2.0.30 oops, decoded

Simon Karpen (slk@linux1.acm.rpi.edu)
Sun, 4 May 1997 20:51:38 -0400 (EDT)


ok, i don't know if this is a known problem, but...

this is on a fairly heavily loaded shell/web/mail server.
buslogic scsi, tulip ethernet, 128mb ram, triton ii, pentium 166

general protection: 0000
CPU: 0
EIP: 0010:[<001453f4>]
EFLAGS: 00010217
eax: f000e987 ebx: 00000000 ecx: 007ef834 edx: f000f84d
esi: 007ef8cc edi: 000001a9 ebp: 007ef810 esp: 026dcee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process httpd (pid: 3175, process nr: 113, stackpage=026dc000)
Stack: 007ef810 026dcf7c 00000000 00000000 1002432e 007ef834 00000000 000001a9
068a3c0c 06935924 000339d2 00150042 007ef810 026dcf78 00000e57 00000000
00000000 026dcf7c 00001000 069358dc 08094ba4 06935968 00135fdf 06935968
Call Trace: [<00150042>] [<00135fdf>] [<001217eb>] [<0010a5e5>]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87

ksymoops gives

Using `/usr/src/linux/System.map' to map addresses to symbols.

>>EIP: 1453f4 <tcp_recvmsg+170/40c>
Trace: 150042 <inet_recvmsg+72/88>
Trace: 135fdf <sock_read+ab/c0>
Trace: 1217eb <sys_read+b3/d8>
Trace: 10a5e5 <system_call+55/80>

Code: 1453f4 <tcp_recvmsg+170/40c> movb 0xd(%eax),%al
Code: 1453f7 <tcp_recvmsg+173/40c> testb $0x2,%al
Code: 1453f9 <tcp_recvmsg+175/40c> je 1453ff <tcp_recvmsg+17b/40c>
Code: 1453fb <tcp_recvmsg+177/40c> decl 0x10(%esp,1)
Code: 1453ff <tcp_recvmsg+17b/40c> movl 0x10(%esp,1),%edi
Code: 145403 <tcp_recvmsg+17f/40c> cmpl %edi,0x30(%ebx)
Code: 145406 <tcp_recvmsg+182/40c> ja 90909018 <_EIP+90909018>

this happened shortly after an 'oversized packet from xxx.xxx.xxx.xxx'
message.

Simon Karpen
karpes@rpi.edu slk@acm.rpi.edu slk@karpes.stu.rpi.edu
"Fixing Unix is easier than living with NT."
--Larry McVoy