kernel bug ?

Jan ' Kozo ' Vajda jvajda na somi.sk
Středa Květen 19 13:07:07 CEST 1999


:> http://www.spsselib.hiedu.cz/docs/Documentation-linux.kernel/oops-tracing.txt
:> 
:> s pouzitim souboru *.map se dozvime, kde do zbuchlo. Takhle to je jen
:> hromada cisel...

tak som spravil co som mal .. mne to aj takto vyzera ako hromada cisel, ale
snad sa v tom niekto vyzna ..

--
% ksymoops /boot/System.map < /tmp/crash.log

Using /boot/System.map' to map addresses to symbols.

Code: 
Code:  a3 00 18 90 7b   movl   %eax,0x7b901800
Code:  04 00            addb   $0x0,%al
Code:  00 00            addb   %al,(%eax)
Code:  00 00            addb   %al,(%eax)
Code:  00 00            addb   %al,(%eax)
Code:  00 f4            addb   %dh,%ah
Code:  86 6a 1d         xchgb  %ch,0x1d(%edx)
Code:  03 00            addl   (%eax),%eax
Code:  
Segmentation fault (core dumped)
--

preco mi to crashlo neviem .. mam pocit, ze sa k dalsim veciam ani nedostal ...


crash.log vyzeral takto:

--

general protection: 0000
CPU:    0
EIP:    0010:[<0750301a>]
EFLAGS: 00010206
eax: 07503018   ebx: 047b9018   ecx: 01131604   edx: 01131000
esi: 00000154   edi: 00000000   ebp: 700f7036   esp: 00936d48
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Stack: 00141e3f 047b9018 047b9018 011316cc 00142167 047b9018 011316cc 011316cc 
       047b9018 00000000 001503b6 011316cc 00000000 047b9018 05986e14 05986e40 
       7bd39d75 059800ff 00000000 0038b330 c99392c3 028c0cc3 0015a797 00000002
Call Trace: [rt_cache_get_info+267/408] [rt_redirect_1+43/224] [udp_v4_verify_b
       [kmalloc+235/512] [die_if_kernel+175/680] [rt_kick_backlog+81/108] [rt_c
       [def_callback3+23/44] [do_execve+384/428] [die_if_kernel+483/680]
Code: a3 00 18 90 7b 04 00 00 00 00 00 00 00 00 f4 86 6a 1d 03 00
CPU:    0
EIP:    0010:[<0750301a>]
EFLAGS: 00010206
eax: 07503018   ebx: 047b9018   ecx: 00d4820c   edx: 00d48000
esi: 00000144   edi: 00000000   ebp: 001a6184   esp: 06017e94
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Stack: 00141e3f 047b9018 047b9018 00d482c4 00142167 047b9018 00d482c4 00000300 
       00000000 00000300 00142602 00d482c4 00000000 00000300 00d4828e 00186165
       00d482c4 00000000 00000001 00d482c4 001a621c 001a6184 00000000 00000bc4
Call Trace: [rt_cache_get_info+267/408] [rt_redirect_1+43/224] [rt_add+278/1028
       [arp_rcv+393/736] [arp_req_delete+188/200] [arp_req_delete+198/200] [sys
Code: a3 00 18 90 7b 04 00 00 00 00 00 00 00 00 f4 86 6a 1d 03 00
CPU:    0
EIP:    0010:[<0750301a>]
EFLAGS: 00010206
eax: 07503018   ebx: 047b9018   ecx: 07839010   edx: 07839000 
esi: 00000764   edi: 00000000   ebp: 700f7201   esp: 00936e98
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process httpd (pid: 24465, process nr: 58, stackpage=00936000)
Stack: 00141e3f 047b9018 047b9018 078396e8 00142167 047b9018 078396e8 078396e8 
       047b9018 00000000 001503b6 078396e8 00000000 047b9018 05450d18 05450d44 
       7bd39eff 000000ff 00000000 0038b330 c99392c3 028c0cc3 0015a797 00000000
Call Trace: [rt_cache_get_info+267/408] [rt_redirect_1+43/224] [udp_v4_verify_b
       [kmalloc+235/512] [die_if_kernel+175/680]
Code: a3 00 18 90 7b 04 00 00 00 00 00 00 00 00 f4 86 6a 1d 03 00
CPU:    0
EIP:    0010:[<0750301a>]
EFLAGS: 00010206
eax: 07503018   ebx: 047b9018   ecx: 05cb3604   edx: 05cb3000
esi: 00000144   edi: 00000000   ebp: 001a6184   esp: 06119dd4 
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process dosla (pid: 24499, process nr: 38, stackpage=06119000)
Stack: 00141e3f 047b9018 047b9018 05cb36bc 00142167 047b9018 05cb36bc 00000300
       00000000 00000300 00142602 05cb36bc 00000000 00000300 05cb3686 00186165 
       05cb36bc 00000000 00000001 05cb36bc 001a621c 001a6184 00000000 00000bc4 
Call Trace: [rt_cache_get_info+267/408] [rt_redirect_1+43/224] [rt_add+278/1028
       [arp_rcv+393/736] [udp_getfrag_nosum+4/136] [udp_sendto+197/232] [udp_rc
Code: a3 00 18 90 7b 04 00 00 00 00 00 00 00 00 f4 86 6a 1d 03 00 
general protection: 0000
CPU:    0
EIP:    0010:[<0750301a>]
EFLAGS: 00010206
eax: 07503018   ebx: 047b9018   ecx: 01131010   edx: 01131000
esi: 00000144   edi: 00000000   ebp: 700f7202   esp: 00f3f9c8
ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
Process dosla (pid: 24519, process nr: 36, stackpage=00f3f000)
Stack: 00141e3f 047b9018 047b9018 011310c8 00142167 047b9018 011310c8 011310c8
       047b9018 00000000 001503b6 011310c8 00000000 047b9018 05450f10 05450f3c
       7bd39eff 001400ff 00000000 0000b330 c99392c3 028c0cc3 0015a797 00000002
Call Trace: [rt_cache_get_info+267/408] [rt_redirect_1+43/224] [udp_v4_verify_b
       [ip_rt_kill+112/148] [kmalloc+235/512] [will_become_orphaned_pgrp+39/92]
       [def_callback3+4/60] [ip_fw_masquerade+809/1260] [nfs+12169/53248] [nfs+
       [nfs+8568/53248] [nfs+9518/53248] [nfs+8840/53248] [nfs+8568/53248] [nfs
       [nfs+19407/53248] [_namei+213/216] [dquot_initialize+84/228] [isize_to_b
       [die_if_kernel+483/680]
Code: a3 00 18 90 7b 04 00 00 00 00 00 00 00 00 f4 86 6a 1d 03 00
--

		                                   K O Z O 
                		    ===================================
                                      Look At Your Young Man Fighting
                                         Look At Your Woman Crying
                                       Look At Your Young Man Dying
                                    The Way They've Always Done Before



Další informace o konferenci Linux