),%esi
Code;  0000000a Before first symbol
   a:   8b 47 18                  mov    0x18(%edi),%eax
Code;  0000000d Before first symbol
   d:   a8 80                     test   $0x80,%al
Code;  0000000f Before first symbol
   f:   74 19                     je     2a <_EIP+0x2a> 0000002a Before first symbol
Code;  00000011 Before first symbol
  11:   68 d1 00 00 00            push   $0xd1

Jul 14 20:54:49 devil kernel: Kernel command line: BOOT_IMAGE=New ro root=307 video=matrox:sgram,vesa:261,maxclk:210,fh:100000,fv:85,fastfont:65536 parport=auto ide0=autotune ide1=autotune hdb=scsi apm=power-off,smp-power-off,debug acpi=on devfs=nomount nmi_watchdog=1
Jul 14 20:54:49 devil kernel: activating NMI Watchdog ... done.
Jul 14 20:54:49 devil kernel: testing NMI watchdog ... OK.
Jul 14 20:54:49 devil kernel: cpu: 0, clocks: 997387, slice: 332462
Jul 14 20:54:49 devil kernel: cpu: 1, clocks: 997387, slice: 332462

2 warnings issued.  Results may not be reliable.

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2002-07-15  8:21 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-07-15  8:24 [Fwd: kernel BUG at page_alloc.c:207!] Mika Liljeberg

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox