Package: kernel-image-2.4.26-1-686 Version: 2.4.26-2 Priority: normal I really don't know what caused this (the computer in which this was found is turned on 24h a day and I didn't see the oops, I just found it unresponsive at that time). Digging in the logs (today, now that I had time) I found this at 06:56 two days ago I found this:
------------------------------------------------------------------- Jun 18 06:46:38 xxxx -- MARK -- Jun 18 06:56:46 xxxx kernel: printing eip: Jun 18 06:56:46 xxxx kernel: c0153c3d Jun 18 06:56:46 xxxx kernel: Oops: 0002 Jun 18 06:56:46 xxxx kernel: CPU: 0 Jun 18 06:56:46 xxxx kernel: EIP: 0010:[d_alloc+77/368] Not tainted Jun 18 06:56:46 xxxx kernel: EFLAGS: 00010217 Jun 18 06:56:46 xxxx kernel: eax: 0000000e ebx: 2f7795a0 ecx: 00000003 edx: 2f7795fc Jun 18 06:56:46 xxxx kernel: esi: ce4e0000 edi: 2f7795fc ebp: cfa48620 esp: cd9fdeec Jun 18 06:56:46 xxxx kernel: ds: 0018 es: 0018 ss: 0018 Jun 18 06:56:46 xxxx kernel: Process find (pid: 31710, stackpage=cd9fd000) Jun 18 06:56:46 xxxx kernel: Stack: c1487f84 000001f0 0000000e fffffff4 cef9986c cef99800 cfa48620 c014a657 Jun 18 06:56:46 xxxx kernel: cfa48620 cd9fdf40 00000000 ce4e000e 00000000 cd9fdf98 c014ad38 cfa48620 Jun 18 06:56:46 xxxx kernel: cd9fdf40 00000000 00000008 cef99800 00000000 ce4e0000 0000000e a6a94a0b Jun 18 06:56:46 xxxx kernel: Call Trace: [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [__user_walk+73/96] [sys_lstat64+31/144] Jun 18 06:56:46 xxxx kernel: [system_call+51/56] Jun 18 06:56:46 xxxx kernel: Jun 18 06:56:46 xxxx kernel: Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b Jun 18 06:56:46 xxxx kernel: <1>Unable to handle kernel paging request at virtual address 2f7795fc Jun 18 06:56:46 xxxx kernel: printing eip: Jun 18 06:56:46 xxxx kernel: c0153c3d Jun 18 06:56:46 xxxx kernel: Oops: 0002 Jun 18 06:56:46 xxxx kernel: CPU: 0 Jun 18 06:56:46 xxxx kernel: EIP: 0010:[d_alloc+77/368] Not tainted Jun 18 06:56:46 xxxx kernel: EFLAGS: 00010213 Jun 18 06:56:46 xxxx kernel: eax: 00000007 ebx: 2f7795a0 ecx: 00000001 edx: 2f7795fc ------------------------------------------------------------------- Followed by 5 other oops (ksymoops of all of them attached). Since the last symoops named process 'cron' it seems that it might be related to it. I had to manually reset the system after this oops at that time. If there's anything I can do to try to catch this and reproduce it, please let me know. Regards Javier
ksymoops 2.4.9 on i686 2.4.26-1-686. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.26-1-686/ (default) -m /boot/System.map-2.4.26-1-686 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/fs/ext3/ext3.o for module ext3 has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/fs/jbd/jbd.o for module jbd has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/ide-detect.o for module ide-detect has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/pci/via82cxxx.o for module via82cxxx has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/ide-disk.o for module ide-disk has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/pci/pdc202xx_new.o for module pdc202xx_new has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/ide-core.o for module ide-core has changed since load Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/net/unix/unix.o for module unix has changed since load c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010217 eax: 0000000e ebx: 2f7795a0 ecx: 00000003 edx: 2f7795fc esi: ce4e0000 edi: 2f7795fc ebp: cfa48620 esp: cd9fdeec ds: 0018 es: 0018 ss: 0018 Process find (pid: 31710, stackpage=cd9fd000) Stack: c1487f84 000001f0 0000000e fffffff4 cef9986c cef99800 cfa48620 c014a657 cfa48620 cd9fdf40 00000000 ce4e000e 00000000 cd9fdf98 c014ad38 cfa48620 cd9fdf40 00000000 00000008 cef99800 00000000 ce4e0000 0000000e a6a94a0b Call Trace: [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [__user_walk+73/96] [sys_lstat64+31/144] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b Using defaults from ksymoops -t elf32-i386 -a i386 >>esi; ce4e0000 <_end+e1dc5a0/18509600> >>ebp; cfa48620 <_end+f744bc0/18509600> >>esp; cd9fdeec <_end+d6fa48c/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax <1>Unable to handle kernel paging request at virtual address 2f7795fc c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010213 eax: 00000007 ebx: 2f7795a0 ecx: 00000001 edx: 2f7795fc esi: caec8024 edi: 2f7795fc ebp: d65665a0 esp: cb8b3ebc ds: 0018 es: 0018 ss: 0018 Process updatedb (pid: 31707, stackpage=cb8b3000) Stack: c1487f84 000001f0 00000007 fffffff4 c9b136ec c9b13680 d65665a0 c014a657 d65665a0 cb8b3f10 00000000 caec802b 00000000 cb8b3f84 c014ad38 d65665a0 cb8b3f10 00000000 00000001 c9b13680 00000000 caec8024 00000007 a0af7bee Call Trace: [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [open_namei+110/1488] [filp_open+62/112] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b >>esi; caec8024 <_end+abc45c4/18509600> >>ebp; d65665a0 <_end+16262b40/18509600> >>esp; cb8b3ebc <_end+b5b045c/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax <1>Unable to handle kernel NULL pointer dereference at virtual address 000000a0 d885baed Oops: 0000 CPU: 0 EIP: 0010:[ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1500435/96] Not tainted EFLAGS: 00010246 eax: 00000000 ebx: fffffff4 ecx: d4bcfef8 edx: cc08d0a0 esi: cc08d0a0 edi: cb196600 ebp: 00000000 esp: d4bcfe60 ds: 0018 es: 0018 ss: 0018 Process samhain (pid: 1939, stackpage=d4bcf000) Stack: c176b9c0 c8589380 00000000 00000000 cc6d1720 cb196600 c15bc6e0 d885b44c cc6d1720 cb196600 00000000 00000001 00000000 00000000 00000000 cb196600 40d2760e 00000000 cb196600 c01564cc cb196600 00000001 00001000 d8855e64 Call Trace: [ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1502132/96] [update_atime+108/112] [ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1524124/96] [ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1499567/96] [real_lookup+205/240] Code: 8b 98 a0 00 00 00 8b 7c 24 28 89 5c 24 48 8b 77 48 0f b6 4b >>ecx; d4bcfef8 <_end+148cc498/18509600> >>edx; cc08d0a0 <_end+bd89640/18509600> >>esi; cc08d0a0 <_end+bd89640/18509600> >>edi; cb196600 <_end+ae92ba0/18509600> >>esp; d4bcfe60 <_end+148cc400/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 98 a0 00 00 00 mov 0xa0(%eax),%ebx Code; 00000006 Before first symbol 6: 8b 7c 24 28 mov 0x28(%esp,1),%edi Code; 0000000a Before first symbol a: 89 5c 24 48 mov %ebx,0x48(%esp,1) Code; 0000000e Before first symbol e: 8b 77 48 mov 0x48(%edi),%esi Code; 00000011 Before first symbol 11: 0f b6 4b 00 movzbl 0x0(%ebx),%ecx <1>Unable to handle kernel paging request at virtual address 2f7795fc c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010212 eax: 00000008 ebx: 2f7795a0 ecx: 00000002 edx: 2f7795fc esi: d05c5f24 edi: 2f7795fc ebp: c1489220 esp: d05c5ef8 ds: 0018 es: 0018 ss: 0018 Process nmbd (pid: 2058, stackpage=d05c5000) Stack: c1487f84 000001f0 d05c5f24 00000000 d4e82760 d05c5f2d 0000000e c01c3355 c1489220 d05c5f44 00060fef 3739335b 5d353932 cb196500 00000000 00000000 00000286 d78cf680 00000000 d05c5f24 00000008 00060fef 00000000 00000000 Call Trace: [sock_map_fd+133/368] [sys_socket+61/96] [sys_socketcall+104/608] [sys_rt_sigprocmask+337/416] [system_call+51/56] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b >>esi; d05c5f24 <_end+102c24c4/18509600> >>ebp; c1489220 <_end+11857c0/18509600> >>esp; d05c5ef8 <_end+102c2498/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax <1>Unable to handle kernel paging request at virtual address 2f7795fc c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010212 eax: 00000008 ebx: 2f7795a0 ecx: 00000002 edx: 2f7795fc esi: ce7fa012 edi: 2f7795fc ebp: cee12aa0 esp: d2503f48 ds: 0018 es: 0018 ss: 0018 Process rm (pid: 31714, stackpage=d2503000) Stack: c1487f84 000001f0 d2503f98 fffffff4 d3865800 cee12aa0 d2503f98 c014b1b7 cee12aa0 d2503f98 00000000 ffffffeb ce7fa000 d2503f90 bffffc98 c014c59e d2503f98 cee12aa0 cee12aa0 c148e360 ce7fa012 00000008 596686d1 00000010 Call Trace: [lookup_hash+135/208] [sys_unlink+142/288] [system_call+51/56] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b >>esi; ce7fa012 <_end+e4f65b2/18509600> >>ebp; cee12aa0 <_end+eb0f040/18509600> >>esp; d2503f48 <_end+122004e8/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax <1>Unable to handle kernel paging request at virtual address 2f7795fc c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010213 eax: 0000000a ebx: 2f7795a0 ecx: 00000002 edx: 2f7795fc esi: d4c08017 edi: 2f7795fc ebp: d3c6b8a0 esp: d2503ebc ds: 0018 es: 0018 ss: 0018 Process postmaster (pid: 31715, stackpage=d2503000) Stack: c1487f84 000001f0 0000000a fffffff4 d088fe0c d088fda0 d3c6b8a0 c014a657 d3c6b8a0 d2503f10 00000000 d4c08021 00000000 d2503f84 c014ad38 d3c6b8a0 d2503f10 00000000 00000001 d088fda0 00000000 d4c08017 0000000a e6dcd299 Call Trace: [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [open_namei+110/1488] [filp_open+62/112] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b >>esi; d4c08017 <_end+149045b7/18509600> >>ebp; d3c6b8a0 <_end+13967e40/18509600> >>esp; d2503ebc <_end+1220045c/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax <1>Unable to handle kernel paging request at virtual address 2f7795fc c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010212 eax: 00000008 ebx: 2f7795a0 ecx: 00000002 edx: 2f7795fc esi: d2503f60 edi: 2f7795fc ebp: c1489320 esp: d2503f28 ds: 0018 es: 0018 ss: 0018 Process cron (pid: 31716, stackpage=d2503000) Stack: c1487f84 000001f0 d2503f54 d0595c20 cbb4eb40 d2503f69 c4474520 c0149f72 c1489320 d2503f80 00060ff1 00000004 00000003 fffffff4 3739335b 5d373932 bffff000 d2503f74 00000014 0804a270 14000000 4005d658 d2503f60 00000008 Call Trace: [do_pipe+194/576] [sys_pipe+23/96] [do_page_fault+0/1261] [system_call+51/56] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b >>esi; d2503f60 <_end+12200500/18509600> >>ebp; c1489320 <_end+11858c0/18509600> >>esp; d2503f28 <_end+122004c8/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax <1>Unable to handle kernel paging request at virtual address 2f7795fc c0153c3d Oops: 0002 CPU: 0 EIP: 0010:[d_alloc+77/368] Not tainted EFLAGS: 00010212 eax: 00000008 ebx: 2f7795a0 ecx: 00000002 edx: 2f7795fc esi: c5c01f60 edi: 2f7795fc ebp: c1489320 esp: c5c01f28 ds: 0018 es: 0018 ss: 0018 Process cron (pid: 31717, stackpage=c5c01000) Stack: c1487f84 000001f0 c5c01f54 d05c7de0 d20a5b60 c5c01f69 d7d41d20 c0149f72 c1489320 c5c01f80 00060ff3 00000006 00000005 fffffff4 3739335b 5d393932 bffff000 c5c01f74 00000014 0804a270 14000000 4005d658 c5c01f60 00000008 Call Trace: [do_pipe+194/576] [sys_pipe+23/96] [system_call+51/56] Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b >>esi; c5c01f60 <_end+58fe500/18509600> >>ebp; c1489320 <_end+11858c0/18509600> >>esp; c5c01f28 <_end+58fe4c8/18509600> Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: f3 a5 repz movsl %ds:(%esi),%es:(%edi) Code; 00000002 Before first symbol 2: a8 02 test $0x2,%al Code; 00000004 Before first symbol 4: 74 02 je 8 <_EIP+0x8> Code; 00000006 Before first symbol 6: 66 a5 movsw %ds:(%esi),%es:(%edi) Code; 00000008 Before first symbol 8: a8 01 test $0x1,%al Code; 0000000a Before first symbol a: 74 01 je d <_EIP+0xd> Code; 0000000c Before first symbol c: a4 movsb %ds:(%esi),%es:(%edi) Code; 0000000d Before first symbol d: 8b 4c 24 24 mov 0x24(%esp,1),%ecx Code; 00000011 Before first symbol 11: 85 ed test %ebp,%ebp Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax 9 warnings issued. Results may not be reliable.
signature.asc
Description: Digital signature