I was running a load test over the local ethernet against Apache on my SS5/85 with 64 megs of RAM, and it resulted in the attached output (I didn't feel like formatting it, so I am attaching it as an 80 column wide text file). Is this a known problem? Should I report it to more appropriate parties? I don't know if this is specific to Sparc, but I've never reported a kernel bug before. -- Sean R. Lynch KG6CVV <seanl@literati.org> http://www.literati.org/~seanl/ Jabber:kg6cvv@jabber.org AIM:geekboi MSN:kg6cvv Yahoo:kg6cvv ICQ:10107887 GPG key fingerprint = 540F 19F2 C416 847F 4832 B346 9AF3 E455 6E73 B691 Bay Area Anarcho-Capitalists: http://www.literati.org/mailman/listinfo/baac
Run out of nocached RAM! NET: 183 messages suppressed. Type 'go' to resume ok sync PROM SYNC COMMAND... Free pages: 964kB ( 0kB HighMem) ( Active: 1532, inactive_dirty: 2423, inactive_clean: 142, free: 241 (119 238 3)93*4kB 2*8kB 0*16kB 0*32kB 1*64kB 0*128kB 0*256kB 1*512kB 0*1024kB 0*2048kB = 9)= 0kB) = 0kB) Swap cache: add 22, delete 0, find 19/19 Scheduling in interrupt kernel BUG at sched.c:688! Unable to handle kernel NULL pointer dereference<1>tsk->{mm,active_mm}->context3tsk->{mm,active_mm}->pgd = fc02b400 \|/ ____ \|/ "@'/ ,. \`@" /_| \__/ |_\ \__U_/ apache(491): Oops PSR: 049010c0 PC: f00265b0 NPC: f00265b4 Y: 00000000 g0: f01b346b g1: 04901fe7 g2: f01b7800 g3: 00003fff g4: 00000001 g5: 00000000 g0o0: 0000001b o1: 00000000 o2: f01b346b o3: f01b3486 o4: f01b3486 o5: 00000001 s8l0: f134b280 l1: f0774578 l2: f13ec000 l3: 0000ff00 l4: 00000000 l5: 00ff0000 l0i0: 0000001d i1: f13eda98 i2: f367cd6c i3: 040010e2 i4: 2f302e30 i5: f01433f0 f0Caller[f004dcf0] Caller[f004df4c] Caller[f004e024] Caller[f004e038] Caller[f00172e4] Caller[ffd1e0dc] Caller[f00e8588] Caller[f00e8f98] Caller[f0012c60] Caller[f0010524] Caller[f001f6b0] Caller[f0011ef0] Caller[00026c70] Instruction DUMP: 921262a8 40000bc5 941022b0 <c0202000> 81c7e008 81e80000 9 Kernel panic: Aiee, killing interrupt handler! In interrupt handler - not syncing Press L1-A to return to the boot prom
Attachment:
pgpcK9WjGRUQd.pgp
Description: PGP signature