Hi
 Could anyone give me a hint- why is this crash happens repeatedly
 after working almost a year without any problems
  Linux  Slackware 3.30 2.0.36

Syslog is enclosed

Thsnks in advance
Jul 14 08:23:38 rt kernel: general protection: 0000
Jul 14 08:23:38 rt kernel: CPU:    0
Jul 14 08:23:38 rt kernel: EIP:    0010:[opost+27/456]
Jul 14 08:23:38 rt kernel: EFLAGS: 00010202
Jul 14 08:23:38 rt kernel: eax: f000ff53   ebx: 00000001   ecx: 08051d1b   edx: 
001951e0
Jul 14 08:23:38 rt kernel: esi: 00000000   edi: 00000000   ebp: 00fed000   esp: 
01c73f2c
Jul 14 08:23:38 rt kernel: ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Jul 14 08:23:38 rt kernel: Process in.telnetd (pid: 149, process nr: 37, 
stackpage=01c73000)
Jul 14 08:23:38 rt kernel: Stack: 00000000 00000001 08051ddc 00000000 00fed000 
00138c1b 001951d7 0000001b 
Jul 14 08:23:38 rt kernel:        00000000 0019195d 00fed000 01e0c1dc 08051ddc 
00000001 00000000 01d74234 
Jul 14 08:23:38 rt kernel:        01e0c1dc 01d74200 001950e0 00123e73 01d74200 
01e0c1dc 08051ddc 00000001 
Jul 14 08:23:38 rt kernel: Call Trace: [sock_release+115/156] [write_chan+251/400] 
[tty_write+225/304] [write_chan+4/400] [sys_write+339/396] [system_call+85/128] 
Jul 14 08:23:38 rt kernel: Code: ff d0 89 c7 83 c4 04 85 ff 75 0e b8 ff ff ff ff 5b 5e 
5f 5d 



Jul 14 10:20:01 rt kernel: Unable to handle kernel paging request at virtual address 
4007b7a2
Jul 14 10:20:01 rt kernel: current->tss.cr3 = 00c81000, Lr3 = 00c81000
Jul 14 10:20:01 rt kernel: *pde = 00e87067
Jul 14 10:20:01 rt kernel: *pte = 01fec025
Jul 14 10:20:01 rt kernel: Oops: 0003
Jul 14 10:20:01 rt kernel: CPU:    0
Jul 14 10:20:01 rt kernel: EIP:    0010:[filldir+59/164]
Jul 14 10:20:01 rt kernel: EFLAGS: 00010202
Jul 14 10:20:01 rt kernel: eax: 00000011   ebx: 01d03fe8   ecx: 01d03fa8   edx: 
4007b79e
Jul 14 10:20:01 rt kernel: esi: 01d03fe8   edi: 0000005c   ebp: 00000010   esp: 
01d03ea8
Jul 14 10:20:01 rt kernel: ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Jul 14 10:20:01 rt kernel: Process sh (pid: 249, process nr: 27, stackpage=01d03000)
Jul 14 10:20:01 rt kernel: Stack: 0012dcd4 00276864 0808e640 00000068 0015e7d1 
01d03fe8 00276864 00000003 
Jul 14 10:20:01 rt kernel:        0000005c 000146ba 00275f00 00276864 00000003 
000146ba 01a593b8 00001000 
Jul 14 10:20:01 rt kernel:        0808e640 bffffc04 0027685c 0000005c 00000000 
00000002 01b75200 00000000 
Jul 14 10:20:01 rt kernel: Call Trace: [filldir+0/164] [ext2_readdir+1281/1568] 
[do_no_page+0/820] [sys_getdents+151/200] [filldir+0/164] [system_call+85/128] 
Jul 14 10:20:01 rt kernel: Code: 64 89 7a 04 8b 5c 24 14 8b 13 89 53 04 8b 74 24 24 64 
89 32 
Jul 14 10:20:13 rt kernel: kfree of non-kmalloced memory: 0026bffc, next= 00000000, 
order=4
Jul 14 10:49:26 rt kernel: kfree of non-kmalloced memory: 01e99810, next= 5251504f, 
order=1515804759
Jul 14 10:52:04 rt kernel: general protection: 0000
Jul 14 10:52:04 rt kernel: CPU:    0
Jul 14 10:52:04 rt kernel: EIP:    0010:[kfree+30/300]
Jul 14 10:52:04 rt kernel: EFLAGS: 00010293
Jul 14 10:52:04 rt kernel: eax: 00101000   ebx: 0009e818   ecx: 8009f810   edx: 
8009f000
Jul 14 10:52:04 rt kernel: esi: 00e1cf24   edi: 00000000   ebp: 00000003   esp: 
00e1cedc
Jul 14 10:52:04 rt kernel: ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Jul 14 10:52:04 rt kernel: Process in.pop3d (pid: 287, process nr: 27, 
stackpage=00e1c000)
Jul 14 10:52:04 rt kernel: Stack: 0009e818 00e1cf24 00000000 00000003 c280c000 
0011fdb5 0009e818 c2c00000 
Jul 14 10:52:04 rt kernel:        00002000 00e1cf24 00140f21 0280a000 00cf8018 
00cf8810 00ea5c90 00000003 
Jul 14 10:52:04 rt kernel:        0013f2fe 00cf8018 00e1cf24 00e1cf24 00000000 
0013f642 00cf8810 00ea5c00 
Jul 14 10:52:04 rt kernel: Call Trace: [vfree+61/116] [unix_gc+909/916] [<0280a000>] 
[unix_destroy_socket+246/252] [unix_release+122/144] [sock_release+92/156] 
[sock_close+37/44] 
Jul 14 10:52:04 rt kernel:        [__fput+30/68] [close_fp+76/92] [do_exit+292/508] 
[sys_exit+14/16] [system_call+85/128] 
Jul 14 10:52:04 rt kernel: Code: f7 02 ff 0f 00 00 0f 85 ca 00 00 00 8b 42 08 83 f8 0d 
0f 87 


Jul 19 07:31:07 rt wu.ftpd[124]: warning: can't get client address: Connection reset 
by peer
Jul 19 07:31:09 rt syslog: getpeername (wu.ftpd): Transport endpoint is not connected
Jul 19 07:33:06 rt kernel: general protection: 0000
Jul 19 07:33:06 rt kernel: CPU:    0
Jul 19 07:33:06 rt kernel: EIP:    0010:[opost+27/456]
Jul 19 07:33:06 rt kernel: EFLAGS: 00010202
Jul 19 07:33:06 rt kernel: eax: f000ff53   ebx: 00000003   ecx: 08051d1b   edx: 
001951e0
Jul 19 07:33:06 rt kernel: esi: 00000000   edi: 00000000   ebp: 01545000   esp: 
013a2f2c
Jul 19 07:33:06 rt kernel: ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Jul 19 07:33:06 rt kernel: Process in.telnetd (pid: 148, process nr: 32, 
stackpage=013a2000)
Jul 19 07:33:06 rt kernel: Stack: 00000000 00000003 08051ddc 00000000 01545000 
00138c1b 001951d7 0000001b 
Jul 19 07:33:06 rt kernel:        00000000 0019195d 01545000 01e5b198 08051ddc 
00000003 00000000 013a1a34 
Jul 19 07:33:06 rt kernel:        01e5b198 013a1a00 001950e0 00123e73 013a1a00 
01e5b198 08051ddc 00000003 
Jul 19 07:33:06 rt kernel: Call Trace: [sock_release+115/156] [write_chan+251/400] 
[tty_write+225/304] [write_chan+4/400] [sys_write+339/396] [system_call+85/128] 
Jul 19 07:33:06 rt kernel: Code: ff d0 89 c7 83 c4 04 85 ff 75 0e b8 ff ff ff ff 5b 5e 
5f 5d 
Jul 19 07:35:05 rt kernel: kfree of non-kmalloced memory: 01474c0c, next= 00001000, 
order=0
Jul 19 07:35:10 rt kernel: alloc_skb called nonatomically from interrupt 0000007f
Jul 19 07:35:10 rt ftpd[195]: exiting on signal 11
Jul 19 07:37:19 rt kernel: general protection: 0000
Jul 19 07:37:19 rt kernel: CPU:    0
Jul 19 07:37:19 rt kernel: EIP:    0010:[kfree+30/300]
Jul 19 07:37:19 rt kernel: EFLAGS: 00010293
Jul 19 07:37:19 rt kernel: eax: 00000000   ebx: 00735c0c   ecx: 8073fe04   edx: 
8073f000
Jul 19 07:37:19 rt kernel: esi: 000000c4   edi: bffffbb0   ebp: ffffffff   esp: 
00327f6c
Jul 19 07:37:19 rt kernel: ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Jul 19 07:37:19 rt kernel: Process inetd (pid: 65, process nr: 16, stackpage=00327000)
Jul 19 07:37:19 rt kernel: Stack: 00735c0c 000000c4 bffffbb0 ffffffff ffffffff 
00116db8 00735c0c 006c2000 
Jul 19 07:37:19 rt kernel:        00000000 00735c0c 0011789e 00735c0c 0083b414 
00000000 ffffffff bffffbb4 
Jul 19 07:37:19 rt kernel:        000000c4 0083b414 0083b524 0010a925 ffffffff 
bffffbb0 00000001 00000000 
Jul 19 07:37:19 rt kernel: Call Trace: [release+280/336] [sys_wait4+706/848] 
[system_call+85/128] 
Jul 19 07:37:19 rt kernel: Code: f7 02 ff 0f 00 00 0f 85 ca 00 00 00 8b 42 08 83 f8 0d 
0f 87 


Jul 19 13:50:01 rt kernel: kfree of non-kmalloced memory: 00fbe598, next= 230a2e73, 
order=2036689012
Jul 19 13:51:57 rt kernel: kfree of non-kmalloced memory: 00fbef18, next= 230a2e73, 
order=2036689012
Jul 19 13:52:23 rt kernel: kfree of non-kmalloced memory: 0027bffc, next= 000041ed, 
order=932369094


Reply via email to