Unfortunatley I've had several complete system freeze + black screen +
nothing in the logs. I did not experienced any of this with kernel 2.0.29.
My average uptime is less than 3 days now. :( Not Good compared to 2-3
months using 2.0.29.
general protection: 0000
CPU: 0
EIP: 0010:[<00186f10>]
EFLAGS: 00010286
eax: 00000000 ebx: 00cfc814 ecx: 00000005 edx: f000ef6f
esi: 00000006 edi: 080628dc ebp: 000005e0 esp: 01c37f58
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 7554, process nr: 24, stackpage=01c37000)
Stack: 008a5000 00916d48 01cdc200 000005e0 00000005 01fd4006 0016b74d 008a5000
00916d48 080628da 000005e0 00000000 00916d48 000005e0 01cdc200 001220f8
01cdc200 00916d48 080628da 000005e0 019c3810 00000005 0805ff64 bffffe30
Call Trace: [<0016b74d>] [<001220f8>] [<0010a645>]
Code: 8a 52 20 88 54 24 14 ff 40 0c 8b 43 6c 8b 08 21 48 0c 0f b6
Using `/boot/System.map-2.0.32' to map addresses to symbols.
>>EIP: 186f10 <ppp_tty_read+2b0/304>
Trace: 16b74d <tty_read+9d/bc>
Trace: 1220f8 <sys_read+c0/e8>
Trace: 10a645 <system_call+55/80>
Code: 186f10 <ppp_tty_read+2b0/304> movb 0x20(%edx),%dl
Code: 186f13 <ppp_tty_read+2b3/304> movb %dl,0x14(%esp,1)
Code: 186f17 <ppp_tty_read+2b7/304> incl 0xc(%eax)
Code: 186f1a <ppp_tty_read+2ba/304> movl 0x6c(%ebx),%eax
Code: 186f1d <ppp_tty_read+2bd/304> movl (%eax),%ecx
Code: 186f1f <ppp_tty_read+2bf/304> andl %ecx,0xc(%eax)
Code: 186f22 <ppp_tty_read+2c2/304> movzbl (%eax),%eax
Code: 186f25 <ppp_tty_read+2c5/304> nop
Code: 186f26 <ppp_tty_read+2c6/304> nop
Code: 186f27 <ppp_tty_read+2c7/304> nop
And the other one looks very similar (sorry, klogd had already mudged the
addresses so ksymoops did not like them):
general protection: 0000
CPU: 0
EIP: 0010:[ppp_tty_read+688/772]
EFLAGS: 00010286
eax: 00000000 ebx: 0183f220 ecx: 00000005 edx: f000ef6f
esi: 00000006 edi: 080628dc ebp: 000005e0 esp: 01974f58
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 21270, process nr: 30, stackpage=01974000)
Stack: 00ff5000 01029d48 01eab300 000005e0 00000005 01fe3006 0016b74d 00ff5000
01029d48 080628da 000005e0 00000000 01029d48 000005e0 01eab300 001220f8
01eab300 01029d48 080628da 000005e0 00332414 00000005 0805ff64 bffffde4
Call Trace: [tty_read+157/188] [sys_read+192/232] [system_call+85/128]
Code: 8a 52 20 88 54 24 14 ff 40 0c 8b 43 6c 8b 08 21 48 0c 0f b6
Code: 00000000 <_EIP> movb 0x20(%edx),%dl
Code: 00000003 <_EIP+3> movb %dl,0x14(%esp,1)
Code: 00000007 <_EIP+7> incl 0xc(%eax)
Code: 0000000a <_EIP+a> movl 0x6c(%ebx),%eax
Code: 0000000d <_EIP+d> movl (%eax),%ecx
Code: 0000000f <_EIP+f> andl %ecx,0xc(%eax)
Code: 00000012 <_EIP+12> movzbl (%eax),%eax
Code: 00000015 <_EIP+15> nop
Code: 00000016 <_EIP+16> nop
Code: 00000017 <_EIP+17> nop
Best Regards
Daniel Ryde, System Administrator
__________________________________________________________________________
Tripnet AB Visit Address: Telephone: +46 31 7252500
Box 5071 Avagen 42 Facsimile: +46 31 7252501
S-402 22 GOTEBORG GOTEBORG Email: ryde@tripnet.se
Sweden Sweden