[OOPS] in 2.4.0-test8 occuring in low memory machines

2000-09-15 Thread Michael Peddemors

Sorry I can't be more explicit in checking this out, still working my way 
through definitive situations where these occur, but seem to be in low memory 
machines, running initrd.gz minix filesystems..

I started gettting OOPS soon after running a patch to rd.c to allow for 
encrypted initrd.gz, and I thought it was something to do with the patch, but 
it seems this is a deeper issue, because we are now getting it even when 
using an unencrypted initrd.gz.  

Only seems to happen on Pentium/486 class machines with 8-16 MG RAM
Also, we are running a minix file system. 

First OOPS occured after gunzip routine completed, while using the encrypted 
initrd.gz..  (Unencrypted OOPS below)

Not a master of ksymoops, but included it incase it helps.

Unable to handle kernel paging request at virtual address 8140c35b
 printing eip:
c015e483
*pde = 
Oops: 
CPU:0
EIP:0010:[]
EFLAGS: 00010293
eax: 8140c357   ebx: 8140c35f   ecx: c10952d0   edx: c10951d0
esi: 0042   edi:    ebp: 000a   esp: c1ffd824
ds: 0018es: 0018ss: 0018
Process swapper (pid: 1, stackpage=c1ffd000)
Stack: 0008 c015f1e4 c1f04008 0005 001d  c1ffdd8c
 c1ffd874 c1ffd870 c1ffd86c 001e 011e 0012 013c 007f
 c1f19408 0006 c1f04008 0009 0005 0006 0007 0007
Call Trace: [] [] [] [] [] 
[] [] [] [] []
Code: 8b 58 04 50 e8 44 78 05 00 89 d8 83 c4 04 85 c0 75 eb 31 c0
Kernel panic: Attempted to kill init!



>>EIP; c015e483<=
Trace; c015f1e4 
Trace; c015f2e9 
Trace; f0708b1f 
Trace; c015f366 
Trace; f0708b1f 
Trace; c015f753 
Trace; c011a28d 
Trace; c0100018 
Trace; c01070e7 
Trace; c0107518 
Code;  c015e483 
 <_EIP>:
Code;  c015e483<=
   0:   8b 58 04  movl   0x4(%eax),%ebx   <=
Code;  c015e486 
   3:   50pushl  %eax
Code;  c015e487 
   4:   e8 44 78 05 00call   5784d <_EIP+0x5784d> c01b5cd0 

Code;  c015e48c 
   9:   89 d8 movl   %ebx,%eax
Code;  c015e48e 
   b:   83 c4 04  addl   $0x4,%esp
Code;  c015e491 
   e:   85 c0 testl  %eax,%eax
Code;  c015e493 
  10:   75 eb jnefffd <_EIP+0xfffd> c015e480 

Code;  c015e495 
  12:   31 c0 xorl   %eax,%eax 

Latest OOPS discovered

Unable to handle kernel paging request at virtual address c839a5b4 printing 
eip:
c8124c70
*pde = 
Oops: 
CPU:0
EIP:0010:[]
EFLAGS: 00010282
eax:    ebx: c839a5b0   ecx: 400ec000   edx: c020f360
esi: 400e8000   edi: c020f360   ebp: 0004   esp: c0097f90
ds: 0018es: 0018ss: 0018
Process kswapd (pid: 2, stackpage=c0097000)
Stack: c020f360   0015 c0124d51 c020f360 0004 0010
 0027 0008 0028 0054  c0124f0c 0028 0004
 00010f00 0003 0001 0008e000 c0125038 0004 c009bf98 
Call Trace: [] [] [] []
Code: 8b 73 04 55 56 53 57 e8 24 fe ff ff 83 c4 10 85 c0 75 1d 8b

ksymoops output

Oops: 
CPU:0
EIP:0010:[]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010282
eax:    ebx: c839a5b0 ecx: 400ec000   edx: c020f360
esi: 400e8000   edi: c020f360 ebp: 0004   esp: c0097f90
ds: 0018es: 0018   ss: 0018
Process kswapd (pid: 2, stackpage=c0097000)
Stack: c020f360   0015 c0124d51 c020f360 0004 0010
 0027 0008 0028 0054  c0124f0c 0028 0004
 00010f00 0003 0001 0008e000 c0125038 0004 c009bf98 
Call Trace: [] [] [] []
Code: 8b 73 04 55 56 53 57 e8 24 fe ff ff 83 c4 10 85 c0 75 1d 8b
 
>>EIP; c0124c70<=
Trace; c0124d51 
Trace; c0124f0c 
Trace; c0125038 
Trace; c0107518 
Code;  c0124c70 
 <_EIP>:
Code;  c0124c70<=
   0:   8b 73 04  movl   0x4(%ebx),%esi   <=
Code;  c0124c73 
   3:   55pushl  %ebp
Code;  c0124c74 
   4:   56pushl  %esi
Code;  c0124c75 
   5:   53pushl  %ebx
Code;  c0124c76 
   6:   57pushl  %edi
Code;  c0124c77 
   7:   e8 24 fe ff ffcall   fe30 <_EIP+0xfe30> c0124aa0 

Code;  c0124c7c 
   c:   83 c4 10  addl   $0x10,%esp
Code;  c0124c7f 
   f:   85 c0 testl  %eax,%eax
Code;  c0124c81 
  11:   75 1d jne30 <_EIP+0x30> c0124ca0 

Code;  c0124c83 
  13:   8b 00 movl   (%eax),%eax
 
 
1 warning and 1 error issued.  Results may not be reliable.


Michael Peddemors - Senior Consultant
Unix Administration - WebSite Hosting
Network Services - Programming
Wizard Internet Services http://www.wizard.ca
Linux Support Specialist - http://www.linuxmagic.com

(604) 589-0037 Beautiful British 

[OOPS] in 2.4.0-test8 occuring in low memory machines

2000-09-15 Thread Michael Peddemors

Sorry I can't be more explicit in checking this out, still working my way 
through definitive situations where these occur, but seem to be in low memory 
machines, running initrd.gz minix filesystems..

I started gettting OOPS soon after running a patch to rd.c to allow for 
encrypted initrd.gz, and I thought it was something to do with the patch, but 
it seems this is a deeper issue, because we are now getting it even when 
using an unencrypted initrd.gz.  

Only seems to happen on Pentium/486 class machines with 8-16 MG RAM
Also, we are running a minix file system. 

First OOPS occured after gunzip routine completed, while using the encrypted 
initrd.gz..  (Unencrypted OOPS below)

Not a master of ksymoops, but included it incase it helps.

Unable to handle kernel paging request at virtual address 8140c35b
 printing eip:
c015e483
*pde = 
Oops: 
CPU:0
EIP:0010:[c015e483]
EFLAGS: 00010293
eax: 8140c357   ebx: 8140c35f   ecx: c10952d0   edx: c10951d0
esi: 0042   edi:    ebp: 000a   esp: c1ffd824
ds: 0018es: 0018ss: 0018
Process swapper (pid: 1, stackpage=c1ffd000)
Stack: 0008 c015f1e4 c1f04008 0005 001d  c1ffdd8c
 c1ffd874 c1ffd870 c1ffd86c 001e 011e 0012 013c 007f
 c1f19408 0006 c1f04008 0009 0005 0006 0007 0007
Call Trace: [c015f1e4] [c015f2e9] [f0708b1f] [c015f366] [f0708b1f] 
[c015f753] [c011a28d] [c0100018] [c01070e7] [c0107518]
Code: 8b 58 04 50 e8 44 78 05 00 89 d8 83 c4 04 85 c0 75 eb 31 c0
Kernel panic: Attempted to kill init!



EIP; c015e483 rd_request+d3/190   =
Trace; c015f1e4 inflate_codes+454/470
Trace; c015f2e9 inflate_stored+e9/1b0
Trace; f0708b1f END_OF_CODE+304c98eb/
Trace; c015f366 inflate_stored+166/1b0
Trace; f0708b1f END_OF_CODE+304c98eb/
Trace; c015f753 inflate_dynamic+253/600
Trace; c011a28d proc_dointvec_jiffies+1d/30
Trace; c0100018 startup_32+18/13b
Trace; c01070e7 init+7/110
Trace; c0107518 kernel_thread+28/40
Code;  c015e483 rd_request+d3/190
 _EIP:
Code;  c015e483 rd_request+d3/190   =
   0:   8b 58 04  movl   0x4(%eax),%ebx   =
Code;  c015e486 rd_request+d6/190
   3:   50pushl  %eax
Code;  c015e487 rd_request+d7/190
   4:   e8 44 78 05 00call   5784d _EIP+0x5784d c01b5cd0 
find_best_ips_proto+130/210
Code;  c015e48c rd_request+dc/190
   9:   89 d8 movl   %ebx,%eax
Code;  c015e48e rd_request+de/190
   b:   83 c4 04  addl   $0x4,%esp
Code;  c015e491 rd_request+e1/190
   e:   85 c0 testl  %eax,%eax
Code;  c015e493 rd_request+e3/190
  10:   75 eb jnefffd _EIP+0xfffd c015e480 
rd_request+d0/190
Code;  c015e495 rd_request+e5/190
  12:   31 c0 xorl   %eax,%eax 

Latest OOPS discovered

Unable to handle kernel paging request at virtual address c839a5b4 printing 
eip:
c8124c70
*pde = 
Oops: 
CPU:0
EIP:0010:[c0124c70]
EFLAGS: 00010282
eax:    ebx: c839a5b0   ecx: 400ec000   edx: c020f360
esi: 400e8000   edi: c020f360   ebp: 0004   esp: c0097f90
ds: 0018es: 0018ss: 0018
Process kswapd (pid: 2, stackpage=c0097000)
Stack: c020f360   0015 c0124d51 c020f360 0004 0010
 0027 0008 0028 0054  c0124f0c 0028 0004
 00010f00 0003 0001 0008e000 c0125038 0004 c009bf98 
Call Trace: [c0124d51] [c0124f0c] [c0125038] [c0107518]
Code: 8b 73 04 55 56 53 57 e8 24 fe ff ff 83 c4 10 85 c0 75 1d 8b

ksymoops output

Oops: 
CPU:0
EIP:0010:[c0124c70]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010282
eax:    ebx: c839a5b0 ecx: 400ec000   edx: c020f360
esi: 400e8000   edi: c020f360 ebp: 0004   esp: c0097f90
ds: 0018es: 0018   ss: 0018
Process kswapd (pid: 2, stackpage=c0097000)
Stack: c020f360   0015 c0124d51 c020f360 0004 0010
 0027 0008 0028 0054  c0124f0c 0028 0004
 00010f00 0003 0001 0008e000 c0125038 0004 c009bf98 
Call Trace: [c0124d51] [c0124f0c] [c0125038] [c0107518]
Code: 8b 73 04 55 56 53 57 e8 24 fe ff ff 83 c4 10 85 c0 75 1d 8b
 
EIP; c0124c70 swap_out_mm+30/70   =
Trace; c0124d51 swap_out+a1/f0
Trace; c0124f0c do_try_to_free_pages+16c/200
Trace; c0125038 kswapd+98/a0
Trace; c0107518 kernel_thread+28/40
Code;  c0124c70 swap_out_mm+30/70
 _EIP:
Code;  c0124c70 swap_out_mm+30/70   =
   0:   8b 73 04  movl   0x4(%ebx),%esi   =
Code;  c0124c73 swap_out_mm+33/70
   3:   55pushl  %ebp
Code;  c0124c74 swap_out_mm+34/70
   4:   56pushl  %esi
Code;  c0124c75 swap_out_mm+35/70
   5:   53pushl  %ebx
Code;  c0124c76 swap_out_mm+36/70
   6:   57pushl  %edi
Code;  c0124c77 swap_out_mm+37/70
   7: