[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



It's also worth removing the memory, and cleaning the edge connector with a
soft pencil eraser and refitting it. I've fixed loads of memory related
things like that over the years. They have a very small contact area between
the pads and connector.

Phil

** http://www.diygear.com THE Online DIY Toolstore For DIY & Business
** Infolink Electronic Systems Ltd. http://www.infolinkelectronics.co.uk
** Professional Web Design & Cobalt Hosting Solutions
** Sun Cobalt iForce Reseller - Canon Silver Reseller
** Contact: Sales@xxxxxxxxxxxxxxxxxxxxxxxxx
** Tel / Fax 0121 458 4894 (office) 0121 441 3558 (home)


> Hi,
>
> today this raq4 server crashed 5 times in an hour.
> Judging from this log, it has some serious problems...
> it did'nt even got to start and already has kernel
> errors??
>
> a sad sysadmin,
> Csaba
>
> Oct 15 11:30:04 ns kernel: Adding Swap: 131532k
> swap-space (priority -1)
> Oct 15 11:30:04 ns kernel: Sun Cobalt Bandwidth
> Limiting Module
> Oct 15 11:30:04 ns kernel: Copyright (c) 1999-2001,
> Sun Microsystems, Inc.
> Oct 15 11:30:04 ns kernel: All rights reserved
> Oct 15 11:30:04 ns kernel: eth0: Invalid EEPROM
> checksum 0xefd5, check settings before activating this
> device!
> Oct 15 11:30:04 ns kernel: eth0: Intel PCI
> EtherExpress Pro100 82559ER, 00:10:E0:01:F5:DD, I/O at
> 0x6200, IRQ 11.
> Oct 15 11:30:04 ns kernel: Board assembly 000000-000,
> Physical connectors present:
> Oct 15 11:30:04 ns kernel: Primary interface chip None
> PHY #0.
> Oct 15 11:30:04 ns kernel: Forcing 100Mbs full-duplex
> operation.
> Oct 15 11:30:04 ns kernel: General self-test: passed.
> Oct 15 11:30:04 ns kernel: Serial sub-system
> self-test: passed.
> Oct 15 11:30:04 ns kernel: Internal registers
> self-test: passed.
> Oct 15 11:30:04 ns kernel: ROM checksum self-test:
> passed (0xdbd8681d).
> Oct 15 11:30:04 ns kernel: Receiver lock-up workaround
> activated.
> Oct 15 11:30:04 ns kernel: eth1: Invalid EEPROM
> checksum 0xead7, check settings before activating this
> device!
> Oct 15 11:30:04 ns kernel: eth1: Intel PCI
> EtherExpress Pro100 82559ER, 00:10:E0:01:F7:D8, I/O at
> 0x6240, IRQ 10.
> Oct 15 11:30:04 ns kernel: Board assembly 000000-000,
> Physical connectors present:
> Oct 15 11:30:04 ns kernel: Primary interface chip None
> PHY #0.
> Oct 15 11:30:04 ns kernel: General self-test: passed.
> Oct 15 11:30:04 ns kernel: Serial sub-system
> self-test: passed.
> Oct 15 11:30:04 ns kernel: Internal registers
> self-test: passed.
> Oct 15 11:30:04 ns kernel: ROM checksum self-test:
> passed (0xdbd8681d).
> Oct 15 11:30:04 ns kernel: Receiver lock-up workaround
> activated.
> Oct 15 11:30:04 ns kernel: portmap: RPC call returned
> error 111
> Oct 15 11:30:04 ns kernel: RPC: task of released
> request still queued!
> Oct 15 11:30:04 ns kernel: RPC: (task is on
> xprt_pending)
> Oct 15 11:30:04 ns kernel: portmap: RPC call returned
> error 111
> Oct 15 11:30:04 ns kernel: RPC: task of released
> request still queued!
> Oct 15 11:30:04 ns kernel: RPC: (task is on
> xprt_pending)
> Oct 15 11:30:04 ns kernel: lockd_up: makesock failed,
> error=-111
> Oct 15 11:30:04 ns kernel: portmap: RPC call returned
> error 111
> Oct 15 11:30:04 ns kernel: RPC: task of released
> request still queued!
> Oct 15 11:30:04 ns kernel: RPC: (task is on
> xprt_pending)
> Oct 15 11:30:11 ns kernel: general protection fault:
> 8550
> Oct 15 11:30:11 ns kernel: CPU: 0
> Oct 15 11:30:11 ns kernel: EIP:
> 0010:[generic_readpage+14/144]
> Oct 15 11:30:11 ns kernel: EFLAGS: 00010282
> Oct 15 11:30:11 ns kernel: eax: c29d0be0 ebx: c030ea20
> ecx: c255f060 edx: c02a2000
> Oct 15 11:30:11 ns kernel: esi: c2668550 edi: c2b74000
> ebp: 000e0000 esp: df7c3b30
> Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
> Oct 15 11:30:11 ns kernel: Process httpd (pid: 510,
> process nr: 11, stackpage=df7c3000)
> Oct 15 11:30:11 ns kernel: Stack: c2b74000 000e0000
> c2668550 00000000 000e0000 dfe70520 df7c2000 00000001
> Oct 15 11:30:11 ns kernel: df80d04c c2c18000 00000000
> c011c914 c255f060 c030ea20 00000010 000e0000
> Oct 15 11:30:11 ns kernel: 00000000 000e2000 dfe9a4d4
> c011d53c c255f060 000e0000 00000000 db6a0380
> Oct 15 11:30:11 ns kernel: Call Trace:
> [try_to_read_ahead+248/272] [filemap_nopage+416/816]
> [do_no_page+81/196] [handle_mm_fault+197/324]
> [do_page_fault+278/944] [error_code+45/56]
> [clear_user+55/72]
> Oct 15 11:30:11 ns kernel: [padzero+28/32]
> [load_elf_binary+3222/3552] [cprt+1788/55552]
> [read_exec+194/316] [search_binary_handler+71/288]
> [do_execve+422/564] [do_execve+456/564]
> [sys_execve+47/88]
> Oct 15 11:30:11 ns kernel: [system_call+52/56]
> Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
> ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
> Oct 15 11:30:11 ns kernel: general protection fault:
> 1650
> Oct 15 11:30:11 ns kernel: CPU: 0
> Oct 15 11:30:11 ns kernel: EIP:
> 0010:[generic_readpage+14/144]
> Oct 15 11:30:11 ns kernel: EFLAGS: 00010282
> Oct 15 11:30:11 ns kernel: eax: c29d0e60 ebx: 00000000
> ecx: c23325c0 edx: c02a2000
> Oct 15 11:30:11 ns kernel: esi: c25d1650 edi: c0311310
> ebp: 00000000 esp: df975efc
> Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
> Oct 15 11:30:11 ns kernel: Process egrep (pid: 512,
> process nr: 7, stackpage=df975000)
> Oct 15 11:30:11 ns kernel: Stack: c0311310 00000000
> 00000000 00000000 00000000 00000001 df974000 dfe70ce0
> Oct 15 11:30:11 ns kernel: df974000 00000000 00000000
> c011cf1a c23325c0 c0311310 00008000 08061000
> Oct 15 11:30:11 ns kernel: 00000000 00008000 dfef4594
> 00000000 00000000 1f9bb025 c23325c0 00000000
> Oct 15 11:30:11 ns kernel: Call Trace:
> [do_generic_file_read+1314/1500]
> [generic_file_read+99/124] [file_read_actor+0/80]
> [sys_read+174/196] [system_call+52/56]
> Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
> ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
> Oct 15 11:30:11 ns kernel: general protection fault:
> 5da4
> Oct 15 11:30:11 ns kernel: CPU: 0
> Oct 15 11:30:11 ns kernel: EIP:
> 0010:[generic_readpage+14/144]
> Oct 15 11:30:11 ns kernel: EFLAGS: 00010286
> Oct 15 11:30:11 ns kernel: eax: c29d0e60 ebx: 00000000
> ecx: c25d1650 edx: c0311310
> Oct 15 11:30:11 ns kernel: esi: df975da4 edi: c0311310
> ebp: 00000000 esp: df975cdc
> Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
> Oct 15 11:30:11 ns kernel: Process rc (pid: 513,
> process nr: 7, stackpage=df975000)
> Oct 15 11:30:11 ns kernel: Stack: c0311310 00000000
> 464c457f 00010101 00000080 df975d6c dffe9650 df8d4140
> Oct 15 11:30:11 ns kernel: df8d4140 df8d4140 c011ce39
> c011cf42 df975da4 c0311310 00000080 df975e60
> Oct 15 11:30:11 ns kernel: 00000000 df975da4 dfef4594
> 00000000 00000000 00000000 c017b3eb dfff8260
> Oct 15 11:30:11 ns kernel: Call Trace:
> [do_generic_file_read+1089/1500]
> [do_generic_file_read+1354/1500]
> [ip_route_input_slow+351/1220]
> [generic_file_read+99/124] [file_read_actor+0/80]
> [read_exec+194/316] [prepare_binprm+686/700]
> Oct 15 11:30:11 ns kernel: [do_execve+309/564]
> [sys_execve+47/88] [system_call+52/56]
> Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
> ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
> Oct 15 11:30:11 ns kernel: general protection fault:
> 1430
> Oct 15 11:30:11 ns kernel: CPU: 0
> Oct 15 11:30:11 ns kernel: EIP:
> 0010:[generic_readpage+14/144]
> Oct 15 11:30:11 ns kernel: EFLAGS: 00010282
> Oct 15 11:30:11 ns kernel: eax: c1b54040 ebx: 00000000
> ecx: dfe7ff20 edx: c02a2000
> Oct 15 11:30:11 ns kernel: esi: c25d1430 edi: c030a358
> ebp: 00000000 esp: df975efc
> Oct 15 11:30:11 ns kernel: ds: 0018 es: 0018 ss: 0018
> Oct 15 11:30:11 ns kernel: Process egrep (pid: 514,
> process nr: 7, stackpage=df975000)
> Oct 15 11:30:11 ns kernel: Stack: c030a358 00000000
> 00000000 00000000 00000000 00000001 df974000 dfe706a0
> Oct 15 11:30:11 ns kernel: df974000 00000000 00000000
> c011cf1a dfe7ff20 c030a358 00008000 08061000
> Oct 15 11:30:11 ns kernel: 00000000 00008000 dfef450c
> 00000000 00000000 1f9bb025 dfe7ff20 00000000
> Oct 15 11:30:11 ns kernel: Call Trace:
> [do_generic_file_read+1314/1500]
> [generic_file_read+99/124] [file_read_actor+0/80]
> [sys_read+174/196] [system_call+52/56]
> Oct 15 11:30:11 ns kernel: Code: cb 54 24 3c 8b 68 08
> ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
> Oct 15 11:30:12 ns kernel: general protection fault:
> 5da4
> Oct 15 11:30:12 ns kernel: CPU: 0
> Oct 15 11:30:12 ns kernel: EIP:
> 0010:[generic_readpage+14/144]
> Oct 15 11:30:12 ns kernel: EFLAGS: 00010286
> Oct 15 11:30:12 ns kernel: eax: c1b54040 ebx: 00000000
> ecx: c25d1430 edx: c030a358
> Oct 15 11:30:12 ns kernel: esi: df975da4 edi: c030a358
> ebp: 00000000 esp: df975cdc
> Oct 15 11:30:12 ns kernel: ds: 0018 es: 0018 ss: 0018
> Oct 15 11:30:12 ns kernel: Process rc (pid: 515,
> process nr: 7, stackpage=df975000)
> Oct 15 11:30:12 ns kernel: Stack: c030a358 00000000
> 464c457f 00010101 00000080 df975d6c dffe9650 df8d4140
> Oct 15 11:30:12 ns kernel: df8d4140 df8d4140 c011ce39
> c011cf42 df975da4 c030a358 00000080 df975e60
> Oct 15 11:30:12 ns kernel: 00000000 df975da4 dfef450c
> 00000000 00000000 c01cab9c 00000003 0000000c
> Oct 15 11:30:12 ns kernel: Call Trace:
> [do_generic_file_read+1089/1500]
> [do_generic_file_read+1354/1500]
> [add_timer_randomness+552/560]
> [generic_file_read+99/124] [file_read_actor+0/80]
> [read_exec+194/316] [prepare_binprm+686/700]
> Oct 15 11:30:12 ns kernel: [do_execve+309/564]
> [sys_execve+47/88] [system_call+52/56]
> Oct 15 11:30:12 ns kernel: Code: cb 54 24 3c 8b 68 08
> ff 42 14 31 c0 0f ab 42 18 b8 05 00 00
> Oct 15 11:58:59 ns kernel: klogd 1.3-3, log source =
> /proc/kmsg started.
> Oct 15 11:58:59 ns kernel: Inspecting /boot/System.map
>
> Oct 15 11:58:59 ns kernel: Loaded 7678 symbols from
> /boot/System.map.
> Oct 15 11:58:59 ns kernel: Symbols match kernel
> version 2.2.16.
> Oct 15 11:58:59 ns kernel: Loaded 124 symbols from 2
> modules.
> Oct 15 11:58:59 ns kernel: Linux version 2.2.16C37_III
>
>
> __________________________________
> Do you Yahoo!?
> The New Yahoo! Shopping - with improved product search
> http://shopping.yahoo.com
>
> _____________________________________
> cobalt-users mailing list
> cobalt-users@xxxxxxxxxxxxxxx
> To subscribe/unsubscribe, or to SEARCH THE ARCHIVES, go to:
> http://list.cobalt.com/mailman/listinfo/cobalt-users
>