Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Wed, 7 Aug 2002 12:26:15 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Wed, 7 Aug 2002 12:26:15 -0400 Received: from os.inf.tu-dresden.de ([141.76.48.99]:133 "EHLO os.inf.tu-dresden.de") by vger.kernel.org with ESMTP id ; Wed, 7 Aug 2002 12:25:53 -0400 Date: Wed, 7 Aug 2002 18:29:32 +0200 From: Adam Lackorzynski To: linux-kernel@vger.kernel.org Subject: Oopses on dual Athlon with 2.4.19-ac4 and 2.4.20-pre1-ac1 Message-ID: <20020807162932.GH23816@os.inf.tu-dresden.de> Mail-Followup-To: linux-kernel@vger.kernel.org Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline User-Agent: Mutt/1.3.28i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6706 Lines: 184 Hi, I have a dual Athlon here which ooopses after 2 minutes of dnetc when running 2.4.19-ac4 or 2.4.20-pre1-ac1. I cannot reproduce this with 2.4.19 or 2.4.20-pre1. The two Athlons are sitting on a A7M266-D. I have put the kern log, kernel config, lspci info etc. on http://os.inf.tu-dresden.de/~adam/oops/ as this is quite big. 2.4.20-pre1-ac1: Unable to handle kernel NULL pointer dereference at virtual address 0000002a printing eip: c011831c *pde = 00000000 Oops: 0000 CPU: 1 EIP: 0010:[] Not tainted EFLAGS: 00010007 eax: 0000008c ebx: ffffffd6 ecx: c0395264 edx: ddecc000 esi: c0395240 edi: ddecc02c ebp: ddecdfa4 esp: ddecdf88 ds: 0018 es: 0018 ss: 0018 Process dnetc (pid: 310, stackpage=ddecd000) Stack: ddecc000 c0395264 ddecc02c 00000001 c011521f ddecc000 ddecc000 ddecdfbc c011935d ddecc000 000000c5 000b4aa0 c0395240 bffff7b4 c0108b6b 00000000 00000000 40025004 000000c5 000b4aa0 bffff7b4 0000009e 0000002b 0000002b Call Trace: [] [] [] Code: 8b 4b 54 89 4d f4 8b 72 58 85 c9 75 37 89 73 58 f0 ff 46 14 >>EIP; c011831c <===== >>ebx; ffffffd6 >>ecx; c0395264 >>edx; ddecc000 >>esi; c0395240 >>edi; ddecc02c >>ebp; ddecdfa4 >>esp; ddecdf88 Trace; c011521f Trace; c011935d Trace; c0108b6b Code; c011831c 00000000 <_EIP>: Code; c011831c <===== 0: 8b 4b 54 mov 0x54(%ebx),%ecx <===== Code; c011831f 3: 89 4d f4 mov %ecx,0xfffffff4(%ebp) Code; c0118322 6: 8b 72 58 mov 0x58(%edx),%esi Code; c0118325 9: 85 c9 test %ecx,%ecx Code; c0118327 b: 75 37 jne 44 <_EIP+0x44> c0118360 Code; c0118329 d: 89 73 58 mov %esi,0x58(%ebx) Code; c011832c 10: f0 ff 46 14 lock incl 0x14(%esi) ------------------------------------------------------------ Unable to handle kernel NULL pointer dereference at virtual address 0000002a printing eip: c011831c *pde = 00000000 Oops: 0000 CPU: 1 EIP: 0010:[] Not tainted EFLAGS: 00010003 eax: 0000008c ebx: ffffffd6 ecx: c0395264 edx: dea0c000 esi: c0395240 edi: dea0c02c ebp: dea0dfa4 esp: dea0df88 ds: 0018 es: 0018 ss: 0018 Process dnetc (pid: 307, stackpage=dea0d000) Stack: dea0c000 c0395264 dea0c02c c011521f 00000000 dea0c000 dea0c000 dea0dfbc c011935d dea0c000 000000c5 000be6e0 c0395240 bffff7b4 c0108b6b 00000000 00000000 40025004 000000c5 000be6e0 bffff7b4 0000009e 0000002b 0000002b Call Trace: [] [] [] Code: 8b 4b 54 89 4d f4 8b 72 58 85 c9 75 37 89 73 58 f0 ff 46 14 >>EIP; c011831c <===== >>ebx; ffffffd6 >>ecx; c0395264 >>edx; dea0c000 >>esi; c0395240 >>edi; dea0c02c >>ebp; dea0dfa4 >>esp; dea0df88 Trace; c011521f Trace; c011935d Trace; c0108b6b Code; c011831c 00000000 <_EIP>: Code; c011831c <===== 0: 8b 4b 54 mov 0x54(%ebx),%ecx <===== Code; c011831f 3: 89 4d f4 mov %ecx,0xfffffff4(%ebp) Code; c0118322 6: 8b 72 58 mov 0x58(%edx),%esi Code; c0118325 9: 85 c9 test %ecx,%ecx Code; c0118327 b: 75 37 jne 44 <_EIP+0x44> c0118360 Code; c0118329 d: 89 73 58 mov %esi,0x58(%ebx) Code; c011832c 10: f0 ff 46 14 lock incl 0x14(%esi) 2.4.19-ac4: Unable to handle kernel NULL pointer dereference at virtual address 0000002a printing eip: c01181ac *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010003 eax: 0000008c ebx: ffffffd6 ecx: c038b8a4 edx: de7ce000 esi: c038b880 edi: de7ce02c ebp: de7cffa4 esp: de7cff88 ds: 0018 es: 0018 ss: 0018 Process dnetc (pid: 302, stackpage=de7cf000) Stack: de7ce000 c038b8a4 de7ce02c 00000000 c011521f de7ce000 de7ce000 de7cffbc c01191ed de7ce000 0000003c 00050910 c038b880 bffff7b4 c0108b6b 00000000 00000000 40025004 0000003c 00050910 bffff7b4 0000009e 0000002b 0000002b Call Trace: [] [] [] Code: 8b 4b 54 89 4d f4 8b 72 58 85 c9 75 37 89 73 58 f0 ff 46 14 >>EIP; c01181ac <===== >>ebx; ffffffd6 >>ecx; c038b8a4 >>edx; de7ce000 >>esi; c038b880 >>edi; de7ce02c >>ebp; de7cffa4 >>esp; de7cff88 Trace; c011521f Trace; c01191ed Trace; c0108b6b Code; c01181ac 00000000 <_EIP>: Code; c01181ac <===== 0: 8b 4b 54 mov 0x54(%ebx),%ecx <===== Code; c01181af 3: 89 4d f4 mov %ecx,0xfffffff4(%ebp) Code; c01181b2 6: 8b 72 58 mov 0x58(%edx),%esi Code; c01181b5 9: 85 c9 test %ecx,%ecx Code; c01181b7 b: 75 37 jne 44 <_EIP+0x44> c01181f0 Code; c01181b9 d: 89 73 58 mov %esi,0x58(%ebx) Code; c01181bc 10: f0 ff 46 14 lock incl 0x14(%esi) HTH, Adam -- Adam adam@os.inf.tu-dresden.de Lackorzynski http://os.inf.tu-dresden.de/~adam/ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/