oops in 2.0

Johan Henselmans (johan@hsb.nest.nl)
Tue, 11 Jun 1996 09:22:14 +0100 (WET DST)


This happened when I started dump through crontab:

44 4 * * tue /usr/local/etc/dodumpend

mt -f /dev/nst0 eom
/sbin/dump 1bdsfu 32 15000 11000 /dev/nst0 /dev/sda3
/sbin/dump 1bdsfu 32 15000 11000 /dev/nst0 /dev/sda5
/sbin/dump 1bdsfu 32 15000 11000 /dev/nst0 /dev/sda6
/sbin/dump 1bdsfu 32 15000 11000 /dev/nst0 /dev/sdb1
/sbin/dump 1bdsfu 32 15000 11000 /dev/nst0 /dev/sdb2
/sbin/dump 1bdsfu 32 15000 11000 /dev/nst0 /dev/sdb3
mt -f /dev/nst0 rewoffl

Configuration:

Digital priorisXL, pci adaptec 2940 wide/fast (AIC7870)
3c509, 32 MB memory, 2 scsi (1GB IBM DPES-31080), 2.3 GB Quantum VP32210
Creatix ISDN card

GCC 2.72, libc5.3.12, sendmail8.7.5 for the rest mostly slackware3.0
modules 1.3.57 with patches 1,2,3

Config:

Jun 11 04:50:11 eagle kernel: general protection: 0000
Jun 11 04:50:11 eagle kernel: CPU: 0
Jun 11 04:50:11 eagle kernel: EIP: 0010:[<00122204>]
Jun 11 04:50:11 eagle kernel: EFLAGS: 00010006
Jun 11 04:50:11 eagle kernel: eax: 66696365 ebx: 00da01dc ecx: 00000000 edx: 00000206
Jun 11 04:50:11 eagle kernel: esi: 00000001 edi: 00000000 ebp: bffffe24 esp: 01ed4f68
Jun 11 04:50:11 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:50:11 eagle kernel: Process update (pid: 13, process nr: 12, stackpage=01ed4000)
Jun 11 04:50:11 eagle kernel: Stack: 00da01dc 00000001 00000000 01ef3c0c 00000000 00121c36 00da01dc 01ef3c0c
Jun 11 04:50:11 eagle kernel: 00000000 00000000 00125b98 00000000 00000000 01ef3c0c 00000000 00000000
Jun 11 04:50:11 eagle kernel: 01ef3c0c 00125ce1 01ef3c0c 00000001 0010a532 00000001 00000000 00000000
Jun 11 04:50:11 eagle kernel: Call Trace: [<00121c36>] [<00125b98>] [<00125ce1>] [<0010a532>]
Jun 11 04:50:11 eagle kernel: Code: 8b 40 04 89 44 24 10 8b 43 44 8d 7c 24 0c 89 78 04 52 9d a1
Jun 11 04:50:11 eagle kernel: general protection: 0000
Jun 11 04:50:11 eagle kernel: CPU: 0
Jun 11 04:50:11 eagle kernel: EIP: 0010:[<00122204>]
Jun 11 04:50:11 eagle kernel: EFLAGS: 00010006
Jun 11 04:50:11 eagle kernel: eax: 66696365 ebx: 00da01dc ecx: 008df2ec edx: 00000212
Jun 11 04:50:11 eagle kernel: esi: 00000001 edi: 00000000 ebp: bffffe1c esp: 0008af70
Jun 11 04:50:11 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:50:11 eagle kernel: Process init (pid: 1, process nr: 1, stackpage=0008a000)
Jun 11 04:50:11 eagle kernel: Stack: 00da01dc 00000001 00000000 0008b018 00000000 00121c36 00da01dc 00000000
Jun 11 04:50:11 eagle kernel: 31bcecf3 00000000 00122c4a 00000000 00000000 00000000 00000000 0008b018
Jun 11 04:50:11 eagle kernel: 00122c67 00000000 0010a532 00000000 00000000 00000002 31bcecf3 00000000
Jun 11 04:50:11 eagle kernel: Call Trace: [<00121c36>] [<00122c4a>] [<00122c67>] [<0010a532>]
Jun 11 04:50:11 eagle kernel: Code: 8b 40 04 89 44 24 10 8b 43 44 8d 7c 24 0c 89 78 04 52 9d a1
Jun 11 04:50:12 eagle kernel: general protection: 0000
Jun 11 04:50:12 eagle kernel: CPU: 0
Jun 11 04:50:12 eagle kernel: EIP: 0010:[<00121e00>]
Jun 11 04:50:12 eagle kernel: EFLAGS: 00010202
Jun 11 04:50:12 eagle kernel: eax: 00000526 ebx: 656d614e ecx: 00000001 edx: 00000000
Jun 11 04:50:12 eagle kernel: esi: 000003e8 edi: 00000000 ebp: 00000001 esp: 01fa2f14
Jun 11 04:50:12 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:50:12 eagle kernel: Process dump (pid: 21838, process nr: 12, stackpage=01fa2000)
Jun 11 04:50:12 eagle kernel: Stack: 00000000 001dd9f0 00000006 0013698d 00136eca 00000000 0007d824 00000006
Jun 11 04:50:12 eagle kernel: 00000001 00000004 0013c4b4 00000000 00000000 00000000 00085938 00000000
Jun 11 04:50:12 eagle kernel: 00000041 0000001a 0000000c 001d0000 00136ff8 00000001 00000001 00000000
Jun 11 04:50:12 eagle kernel: Call Trace: [<0013698d>] [<00136eca>] [<0013c4b4>] [<00136ff8>] [<00138125>] [<0010a532>]
Jun 11 04:50:12 eagle kernel: Code: 66 83 7b 78 00 75 24 80 7b 7c 00 75 06 80 7b 7d 00 74 09 ba
Jun 11 04:50:12 eagle kernel: general protection: 0000
Jun 11 04:50:12 eagle kernel: CPU: 0
Jun 11 04:50:12 eagle kernel: EIP: 0010:[<00121c25>]
Jun 11 04:50:12 eagle kernel: EFLAGS: 00010202
Jun 11 04:50:12 eagle kernel: eax: 000014a0 ebx: 656d614e ecx: 01d61110 edx: 00000a50
Jun 11 04:50:12 eagle kernel: esi: 00000002 edi: 00000813 ebp: 00000000 esp: 00fccf58
Jun 11 04:50:12 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:50:12 eagle kernel: Process dump (pid: 21836, process nr: 58, stackpage=00fcc000)
Jun 11 04:50:12 eagle kernel: Stack: 00000813 01556988 00000000 00122c4a 00000813 00000813 00000813 00000000
Jun 11 04:50:12 eagle kernel: 01556988 001aca03 00000813 013e36c0 00120d72 01556988 013e36c0 00000003
Jun 11 04:50:12 eagle kernel: 01e38018 001150fa 013e36c0 00f3f018 ffffffff fffffffc 001151de 00000000
Jun 11 04:50:12 eagle kernel: Call Trace: [<00122c4a>] [<001aca03>] [<00120d72>] [<001150fa>] [<001151de>] [<0010a532>]
Jun 11 04:50:12 eagle kernel: Code: 66 39 3b 75 1e 80 7b 7c 00 74 09 53 e8 96 05 00 00 83 c4 04
Jun 11 04:50:57 eagle kernel: general protection: 0000
Jun 11 04:50:57 eagle kernel: CPU: 0
Jun 11 04:50:57 eagle kernel: EIP: 0010:[<00121e00>]
Jun 11 04:50:57 eagle kernel: EFLAGS: 00010206
Jun 11 04:50:57 eagle kernel: eax: 00000527 ebx: 656d614e ecx: 00212000 edx: 00200714
Jun 11 04:50:57 eagle kernel: esi: 000003e8 edi: 00000000 ebp: 00200714 esp: 00fcce9c
Jun 11 04:50:57 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:50:57 eagle kernel: Process sh (pid: 21842, process nr: 12, stackpage=00fcc000)
Jun 11 04:50:57 eagle kernel: Stack: 00000000 001eeafc 00000000 00122045 0007d7a0 0179ee9c 00000008 004c7025
Jun 11 04:50:57 eagle kernel: 0179ee9c 0015f753 00200714 0001de39 00000001 0007d7a0 004c702e 00fccf34
Jun 11 04:50:57 eagle kernel: 00000008 00065c6c 0001de39 0012a3ba 0007d7a0 004c7025 00000008 00fccf34
Jun 11 04:50:57 eagle kernel: Call Trace: [<00122045>] [<0015f753>] [<0012a3ba>] [<0012a4d9>] [<0012a70a>] [<00120bb0>] [<00120cd6>]
Jun 11 04:50:57 eagle kernel: [<0010a532>]
Jun 11 04:50:57 eagle kernel: Code: 66 83 7b 78 00 75 24 80 7b 7c 00 75 06 80 7b 7d 00 74 09 ba
Jun 11 04:51:06 eagle kernel: general protection: 0000
Jun 11 04:51:06 eagle kernel: CPU: 0
Jun 11 04:51:06 eagle kernel: EIP: 0010:[<00121e00>]
Jun 11 04:51:06 eagle kernel: EFLAGS: 00010206
Jun 11 04:51:06 eagle kernel: eax: 00000527 ebx: 656d614e ecx: 00000002 edx: 00000001
Jun 11 04:51:06 eagle kernel: esi: 000003e8 edi: 00000000 ebp: 00000002 esp: 00a1bf3c
Jun 11 04:51:06 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:51:06 eagle kernel: Process sendmail (pid: 21843, process nr: 12, stackpage=00a1b000)
Jun 11 04:51:06 eagle kernel: Stack: bfffe498 001df5d4 00000000 0013698d 00136eca bfffe498 00000000 00000000
Jun 11 04:51:06 eagle kernel: bfffe718 00a1bfbc 00000004 00000020 01f9b025 0011b7b4 bfffe498 00000000
Jun 11 04:51:06 eagle kernel: 00000000 bfffe718 0010fcff bfffe000 0013807e 00000002 00000002 00000000
Jun 11 04:51:06 eagle kernel: Call Trace: [<0013698d>] [<00136eca>] [<0011b7b4>] [<0010fcff>] [<0013807e>] [<0010a532>]
Jun 11 04:51:06 eagle kernel: Code: 66 83 7b 78 00 75 24 80 7b 7c 00 75 06 80 7b 7d 00 74 09 ba
Jun 11 04:52:25 eagle kernel: general protection: 0000
Jun 11 04:52:25 eagle kernel: CPU: 0
Jun 11 04:52:25 eagle kernel: EIP: 0010:[<00121e00>]
Jun 11 04:52:25 eagle kernel: EFLAGS: 00010202
Jun 11 04:52:25 eagle kernel: eax: 00000526 ebx: 656d614e ecx: 0000dd7a edx: 00000000
Jun 11 04:52:25 eagle kernel: esi: 000003e8 edi: 00000000 ebp: 00200580 esp: 010efed8
Jun 11 04:52:25 eagle kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Jun 11 04:52:25 eagle kernel: Process nmbd (pid: 311, process nr: 37, stackpage=010ef000)
Jun 11 04:52:25 eagle kernel: Stack: 00000000 001ef59c 00000000 00122045 00000000 00de5d58 00000000 018c7e4c
Jun 11 04:52:25 eagle kernel: 00160d9a 00160db7 00200580 0000dd7a 00000000 018c7e4c 0000000a 00a1b01b
Jun 11 04:52:25 eagle kernel: 018c7e4c 0057f988 01f679d4 01f679d4 ffffffff 00620440 0062042c 001611fa
Jun 11 04:52:25 eagle kernel: Call Trace: [<00122045>] [<00160d9a>] [<00160db7>] [<001611fa>] [<0012b69e>] [<0012b70c>] [<0010a532>]
Jun 11 04:52:25 eagle kernel: Code: 66 83 7b 78 00 75 24 80 7b 7c 00 75 06 80 7b 7d 00 74 09 ba

Using `/System.20' to map addresses to symbols.

>>EIP: 122204 <__wait_on_inode+38/bc>
Trace: 121c36 <sync_inodes+2a/54>
Trace: 125b98 <sync_old_buffers+14/128>
Trace: 125ce1 <sys_bdflush+35/a4>
Trace: 10a532 <system_call+52/80>

Code: 122204 <__wait_on_inode+38/bc> movl 0x4(%eax),%eax
Code: 122207 <__wait_on_inode+3b/bc> movl %eax,0x10(%esp,1)
Code: 12220b <__wait_on_inode+3f/bc> movl 0x44(%ebx),%eax
Code: 12220e <__wait_on_inode+42/bc> leal 0xc(%esp,1),%edi
Code: 122212 <__wait_on_inode+46/bc> movl %edi,0x4(%eax)
Code: 122215 <__wait_on_inode+49/bc> pushl %edx
Code: 122216 <__wait_on_inode+4a/bc> popf
Code: 122217 <__wait_on_inode+4b/bc> movl 0x90909000,%eax
Using `/System.20' to map addresses to symbols.

>>EIP: 122204 <__wait_on_inode+38/bc>
Trace: 121c36 <sync_inodes+2a/54>
Trace: 122c4a <fsync_dev+1a/30>
Trace: 122c67 <sys_sync+7/10>
Trace: 10a532 <system_call+52/80>

Code: 122204 <__wait_on_inode+38/bc> movl 0x4(%eax),%eax
Code: 122207 <__wait_on_inode+3b/bc> movl %eax,0x10(%esp,1)
Code: 12220b <__wait_on_inode+3f/bc> movl 0x44(%ebx),%eax
Code: 12220e <__wait_on_inode+42/bc> leal 0xc(%esp,1),%edi
Code: 122212 <__wait_on_inode+46/bc> movl %edi,0x4(%eax)
Code: 122215 <__wait_on_inode+49/bc> pushl %edx
Code: 122216 <__wait_on_inode+4a/bc> popf
Code: 122217 <__wait_on_inode+4b/bc> movl 0x90909000,%eax
Using `/System.20' to map addresses to symbols.

>>EIP: 121e00 <get_empty_inode+44/150>
Trace: 13698d <sock_alloc+5/b4>
Trace: 136eca <sys_socket+9a/140>
Trace: 13c4b4 <unix_create>
Trace: 136ff8 <sys_socketpair+88/164>
Trace: 138125 <sys_socketcall+1a1/2dc>
Trace: 10a532 <system_call+52/80>

Code: 121e00 <get_empty_inode+44/150> cmpw $0x0,0x78(%ebx)
Code: 121e05 <get_empty_inode+49/150> jne 121e2b <get_empty_inode+6f/150>
Code: 121e07 <get_empty_inode+4b/150> cmpb $0x0,0x7c(%ebx)
Code: 121e0b <get_empty_inode+4f/150> jne 121e13 <get_empty_inode+57/150>
Code: 121e0d <get_empty_inode+51/150> cmpb $0x0,0x7d(%ebx)
Code: 121e11 <get_empty_inode+55/150> je 121e1c <get_empty_inode+60/150>
Code: 121e13 <get_empty_inode+57/150> movl $0x90909000,%edx
Using `/System.20' to map addresses to symbols.

>>EIP: 121c25 <sync_inodes+19/54>
Trace: 122c4a <fsync_dev+1a/30>
Trace: 1aca03 <sd_release+f/7c>
Trace: 120d72 <close_fp+5e/84>
Trace: 1150fa <do_exit+fa/1d0>
Trace: 1151de <sys_exit+e/10>
Trace: 10a532 <system_call+52/80>

Code: 121c25 <sync_inodes+19/54> cmpw %di,(%ebx)
Code: 121c28 <sync_inodes+1c/54> jne 121c48 <sync_inodes+3c/54>
Code: 121c2a <sync_inodes+1e/54> cmpb $0x0,0x7c(%ebx)
Code: 121c2e <sync_inodes+22/54> je 121c39 <sync_inodes+2d/54>
Code: 121c30 <sync_inodes+24/54> pushl %ebx
Code: 121c31 <sync_inodes+25/54> call 1221cc <__wait_on_inode>
Code: 121c36 <sync_inodes+2a/54> addl $0x4,%esp
Code: 121c39 <sync_inodes+2d/54> Using `/System.20' to map addresses to symbols.

>>EIP: 121e00 <get_empty_inode+44/150>
Trace: 122045 <__iget+61/1e8>
Trace: 15f753 <ext2_lookup+11f/138>
Trace: 12a3ba <lookup+da/f4>
Trace: 12a4d9 <dir_namei+95/128>
Trace: 12a70a <open_namei+52/3cc>
Trace: 120bb0 <do_open+74/168>
Trace: 120cd6 <sys_open+32/58>
Trace: 10a532 <system_call+52/80>

Code: 121e00 <get_empty_inode+44/150> cmpw $0x0,0x78(%ebx)
Code: 121e05 <get_empty_inode+49/150> jne 121e2b <get_empty_inode+6f/150>
Code: 121e07 <get_empty_inode+4b/150> cmpb $0x0,0x7c(%ebx)
Code: 121e0b <get_empty_inode+4f/150> jne 121e13 <get_empty_inode+57/150>
Code: 121e0d <get_empty_inode+51/150> cmpb $0x0,0x7d(%ebx)
Code: 121e11 <get_empty_inode+55/150> je 121e1c <get_empty_inode+60/150>
Code: 121e13 <get_empty_inode+57/150> movl $0x90909000,%edx
Using `/System.20' to map addresses to symbols.

>>EIP: 121e00 <get_empty_inode+44/150>
Trace: 13698d <sock_alloc+5/b4>
Trace: 136eca <sys_socket+9a/140>
Trace: 11b7b4 <filemap_nopage>
Trace: 10fcff <do_page_fault+13f/29c>
Trace: 13807e <sys_socketcall+fa/2dc>
Trace: 10a532 <system_call+52/80>

Code: 121e00 <get_empty_inode+44/150> cmpw $0x0,0x78(%ebx)
Code: 121e05 <get_empty_inode+49/150> jne 121e2b <get_empty_inode+6f/150>
Code: 121e07 <get_empty_inode+4b/150> cmpb $0x0,0x7c(%ebx)
Code: 121e0b <get_empty_inode+4f/150> jne 121e13 <get_empty_inode+57/150>
Code: 121e0d <get_empty_inode+51/150> cmpb $0x0,0x7d(%ebx)
Code: 121e11 <get_empty_inode+55/150> je 121e1c <get_empty_inode+60/150>
Code: 121e13 <get_empty_inode+57/150> movl $0x90909000,%edx
Using `/System.20' to map addresses to symbols.

>>EIP: 121e00 <get_empty_inode+44/150>
Trace: 122045 <__iget+61/1e8>
Trace: 160d9a <do_ext2_rename+14a/558>
Trace: 160db7 <do_ext2_rename+167/558>
Trace: 1611fa <ext2_rename+52/7c>
Trace: 12b69e <do_rename+21e/248>
Trace: 12b70c <sys_rename+44/68>
Trace: 10a532 <system_call+52/80>

Code: 121e00 <get_empty_inode+44/150> cmpw $0x0,0x78(%ebx)
Code: 121e05 <get_empty_inode+49/150> jne 121e2b <get_empty_inode+6f/150>
Code: 121e07 <get_empty_inode+4b/150> cmpb $0x0,0x7c(%ebx)
Code: 121e0b <get_empty_inode+4f/150> jne 121e13 <get_empty_inode+57/150>
Code: 121e0d <get_empty_inode+51/150> cmpb $0x0,0x7d(%ebx)
Code: 121e11 <get_empty_inode+55/150> je 121e1c <get_empty_inode+60/150>
Code: 121e13 <get_empty_inode+57/150> movl $0x90909000,%edx