Hi Could anyone give me a hint- why is this crash happens repeatedly after working almost a year without any problems Linux Slackware 3.30 2.0.36 Syslog is enclosed Thsnks in advance
Jul 14 08:23:38 rt kernel: general protection: 0000 Jul 14 08:23:38 rt kernel: CPU: 0 Jul 14 08:23:38 rt kernel: EIP: 0010:[opost+27/456] Jul 14 08:23:38 rt kernel: EFLAGS: 00010202 Jul 14 08:23:38 rt kernel: eax: f000ff53 ebx: 00000001 ecx: 08051d1b edx: 001951e0 Jul 14 08:23:38 rt kernel: esi: 00000000 edi: 00000000 ebp: 00fed000 esp: 01c73f2c Jul 14 08:23:38 rt kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018 Jul 14 08:23:38 rt kernel: Process in.telnetd (pid: 149, process nr: 37, stackpage=01c73000) Jul 14 08:23:38 rt kernel: Stack: 00000000 00000001 08051ddc 00000000 00fed000 00138c1b 001951d7 0000001b Jul 14 08:23:38 rt kernel: 00000000 0019195d 00fed000 01e0c1dc 08051ddc 00000001 00000000 01d74234 Jul 14 08:23:38 rt kernel: 01e0c1dc 01d74200 001950e0 00123e73 01d74200 01e0c1dc 08051ddc 00000001 Jul 14 08:23:38 rt kernel: Call Trace: [sock_release+115/156] [write_chan+251/400] [tty_write+225/304] [write_chan+4/400] [sys_write+339/396] [system_call+85/128] Jul 14 08:23:38 rt kernel: Code: ff d0 89 c7 83 c4 04 85 ff 75 0e b8 ff ff ff ff 5b 5e 5f 5d Jul 14 10:20:01 rt kernel: Unable to handle kernel paging request at virtual address 4007b7a2 Jul 14 10:20:01 rt kernel: current->tss.cr3 = 00c81000, Lr3 = 00c81000 Jul 14 10:20:01 rt kernel: *pde = 00e87067 Jul 14 10:20:01 rt kernel: *pte = 01fec025 Jul 14 10:20:01 rt kernel: Oops: 0003 Jul 14 10:20:01 rt kernel: CPU: 0 Jul 14 10:20:01 rt kernel: EIP: 0010:[filldir+59/164] Jul 14 10:20:01 rt kernel: EFLAGS: 00010202 Jul 14 10:20:01 rt kernel: eax: 00000011 ebx: 01d03fe8 ecx: 01d03fa8 edx: 4007b79e Jul 14 10:20:01 rt kernel: esi: 01d03fe8 edi: 0000005c ebp: 00000010 esp: 01d03ea8 Jul 14 10:20:01 rt kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018 Jul 14 10:20:01 rt kernel: Process sh (pid: 249, process nr: 27, stackpage=01d03000) Jul 14 10:20:01 rt kernel: Stack: 0012dcd4 00276864 0808e640 00000068 0015e7d1 01d03fe8 00276864 00000003 Jul 14 10:20:01 rt kernel: 0000005c 000146ba 00275f00 00276864 00000003 000146ba 01a593b8 00001000 Jul 14 10:20:01 rt kernel: 0808e640 bffffc04 0027685c 0000005c 00000000 00000002 01b75200 00000000 Jul 14 10:20:01 rt kernel: Call Trace: [filldir+0/164] [ext2_readdir+1281/1568] [do_no_page+0/820] [sys_getdents+151/200] [filldir+0/164] [system_call+85/128] Jul 14 10:20:01 rt kernel: Code: 64 89 7a 04 8b 5c 24 14 8b 13 89 53 04 8b 74 24 24 64 89 32 Jul 14 10:20:13 rt kernel: kfree of non-kmalloced memory: 0026bffc, next= 00000000, order=4 Jul 14 10:49:26 rt kernel: kfree of non-kmalloced memory: 01e99810, next= 5251504f, order=1515804759 Jul 14 10:52:04 rt kernel: general protection: 0000 Jul 14 10:52:04 rt kernel: CPU: 0 Jul 14 10:52:04 rt kernel: EIP: 0010:[kfree+30/300] Jul 14 10:52:04 rt kernel: EFLAGS: 00010293 Jul 14 10:52:04 rt kernel: eax: 00101000 ebx: 0009e818 ecx: 8009f810 edx: 8009f000 Jul 14 10:52:04 rt kernel: esi: 00e1cf24 edi: 00000000 ebp: 00000003 esp: 00e1cedc Jul 14 10:52:04 rt kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018 Jul 14 10:52:04 rt kernel: Process in.pop3d (pid: 287, process nr: 27, stackpage=00e1c000) Jul 14 10:52:04 rt kernel: Stack: 0009e818 00e1cf24 00000000 00000003 c280c000 0011fdb5 0009e818 c2c00000 Jul 14 10:52:04 rt kernel: 00002000 00e1cf24 00140f21 0280a000 00cf8018 00cf8810 00ea5c90 00000003 Jul 14 10:52:04 rt kernel: 0013f2fe 00cf8018 00e1cf24 00e1cf24 00000000 0013f642 00cf8810 00ea5c00 Jul 14 10:52:04 rt kernel: Call Trace: [vfree+61/116] [unix_gc+909/916] [<0280a000>] [unix_destroy_socket+246/252] [unix_release+122/144] [sock_release+92/156] [sock_close+37/44] Jul 14 10:52:04 rt kernel: [__fput+30/68] [close_fp+76/92] [do_exit+292/508] [sys_exit+14/16] [system_call+85/128] Jul 14 10:52:04 rt kernel: Code: f7 02 ff 0f 00 00 0f 85 ca 00 00 00 8b 42 08 83 f8 0d 0f 87 Jul 19 07:31:07 rt wu.ftpd[124]: warning: can't get client address: Connection reset by peer Jul 19 07:31:09 rt syslog: getpeername (wu.ftpd): Transport endpoint is not connected Jul 19 07:33:06 rt kernel: general protection: 0000 Jul 19 07:33:06 rt kernel: CPU: 0 Jul 19 07:33:06 rt kernel: EIP: 0010:[opost+27/456] Jul 19 07:33:06 rt kernel: EFLAGS: 00010202 Jul 19 07:33:06 rt kernel: eax: f000ff53 ebx: 00000003 ecx: 08051d1b edx: 001951e0 Jul 19 07:33:06 rt kernel: esi: 00000000 edi: 00000000 ebp: 01545000 esp: 013a2f2c Jul 19 07:33:06 rt kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018 Jul 19 07:33:06 rt kernel: Process in.telnetd (pid: 148, process nr: 32, stackpage=013a2000) Jul 19 07:33:06 rt kernel: Stack: 00000000 00000003 08051ddc 00000000 01545000 00138c1b 001951d7 0000001b Jul 19 07:33:06 rt kernel: 00000000 0019195d 01545000 01e5b198 08051ddc 00000003 00000000 013a1a34 Jul 19 07:33:06 rt kernel: 01e5b198 013a1a00 001950e0 00123e73 013a1a00 01e5b198 08051ddc 00000003 Jul 19 07:33:06 rt kernel: Call Trace: [sock_release+115/156] [write_chan+251/400] [tty_write+225/304] [write_chan+4/400] [sys_write+339/396] [system_call+85/128] Jul 19 07:33:06 rt kernel: Code: ff d0 89 c7 83 c4 04 85 ff 75 0e b8 ff ff ff ff 5b 5e 5f 5d Jul 19 07:35:05 rt kernel: kfree of non-kmalloced memory: 01474c0c, next= 00001000, order=0 Jul 19 07:35:10 rt kernel: alloc_skb called nonatomically from interrupt 0000007f Jul 19 07:35:10 rt ftpd[195]: exiting on signal 11 Jul 19 07:37:19 rt kernel: general protection: 0000 Jul 19 07:37:19 rt kernel: CPU: 0 Jul 19 07:37:19 rt kernel: EIP: 0010:[kfree+30/300] Jul 19 07:37:19 rt kernel: EFLAGS: 00010293 Jul 19 07:37:19 rt kernel: eax: 00000000 ebx: 00735c0c ecx: 8073fe04 edx: 8073f000 Jul 19 07:37:19 rt kernel: esi: 000000c4 edi: bffffbb0 ebp: ffffffff esp: 00327f6c Jul 19 07:37:19 rt kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018 Jul 19 07:37:19 rt kernel: Process inetd (pid: 65, process nr: 16, stackpage=00327000) Jul 19 07:37:19 rt kernel: Stack: 00735c0c 000000c4 bffffbb0 ffffffff ffffffff 00116db8 00735c0c 006c2000 Jul 19 07:37:19 rt kernel: 00000000 00735c0c 0011789e 00735c0c 0083b414 00000000 ffffffff bffffbb4 Jul 19 07:37:19 rt kernel: 000000c4 0083b414 0083b524 0010a925 ffffffff bffffbb0 00000001 00000000 Jul 19 07:37:19 rt kernel: Call Trace: [release+280/336] [sys_wait4+706/848] [system_call+85/128] Jul 19 07:37:19 rt kernel: Code: f7 02 ff 0f 00 00 0f 85 ca 00 00 00 8b 42 08 83 f8 0d 0f 87 Jul 19 13:50:01 rt kernel: kfree of non-kmalloced memory: 00fbe598, next= 230a2e73, order=2036689012 Jul 19 13:51:57 rt kernel: kfree of non-kmalloced memory: 00fbef18, next= 230a2e73, order=2036689012 Jul 19 13:52:23 rt kernel: kfree of non-kmalloced memory: 0027bffc, next= 000041ed, order=932369094
