2002-07-15 08:21:56

by Mika Liljeberg

[permalink] [raw]
Subject: [Fwd: kernel BUG at page_alloc.c:207!]

ksymoops 2.4.5 on i686 2.4.17o1-ll-elv-lkcd. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.17o1-ll-elv-lkcd/ (default)
-m /boot/System.map-2.4.17o1-ll-elv-lkcd (default)

Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

No modules in ksyms, skipping objects
Warning (read_lsmod): no symbols in lsmod, is /proc/modules a valid lsmod file?
Jul 14 20:50:46 devil kernel: kernel BUG at page_alloc.c:207!
Jul 14 20:50:46 devil kernel: invalid operand: 0000
Jul 14 20:50:46 devil kernel: CPU: 0
Jul 14 20:50:47 devil kernel: EIP: 0010:[rmqueue+642/788] Not tainted
Jul 14 20:50:47 devil kernel: EFLAGS: 00013286
Jul 14 20:50:47 devil kernel: eax: 00000020 ebx: 00000000 ecx: 0111b4b3 edx: 00005c45
Jul 14 20:50:47 devil kernel: esi: c0333328 edi: c13d0204 ebp: 00000000 esp: d66b3e3c
Jul 14 20:50:47 devil kernel: ds: 0018 es: 0018 ss: 0018
Jul 14 20:50:47 devil kernel: Process XFree86 (pid: 441, stackpage=d66b3000)
Jul 14 20:50:47 devil kernel: Stack: c02cba2b 000000cf c0333488 000001ff d7d96210 00000000 0000d5ad 00003282
Jul 14 20:50:47 devil kernel: c0333334 00000000 c033330c c013908f 000001d2 4357b000 d7d96210 d7d96210
Jul 14 20:50:47 devil kernel: c033330c c0333484 000001d2 ffffffef c0138e0e 00104000 c012c233 4357b000
Jul 14 20:50:47 devil kernel: Call Trace: [__alloc_pages+51/356] [_alloc_pages+22/24] [do_anonymous_page+131/444] [do_no_page+54/584] [handle_mm_fault+157/408]
Jul 14 20:50:48 devil kernel: Code: 0f 0b 83 c4 08 90 8d 74 26 00 8b 47 18 a8 80 74 19 68 d1 00
Using defaults from ksymoops -t elf32-i386 -a i386


>>ecx; 0111b4b3 Before first symbol
>>edx; 00005c45 Before first symbol
>>esi; c0333328 <contig_page_data+c8/340>
>>edi; c13d0204 <END_OF_CODE+fa7f00/????>
>>esp; d66b3e3c <END_OF_CODE+1628bb38/????>

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 08 add $0x8,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8d 74 26 00 lea 0x0(%esi,1),%esi
Code; 0000000a Before first symbol
a: 8b 47 18 mov 0x18(%edi),%eax
Code; 0000000d Before first symbol
d: a8 80 test $0x80,%al
Code; 0000000f Before first symbol
f: 74 19 je 2a <_EIP+0x2a> 0000002a Before first symbol
Code; 00000011 Before first symbol
11: 68 d1 00 00 00 push $0xd1

Jul 14 20:53:09 devil kernel: kernel BUG at page_alloc.c:207!
Jul 14 20:53:09 devil kernel: invalid operand: 0000
Jul 14 20:53:09 devil kernel: CPU: 0
Jul 14 20:53:09 devil kernel: EIP: 0010:[rmqueue+642/788] Not tainted
Jul 14 20:53:09 devil kernel: EFLAGS: 00013286
Jul 14 20:53:09 devil kernel: eax: 00000020 ebx: 00000000 ecx: 0111b4b3 edx: 000066c8
Jul 14 20:53:09 devil kernel: esi: c0333328 edi: c13d01c0 ebp: 00000000 esp: c2d67e3c
Jul 14 20:53:09 devil kernel: ds: 0018 es: 0018 ss: 0018
Jul 14 20:53:09 devil kernel: Process XFree86 (pid: 11493, stackpage=c2d67000)
Jul 14 20:53:09 devil kernel: Stack: c02cba2b 000000cf c0333488 000001ff d7d96a30 00000000 0000d5ac 00003282
Jul 14 20:53:09 devil kernel: c0333328 00000000 c033330c c013908f 000001d2 41c14000 d7d96a30 d7d96a30
Jul 14 20:53:09 devil kernel: c033330c c0333484 000001d2 000152ce c0138e0e 00104000 c012c233 41c14000
Jul 14 20:53:09 devil kernel: Call Trace: [__alloc_pages+51/356] [_alloc_pages+22/24] [do_anonymous_page+131/444] [do_no_page+54/584] [handle_mm_fault+157/408]
Jul 14 20:53:10 devil kernel: Code: 0f 0b 83 c4 08 90 8d 74 26 00 8b 47 18 a8 80 74 19 68 d1 00


>>ecx; 0111b4b3 Before first symbol
>>edx; 000066c8 Before first symbol
>>esi; c0333328 <contig_page_data+c8/340>
>>edi; c13d01c0 <END_OF_CODE+fa7ebc/????>
>>esp; c2d67e3c <END_OF_CODE+293fb38/????>

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 08 add $0x8,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8d 74 26 00 lea 0x0(%esi,1),%esi
Code; 0000000a Before first symbol
a: 8b 47 18 mov 0x18(%edi),%eax
Code; 0000000d Before first symbol
d: a8 80 test $0x80,%al
Code; 0000000f Before first symbol
f: 74 19 je 2a <_EIP+0x2a> 0000002a Before first symbol
Code; 00000011 Before first symbol
11: 68 d1 00 00 00 push $0xd1

Jul 14 20:54:49 devil kernel: Kernel command line: BOOT_IMAGE=New ro root=307 video=matrox:sgram,vesa:261,maxclk:210,fh:100000,fv:85,fastfont:65536 parport=auto ide0=autotune ide1=autotune hdb=scsi apm=power-off,smp-power-off,debug acpi=on devfs=nomount nmi_watchdog=1
Jul 14 20:54:49 devil kernel: activating NMI Watchdog ... done.
Jul 14 20:54:49 devil kernel: testing NMI watchdog ... OK.
Jul 14 20:54:49 devil kernel: cpu: 0, clocks: 997387, slice: 332462
Jul 14 20:54:49 devil kernel: cpu: 1, clocks: 997387, slice: 332462

2 warnings issued. Results may not be reliable.


Attachments:
crash.txt (5.61 kB)