2003-05-04 17:27:20

by Felix von Leitner

[permalink] [raw]
Subject: [2.5.68] Scalability issues

I am running several scalability tests on Linux 2.5.68, all related to
network servers. My test box is my notebook, Pentium 3 @ 900 MHz, 256
MB RAM. I run a small http server on it that supports the following
models:

- epoll
- sigio
- poll
- pthread_create for each connection
- fork for each connection

epoll works, sigio works as well, poll is slow but works.

pthread_create (using glibc 2.3.2 and gcc 3.2.3, by the way) fails after
creating several threads. I run different scalability benchmarks; one
fetches the same web page over and over again and sees how many fetches
per second it can get, the other does the same but with a rapidly
increasing amount of "idle" background connections to the server doing
nothing but stealing resources.

I expected fork and pthread_create to fail sooner or later. Here is
what happened (dmesg):

Out of Memory: Killed process 51 (sshd).
artillery-fork: page allocation failure. order:0, mode:0x20
[this message comes about 50 times]
Out of Memory: Killed process 52 (zsh).
spurious 8259A interrupt: IRQ7.
Out of Memory: Killed process 49 (sshd).
alloc_area_pte: page already exists
alloc_area_pte: page already exists
alloc_area_pte: page already exists
alloc_area_pte: page already exists
VFS: Close: file count is 0
VFS: Close: file count is 0

these don't look very good, but it gets better:

Unable to handle kernel NULL pointer dereference at virtual address 00000017
printing eip:
c014c95b
*pde = 00000000
Oops: 0000 [#1]
CPU: 0
EIP: 0060:[<c014c95b>] Tainted: P
EFLAGS: 00010286
eax: d241b000 ebx: 00000003 ecx: c037c450 edx: 00000003
esi: 00000405 edi: c3194620 ebp: 00000021 esp: c379bf60
ds: 007b es: 007b ss: 0068
Process artillery-fork (pid: 6966, threadinfo=c379a000 task=c37bad80)
Stack: c0341e60 c3194620 07ffffff 00000405 c3194620 00000021 c011e21c 00000003
c3194620 c3194620 00000000 4003c904 c37bad80 c011edc4 c319d780 c319d780
c379a000 c014d557 00000000 00200001 4003c904 c379a000 c011f0b3 00000000
Call Trace: [<c011e21c>] [<c011edc4>] [<c014d557>] [<c011f0b3>] [<c0109279>]
Code: 8b 43 14 85 c0 0f 84 9a 00 00 00 8b 43 10 31 ed 85 c0 74 45

This should not happen, right? But wait, there's more!

<3>alloc_area_pte: page already exists
alloc_area_pte: page already exists
alloc_area_pte: page already exists
alloc_area_pte: page already exists

Unable to handle kernel paging request at virtual address d209bd38
printing eip:
c014e30f
*pde = 09a1b067
*pte = 00000000
Oops: 0000 [#2]
CPU: 0
EIP: 0060:[<c014e30f>] Tainted: P
EFLAGS: 00010287
eax: d209a000 ebx: 00000000 ecx: 0000074e edx: c23e4000
esi: c21e8548 edi: c23e5f64 ebp: 00000000 esp: c23e5f24
ds: 007b es: 007b ss: 0068
Process artillery-fork (pid: 6894, threadinfo=c23e4000 task=c23e3980)
Stack: 00000000 c015fabd c0124bc0 c23e3980 c21e8540 c23e5f60 c23e5f64 00000000
c015fb9a 00000001 c21e8548 c23e5f60 c23e5f64 c23e4000 c23e4000 00000000
00000000 bffff7c8 00000000 c21e8540 00000001 c015fd60 00000001 c21e8540
Call Trace: [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 8b 1c 88 85 db 74 03 ff 43 14 ff 4a 14 8b 42 08 83 e0 08 75

Mhh. What about this one, then?

<6>note: artillery-fork[6894] exited with preempt_count 1

Unable to handle kernel paging request at virtual address d209a000
printing eip:
c011e1fd
*pde = 09a1b067
*pte = 00000000
Oops: 0002 [#3]
CPU: 0
EIP: 0060:[<c011e1fd>] Tainted: P
EFLAGS: 00010246
eax: d209a000 ebx: ffffffff ecx: 00000000 edx: 00000000
esi: 00000000 edi: c22f8380 ebp: 00000001 esp: c23e5de0
ds: 007b es: 007b ss: 0068
Process artillery-fork (pid: 6894, threadinfo=c23e4000 task=c23e3980)
Stack: 00000000 c23e3980 c22f8380 00000000 c23e3980 c23e3980 c011edc4 c2299e20
c2299e20 00001aee 00000001 c23e4000 c23e5ef0 c23e3980 0000009b c010a2fc
0000000b c033dc76 00000000 00000002 00000000 00000000 c0117e3a c033dc76
Call Trace: [<c011edc4>] [<c010a2fc>] [<c0117e3a>] [<c029ca2d>] [<c029cb34>] [<c010b7ed>] [<c011c604>] [<c0117cf0>] [<c0109cd5>]
[<c012007b>] [<c014e30f>] [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 87 14 b0 85 d2 75 0c 46 d1 eb 75 e7 eb bd 90 8d 74 26 00 89

Obviously, the kernel gets more and more confused. Finally, another one of
these:

<6>note: artillery-fork[6894] exited with preempt_count 1

This was only from the fork tests, the pthread_tests wouldn't let me
create enough threads to consume too much memory. How did the Red Hat
people run those tests with 100000 threads? Set increased the hard
limits for process count and installed the latest glibc and gcc but I'm
apparently still stuck with the old LinuxThreads. pthread_create fails
on me after an apparently random number of threads have been created,
it's going from 5 to 600 to 1200 so far. I was not able to even get
close to the 10000 connection I was aiming for!

So I decided that threads don't work for many concurrent connections and
settled for the other benchmark of mine, that just tries to fetch 10000
times the same page with 10 concurrent connections. It turns out that
pthread_create will still fail after a while. All my threads are
created detached, because I considered the "thread zombies" might be a
problem. ps shows that there are only 4 or so threads running when
pthread_create fails. How can that be? The system is otherwise idle.

Felix


2003-05-04 18:03:47

by Michael Buesch

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Sunday 04 May 2003 19:39, Felix von Leitner wrote:
> Unable to handle kernel NULL pointer dereference at virtual address
> 00000017 printing eip:
> c014c95b
> *pde = 00000000
> Oops: 0000 [#1]
> CPU: 0
> EIP: 0060:[<c014c95b>] Tainted: P
> EFLAGS: 00010286
> eax: d241b000 ebx: 00000003 ecx: c037c450 edx: 00000003
> esi: 00000405 edi: c3194620 ebp: 00000021 esp: c379bf60
> ds: 007b es: 007b ss: 0068
> Process artillery-fork (pid: 6966, threadinfo=c379a000 task=c37bad80)
> Stack: c0341e60 c3194620 07ffffff 00000405 c3194620 00000021 c011e21c
> 00000003 c3194620 c3194620 00000000 4003c904 c37bad80 c011edc4 c319d780
> c319d780 c379a000 c014d557 00000000 00200001 4003c904 c379a000 c011f0b3
> 00000000 Call Trace: [<c011e21c>] [<c011edc4>] [<c014d557>] [<c011f0b3>]
> [<c0109279>] Code: 8b 43 14 85 c0 0f 84 9a 00 00 00 8b 43 10 31 ed 85 c0
> 74 45

Could you please run ksymoops on these oopses?

> EIP: 0060:[<c014c95b>] Tainted: P
What tainted the kernel?

- --
Regards Michael B?sch
http://www.8ung.at/tuxsoft
20:14:28 up 3:44, 4 users, load average: 1.01, 1.05, 1.01
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+tVjtoxoigfggmSgRAlPeAJ4im7EzpQjk2ZRHk3TS1rECLFcB3wCeNhUy
A3yhshZJpMURwsLgX7hVzrY=
=5IoZ
-----END PGP SIGNATURE-----

2003-05-04 19:32:17

by Felix von Leitner

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

Here is the ksymoops output. The taint came from the nvidia kernel
module, X was not running, so the module did not do anything at the
time.


ksymoops 2.4.1 on i686 2.5.68. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.5.68/ (default)
-m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

Error (regular_file): read_ksyms stat /proc/ksyms failed
No modules in ksyms, skipping objects
No ksyms, skipping lsmod
e100: selftest OK.
e100: eth0: Intel(R) PRO/100 Network Connection
e100: eth0 NIC Link is Up 100 Mbps Full duplex
Unable to handle kernel NULL pointer dereference at virtual address 00000017
c014c95b
*pde = 00000000
Oops: 0000 [#1]
CPU: 0
EIP: 0060:[<c014c95b>] Tainted: P
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010286
eax: d241b000 ebx: 00000003 ecx: c037c450 edx: 00000003
esi: 00000405 edi: c3194620 ebp: 00000021 esp: c379bf60
ds: 007b es: 007b ss: 0068
Stack: c0341e60 c3194620 07ffffff 00000405 c3194620 00000021 c011e21c 00000003
c3194620 c3194620 00000000 4003c904 c37bad80 c011edc4 c319d780 c319d780
c379a000 c014d557 00000000 00200001 4003c904 c379a000 c011f0b3 00000000
Call Trace: [<c011e21c>] [<c011edc4>] [<c014d557>] [<c011f0b3>] [<c0109279>]
Code: 8b 43 14 85 c0 0f 84 9a 00 00 00 8b 43 10 31 ed 85 c0 74 45

>>EIP; c014c95b <filp_close+1b/d0> <=====
Trace; c011e21c <put_files_struct+6c/e0>
Trace; c011edc4 <do_exit+144/400>
Trace; c014d557 <sys_write+47/60>
Trace; c011f0b3 <sys_exit+13/20>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c014c95b <filp_close+1b/d0>
00000000 <_EIP>:
Code; c014c95b <filp_close+1b/d0> <=====
0: 8b 43 14 mov 0x14(%ebx),%eax <=====
Code; c014c95e <filp_close+1e/d0>
3: 85 c0 test %eax,%eax
Code; c014c960 <filp_close+20/d0>
5: 0f 84 9a 00 00 00 je a5 <_EIP+0xa5>
Code; c014c966 <filp_close+26/d0>
b: 8b 43 10 mov 0x10(%ebx),%eax
Code; c014c969 <filp_close+29/d0>
e: 31 ed xor %ebp,%ebp
Code; c014c96b <filp_close+2b/d0>
10: 85 c0 test %eax,%eax
Code; c014c96d <filp_close+2d/d0>
12: 74 45 je 59 <_EIP+0x59>

Unable to handle kernel paging request at virtual address d209bd38
c014e30f
*pde = 09a1b067
Oops: 0000 [#2]
CPU: 0
EIP: 0060:[<c014e30f>] Tainted: P
EFLAGS: 00010287
eax: d209a000 ebx: 00000000 ecx: 0000074e edx: c23e4000
esi: c21e8548 edi: c23e5f64 ebp: 00000000 esp: c23e5f24
ds: 007b es: 007b ss: 0068
Stack: 00000000 c015fabd c0124bc0 c23e3980 c21e8540 c23e5f60 c23e5f64 00000000
c015fb9a 00000001 c21e8548 c23e5f60 c23e5f64 c23e4000 c23e4000 00000000
00000000 bffff7c8 00000000 c21e8540 00000001 c015fd60 00000001 c21e8540
Call Trace: [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 8b 1c 88 85 db 74 03 ff 43 14 ff 4a 14 8b 42 08 83 e0 08 75

>>EIP; c014e30f <fget+1f/40> <=====
Trace; c015fabd <do_pollfd+2d/a0>
Trace; c0124bc0 <process_timeout+0/10>
Trace; c015fb9a <do_poll+6a/d0>
Trace; c015fd60 <sys_poll+160/260>
Trace; c015df65 <do_fcntl+d5/1c0>
Trace; c015f0f0 <__pollwait+0/d0>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c014e30f <fget+1f/40>
00000000 <_EIP>:
Code; c014e30f <fget+1f/40> <=====
0: 8b 1c 88 mov (%eax,%ecx,4),%ebx <=====
Code; c014e312 <fget+22/40>
3: 85 db test %ebx,%ebx
Code; c014e314 <fget+24/40>
5: 74 03 je a <_EIP+0xa>
Code; c014e316 <fget+26/40>
7: ff 43 14 incl 0x14(%ebx)
Code; c014e319 <fget+29/40>
a: ff 4a 14 decl 0x14(%edx)
Code; c014e31c <fget+2c/40>
d: 8b 42 08 mov 0x8(%edx),%eax
Code; c014e31f <fget+2f/40>
10: 83 e0 08 and $0x8,%eax
Code; c014e322 <fget+32/40>
13: 75 00 jne 15 <_EIP+0x15>

Unable to handle kernel paging request at virtual address d209a000
c011e1fd
*pde = 09a1b067
Oops: 0002 [#3]
CPU: 0
EIP: 0060:[<c011e1fd>] Tainted: P
EFLAGS: 00010246
eax: d209a000 ebx: ffffffff ecx: 00000000 edx: 00000000
esi: 00000000 edi: c22f8380 ebp: 00000001 esp: c23e5de0
ds: 007b es: 007b ss: 0068
Stack: 00000000 c23e3980 c22f8380 00000000 c23e3980 c23e3980 c011edc4 c2299e20
c2299e20 00001aee 00000001 c23e4000 c23e5ef0 c23e3980 0000009b c010a2fc
0000000b c033dc76 00000000 00000002 00000000 00000000 c0117e3a c033dc76
Call Trace: [<c011edc4>] [<c010a2fc>] [<c0117e3a>] [<c029ca2d>] [<c029cb34>] [<c010b7ed>] [<c011c604>] [<c0117cf0>] [<c0109cd5>] [<c012007b>] [<c014e30f>] [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 87 14 b0 85 d2 75 0c 46 d1 eb 75 e7 eb bd 90 8d 74 26 00 89

>>EIP; c011e1fd <put_files_struct+4d/e0> <=====
Trace; c011edc4 <do_exit+144/400>
Trace; c010a2fc <die+ec/f0>
Trace; c0117e3a <do_page_fault+14a/45e>
Trace; c029ca2d <process_backlog+6d/100>
Trace; c029cb34 <net_rx_action+74/120>
Trace; c010b7ed <do_IRQ+fd/120>
Trace; c011c604 <__mmdrop+34/46>
Trace; c0117cf0 <do_page_fault+0/45e>
Trace; c0109cd5 <error_code+2d/38>
Trace; c012007b <sys_settimeofday+1b/f0>
Trace; c014e30f <fget+1f/40>
Trace; c015fabd <do_pollfd+2d/a0>
Trace; c0124bc0 <process_timeout+0/10>
Trace; c015fb9a <do_poll+6a/d0>
Trace; c015fd60 <sys_poll+160/260>
Trace; c015df65 <do_fcntl+d5/1c0>
Trace; c015f0f0 <__pollwait+0/d0>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c011e1fd <put_files_struct+4d/e0>
00000000 <_EIP>:
Code; c011e1fd <put_files_struct+4d/e0> <=====
0: 87 14 b0 xchg %edx,(%eax,%esi,4) <=====
Code; c011e200 <put_files_struct+50/e0>
3: 85 d2 test %edx,%edx
Code; c011e202 <put_files_struct+52/e0>
5: 75 0c jne 13 <_EIP+0x13>
Code; c011e204 <put_files_struct+54/e0>
7: 46 inc %esi
Code; c011e205 <put_files_struct+55/e0>
8: d1 eb shr %ebx
Code; c011e207 <put_files_struct+57/e0>
a: 75 e7 jne fffffff3 <_EIP+0xfffffff3>
Code; c011e209 <put_files_struct+59/e0>
c: eb bd jmp ffffffcb <_EIP+0xffffffcb>
Code; c011e20b <put_files_struct+5b/e0>
e: 90 nop
Code; c011e20c <put_files_struct+5c/e0>
f: 8d 74 26 00 lea 0x0(%esi,1),%esi
Code; c011e210 <put_files_struct+60/e0>
13: 89 00 mov %eax,(%eax)

Unable to handle kernel paging request at virtual address d2728188
c014e30f
*pde = 08540067
Oops: 0000 [#4]
CPU: 0
EIP: 0060:[<c014e30f>] Tainted: P
EFLAGS: 00010283
eax: d2726000 ebx: 00000000 ecx: 00000862 edx: ca208000
esi: ca271c48 edi: ca209f64 ebp: 00000000 esp: ca209f24
ds: 007b es: 007b ss: 0068
Stack: 00000000 c015fabd c0124bc0 ca219360 ca271c40 ca209f60 ca209f64 00000000
c015fb9a 00000001 ca271c48 ca209f60 ca209f64 ca208000 ca208000 00000000
00000000 bffff7c8 00000000 ca271c40 00000001 c015fd60 00000001 ca271c40
Call Trace: [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 8b 1c 88 85 db 74 03 ff 43 14 ff 4a 14 8b 42 08 83 e0 08 75

>>EIP; c014e30f <fget+1f/40> <=====
Trace; c015fabd <do_pollfd+2d/a0>
Trace; c0124bc0 <process_timeout+0/10>
Trace; c015fb9a <do_poll+6a/d0>
Trace; c015fd60 <sys_poll+160/260>
Trace; c015df65 <do_fcntl+d5/1c0>
Trace; c015f0f0 <__pollwait+0/d0>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c014e30f <fget+1f/40>
00000000 <_EIP>:
Code; c014e30f <fget+1f/40> <=====
0: 8b 1c 88 mov (%eax,%ecx,4),%ebx <=====
Code; c014e312 <fget+22/40>
3: 85 db test %ebx,%ebx
Code; c014e314 <fget+24/40>
5: 74 03 je a <_EIP+0xa>
Code; c014e316 <fget+26/40>
7: ff 43 14 incl 0x14(%ebx)
Code; c014e319 <fget+29/40>
a: ff 4a 14 decl 0x14(%edx)
Code; c014e31c <fget+2c/40>
d: 8b 42 08 mov 0x8(%edx),%eax
Code; c014e31f <fget+2f/40>
10: 83 e0 08 and $0x8,%eax
Code; c014e322 <fget+32/40>
13: 75 00 jne 15 <_EIP+0x15>

Unable to handle kernel paging request at virtual address d2726000
c011e1fd
*pde = 08540067
Oops: 0002 [#5]
CPU: 0
EIP: 0060:[<c011e1fd>] Tainted: P
EFLAGS: 00010246
eax: d2726000 ebx: ffffffff ecx: 00000001 edx: 00000000
esi: 00000000 edi: ca229dc0 ebp: 00000001 esp: ca209de0
ds: 007b es: 007b ss: 0068
Stack: 00000000 ca219360 ca229dc0 00000000 ca219360 ca219360 c011edc4 c9830320
c9830320 00001c02 00000001 ca208000 ca209ef0 ca219360 00000328 c010a2fc
0000000b c033dc76 00000000 00000004 00000000 00000000 c0117e3a c033dc76
Call Trace: [<c011edc4>] [<c010a2fc>] [<c0117e3a>] [<c010b7ed>] [<c0136561>] [<c01366a0>] [<c011c604>] [<c0117cf0>] [<c0109cd5>] [<c012007b>] [<c014e30f>] [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 87 14 b0 85 d2 75 0c 46 d1 eb 75 e7 eb bd 90 8d 74 26 00 89

>>EIP; c011e1fd <put_files_struct+4d/e0> <=====
Trace; c011edc4 <do_exit+144/400>
Trace; c010a2fc <die+ec/f0>
Trace; c0117e3a <do_page_fault+14a/45e>
Trace; c010b7ed <do_IRQ+fd/120>
Trace; c0136561 <buffered_rmqueue+b1/150>
Trace; c01366a0 <__alloc_pages+a0/2d0>
Trace; c011c604 <__mmdrop+34/46>
Trace; c0117cf0 <do_page_fault+0/45e>
Trace; c0109cd5 <error_code+2d/38>
Trace; c012007b <sys_settimeofday+1b/f0>
Trace; c014e30f <fget+1f/40>
Trace; c015fabd <do_pollfd+2d/a0>
Trace; c0124bc0 <process_timeout+0/10>
Trace; c015fb9a <do_poll+6a/d0>
Trace; c015fd60 <sys_poll+160/260>
Trace; c015df65 <do_fcntl+d5/1c0>
Trace; c015f0f0 <__pollwait+0/d0>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c011e1fd <put_files_struct+4d/e0>
00000000 <_EIP>:
Code; c011e1fd <put_files_struct+4d/e0> <=====
0: 87 14 b0 xchg %edx,(%eax,%esi,4) <=====
Code; c011e200 <put_files_struct+50/e0>
3: 85 d2 test %edx,%edx
Code; c011e202 <put_files_struct+52/e0>
5: 75 0c jne 13 <_EIP+0x13>
Code; c011e204 <put_files_struct+54/e0>
7: 46 inc %esi
Code; c011e205 <put_files_struct+55/e0>
8: d1 eb shr %ebx
Code; c011e207 <put_files_struct+57/e0>
a: 75 e7 jne fffffff3 <_EIP+0xfffffff3>
Code; c011e209 <put_files_struct+59/e0>
c: eb bd jmp ffffffcb <_EIP+0xffffffcb>
Code; c011e20b <put_files_struct+5b/e0>
e: 90 nop
Code; c011e20c <put_files_struct+5c/e0>
f: 8d 74 26 00 lea 0x0(%esi,1),%esi
Code; c011e210 <put_files_struct+60/e0>
13: 89 00 mov %eax,(%eax)


1 warning and 1 error issued. Results may not be reliable.

2003-05-04 20:22:29

by Tomas Szepe

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

> [[email protected]]
>
> Here is the ksymoops output. The taint came from the nvidia kernel
> module, X was not running, so the module did not do anything at the
> time.

Please reproduce those without ever loading the NVidia module
so as to rule out its random scribbling over kernel memory.

-TS

2003-05-04 20:45:44

by David Miller

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

On Sun, 2003-05-04 at 12:44, Felix von Leitner wrote:
> Here is the ksymoops output. The taint came from the nvidia kernel
> module, X was not running, so the module did not do anything at the
> time.

Not true, if it got loaded it did something.

Either reproduce without the nvidia module loaded, or take
your report to nvidia.

--
David S. Miller <[email protected]>

2003-05-05 07:38:41

by Felix von Leitner

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

Thus spake David S. Miller ([email protected]):
> > Here is the ksymoops output. The taint came from the nvidia kernel
> > module, X was not running, so the module did not do anything at the
> > time.
> Not true, if it got loaded it did something.

> Either reproduce without the nvidia module loaded, or take
> your report to nvidia.

Thank you for this stunning display of unprofessionalism and zealotry.
People like you keep free software alive.


ksymoops 2.4.1 on i686 2.5.68. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.5.68/ (default)
-m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

Error (regular_file): read_ksyms stat /proc/ksyms failed
No modules in ksyms, skipping objects
No ksyms, skipping lsmod
e100: selftest OK.
e100: eth0: Intel(R) PRO/100 Network Connection
e100: eth0 NIC Link is Up 100 Mbps Full duplex
Unable to handle kernel paging request at virtual address d2f83908
c014e30f
*pde = 06608067
Oops: 0000 [#1]
CPU: 0
EIP: 0060:[<c014e30f>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010287
eax: d2f81000 ebx: 00000000 ecx: 00000a42 edx: c5920000
esi: c5a2f4e8 edi: c5921f64 ebp: 00000000 esp: c5921f24
ds: 007b es: 007b ss: 0068
Stack: 00000000 c015fabd c0124bc0 c5950680 c5a2f4e0 c5921f60 c5921f64 00000000
c015fb9a 00000001 c5a2f4e8 c5921f60 c5921f64 c5920000 c5920000 00000000
00000000 bffff808 00000000 c5a2f4e0 00000001 c015fd60 00000001 c5a2f4e0
Call Trace: [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 8b 1c 88 85 db 74 03 ff 43 14 ff 4a 14 8b 42 08 83 e0 08 75

>>EIP; c014e30f <fget+1f/40> <=====
Trace; c015fabd <do_pollfd+2d/a0>
Trace; c0124bc0 <process_timeout+0/10>
Trace; c015fb9a <do_poll+6a/d0>
Trace; c015fd60 <sys_poll+160/260>
Trace; c015df65 <do_fcntl+d5/1c0>
Trace; c015f0f0 <__pollwait+0/d0>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c014e30f <fget+1f/40>
00000000 <_EIP>:
Code; c014e30f <fget+1f/40> <=====
0: 8b 1c 88 mov (%eax,%ecx,4),%ebx <=====
Code; c014e312 <fget+22/40>
3: 85 db test %ebx,%ebx
Code; c014e314 <fget+24/40>
5: 74 03 je a <_EIP+0xa>
Code; c014e316 <fget+26/40>
7: ff 43 14 incl 0x14(%ebx)
Code; c014e319 <fget+29/40>
a: ff 4a 14 decl 0x14(%edx)
Code; c014e31c <fget+2c/40>
d: 8b 42 08 mov 0x8(%edx),%eax
Code; c014e31f <fget+2f/40>
10: 83 e0 08 and $0x8,%eax
Code; c014e322 <fget+32/40>
13: 75 00 jne 15 <_EIP+0x15>

Unable to handle kernel paging request at virtual address d2f81000
c011e1fd
*pde = 06608067
Oops: 0002 [#2]
CPU: 0
EIP: 0060:[<c011e1fd>] Not tainted
EFLAGS: 00010246
eax: d2f81000 ebx: ffffffff ecx: 00000001 edx: 00000000
esi: 00000000 edi: c597e900 ebp: 00000001 esp: c5921de0
ds: 007b es: 007b ss: 0068
Stack: 00000000 c5950680 c597e900 00000000 c5950680 c5950680 c011edc4 c595ae20
c595ae20 00000a9a 00000001 c5920000 c5921ef0 c5950680 00000383 c010a2fc
0000000b c033dc76 00000000 00000001 00000000 00000000 c0117e3a c033dc76
Call Trace: [<c011edc4>] [<c010a2fc>] [<c0117e3a>] [<c0136561>] [<c0136561>] [<c01366a0>] [<c0117cf0>] [<c0109cd5>] [<c012007b>] [<c014e30f>] [<c015fabd>] [<c0124bc0>] [<c015fb9a>] [<c015fd60>] [<c015df65>] [<c015f0f0>] [<c0109279>]
Code: 87 14 b0 85 d2 75 0c 46 d1 eb 75 e7 eb bd 90 8d 74 26 00 89

>>EIP; c011e1fd <put_files_struct+4d/e0> <=====
Trace; c011edc4 <do_exit+144/400>
Trace; c010a2fc <die+ec/f0>
Trace; c0117e3a <do_page_fault+14a/45e>
Trace; c0136561 <buffered_rmqueue+b1/150>
Trace; c0136561 <buffered_rmqueue+b1/150>
Trace; c01366a0 <__alloc_pages+a0/2d0>
Trace; c0117cf0 <do_page_fault+0/45e>
Trace; c0109cd5 <error_code+2d/38>
Trace; c012007b <sys_settimeofday+1b/f0>
Trace; c014e30f <fget+1f/40>
Trace; c015fabd <do_pollfd+2d/a0>
Trace; c0124bc0 <process_timeout+0/10>
Trace; c015fb9a <do_poll+6a/d0>
Trace; c015fd60 <sys_poll+160/260>
Trace; c015df65 <do_fcntl+d5/1c0>
Trace; c015f0f0 <__pollwait+0/d0>
Trace; c0109279 <sysenter_past_esp+52/71>
Code; c011e1fd <put_files_struct+4d/e0>
00000000 <_EIP>:
Code; c011e1fd <put_files_struct+4d/e0> <=====
0: 87 14 b0 xchg %edx,(%eax,%esi,4) <=====
Code; c011e200 <put_files_struct+50/e0>
3: 85 d2 test %edx,%edx
Code; c011e202 <put_files_struct+52/e0>
5: 75 0c jne 13 <_EIP+0x13>
Code; c011e204 <put_files_struct+54/e0>
7: 46 inc %esi
Code; c011e205 <put_files_struct+55/e0>
8: d1 eb shr %ebx
Code; c011e207 <put_files_struct+57/e0>
a: 75 e7 jne fffffff3 <_EIP+0xfffffff3>
Code; c011e209 <put_files_struct+59/e0>
c: eb bd jmp ffffffcb <_EIP+0xffffffcb>
Code; c011e20b <put_files_struct+5b/e0>
e: 90 nop
Code; c011e20c <put_files_struct+5c/e0>
f: 8d 74 26 00 lea 0x0(%esi,1),%esi
Code; c011e210 <put_files_struct+60/e0>
13: 89 00 mov %eax,(%eax)


1 warning and 1 error issued. Results may not be reliable.

2003-05-05 09:39:03

by Carl-Daniel Hailfinger

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

Felix von Leitner wrote:
> Thus spake David S. Miller ([email protected]):
>
>>>Here is the ksymoops output. The taint came from the nvidia kernel
>>>module, X was not running, so the module did not do anything at the
>>>time.
>>
>>Not true, if it got loaded it did something.
>>
>>Either reproduce without the nvidia module loaded, or take
>>your report to nvidia.
>
> Thank you for this stunning display of unprofessionalism and zealotry.

No, we have to thank you for that.

> People like you keep free software alive.

Yes indeed.
me@linux:~> grep -iC4 "davem" MAINTAINERS
CRYPTO API
P: James Morris
M: [email protected]
P: David S. Miller
M: [email protected]
W http://samba.org/~jamesm/crypto/
L: [email protected]
S: Maintained

--
S: Maintained

NETWORKING [IPv4/IPv6]
P: David S. Miller
M: [email protected]
P: Alexey Kuznetsov
M: [email protected]
P: Pekka Savola (ipv6)
M: [email protected]
--
S: Maintained

UltraSPARC (sparc64):
P: David S. Miller
M: [email protected]
P: Eddie C. Dost
M: [email protected]
P: Jakub Jelinek
M: [email protected]
me@linux:~> grep -iC4 "felix" MAINTAINERS CREDITS
me@linux:~> grep -iC4 "fefe" MAINTAINERS CREDITS
me@linux:~> grep -iC4 "leitner" MAINTAINERS CREDITS
me@linux:~>

Over and out.

2003-05-05 13:53:28

by Chris Friesen

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

Felix von Leitner wrote:
> Thus spake David S. Miller ([email protected]):

>>Either reproduce without the nvidia module loaded, or take
>>your report to nvidia.
>>
>
> Thank you for this stunning display of unprofessionalism and zealotry.
> People like you keep free software alive.

He may not have put it as politely as you would like, but there really is no way
to debug a problem in a kernel which has been tainted by binary-only drivers.
That driver could have done literally anything to the kernel on loading.

Chris




--
Chris Friesen | MailStop: 043/33/F10
Nortel Networks | work: (613) 765-0557
3500 Carling Avenue | fax: (613) 765-2986
Nepean, ON K2H 8E9 Canada | email: [email protected]

2003-05-06 11:00:04

by William Lee Irwin III

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

On Sun, May 04, 2003 at 07:39:56PM +0200, Felix von Leitner wrote:
> Out of Memory: Killed process 51 (sshd).
> artillery-fork: page allocation failure. order:0, mode:0x20
> [this message comes about 50 times]
> Out of Memory: Killed process 52 (zsh).
> spurious 8259A interrupt: IRQ7.
> Out of Memory: Killed process 49 (sshd).
> alloc_area_pte: page already exists
> alloc_area_pte: page already exists
> alloc_area_pte: page already exists
> alloc_area_pte: page already exists
> VFS: Close: file count is 0
> VFS: Close: file count is 0

Could I get a list of devices on your system and the drivers you're using?
A .config and a list of out-of-tree modules (ignore nvidia you already
reproduced without it) would be nice, too.

Thanks.

-- wli

2003-05-06 11:34:48

by William Lee Irwin III

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

On Sun, May 04, 2003 at 07:39:56PM +0200, Felix von Leitner wrote:
> I am running several scalability tests on Linux 2.5.68, all related to
> network servers. My test box is my notebook, Pentium 3 @ 900 MHz, 256
> MB RAM. I run a small http server on it that supports the following
> models:

I think I found it already; it's going to take a while to produce a fix
for what turned up during my audit.


-- wli

2003-05-06 18:39:27

by Bill Davidsen

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

On Mon, 5 May 2003, Chris Friesen wrote:

> Felix von Leitner wrote:
> > Thus spake David S. Miller ([email protected]):
>
> >>Either reproduce without the nvidia module loaded, or take
> >>your report to nvidia.
> >>
> >
> > Thank you for this stunning display of unprofessionalism and zealotry.
> > People like you keep free software alive.
>
> He may not have put it as politely as you would like, but there really is no way
> to debug a problem in a kernel which has been tainted by binary-only drivers.
> That driver could have done literally anything to the kernel on loading.

There's no need to be rude in any case, particularly after the OP reposted
a not tainted oops which had been through ksymoops and didn't get any help
anyway. Why be nasty about the format of a question you're not answering
even after it's been asked again in the preferred format?

It's a shame that some people seem to think that lots of hard work
entitles them to be rude and condescending, while really important
contributors like Alan Cox, Ingo and akpm can be polite and helpful, even
when they are correcting someone or disagreeing on an approach to a
problem.

--
bill davidsen <[email protected]>
CTO, TMR Associates, Inc
Doing interesting things with little computers since 1979.

2003-05-06 20:27:55

by Timothy Miller

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues



Bill Davidsen wrote:

>
> It's a shame that some people seem to think that lots of hard work
> entitles them to be rude and condescending, while really important
> contributors like Alan Cox, Ingo and akpm can be polite and helpful, even
> when they are correcting someone or disagreeing on an approach to a
> problem.
>

I read an article a while back by Paul Graham (LISP guru, SPAM filterer,
etc.) about Junior High School social dynamics. The people at the top
are confident, while the people in the middle want to climb the
popularity ladder and do so by pushing others down.

2003-05-07 00:10:13

by Carl-Daniel Hailfinger

[permalink] [raw]
Subject: Re: [2.5.68] Scalability issues

Bill Davidsen wrote:
> On Mon, 5 May 2003, Chris Friesen wrote:
>
>
>>Felix von Leitner wrote:
>>
>>>Thus spake David S. Miller ([email protected]):
>>
>>>>Either reproduce without the nvidia module loaded, or take
>>>>your report to nvidia.
>>>
>>>Thank you for this stunning display of unprofessionalism and zealotry.
>>>People like you keep free software alive.
>>
>>He may not have put it as politely as you would like, but there really is no way
>>to debug a problem in a kernel which has been tainted by binary-only drivers.
>>That driver could have done literally anything to the kernel on loading.
>
> There's no need to be rude in any case, particularly after the OP reposted
> a not tainted oops which had been through ksymoops and didn't get any help
> anyway. Why be nasty about the format of a question you're not answering
> even after it's been asked again in the preferred format?

Because the OP violated the lkml FAQ section 1.18:
All problems discovered whilst such a module is loaded must be reported
to the vendor of that module, /not/ the Linux kernel hackers and the
linux-kernel mailing list. [...] "oops" reports marked as tainted are of
no use to the kernel developers and will be ignored.

Davem just restated this fact with the same admittedly strong wording.
Felix von Leitner accused him of unprofessionalism and zealotry. That is
what I would call an offence.

> It's a shame that some people seem to think that lots of hard work
> entitles them to be rude and condescending, while really important
> contributors like Alan Cox, Ingo and akpm can be polite and helpful, even
> when they are correcting someone or disagreeing on an approach to a
> problem.

It's even more shocking if a user insults a kernel developer and expects
this developer (or one of his peers) to actually take care of the
problem. wli chose to investigate the report anyway, something not to be
taken for granted.

Hey, if I insulted Al Viro I'd never expect him to help me (respond,
point out mistakes etc.) anymore. Besides that, Al saved me from diving
into floppy.c, for which I'm still thankful.

Chris: Just a heads up - you may get private hate mail from Peter
"Firefly" Lund like I did because you pointed out a mistake of the OP.
So be warned about it.


Carl-Daniel