2.0.31-7 Oopses on full partition

Michael J. Maravillo (mmj@philonline.com.ph)
Tue, 26 Aug 1997 03:51:55 +0800 (GMT+0800)


We've been running 2.0.31-7 for about 4 days already without
any problems. Just this morning, our /var partition got full
and then came the following oopses.

2.0.31 seems to be getting stabler as it goes. Keep up the
good work guys! ":)

Mike
-----
general protection: 0000
CPU: 0
EIP: 0010:[<001539b4>]
EFLAGS: 00010246
eax: 8324438b ebx: 06f63018 ecx: 00453f78 edx: 00453f78
esi: 00453f7c edi: 00000000 ebp: 00000000 esp: 00453f18
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process popper.linux-2. (pid: 1517, process nr: 43, stackpage=00453000)
Stack: 06f63018 00453f78 00000001 00000000 00000000 00453f7c 00000001 051620fc
bffff4a4 05162188 00139497 05162188 00453f78 00000001 00000000 00000000
00453f7c 00000000 07ff8a00 00000001 051620fc 00453f78 bffff4a4 00000001
Call Trace: [<00139497>] [<0012482c>] [<0010c5f5>]
Code: ff d0 83 c4 18 5b 5e 5f 5d c3 89 f6 b8 f5 ff ff ff 5b 5e 5f

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 1539b4 <inet_recvmsg+70/88>
Trace: 139497 <sock_read+ab/c0>
Trace: 12482c <sys_read+c0/e8>
Trace: 10c5f5 <system_call+55/80>

Code: 1539b4 <inet_recvmsg+70/88>
Code: 1539b4 <inet_recvmsg+70/88> ff d0 call *%eax
Code: 1539b6 <inet_recvmsg+72/88> 83 c4 18 addl $0x18,%esp
Code: 1539b9 <inet_recvmsg+75/88> 5b popl %ebx
Code: 1539ba <inet_recvmsg+76/88> 5e popl %esi
Code: 1539bb <inet_recvmsg+77/88> 5f popl %edi
Code: 1539bc <inet_recvmsg+78/88> 5d popl %ebp
Code: 1539bd <inet_recvmsg+79/88> c3 ret
Code: 1539c4 <inet_recvmsg+80/88> 89 f6 movl %esi,%esi
Code: 1539c6 <inet_recvmsg+82/88> b8 f5 ff ff ff movl $0xfffffff5,%eax
Code: 1539cb <inet_recvmsg+87/88> 5b popl %ebx
Code: 1539cc <inet_sendmsg> 5e popl %esi
Code: 1539cd <inet_sendmsg+1/ac> 5f popl %edi
Code: 1539d4 <inet_sendmsg+8/ac>
-----
general protection: 0000
CPU: 0
EIP: 0010:[<0014da81>]
EFLAGS: 00010202
eax: 83fff9ac ebx: 06f63018 ecx: 00000000 edx: 0018597c
esi: 07c4ce7c edi: 00000000 ebp: 072f4fa0 esp: 072f4f40
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process radiusd (pid: 1518, process nr: 43, stackpage=072f4000)
Stack: 07c4ce7c c204b0cb db04b0cb 072f4f78 00000006 00000000 0000007f 00000000
00000040 06f631e4 06f63018 0014e184 00000000 072f4fa0 00000000 0014e18e
06f63018 0011421d 06f63018 00000001 ffffffff 00000005 00000000 072f4fbc
Call Trace: [<0014e184>] [<0014e18e>] [<0011421d>] [<001198ef>] [<0010c57b>]
Code: ff d0 83 c4 28 85 c0 7d 16 c6 46 62 01 56 53 e8 77 d8 fe ff
Aiee, killing interrupt handler

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 14da81 <tcp_send_ack+105/238>
Trace: 14e184 <tcp_delack_timer>
Trace: 14e18e <tcp_delack_timer+a/10>
Trace: 11421d <timer_bh+2ed/334>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>

Code: 14da81 <tcp_send_ack+105/238>
Code: 14da81 <tcp_send_ack+105/238> ff d0 call *%eax
Code: 14da83 <tcp_send_ack+107/238> 83 c4 28 addl $0x28,%esp
Code: 14da86 <tcp_send_ack+10a/238> 85 c0 testl %eax,%eax
Code: 14da88 <tcp_send_ack+10c/238> 7d 16 jnl 14daa0 <tcp_send_ack+124/238>
Code: 14da8a <tcp_send_ack+10e/238> c6 46 62 01 movb $0x1,0x62(%esi)
Code: 14da94 <tcp_send_ack+118/238> 56 pushl %esi
Code: 14da95 <tcp_send_ack+119/238> 53 pushl %ebx
Code: 14da96 <tcp_send_ack+11a/238> e8 77 d8 fe ff call fffed88b <_EIP+fffed88b>
Code: 14daa1 <tcp_send_ack+125/238>
-----
general protection: 0000
CPU: 0
EIP: 0010:[<0014da81>]
EFLAGS: 00010206
eax: 83fff9ac ebx: 06f63018 ecx: 00000000 edx: 0018597c
esi: 07741a84 edi: 06f63018 ebp: 0041289c esp: 001be644
ds: 0018 es: 0018 fs: 002b gs: 0018 ss: 0018
Process swapper (pid: 0, process nr: 0, stackpage=001bc82c)
Stack: 07741a84 c204b0cb db04b0cb 001be67c 00000006 00000000 0000007f 00000000
00000040 06f631e4 06f630d8 00656164 06f63018 0041289c 00000000 0014b714
06f63018 06f63018 00656138 00656164 00656138 06f630d8 0014b9d1 00656164
Call Trace: [<0014b714>] [<0014b9d1>] [<0014c329>] [<00143cdf>] [<0013c6d4>] [<001198ef>] [<0010c57b>]
[<0010b634>] [<0010c5f5>] [<0010b328>] [<0010b1b5>]
Code: ff d0 83 c4 28 85 c0 7d 16 c6 46 62 01 56 53 e8 77 d8 fe ff
Aiee, killing interrupt handler
kfree of non-kmalloced memory: 001be874, next= 00000000, order=0
kfree of non-kmalloced memory: 001be864, next= 00000000, order=0
kfree of non-kmalloced memory: 001c1b58, next= 00000000, order=0
idle task may not sleep

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 14da81 <tcp_send_ack+105/238>
Trace: 14b714 <tcp_queue+d8/184>
Trace: 14b9d1 <tcp_data+211/21c>
Trace: 14c329 <tcp_rcv+815/8c0>
Trace: 143cdf <ip_rcv+3a3/4d4>
Trace: 13c6d4 <net_bh+fc/11c>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>
Trace: 10b634 <sys_idle+5c/70>
Trace: 10c5f5 <system_call+55/80>
Trace: 10b328 <init>
Trace: 10b1b5 <start_kernel+1ad/1b8>

Code: 14da81 <tcp_send_ack+105/238>
Code: 14da81 <tcp_send_ack+105/238> ff d0 call *%eax
Code: 14da83 <tcp_send_ack+107/238> 83 c4 28 addl $0x28,%esp
Code: 14da86 <tcp_send_ack+10a/238> 85 c0 testl %eax,%eax
Code: 14da88 <tcp_send_ack+10c/238> 7d 16 jnl 14daa0 <tcp_send_ack+124/238>
Code: 14da8a <tcp_send_ack+10e/238> c6 46 62 01 movb $0x1,0x62(%esi)
Code: 14da94 <tcp_send_ack+118/238> 56 pushl %esi
Code: 14da95 <tcp_send_ack+119/238> 53 pushl %ebx
Code: 14da96 <tcp_send_ack+11a/238> e8 77 d8 fe ff call fffed88b <_EIP+fffed88b>
Code: 14daa1 <tcp_send_ack+125/238>
-----
general protection: 0000
CPU: 0
EIP: 0010:[<0014da81>]
EFLAGS: 00010206
eax: 83fff9ac ebx: 06f63018 ecx: 00000000 edx: 0018597c
esi: 05aeca84 edi: 06f63018 ebp: 0041289c esp: 001be28c
ds: 0018 es: 0018 fs: 002b gs: 0000 ss: 0018
Process swapper (pid: 0, process nr: 0, stackpage=001bc82c)
Stack: 05aeca84 c204b0cb db04b0cb 001be2c4 00000006 00000000 0000007f 00000000
00000040 06f631e4 06f630d8 0000be30 06f63018 0041289c 00000000 0014b714
06f63018 06f63018 0000be04 0000be30 0000be04 06f630d8 0014b9d1 0000be30
Call Trace: [<0014b714>] [<0014b9d1>] [<0014c329>] [<00143cdf>] [<0013c6d4>] [<001198ef>] [<0010c57b>]
[<0015ec70>] [<0015efa3>] [<0015d2f9>] [<0015d174>] [<0010e8fa>] [<0010e111>] [<00116048>] [<0015d174>]
[<001186a2>] [<0010cba3>] [<09000000>] [<08800000>] [<0010cfb8>] [<0010cf90>] [<0010c780>] [<0018597c>]
[<0014da81>] [<0014b714>] [<0014b9d1>] [<0014c329>] [<00143cdf>] [<0013c6d4>] [<001198ef>] [<0010c57b>]
[<0010b634>] [<0010c5f5>] [<0010b328>] [<0010b1b5>]
Code: ff d0 83 c4 28 85 c0 7d 16 c6 46 62 01 56 53 e8 77 d8 fe ff
Aiee, killing interrupt handler

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 14da81 <tcp_send_ack+105/238>
Trace: 14b714 <tcp_queue+d8/184>
Trace: 14b9d1 <tcp_data+211/21c>
Trace: 14c329 <tcp_rcv+815/8c0>
Trace: 143cdf <ip_rcv+3a3/4d4>
Trace: 13c6d4 <net_bh+fc/11c>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>
Trace: 15ec70 <block_getblk+88/264>
Trace: 15efa3 <ext2_getblk+157/22c>
Trace: 15d2f9 <ext2_file_write+185/45c>
Trace: 15d2f9 <ext2_file_write+185/45c>
Trace: 10e8fa <do_fast_IRQ+2a/4c>
Trace: 10e111 <fast_IRQ10_interrupt+41/70>
Trace: 116048 <acct_process+198/1b8>
Trace: 15d2f9 <ext2_file_write+185/45c>
Trace: 1186a2 <do_exit+2e/1ec>
Trace: 10cba3 <die_if_kernel+2b7/2c0>
Trace: 9000000
Trace: 8800000
Trace: 10cfb8 <do_general_protection+28/54>
Trace: 10cfb8 <do_general_protection+28/54>
Trace: 10c780 <error_code+40/50>
Trace: 18597c <ide_ioctl+720/870>
Trace: 14da81 <tcp_send_ack+105/238>
Trace: 14b714 <tcp_queue+d8/184>
Trace: 14b9d1 <tcp_data+211/21c>
Trace: 14c329 <tcp_rcv+815/8c0>
Trace: 143cdf <ip_rcv+3a3/4d4>
Trace: 13c6d4 <net_bh+fc/11c>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>
Trace: 10b634 <sys_idle+5c/70>
Trace: 10c5f5 <system_call+55/80>
Trace: 10b328 <init>
Trace: 10b1b5 <start_kernel+1ad/1b8>

Code: 14da81 <tcp_send_ack+105/238>
Code: 14da81 <tcp_send_ack+105/238> ff d0 call *%eax
Code: 14da83 <tcp_send_ack+107/238> 83 c4 28 addl $0x28,%esp
Code: 14da86 <tcp_send_ack+10a/238> 85 c0 testl %eax,%eax
Code: 14da88 <tcp_send_ack+10c/238> 7d 16 jnl 14daa0 <tcp_send_ack+124/238>
Code: 14da8a <tcp_send_ack+10e/238> c6 46 62 01 movb $0x1,0x62(%esi)
Code: 14da94 <tcp_send_ack+118/238> 56 pushl %esi
Code: 14da95 <tcp_send_ack+119/238> 53 pushl %ebx
Code: 14da96 <tcp_send_ack+11a/238> e8 77 d8 fe ff call fffed88b <_EIP+fffed88b>
Code: 14daa1 <tcp_send_ack+125/238>
-----
general protection: 0000
CPU: 0
EIP: 0010:[<0014da81>]
EFLAGS: 00010206
eax: 83fff9ac ebx: 06f63018 ecx: 00000000 edx: 0018597c
esi: 05b90888 edi: 06f63018 ebp: 0041289c esp: 001be074
ds: 0018 es: 0018 fs: 002b gs: 0000 ss: 0018
Process swapper (pid: 0, process nr: 0, stackpage=001bc82c)
Stack: 05b90888 c204b0cb db04b0cb 001be0ac 00000006 00000000 0000007f 00000000
00000040 06f631e4 06f630d8 03d81d34 06f63018 0041289c 00000000 0014b714
06f63018 06f63018 03d81d08 03d81d34 03d81d08 06f630d8 0014b9d1 03d81d34
Call Trace: [<0014b714>] [<0014b9d1>] [<0014c329>] [<00143cdf>] [<0013c6d4>] [<001198ef>] [<0010c57b>]
[<001184db>] [<0011882c>] [<0010cba3>] [<09000000>] [<08800000>] [<0010cfb8>] [<0010cf90>] [<0010c780>]
[<0018597c>] [<0014da81>] [<0014b714>] [<0014b9d1>] [<0014c329>] [<00143cdf>] [<0013c6d4>] [<001198ef>]
[<0010c57b>] [<0015ec70>] [<0015efa3>] [<0015d2f9>] [<0015d174>] [<0010e8fa>] [<0010e111>] [<00116048>]
[<0015d174>] [<001186a2>] [<0010cba3>] [<09000000>] [<08800000>] [<0010cfb8>] [<0010cf90>] [<0010c780>]
[<0018597c>] [<0014da81>] [<0014b714>] [<0014b9d1>] [<0014c329>] [<00143cdf>] [<0013c6d4>] [<001198ef>]
[<0010c57b>] [<0010b634>] [<0010c5f5>] [<0010b328>] [<0010b1b5>]
Code: ff d0 83 c4 28 85 c0 7d 16 c6 46 62 01 56 53 e8 77 d8 fe ff
Aiee, killing interrupt handler

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 14da81 <tcp_send_ack+105/238>
Trace: 14b714 <tcp_queue+d8/184>
Trace: 14b9d1 <tcp_data+211/21c>
Trace: 14c329 <tcp_rcv+815/8c0>
Trace: 143cdf <ip_rcv+3a3/4d4>
Trace: 13c6d4 <net_bh+fc/11c>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>
Trace: 1184db <exit_notify+3b/1d4>
Trace: 11882c <do_exit+1b8/1ec>
Trace: 10cba3 <die_if_kernel+2b7/2c0>
Trace: 9000000
Trace: 8800000
Trace: 10cfb8 <do_general_protection+28/54>
Trace: 10cfb8 <do_general_protection+28/54>
Trace: 10c780 <error_code+40/50>
Trace: 18597c <ide_ioctl+720/870>
Trace: 14da81 <tcp_send_ack+105/238>
Trace: 14b714 <tcp_queue+d8/184>
Trace: 14b9d1 <tcp_data+211/21c>
Trace: 14c329 <tcp_rcv+815/8c0>
Trace: 143cdf <ip_rcv+3a3/4d4>
Trace: 13c6d4 <net_bh+fc/11c>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>
Trace: 15ec70 <block_getblk+88/264>
Trace: 15efa3 <ext2_getblk+157/22c>
Trace: 15d2f9 <ext2_file_write+185/45c>
Trace: 15d2f9 <ext2_file_write+185/45c>
Trace: 10e8fa <do_fast_IRQ+2a/4c>
Trace: 10e111 <fast_IRQ10_interrupt+41/70>
Trace: 116048 <acct_process+198/1b8>
Trace: 15d2f9 <ext2_file_write+185/45c>
Trace: 1186a2 <do_exit+2e/1ec>
Trace: 10cba3 <die_if_kernel+2b7/2c0>
Trace: 9000000
Trace: 8800000
Trace: 10cfb8 <do_general_protection+28/54>
Trace: 10cfb8 <do_general_protection+28/54>
Trace: 10c780 <error_code+40/50>
Trace: 18597c <ide_ioctl+720/870>
Trace: 14da81 <tcp_send_ack+105/238>
Trace: 14b714 <tcp_queue+d8/184>
Trace: 14b9d1 <tcp_data+211/21c>
Trace: 14c329 <tcp_rcv+815/8c0>
Trace: 143cdf <ip_rcv+3a3/4d4>
Trace: 13c6d4 <net_bh+fc/11c>
Trace: 1198ef <do_bottom_half+3b/60>
Trace: 10c57b <handle_bottom_half+b/20>
Trace: 10b634 <sys_idle+5c/70>
Trace: 10c5f5 <system_call+55/80>
Trace: 10b328 <init>
Trace: 10b1b5 <start_kernel+1ad/1b8>

Code: 14da81 <tcp_send_ack+105/238>
Code: 14da81 <tcp_send_ack+105/238> ff d0 call *%eax
Code: 14da83 <tcp_send_ack+107/238> 83 c4 28 addl $0x28,%esp
Code: 14da86 <tcp_send_ack+10a/238> 85 c0 testl %eax,%eax
Code: 14da88 <tcp_send_ack+10c/238> 7d 16 jnl 14daa0 <tcp_send_ack+124/238>
Code: 14da8a <tcp_send_ack+10e/238> c6 46 62 01 movb $0x1,0x62(%esi)
Code: 14da94 <tcp_send_ack+118/238> 56 pushl %esi
Code: 14da95 <tcp_send_ack+119/238> 53 pushl %ebx
Code: 14da96 <tcp_send_ack+11a/238> e8 77 d8 fe ff call fffed88b <_EIP+fffed88b>
Code: 14daa1 <tcp_send_ack+125/238>

__
Michael J. Maravillo Philippines Online
System Administrator PGP KeyID: 470AED9D InfoDyne, Incorporated
http://www.philonline.com.ph/~mmj/ 4A N&M Bldg, 1184 Chino Roces, Makati