oops in block_read and kmem_cache_free

From: collver@softhome.net
Date: Fri Jun 02 2000 - 08:58:57 EST


Hello,

I have sporadically been getting OOPSes and do not know how to deal with
them. I am using gcc 2.95.2, binutils 2.9.1.0.19a-2, and linux 2.2.15 on
an intel celeron 466. The OOPses tend to happen when there is heavy disk
i/o. Included are two that have been passed through ksymoops.

Unable to handle kernel NULL pointer dereference at virtual address 00000017
current->tss.cr3 = 02834000, %cr3 = 02834000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0127981>]
EFLAGS: 00010286
eax: 00000000 ebx: 00000400 ecx: c2e0bf84 edx: ffffffff
esi: c2e0bf78 edi: 00000000 ebp: 00000008 esp: c2e0bd3c
ds: 0018 es: 0018 ss: 0018
Process dd (pid: 235, process nr: 34, stackpage=c2e0b000)
Stack: 00000000 00100000 00000400 00000000 00000004 00000000 00030000 00000400
       0a1fb994 0009f400 0340ab40 c2e0be84 00060c00 00000180 00000400 00000000
       00000000 0002aa80 c2522bc0 c260bbc0 c2522f20 c2522ec0 c2522e60
Call Trace: [<c0122d16>] [<c0107a64>]
Code: 86 42 18 a8 04 75 55 85 d2 0f 84 04 ff ff ff 8b 42 18 a8 04

>>EIP: c0127981 <block_read+3e9/4b8>
Trace: c0122d16 <sys_read+b2/d0>
Trace: c0107a64 <system_call+34/38>
Code: c0127981 <block_read+3e9/4b8> 00000000 <_EIP>: <===
Code: c0127981 <block_read+3e9/4b8> 0: 86 42 18 xchgb %al,0x18(%edx) <===
Code: c0127984 <block_read+3ec/4b8> 3: a8 04 testb $0x4,%al
Code: c0127986 <block_read+3ee/4b8> 5: 75 55 jne c01279dd <block_read+445/4b8>
Code: c0127988 <block_read+3f0/4b8> 7: 85 d2 testl %edx,%edx
Code: c012798a <block_read+3f2/4b8> 9: 0f 84 04 ff ff je c0127894 <block_read+2fc/4b8>
Code: c012798f <block_read+3f7/4b8> e: ff
Code: c0127990 <block_read+3f8/4b8> f: 8b 42 18 movl 0x18(%edx),%eax
Code: c0127993 <block_read+3fb/4b8> 12: a8 04 testb $0x4,%al

Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 00101000, %cr3 = 00101000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c011e970>]
EFLAGS: 00010282
eax: 0000003d ebx: c31e7540 ecx: ffffffff edx: 0000003c
esi: c3eef740 edi: 00000282 ebp: c0286e48 esp: c3e71ecc
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 5, process nr: 5, stackpage=c3e71000)
Stack: c31e7660 c0286e48 c2f58a20 c3e71ef4 00000000 c3e71efc c28618c0 c0108dc9
       c3e71f08 c0124b46 c3eef740 c31e7540 c2f58900 c2f58fc0 c31e7660 c2f58a20
       c2f58a20 00000206 c31e7540 c31e7660 c306cc60 c012548d c31e7540 c306cc60
Call Trace: [<c0108dc9>] [<c0124b46>] [<c012548d>] [<c0125484>] [<c01254bd>] [<c011a8d9>] [<c01b1c2e>]
       [<c010f1f6>] [<c011f581>] [<c01b1c2e>] [<c01b1c2e>] [<c011f64a>] [<c011f632>] [<c0106557>] [<c0106560>]
Code: c7 05 00 00 00 00 00 00 00 00 eb 12 83 c4 fc 56 53 68 3e 1a

>>EIP: c011e970 <kmem_cache_free+140/168>
Trace: c0108dc9 <do_IRQ+41/48>
Trace: c0124b46 <put_unused_buffer_head+26/54>
Trace: c012548d <try_to_free_buffers+55/94>
Trace: c0125484 <try_to_free_buffers+4c/94>
Trace: c01254bd <try_to_free_buffers+85/94>
Trace: c011a8d9 <shrink_mmap+e1/138>
Trace: c01b1c2e <tvecs+1a6e/3280>
Trace: c010f1f6 <schedule+142/278>
Code: c011e970 <kmem_cache_free+140/168> 00000000 <_EIP>: <===
Code: c011e970 <kmem_cache_free+140/168> 0: c7 05 00 00 00 movl $0x0,0x0 <===
Code: c011e975 <kmem_cache_free+145/168> 5: 00 00 00 00 00
Code: c011e97a <kmem_cache_free+14a/168> a: eb 12 jmp c011e98e <kmem_cache_free+15e/168>
Code: c011e97c <kmem_cache_free+14c/168> c: 83 c4 fc addl $0xfffffffc,%esp
Code: c011e97f <kmem_cache_free+14f/168> f: 56 pushl %esi
Code: c011e980 <kmem_cache_free+150/168> 10: 53 pushl %ebx
Code: c011e981 <kmem_cache_free+151/168> 11: 68 3e 1a 00 00 pushl $0x1a3e

-- 
Ben Collver -- collver@softhome.net
"Do you suppose robots would enjoy listening to music?
 Would you be willing to work on it?"

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Wed Jun 07 2000 - 21:00:15 EST