2005-10-08 00:31:09

by Sasa Ostrouska

[permalink] [raw]
Subject: oops in 2.6.14-rc3

Hi ppl,

After some playing with my new slackware 10.2 and
kernel 2.6.14-rc3 I noted this oops when shutting down the machine.
Can somebody tell me why ?

Oct 8 02:20:33 rc-vaio kernel: Unable to handle kernel paging request
at virtual address f8c19706
Oct 8 02:20:33 rc-vaio kernel: printing eip:
Oct 8 02:20:33 rc-vaio kernel: c01eac19
Oct 8 02:20:33 rc-vaio kernel: *pde = 37f83067
Oct 8 02:20:33 rc-vaio kernel: Oops: 0000 [#1]
Oct 8 02:20:33 rc-vaio kernel: PREEMPT
Oct 8 02:20:33 rc-vaio kernel: Modules linked in: nls_iso8859_1
nls_cp437 vfat fat nls_base nvidia snd_pcm_oss snd_mixer_oss ipv6
uhci_hcd joydev parport_pc parport psmouse pcspkr rtc sis_agp shpchp
pci_hotplug i2c_sis96x i2c_core usbhid usb_storage usbmouse snd_intel8x0
snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd snd_page_alloc
ohci_hcd ehci_hcd usbcore sis900 ohci1394 ieee1394 tsdev pcmcia
firmware_class yenta_socket rsrc_nonstatic pcmcia_core ide_scsi agpgart
Oct 8 02:20:33 rc-vaio kernel: CPU: 0
Oct 8 02:20:33 rc-vaio kernel: EIP: 0060:[<c01eac19>] Tainted: P
VLI
Oct 8 02:20:33 rc-vaio kernel: EFLAGS: 00010297 (2.6.14-rc3)
Oct 8 02:20:33 rc-vaio kernel: EIP is at vsnprintf+0x369/0x500
Oct 8 02:20:33 rc-vaio kernel: eax: f8c19706 ebx: 0000000a ecx:
f8c19706 edx: fffffffe
Oct 8 02:20:33 rc-vaio kernel: esi: f5c8311f edi: 00000000 ebp:
f5c83fff esp: ce25ded0
Oct 8 02:20:33 rc-vaio kernel: ds: 007b es: 007b ss: 0068
Oct 8 02:20:33 rc-vaio kernel: Process grep (pid: 12222,
threadinfo=ce25c000 task=f65d7a30)
Oct 8 02:20:33 rc-vaio kernel: Stack: 000003e1 00000000 00000010
00000004 00000002 00000001 ffffffff ffffffff
Oct 8 02:20:33 rc-vaio kernel: 00000eed f5c83113 c0331212
f5c83113 f65a3400 f65a3400 00000113 c017c46f
Oct 8 02:20:33 rc-vaio kernel: ce25df44 c0330509 f78b7fa0
c011fcb4 f65a3400 c0331200 00000000 c0330509
Oct 8 02:20:33 rc-vaio kernel: Call Trace:
Oct 8 02:20:33 rc-vaio kernel: [<c017c46f>] seq_printf+0x2f/0x60
Oct 8 02:20:33 rc-vaio kernel: [<c011fcb4>] r_show+0x84/0x90
Oct 8 02:20:33 rc-vaio kernel: [<c017c031>] seq_read+0x221/0x290
Oct 8 02:20:33 rc-vaio kernel: [<c015ba27>] vfs_read+0xc7/0x180
Oct 8 02:20:33 rc-vaio kernel: [<c015bdb7>] sys_read+0x47/0x80
Oct 8 02:20:33 rc-vaio kernel: [<c0103005>] syscall_call+0x7/0xb
Oct 8 02:20:33 rc-vaio kernel: Code: 00 83 cf 01 89 44 24 1c eb bc 8b
44 24 40 8b 54 24 18 83 44 24 40 04 8b 08 b8 5e 10 34 c0 81 f9 ff 0f 00
00 0f 46 c8 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 83
e7 10 89 c3 75 20
Oct 8 02:20:33 rc-vaio kernel: <6>note: grep[12222] exited with
preempt_count 1


Many thanks in advance.
Rgds
Sasa


2005-10-08 01:49:18

by Grant Coady

[permalink] [raw]
Subject: Re: oops in 2.6.14-rc3

On Sat, 08 Oct 2005 02:32:31 +0200, Sasa Ostrouska <[email protected]> wrote:

>Hi ppl,
>
> After some playing with my new slackware 10.2 and
>kernel 2.6.14-rc3 I noted this oops when shutting down the machine.
>Can somebody tell me why ?
>
>Oct 8 02:20:33 rc-vaio kernel: Unable to handle kernel paging request
>at virtual address f8c19706

What does 'grep swap /var/log/dmesg' have to say about it?

Grant.

2005-10-08 07:14:19

by Paolo Ornati

[permalink] [raw]
Subject: Re: oops in 2.6.14-rc3

On Sat, 08 Oct 2005 02:32:31 +0200
Sasa Ostrouska <[email protected]> wrote:

> Oct 8 02:20:33 rc-vaio kernel: EIP: 0060:[<c01eac19>] Tainted: P

http://www.tux.org/lkml/#s1-18

"Some vendors distribute binary modules (i.e. modules without available
source code under a free software license). As the source is not freely
available, any bugs uncovered whilst such modules are loaded cannot be
investigated by the kernel hackers. All problems discovered whilst such
a module is loaded must be reported to the vendor of that module, not
the Linux kernel hackers and the linux-kernel mailing list. The
tainting scheme is used to identify bug reports from kernels with
binary modules loaded: such kernels are marked as "tainted" by means of
the MODULE_LICENSE tag. If a module is loaded that does not specify an
approved license, the kernel is marked as tainted. The canonical list
of approved license strings is in linux/include/linux/module.h. "oops"
reports marked as tainted are of no use to the kernel developers and
will be ignored. A warning is output when such a module is loaded. Note
that you may come across module source that is under a compatible
license, but does not have a suitable MODULE_LICENSE tag. If you see a
warning from modprobe or insmod for a module under a compatible
license, please report this bug to the maintainers of the module, so
that they can add the necessary tag."

--
Paolo Ornati
Linux 2.6.14-rc3-gc0758146 on x86_64

2005-10-08 13:02:47

by Sasa Ostrouska

[permalink] [raw]
Subject: Re: oops in 2.6.14-rc3

On Sat, 2005-10-08 at 11:48 +1000, Grant Coady wrote:
> On Sat, 08 Oct 2005 02:32:31 +0200, Sasa Ostrouska <[email protected]> wrote:
>
> >Hi ppl,
> >
> > After some playing with my new slackware 10.2 and
> >kernel 2.6.14-rc3 I noted this oops when shutting down the machine.
> >Can somebody tell me why ?
> >
> >Oct 8 02:20:33 rc-vaio kernel: Unable to handle kernel paging request
> >at virtual address f8c19706
>
> What does 'grep swap /var/log/dmesg' have to say about it?
>
> Grant.

Dear MR. Grant, many thanks for your answer. Here is what I have on
dmesg:

root@rc-vaio:/home/sasa# grep swap /var/log/dmesg
Adding 1839376k swap on /dev/hda3. Priority:-1 extents:1
across:1839376k
root@rc-vaio:/home/sasa#

Rgds
Sasa

2005-10-23 13:04:46

by Sasa Ostrouska

[permalink] [raw]
Subject: Re: oops in 2.6.14-rc3

Dear Mr. Ornati, can you please help me now ?

Oct 20 03:01:50 rc-vaio kernel: Unable to handle kernel paging request
at virtual address f8e43706
Oct 20 03:01:50 rc-vaio kernel: printing eip:
Oct 20 03:01:50 rc-vaio kernel: c01eaf49
Oct 20 03:01:50 rc-vaio kernel: *pde = 01bae067
Oct 20 03:01:50 rc-vaio kernel: Oops: 0000 [#1]
Oct 20 03:01:50 rc-vaio kernel: PREEMPT
Oct 20 03:01:50 rc-vaio kernel: Modules linked in: snd_pcm_oss
snd_mixer_oss lp ipv6 uhci_hcd joydev parport_pc parport psmouse pcspkr
rtc sis_agp shpchp pci_hotplug i2c_sis96x i2c_core usb_storage
snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd
snd_page_alloc ohci_hcd ehci_hcd usbcore sis900 ohci1394 ieee1394 tsdev
pcmcia firmware_class yenta_socket rsrc_nonstatic pcmcia_core ide_scsi
agpgart
Oct 20 03:01:50 rc-vaio kernel: CPU: 0
Oct 20 03:01:50 rc-vaio kernel: EIP: 0060:[<c01eaf49>] Not tainted
VLI
Oct 20 03:01:50 rc-vaio kernel: EFLAGS: 00010297 (2.6.14-rc4)
Oct 20 03:01:50 rc-vaio kernel: EIP is at vsnprintf+0x369/0x500
Oct 20 03:01:50 rc-vaio kernel: eax: f8e43706 ebx: 0000000a ecx:
f8e43706 edx: fffffffe
Oct 20 03:01:50 rc-vaio kernel: esi: f596e11f edi: 00000000 ebp:
f596efff esp: f398ded0
Oct 20 03:01:50 rc-vaio kernel: ds: 007b es: 007b ss: 0068
Oct 20 03:01:50 rc-vaio kernel: Process grep (pid: 7529,
threadinfo=f398c000 task=f6122030)
Oct 20 03:01:50 rc-vaio kernel: Stack: 000003e1 00000000 00000010
00000004 00000002 00000001 ffffffff ffffffff
Oct 20 03:01:50 rc-vaio kernel: 00000eed f596e113 c0331532
f596e113 f665c380 f665c380 00000113 c017c52f
Oct 20 03:01:50 rc-vaio kernel: f398df44 c0330829 f7fe0ca0
c011fcb4 f665c380 c0331520 00000000 c0330829
Oct 20 03:01:50 rc-vaio kernel: Call Trace:
Oct 20 03:01:50 rc-vaio kernel: [<c017c52f>] seq_printf+0x2f/0x60
Oct 20 03:01:50 rc-vaio kernel: [<c011fcb4>] r_show+0x84/0x90
Oct 20 03:01:50 rc-vaio kernel: [<c017c0f1>] seq_read+0x221/0x290
Oct 20 03:01:50 rc-vaio kernel: [<c015bae7>] vfs_read+0xc7/0x180
Oct 20 03:01:50 rc-vaio kernel: [<c015be77>] sys_read+0x47/0x80
Oct 20 03:01:50 rc-vaio kernel: [<c0103005>] syscall_call+0x7/0xb
Oct 20 03:01:50 rc-vaio kernel: Code: 00 83 cf 01 89 44 24 1c eb bc 8b
44 24 40 8b 54 24 18 83 44 24 40 04 8b 08 b8 fe 14 34 c0 81 f9 ff 0f 00
00 0f 46 c8 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 83
e7 10 89 c3 75 20
Oct 20 03:01:50 rc-vaio kernel: <6>note: grep[7529] exited with
preempt_count 1

Thank you very much for your help.
Rgds
Sasa Ostrouska



On Sat, 2005-10-08 at 09:14 +0200, Paolo Ornati wrote:
> On Sat, 08 Oct 2005 02:32:31 +0200
> Sasa Ostrouska <[email protected]> wrote:
>
> > Oct 8 02:20:33 rc-vaio kernel: EIP: 0060:[<c01eac19>] Tainted: P
>
> http://www.tux.org/lkml/#s1-18
>
> "Some vendors distribute binary modules (i.e. modules without available
> source code under a free software license). As the source is not freely
> available, any bugs uncovered whilst such modules are loaded cannot be
> investigated by the kernel hackers. All problems discovered whilst such
> a module is loaded must be reported to the vendor of that module, not
> the Linux kernel hackers and the linux-kernel mailing list. The
> tainting scheme is used to identify bug reports from kernels with
> binary modules loaded: such kernels are marked as "tainted" by means of
> the MODULE_LICENSE tag. If a module is loaded that does not specify an
> approved license, the kernel is marked as tainted. The canonical list
> of approved license strings is in linux/include/linux/module.h. "oops"
> reports marked as tainted are of no use to the kernel developers and
> will be ignored. A warning is output when such a module is loaded. Note
> that you may come across module source that is under a compatible
> license, but does not have a suitable MODULE_LICENSE tag. If you see a
> warning from modprobe or insmod for a module under a compatible
> license, please report this bug to the maintainers of the module, so
> that they can add the necessary tag."
>

2005-10-23 13:48:15

by Adam Kropelin

[permalink] [raw]
Subject: Re: oops in 2.6.14-rc3

Sasa Ostrouska <[email protected]> wrote:
> Oct 20 03:01:50 rc-vaio kernel: Unable to handle kernel paging request at virtual address f8e43706
> Oct 20 03:01:50 rc-vaio kernel: printing eip:
> Oct 20 03:01:50 rc-vaio kernel: c01eaf49
> Oct 20 03:01:50 rc-vaio kernel: *pde = 01bae067
> Oct 20 03:01:50 rc-vaio kernel: Oops: 0000 [#1]
> Oct 20 03:01:50 rc-vaio kernel: PREEMPT
> Oct 20 03:01:50 rc-vaio kernel: Modules linked in: snd_pcm_oss
> snd_mixer_oss lp ipv6 uhci_hcd joydev parport_pc parport psmouse pcspkr
> rtc sis_agp shpchp pci_hotplug i2c_sis96x i2c_core usb_storage
> snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd
> snd_page_alloc ohci_hcd ehci_hcd usbcore sis900 ohci1394 ieee1394 tsdev
> pcmcia firmware_class yenta_socket rsrc_nonstatic pcmcia_core ide_scsi
> agpgart
> Oct 20 03:01:50 rc-vaio kernel: CPU: 0
> Oct 20 03:01:50 rc-vaio kernel: EIP: 0060:[<c01eaf49>] Not tainted VLI
> Oct 20 03:01:50 rc-vaio kernel: EFLAGS: 00010297 (2.6.14-rc4)
> Oct 20 03:01:50 rc-vaio kernel: EIP is at vsnprintf+0x369/0x500
> Oct 20 03:01:50 rc-vaio kernel: eax: f8e43706 ebx: 0000000a ecx: f8e43706 edx: fffffffe
> Oct 20 03:01:50 rc-vaio kernel: esi: f596e11f edi: 00000000 ebp: f596efff esp: f398ded0
> Oct 20 03:01:50 rc-vaio kernel: ds: 007b es: 007b ss: 0068
> Oct 20 03:01:50 rc-vaio kernel: Process grep (pid: 7529, threadinfo=f398c000 task=f6122030)
> Oct 20 03:01:50 rc-vaio kernel: Stack: 000003e1 00000000 00000010 00000004 00000002 00000001 ffffffff ffffffff
> Oct 20 03:01:50 rc-vaio kernel: 00000eed f596e113 c0331532 f596e113 f665c380 f665c380 00000113 c017c52f
> Oct 20 03:01:50 rc-vaio kernel: f398df44 c0330829 f7fe0ca0 c011fcb4 f665c380 c0331520 00000000 c0330829
> Oct 20 03:01:50 rc-vaio kernel: Call Trace:
> Oct 20 03:01:50 rc-vaio kernel: [<c017c52f>] seq_printf+0x2f/0x60
> Oct 20 03:01:50 rc-vaio kernel: [<c011fcb4>] r_show+0x84/0x90
> Oct 20 03:01:50 rc-vaio kernel: [<c017c0f1>] seq_read+0x221/0x290
> Oct 20 03:01:50 rc-vaio kernel: [<c015bae7>] vfs_read+0xc7/0x180
> Oct 20 03:01:50 rc-vaio kernel: [<c015be77>] sys_read+0x47/0x80
> Oct 20 03:01:50 rc-vaio kernel: [<c0103005>] syscall_call+0x7/0xb
> Oct 20 03:01:50 rc-vaio kernel: Code: 00 83 cf 01 89 44 24 1c eb bc 8b
> 44 24 40 8b 54 24 18 83 44 24 40 04 8b 08 b8 fe 14 34 c0 81 f9 ff 0f 00
> 00 0f 46 c8 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 83
> e7 10 89 c3 75 20
> Oct 20 03:01:50 rc-vaio kernel: <6>note: grep[7529] exited with preempt_count 1

If I had to guess (and I do) I'd say one of your shutdown scripts tried
to grep thru something in /proc and the module that once supplied the
data for that something is gone, without having removed its /proc
entries. Lacking any particular insight on what module to blame, I'd
start by disabling various modules and booting cleanly so they never
load. Binary search your way thru them until you find the culprit.

--Adam

2005-10-23 14:32:24

by Sergey Vlasov

[permalink] [raw]
Subject: Re: oops in 2.6.14-rc3

On Sun, 23 Oct 2005 10:22:49 -0400 Adam Kropelin wrote:

> Sasa Ostrouska <[email protected]> wrote:
> > Oct 20 03:01:50 rc-vaio kernel: Unable to handle kernel paging request at virtual address f8e43706
> > Oct 20 03:01:50 rc-vaio kernel: printing eip:
> > Oct 20 03:01:50 rc-vaio kernel: c01eaf49
> > Oct 20 03:01:50 rc-vaio kernel: *pde = 01bae067
> > Oct 20 03:01:50 rc-vaio kernel: Oops: 0000 [#1]
> > Oct 20 03:01:50 rc-vaio kernel: PREEMPT
> > Oct 20 03:01:50 rc-vaio kernel: Modules linked in: snd_pcm_oss
> > snd_mixer_oss lp ipv6 uhci_hcd joydev parport_pc parport psmouse pcspkr
> > rtc sis_agp shpchp pci_hotplug i2c_sis96x i2c_core usb_storage
> > snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd
> > snd_page_alloc ohci_hcd ehci_hcd usbcore sis900 ohci1394 ieee1394 tsdev
> > pcmcia firmware_class yenta_socket rsrc_nonstatic pcmcia_core ide_scsi
> > agpgart
> > Oct 20 03:01:50 rc-vaio kernel: CPU: 0
> > Oct 20 03:01:50 rc-vaio kernel: EIP: 0060:[<c01eaf49>] Not tainted VLI
> > Oct 20 03:01:50 rc-vaio kernel: EFLAGS: 00010297 (2.6.14-rc4)
> > Oct 20 03:01:50 rc-vaio kernel: EIP is at vsnprintf+0x369/0x500
> > Oct 20 03:01:50 rc-vaio kernel: eax: f8e43706 ebx: 0000000a ecx: f8e43706 edx: fffffffe
> > Oct 20 03:01:50 rc-vaio kernel: esi: f596e11f edi: 00000000 ebp: f596efff esp: f398ded0
> > Oct 20 03:01:50 rc-vaio kernel: ds: 007b es: 007b ss: 0068
> > Oct 20 03:01:50 rc-vaio kernel: Process grep (pid: 7529, threadinfo=f398c000 task=f6122030)
> > Oct 20 03:01:50 rc-vaio kernel: Stack: 000003e1 00000000 00000010 00000004 00000002 00000001 ffffffff ffffffff
> > Oct 20 03:01:50 rc-vaio kernel: 00000eed f596e113 c0331532 f596e113 f665c380 f665c380 00000113 c017c52f
> > Oct 20 03:01:50 rc-vaio kernel: f398df44 c0330829 f7fe0ca0 c011fcb4 f665c380 c0331520 00000000 c0330829
> > Oct 20 03:01:50 rc-vaio kernel: Call Trace:
> > Oct 20 03:01:50 rc-vaio kernel: [<c017c52f>] seq_printf+0x2f/0x60
> > Oct 20 03:01:50 rc-vaio kernel: [<c011fcb4>] r_show+0x84/0x90
> > Oct 20 03:01:50 rc-vaio kernel: [<c017c0f1>] seq_read+0x221/0x290
> > Oct 20 03:01:50 rc-vaio kernel: [<c015bae7>] vfs_read+0xc7/0x180
> > Oct 20 03:01:50 rc-vaio kernel: [<c015be77>] sys_read+0x47/0x80
> > Oct 20 03:01:50 rc-vaio kernel: [<c0103005>] syscall_call+0x7/0xb
> > Oct 20 03:01:50 rc-vaio kernel: Code: 00 83 cf 01 89 44 24 1c eb bc 8b
> > 44 24 40 8b 54 24 18 83 44 24 40 04 8b 08 b8 fe 14 34 c0 81 f9 ff 0f 00
> > 00 0f 46 c8 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 83
> > e7 10 89 c3 75 20
> > Oct 20 03:01:50 rc-vaio kernel: <6>note: grep[7529] exited with preempt_count 1
>
> If I had to guess (and I do) I'd say one of your shutdown scripts tried
> to grep thru something in /proc and the module that once supplied the
> data for that something is gone, without having removed its /proc
> entries. Lacking any particular insight on what module to blame, I'd
> start by disabling various modules and booting cleanly so they never
> load. Binary search your way thru them until you find the culprit.

$ git grep -w r_show
fs/reiserfs/procfs.c:static int r_show(struct seq_file *m, void *v)
fs/reiserfs/procfs.c: .show = r_show,
kernel/resource.c:static int r_show(struct seq_file *m, void *v)
kernel/resource.c: .show = r_show,

This does not look like r_show() from reiserfs, because that function
does not call seq_printf() directly, so it must be r_show() from
kernel/resource.c:

static int r_show(struct seq_file *m, void *v)
{
struct resource *root = m->private;
struct resource *r = v, *p;
int width = root->end < 0x10000 ? 4 : 8;
int depth;

for (depth = 0, p = r; depth < MAX_IORES_LEVEL; depth++, p = p->parent)
if (p->parent == root)
break;
seq_printf(m, "%*s%0*lx-%0*lx : %s\n",
depth * 2, "",
width, r->start,
width, r->end,
r->name ? r->name : "<BAD>");
return 0;
}

This function is responsible for /proc/ioports and /proc/iomem.

First parameters of seq_printf() in the stack were:

f665c380 m
c0331520 "%*s%0*lx-%0*lx : %s\n"
00000000 depth * 2
c0330829 ""

(unfortunately, no more information is available in the stack dump).

They do not look like the bad pointer (f8e43706), so the most likely
culprit is r->name - probably some module set the resource name to some
string constant, and then was unloaded, but did not perform the proper
cleanup. And depth == 0 means that the problematic resource most likely
did not belong to a PCI device - maybe it was some legacy resource.

You have the list of modules which were loaded at oops time (see
"Modules linked in:" above); please also show the lsmod output obtained
when the system is working - then we can find which modules were
unloaded and investigate those more closely.


Attachments:
(No filename) (4.67 kB)
(No filename) (189.00 B)
Download all attachments