2.0.32 Oopses in ppp

Daniel Ryde (ryde@tripnet.se)
Fri, 21 Nov 1997 16:09:11 +0100 (CET)


Here is two opses that I found in the logs on two separate machines
running kernel 2.0.32. These machines mostly run pppd. The opses did not
freeze the machines, but they were probably swapping due to the kernel
memory leak I've reported many times now. I can't find any way of
reproducing these opses.

Unfortunatley I've had several complete system freeze + black screen +
nothing in the logs. I did not experienced any of this with kernel 2.0.29.
My average uptime is less than 3 days now. :( Not Good compared to 2-3
months using 2.0.29.

general protection: 0000
CPU: 0
EIP: 0010:[<00186f10>]
EFLAGS: 00010286
eax: 00000000 ebx: 00cfc814 ecx: 00000005 edx: f000ef6f
esi: 00000006 edi: 080628dc ebp: 000005e0 esp: 01c37f58
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 7554, process nr: 24, stackpage=01c37000)
Stack: 008a5000 00916d48 01cdc200 000005e0 00000005 01fd4006 0016b74d 008a5000
00916d48 080628da 000005e0 00000000 00916d48 000005e0 01cdc200 001220f8
01cdc200 00916d48 080628da 000005e0 019c3810 00000005 0805ff64 bffffe30
Call Trace: [<0016b74d>] [<001220f8>] [<0010a645>]
Code: 8a 52 20 88 54 24 14 ff 40 0c 8b 43 6c 8b 08 21 48 0c 0f b6

Using `/boot/System.map-2.0.32' to map addresses to symbols.

>>EIP: 186f10 <ppp_tty_read+2b0/304>
Trace: 16b74d <tty_read+9d/bc>
Trace: 1220f8 <sys_read+c0/e8>
Trace: 10a645 <system_call+55/80>

Code: 186f10 <ppp_tty_read+2b0/304> movb 0x20(%edx),%dl
Code: 186f13 <ppp_tty_read+2b3/304> movb %dl,0x14(%esp,1)
Code: 186f17 <ppp_tty_read+2b7/304> incl 0xc(%eax)
Code: 186f1a <ppp_tty_read+2ba/304> movl 0x6c(%ebx),%eax
Code: 186f1d <ppp_tty_read+2bd/304> movl (%eax),%ecx
Code: 186f1f <ppp_tty_read+2bf/304> andl %ecx,0xc(%eax)
Code: 186f22 <ppp_tty_read+2c2/304> movzbl (%eax),%eax
Code: 186f25 <ppp_tty_read+2c5/304> nop
Code: 186f26 <ppp_tty_read+2c6/304> nop
Code: 186f27 <ppp_tty_read+2c7/304> nop

And the other one looks very similar (sorry, klogd had already mudged the
addresses so ksymoops did not like them):

general protection: 0000
CPU: 0
EIP: 0010:[ppp_tty_read+688/772]
EFLAGS: 00010286
eax: 00000000 ebx: 0183f220 ecx: 00000005 edx: f000ef6f
esi: 00000006 edi: 080628dc ebp: 000005e0 esp: 01974f58
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 21270, process nr: 30, stackpage=01974000)
Stack: 00ff5000 01029d48 01eab300 000005e0 00000005 01fe3006 0016b74d 00ff5000
01029d48 080628da 000005e0 00000000 01029d48 000005e0 01eab300 001220f8
01eab300 01029d48 080628da 000005e0 00332414 00000005 0805ff64 bffffde4
Call Trace: [tty_read+157/188] [sys_read+192/232] [system_call+85/128]
Code: 8a 52 20 88 54 24 14 ff 40 0c 8b 43 6c 8b 08 21 48 0c 0f b6

Code: 00000000 <_EIP> movb 0x20(%edx),%dl
Code: 00000003 <_EIP+3> movb %dl,0x14(%esp,1)
Code: 00000007 <_EIP+7> incl 0xc(%eax)
Code: 0000000a <_EIP+a> movl 0x6c(%ebx),%eax
Code: 0000000d <_EIP+d> movl (%eax),%ecx
Code: 0000000f <_EIP+f> andl %ecx,0xc(%eax)
Code: 00000012 <_EIP+12> movzbl (%eax),%eax
Code: 00000015 <_EIP+15> nop
Code: 00000016 <_EIP+16> nop
Code: 00000017 <_EIP+17> nop

Best Regards

Daniel Ryde, System Administrator
__________________________________________________________________________
Tripnet AB Visit Address: Telephone: +46 31 7252500
Box 5071 Avagen 42 Facsimile: +46 31 7252501
S-402 22 GOTEBORG GOTEBORG Email: ryde@tripnet.se
Sweden Sweden