Bug 6580
Summary: | kernel panic | ||
---|---|---|---|
Product: | Other | Reporter: | david (dsiukaev) |
Component: | Other | Assignee: | Diego Calleja (diegocg) |
Status: | REJECTED INVALID | ||
Severity: | high | CC: | diegocg |
Priority: | P2 | ||
Hardware: | i386 | ||
OS: | Linux | ||
Kernel Version: | 2.4.32 | Subsystem: | |
Regression: | --- | Bisected commit-id: | |
Attachments: |
screenshot
sreenshot |
Description
david
2006-05-18 23:42:52 UTC
Created attachment 8145 [details]
screenshot
screenshot
You need to run it through ksymoops to decode it. Hopefully there's a copy stashed in /var/log/messages somewhere you can use. Created attachment 8195 [details]
sreenshot
I've decoded logs by ksymoops but it don't gave me any information.
Today server crashed again with the another errors(see in new attached
screenshot)
I've printed the text from the screenshots and decoded them using ksymoops and this gave me the following result: 1)here is a decoded text from the oops file of an old crash ksymoops 2.4.9 on i686 2.4.32. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.32/ (default) -m /boot/System.map-2.4.32 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Oops: 0000 CPU: 0 EIP: 0010:[<f88f8967>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010286 eax: 67697300 ebx: f7bf3b08 ecx: 000001c0 edx: f7bf3b08 esi: f7a2c800 edi: f7bf3b08 ebp: f7a2c980 esp: c0273b4c ds: 0018 es: 0018 ss:0018 Process swapper (pid: 0, stackpage=c0273000) Stack: f7a2c800 00003002 00000001 00000000 f79d0380 00000007 0000dc00 f7bf3aa0 f7a2c800 f7bf3b08 f054a340 c01e5059 f7bf3b08 f7a2c800 f7a2c800 00000000 c0272000 c01da57f f7a2c800 f7bf3aa0 f7eaf8e0 f7eaf908 eccb242c c01f1e0c Call Trace: [<c01e5059>] [<c01da57f>] [<c01f1e0c>] [<c01f1d60>] [<c01f1d60>] [<c01e4633>] [<c01f1d60>] [<c01f1d60>] [<c01f0730>] [<c01f1d60>] [<c01f1f41>] [<c01f1e80>] [<c01f1e80>] [<c01e4633>] [<c01f1e80>] [<c01f0c07>] [<c01f1e80>] [<f892286d>] [<c0208c9d>] [<c02030d5>] [<c0205a25>] [<c020132a>] [<c022016f>] [<c0209e0a>] [<c020a3ef>] [<c01ed7c5>] [<c01ed670>] [<c01e4633>] [<c01ed670>] [<c01ed7e0>] [<c01ed1ff>] [<c01ed670>] [<c01ed7e0>] [<c01ed9b9>] [<c01ed7e0>] [<c01e4633>] [<c01ed7e0>] [<c01ed60d>] [<c01ed7e0>] [<c01dab94>] [<c01daced>] [<c01dae65>] [<c011d756>] [<c0109276>] [<c0105330>] [<c010b918>] [<c0105330>] [<c010535c>] [<c01053f2>] [<c0105000>] Code: 8b 78 04 85 ff 0f 85 de 00 00 00 8f 5c 24 30 8b 4c 24 14 8b >>EIP; f88f8967 <[3c59x]boomerang_start_xmit+d7/2f0> <===== >>ebx; f7bf3b08 <_end+379047c8/38606d20> >>edx; f7bf3b08 <_end+379047c8/38606d20> >>esi; f7a2c800 <_end+3773d4c0/38606d20> >>edi; f7bf3b08 <_end+379047c8/38606d20> >>ebp; f7a2c980 <_end+3773d640/38606d20> >>esp; c0273b4c <init_task_union+1b4c/2000> Trace; c01e5059 <qdisc_restart+69/1a0> Trace; c01da57f <dev_queue_xmit+23f/330> Trace; c01f1e0c <ip_finish_output2+ac/120> Trace; c01f1d60 <ip_finish_output2+0/120> Trace; c01f1d60 <ip_finish_output2+0/120> Trace; c01e4633 <nf_hook_slow+133/210> Trace; c01f1d60 <ip_finish_output2+0/120> Trace; c01f1d60 <ip_finish_output2+0/120> Trace; c01f0730 <ip_output+190/1a0> Trace; c01f1d60 <ip_finish_output2+0/120> Trace; c01f1f41 <ip_queue_xmit2+c1/239> Trace; c01f1e80 <ip_queue_xmit2+0/239> Trace; c01f1e80 <ip_queue_xmit2+0/239> Trace; c01e4633 <nf_hook_slow+133/210> Trace; c01f1e80 <ip_queue_xmit2+0/239> Trace; c01f0c07 <ip_queue_xmit+4c7/590> Trace; c01f1e80 <ip_queue_xmit2+0/239> Trace; f892286d <[iptable_nat]ip_nat_setup_info+35d/3c0> Trace; c0208c9d <tcp_v4_send_check+4d/e0> Trace; c02030d5 <tcp_transmit_skb+3f5/6c0> Trace; c0205a25 <tcp_send_ack+85/d0> Trace; c020132a <tcp_rcv_established+2aa/9d0> Trace; c022016f <ipt_do_table+22f/400> Trace; c0209e0a <tcp_v4_do_rcv+13a/140> Trace; c020a3ef <tcp_v4_rcv+5df/6c0> Trace; c01ed7c5 <ip_local_deliver_finish+155/170> Trace; c01ed670 <ip_local_deliver_finish+0/170> Trace; c01e4633 <nf_hook_slow+133/210> Trace; c01ed670 <ip_local_deliver_finish+0/170> Trace; c01ed7e0 <ip_rcv_finish+0/23f> Trace; c01ed1ff <ip_local_deliver+1bf/1f0> Trace; c01ed670 <ip_local_deliver_finish+0/170> Trace; c01ed7e0 <ip_rcv_finish+0/23f> Trace; c01ed9b9 <ip_rcv_finish+1d9/23f> Trace; c01ed7e0 <ip_rcv_finish+0/23f> Trace; c01e4633 <nf_hook_slow+133/210> Trace; c01ed7e0 <ip_rcv_finish+0/23f> Trace; c01ed60d <ip_rcv+3dd/440> Trace; c01ed7e0 <ip_rcv_finish+0/23f> Trace; c01dab94 <netif_receive_skb+e4/1b0> Trace; c01daced <process_backlog+8d/130> Trace; c01dae65 <net_rx_action+d5/180> Trace; c011d756 <do_softirq+d6/e0> Trace; c0109276 <do_IRQ+e6/f0> Trace; c0105330 <default_idle+0/50> Trace; c010b918 <call_do_IRQ+5/d> Trace; c0105330 <default_idle+0/50> Trace; c010535c <default_idle+2c/50> Trace; c01053f2 <cpu_idle+52/70> Trace; c0105000 <_stext+0/0> Code; f88f8967 <[3c59x]boomerang_start_xmit+d7/2f0> 00000000 <_EIP>: Code; f88f8967 <[3c59x]boomerang_start_xmit+d7/2f0> <===== 0: 8b 78 04 mov 0x4(%eax),%edi <===== Code; f88f896a <[3c59x]boomerang_start_xmit+da/2f0> 3: 85 ff test %edi,%edi Code; f88f896c <[3c59x]boomerang_start_xmit+dc/2f0> 5: 0f 85 de 00 00 00 jne e9 <_EIP+0xe9> Code; f88f8972 <[3c59x]boomerang_start_xmit+e2/2f0> b: 8f 5c 24 30 popl 0x30(%esp) Code; f88f8976 <[3c59x]boomerang_start_xmit+e6/2f0> f: 8b 4c 24 14 mov 0x14(%esp),%ecx Code; f88f897a <[3c59x]boomerang_start_xmit+ea/2f0> 13: 8b 00 mov (%eax),%eax <0>Kernel panic: Aiee, killing interrupt handler! 1 warning issued. Results may not be reliable. 2)this is information we've got after decoding oops file of new crash ksymoops 2.4.9 on i686 2.4.32. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.32/ (default) -m /boot/System.map-2.4.32 (default) Unable to handle kernel paging request at virtual address 00001004 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<c013f506>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010206 eax: c02633a0 ebx: 2c77f8f1 ecx: c3b49800 edx: 00001000 esi: 004a352a edi: 00000010 ebp: 00000307 esp: f6fc3e40 ds: 0018 es: 0018 ss: 0018 Process squid (pid: 382, stackpage=f6fc3000) Stack: 00001000 00000000 dd2c5c00 0000000b c0140436 00000307 004a352a 00001000 00001000 c014083e d6e036e0 0000000b d6e036e0 00000001 d6e036e0 da76d000 f6fc3e90 00001000 00000000 d6e036e0 0000000a dd2c5c00 c14f6490 cb4e5c40 Call Trace: [<c0140436>] [<c014083e>] [<c0141169>] [<c016c290>] [<c016c8ed>] [<c016c290>] [<c0133ccf>] [<c012ee3e>] [<c012f406>] [<c01da9d7>] [<c0169d59>] [<c013d939>] [<c010724b>] Code: 39 72 04 89 d1 75 f3 0f b7 42 08 3b 44 24 1c 75 e9 66 39 6a >>EIP; c013f506 <get_hash_table+66/90> <===== >>eax; c02633a0 <hash_table_lock+0/20> >>ecx; c3b49800 <_end+385a4c0/38606d20> >>esp; f6fc3e40 <_end+36cd4b00/38606d20> Trace; c0140436 <unmap_underlying_metadata+26/80> Trace; c014083e <__block_prepare_write+1ce/330> Trace; c0141169 <block_prepare_write+39/a0> Trace; c016c290 <ext3_get_block+0/90> Trace; c016c8ed <ext3_prepare_write+cd/260> Trace; c016c290 <ext3_get_block+0/90> Trace; c0133ccf <lru_cache_add+6f/80> Trace; c012ee3e <do_generic_file_write+23e/4a0> Trace; c012f406 <generic_file_write+126/140> Trace; c01da9d7 <net_tx_action+57/130> Trace; c0169d59 <ext3_file_write+39/c0> Trace; c013d939 <sys_write+99/110> Trace; c010724b <system_call+33/38> Code; c013f506 <get_hash_table+66/90> 00000000 <_EIP>: Code; c013f506 <get_hash_table+66/90> <===== 0: 39 72 04 cmp %esi,0x4(%edx) <===== Code; c013f509 <get_hash_table+69/90> 3: 89 d1 mov %edx,%ecx Code; c013f50b <get_hash_table+6b/90> 5: 75 f3 jne fffffffa <_EIP+0xfffffffa> Code; c013f50d <get_hash_table+6d/90> 7: 0f b7 42 08 movzwl 0x8(%edx),%eax Code; c013f511 <get_hash_table+71/90> b: 3b 44 24 1c cmp 0x1c(%esp),%eax Code; c013f515 <get_hash_table+75/90> f: 75 e9 jne fffffffa <_EIP+0xfffffffa> Code; c013f517 <get_hash_table+77/90> 11: 66 39 6a 00 cmp %bp,0x0(%edx) Both of oops files were printed from the screenshots please answer me. ist's realy important.thx I find weird that you have one oops in the networking stack and other in the filesystem code. Could you try to pass memtest86? It's DDR module problem!!! I've pass memtest86+ and it gives me many errors Thanks Mr Garsia !!!!!!!!!! Best Regards D.S. Closing bug |