LKML Archive on lore.kernel.org
help / color / mirror / Atom feed
From: Marat BN <maratbn@yahoo.com>
To: linux-kernel@vger.kernel.org
Subject: Kernel oops
Date: Mon, 3 Jan 2005 13:10:23 -0800 (PST)	[thread overview]
Message-ID: <20050103211024.21792.qmail@web53708.mail.yahoo.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 666 bytes --]

Please find the attached text files containing 2.6.10
kernel Oops messages 
sent out by the kernel to via the serial port.  The
2.6.10 kernel was 
compiled with all debugging support enabled.  It was
running on a Gentoo 
machine.

At the time of the Oops, one process was doing
iterations of capturing 100 
frames each via BTTV and another was tar untarring a
huge file.

Please let me know what other information you require
and/or if this should 
be sent to other people/organizations/mailing lists.

Thanks,
Marat 



		
__________________________________ 
Do you Yahoo!? 
Yahoo! Mail - now with 250MB free storage. Learn more.
http://info.mail.yahoo.com/mail_250

[-- Attachment #2: oops-2.6.10-2005-01-03-03 --]
[-- Type: application/octet-stream, Size: 3726 bytes --]

Oops: 0002 [#1]
DEBUG_PAGEALLOC
Modules linked in: ipv6 usbcore bttv video_buf firmware_class i2c_algo_bit v4l2_common btcx_risc i2c_core videodev eepro100 mii ide_tape st
CPU:    0
EIP:    0060:[<c014869a>]    Not tainted VLI
EFLAGS: 00010046   (2.6.10) 
EIP is at cache_alloc_refill+0x17a/0x340
eax: 23232323   ebx: c123cac0   ecx: c123cac0   edx: c123cacc
esi: c1b0d000   edi: ffffffff   ebp: c2e6dd90   esp: c2e6dd70
ds: 007b   es: 007b   ss: 0068
Process rm (pid: 6276, threadinfo=c2e6d000 task=cd590aa0)
Stack: c1b0d018 c2e6dd94 c1240f48 c123cacc c1240f38 c123cac0 00000246 00000050 
       c2e6ddac c0148d54 c123cac0 00000050 00000000 00000000 00001000 c2e6ddc0 
       c016aec3 c123cac0 00000050 00000000 c2e6ddd8 c01684d7 00000050 c10dfbe0 
Call Trace:
 [<c0103435>] show_stack+0x75/0x90
 [<c0103589>] show_registers+0x119/0x180
 [<c01037c9>] die+0x129/0x270
 [<c010f7a8>] do_page_fault+0x328/0x695
 [<c0102fbb>] error_code+0x2b/0x30
 [<c0148d54>] kmem_cache_alloc+0x64/0x80
 [<c016aec3>] alloc_buffer_head+0x13/0x30
 [<c01684d7>] alloc_page_buffers+0x27/0xb0
 [<c0168647>] grow_dev_page+0x77/0x250
 [<c01688ae>] __getblk_slow+0x8e/0x120
 [<c0168d64>] __getblk+0x44/0x50
 [<c0168dc4>] __bread+0x14/0x40
 [<c01e405a>] ext3_free_branches+0xba/0x1f0
 [<c01e453b>] ext3_truncate+0x3ab/0x500
 [<c01e1cb6>] ext3_delete_inode+0xb6/0xe0
 [<c01877e3>] generic_delete_inode+0xd3/0x2c0
 [<c0187cea>] iput+0x5a/0x90
 [<c0179811>] sys_unlink+0xd1/0x130
 [<c0102d57>] syscall_call+0x7/0xb
Code: e0 66 8b 14 41 66 c7 04 41 fe ff 66 89 56 14 8b 43 3c 39 46 10 73 06 4f 83 ff ff 75 94 56 53 e8 ad fd ff ff 59 58 8b 56 04 8b 06 <89> 50 04 89 02 66 83 7e 14 ff c7 06 00 01 10 00 c7 46 04 00 02 
 bttv0: next set: top=c5a76ef8 bottom=c5a76ef8 [screen=00000000,irq=1,0]
bttv0: next set: top=c5a76ef8 bottom=c5a76ef8 [screen=00000000,irq=1,0]
bttv0: next set: top=c5a76ef8 bottom=c5a76ef8 [screen=00000000,irq=1,0]
bttv0: next set: top=c5a76ef8 bottom=c5a76ef8 [screen=00000000,irq=1,0]
bttv0: next set: top=c5a76ef8 bottom=c5a76ef8 [screen=00000000,irq=1,0]
bttv0: IRQ lockup, cleared int mask [bits: VSYNC* HSYNC OFLOW RISCI*]
bttv0: timeout: drop=15 irq=3037/3037, risc=0ab9a270, bits: VSYNC HSYNC OFLOW RISCI FBUS
mm/slab.c:2768: spin_lock(mm/slab.c:c123cb04) already locked by mm/slab.c/1976
Unable to handle kernel paging request at virtual address 23232327
 printing eip:
c0148a14
*pde = 00000000
Oops: 0002 [#2]
DEBUG_PAGEALLOC
Modules linked in: ipv6 usbcore bttv video_buf firmware_class i2c_algo_bit v4l2_common btcx_risc i2c_core videodev eepro100 mii ide_tape st
CPU:    0
EIP:    0060:[<c0148a14>]    Not tainted VLI
EFLAGS: 00010016   (2.6.10) 
EIP is at free_block+0x54/0x150
eax: 23232323   ebx: c1b0d000   ecx: 00000002   edx: c123cacc
esi: c123cac0   edi: c1b0d7a4   ebp: c1286efc   esp: c1286ee8
ds: 007b   es: 007b   ss: 0068
Process events/0 (pid: 3, threadinfo=c1286000 task=c1291aa0)
Stack: c3b27018 00000002 c1240f48 c1240f38 00000007 c1286f20 c01494e0 c123cac0 
       c1240f48 00000007 c123cac0 c123cac0 c049f520 c1290f38 c1286f50 c01495d2 
       c123cac0 c1240f38 00000000 00000001 00000e14 c123cb48 000000fe 00000000 
Call Trace:
 [<c0103435>] show_stack+0x75/0x90
 [<c0103589>] show_registers+0x119/0x180
 [<c01037c9>] die+0x129/0x270
 [<c010f7a8>] do_page_fault+0x328/0x695
 [<c0102fbb>] error_code+0x2b/0x30
 [<c01494e0>] drain_array_locked+0x70/0xb0
 [<c01495d2>] cache_reap+0xb2/0x360
 [<c012bbd2>] worker_thread+0x1f2/0x3e0
 [<c0131cd4>] kthread+0xa4/0xb0
 [<c0100805>] kernel_thread_helper+0x5/0x10
Code: 65 f4 5b 5e 5f 5d c3 8b 4d f0 8b 45 0c 8b 3c 88 8d 87 00 00 00 40 c1 e8 0c 8b 15 50 f6 49 c0 c1 e0 05 8b 5c 02 1c 8b 53 04 8b 03 <89> 50 04 89 02 c7 43 04 00 02 20 00 c7 03 00 01 10 00 89 f8 2b 
 

[-- Attachment #3: oops-2.6.10-2005-01-03-01 --]
[-- Type: application/octet-stream, Size: 2113 bytes --]

Oops: 0002 [#1]
DEBUG_PAGEALLOC
Modules linked in: ipv6 usbcore bttv video_buf firmware_class i2c_algo_bit v4l2_common btcx_risc i2c_core videodev eepro100 mii ide_tape st
CPU:    0
EIP:    0060:[<c0148a14>]    Not tainted VLI
EFLAGS: 00010012   (2.6.10) 
EIP is at free_block+0x54/0x150
eax: 23232323   ebx: c3fdc000   ecx: 00000003   edx: c3b7d000
esi: ce8a02e0   edi: c3fdca38   ebp: ce196d50   esp: ce196d3c
ds: 007b   es: 007b   ss: 0068
Process kjournald (pid: 758, threadinfo=ce196000 task=ce069aa0)
Stack: c8c55018 00000003 ce8a02e0 ce8a02e0 c3fdcab0 ce196d78 c0148bb0 ce8a02e0 
       ce8b9f48 00000010 ce8b9f48 00000010 ce8b9f38 ce8a02e0 c3fdcab0 ce196d98 
       c0148ef9 ce8a02e0 ce8b9f38 00000202 c3559370 c3fdcab4 c3fdcae4 ce196dac 
Call Trace:
 [<c0103435>] show_stack+0x75/0x90
 [<c0103589>] show_registers+0x119/0x180
 [<c01037c9>] die+0x129/0x270
 [<c010f7a8>] do_page_fault+0x328/0x695
 [<c0102fbb>] error_code+0x2b/0x30
 [<c0148bb0>] cache_flusharray+0xa0/0x1e0
 [<c0148ef9>] kmem_cache_free+0x59/0x60
 [<c01ff5d7>] journal_free_journal_head+0x27/0x30
 [<c01ff91a>] journal_remove_journal_head+0x3a/0x70
 [<c01f816f>] journal_commit_transaction+0x1dbf/0x2590
 [<c01fbc56>] kjournald+0x1e6/0x700
 [<c0100805>] kernel_thread_helper+0x5/0x10
Code: 65 f4 5b 5e 5f 5d c3 8b 4d f0 8b 45 0c 8b 3c 88 8d 87 00 00 00 40 c1 e8 0c 8b 15 50 f6 49 c0 c1 e0 05 8b 5c 02 1c 8b 53 04 8b 03 <89> 50 04 89 02 c7 43 04 00 02 20 00 c7 03 00 01 10 00 89 f8 2b 
 bttv0: next set: top=ccdeaef8 bottom=ccdeaef8 [screen=00000000,irq=1,0]
bttv0: next set: top=ccdeaef8 bottom=ccdeaef8 [screen=00000000,irq=1,0]
bttv0: next set: top=00000000 bottom=00000000 [screen=00000000,irq=0,0]
bttv0: next set: top=00000000 bottom=00000000 [screen=00000000,irq=0,0]
bttv0: next set: top=00000000 bottom=00000000 [screen=00000000,irq=0,0]
bttv0: IRQ lockup, cleared int mask [bits: VSYNC* HSYNC RISCI*]
mm/slab.c:2768: spin_lock(mm/slab.c:ce8a0324) already locked by mm/slab.c/2196
fs/jbd/transaction.c:978: spin_lock(fs/jbd/journal.c:ce2c1f6c) already locked by fs/jbd/commit.c/339
bttv0: buffer field: interlaced  format: 4:2:0,

[-- Attachment #4: oops-2.6.10-2005-01-03-02 --]
[-- Type: application/octet-stream, Size: 1283 bytes --]

Oops: 0002 [#1]
DEBUG_PAGEALLOC
Modules linked in: ipv6 usbcore bttv video_buf firmware_class i2c_algo_bit v4l2_common btcx_risc i2c_core videodev eepro100 mii ide_tape st
CPU:    0
EIP:    0060:[<c01e8939>]    Not tainted VLI
EFLAGS: 00010246   (2.6.10) 
EIP is at ext3_orphan_add+0x139/0x290
eax: c9c09df8   ebx: 00000000   ecx: 00000000   edx: cdb44e0c
esi: cd16fe0c   edi: c94c4bf8   ebp: ccd68f18   esp: ccd68ef4
ds: 007b   es: 007b   ss: 0068
Process rm (pid: 6071, threadinfo=ccd68000 task=ccd6aaa0)
Stack: cd16fd44 cd16fe0c ce192ab4 00000a00 00000051 cd16fe44 c56982ec cd16fe44 
       ce1925c8 ccd68f44 c01e8e8c c56982ec cd16fe44 00000000 cd16d1c0 cd7def58 
       cd7def58 cd16fe44 cd7def58 cd3f9e44 ccd68f60 c01793cb cd3f9e44 cd7def58 
Call Trace:
 [<c0103435>] show_stack+0x75/0x90
 [<c0103589>] show_registers+0x119/0x180
 [<c01037c9>] die+0x129/0x270
 [<c010f7a8>] do_page_fault+0x328/0x695
 [<c0102fbb>] error_code+0x2b/0x30
 [<c01e8e8c>] ext3_rmdir+0x12c/0x1a0
 [<c01793cb>] vfs_rmdir+0x16b/0x210
 [<c017950a>] sys_rmdir+0x9a/0xf0
 [<c0102d57>] syscall_call+0x7/0xb
Code: e4 56 8b 45 0c 50 8b 45 08 50 e8 13 cc ff ff 83 c4 0c 85 db 75 3c 85 c0 89 c3 75 36 8b 87 e0 01 00 00 8b 75 e0 8b 90 08 01 00 00 <89> 72 04 8b 75 0c 89 56 c8 8b 55 e0 8d 88 08 01 00 00 89 4a 04 

             reply	other threads:[~2005-01-03 21:23 UTC|newest]

Thread overview: 61+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-03 21:10 Marat BN [this message]
2005-01-05 10:13 ` Andrew Morton
  -- strict thread matches above, loose matches on Subject: below --
2008-07-23 12:52 kernel oops Andrei Popa
2008-07-23 17:11 ` Vegard Nossum
2008-08-18 16:33   ` Vegard Nossum
2008-08-18 16:39     ` Greg KH
     [not found] <e8eb01770803120245x7690e6a9te8ad04296aa3fc4d@mail.gmail.com>
2008-03-12  9:49 ` Zbynek Drlik
2008-03-12 10:33   ` Al Viro
2008-03-12 13:12     ` Zbynek Drlik
2008-02-05 12:57 Andrej Hocevar
2008-02-06 17:55 ` Len Brown
2006-09-12 10:21 Kernel Oops Marcin Prączko
2006-09-13  3:43 ` Andrew Morton
2005-10-15  1:03 Marc Perkel
2005-10-15  1:21 ` Randy.Dunlap
2005-10-15  1:43   ` Marc Perkel
2005-10-15  1:52     ` Randy.Dunlap
2004-06-11  7:27 Kernel oops tmp
2004-05-24 20:19 tmp
2004-05-16 12:08 Kernel OOPS tmp
2004-05-16 23:27 ` Andrew Morton
2004-05-17  0:33   ` tmp
2004-03-09 22:13 Kernel oops Philipp Baer
2004-03-09 23:11 ` Andrew Morton
2004-03-12  7:46   ` Philipp Baer
2004-02-08 11:05 Kernel Oops Mathieu LESNIAK
2004-02-08 16:35 ` Greg KH
2004-02-09  7:06   ` Mathieu LESNIAK
2003-11-28 23:15 Kernel oops Ville Jutvik
2003-11-28  5:45 Anderson Levi
2003-08-09 12:39 kernel oops Jean-Yves LENHOF
2003-08-09 20:37 ` Jean-Yves LENHOF
2003-08-09  9:28 Jean-Yves LENHOF
2003-07-18 19:44 Kernel OOPS Robert Scussel
2003-07-18 21:31 ` Alan Cox
2003-07-07 12:53 kernel oops Anders Karlsson
2003-07-07 13:14 ` Alan Cox
2003-07-07 13:32   ` Anders Karlsson
2003-07-07 13:37     ` Alan Cox
2003-07-07 13:56       ` Anders Karlsson
2003-07-08  9:39         ` Marcelo Tosatti
     [not found] ` <200307072009.50677.bernd-schubert@web.de>
2003-07-08  5:13   ` Anders Karlsson
2003-05-31  1:32 Nadeem Riaz
2003-03-26 15:52 Steve Terrell
2003-02-03  1:18 Kernel Oops Daniel Espinoza
2003-02-03  3:23 ` vishwas
2002-08-09  5:25 sanket rathi
2002-06-23 19:39 Dirk Schmidt
2002-06-10  8:46 kernel oops Robert Litwiniec
2002-02-26 18:26 Suporte RedeBonja
2002-02-27 13:35 ` Erik Mouw
2001-11-13 13:23 Kernel oops Anthony
2001-11-14  6:02 ` Thiago Rondon
2001-10-08 12:59 kernel oops Terry Kendal
2001-09-27  9:49 kewl
2001-06-01 15:13 Kernel oops David Harris
2001-06-01 15:12 David Harris
2001-04-19 18:32 kernel oops Ronald Bultje
2001-04-19 19:04 ` Alan Cox
2001-04-19 19:08   ` Ronald Bultje
2001-02-19 14:44 Kernel Oops Alberto Bertogli

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050103211024.21792.qmail@web53708.mail.yahoo.com \
    --to=maratbn@yahoo.com \
    --cc=linux-kernel@vger.kernel.org \
    --subject='Re: Kernel oops' \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).