Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Tue, 26 Dec 2000 07:16:08 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Tue, 26 Dec 2000 07:15:58 -0500 Received: from 5dyn231.com21.casema.net ([212.64.96.231]:30481 "HELO home.ds9a.nl") by vger.kernel.org with SMTP id ; Tue, 26 Dec 2000 07:15:41 -0500 Date: Tue, 26 Dec 2000 12:45:12 +0100 From: Jasper Spaans To: Linus Torvalds Cc: linux-kernel@vger.kernel.org, "David S. Miller" Subject: Re: [bug] test13-pre4 nfs/ip_defrag crash (smp) Message-ID: <20001226124512.A888@spaans.ds9a.nl> In-Reply-To: <20001225225925.A1276@spaans.ds9a.nl> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from torvalds@transmeta.com on Mon, Dec 25, 2000 at 04:34:37PM -0800 Organization: http://www.insultant.nl/ X-Copyright: Copyright 2000 C. Jasper Spaans - All Rights Reserved Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 25, 2000 at 04:34:37PM -0800, Linus Torvalds wrote: > > > On Mon, 25 Dec 2000, Jasper Spaans wrote: > > > > I am having some reproducible crashes with 2.4.0-test13-pre4, whenever I > > do some 'heavy' nfs-ing.. decoded oops: > > It looks like most of what you have is modules. Is netfilter enabled as a > module too? Can you reproduce it without modules, in case it's a > autounload race or similar? Right, I've just recompiled with nfs, iptables and my nic driver (8139too) in the kernel. Testing[*] with nfs v2 and v3 crashes it, first oops is with v2, second with v3: [*]: just copying a set of large files between two machines running 2.4.0-test13-pre4 [which are able to saturate the 10Mbps link between them], when copying to a slower machine running 2.2.18, it doesn't crash. ksymoops 2.3.4 on i686 2.4.0-test13-pre4. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0-test13-pre4/ (default) -m /boot/System.map-2.4.0-test13-pre4 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Unable to handle kernel paging request at virtual address 6361636b c020609e *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010202 eax: 6361632f ebx: cf0b4f00 ecx: c91bc824 edx: c9e0bfa0 esi: 00000b90 edi: cf0af0c0 ebp: 000005c8 esp: c99bfc4c ds: 0018 es: 0018 ss: 0018 Process rpciod (pid: 681, stackpage=c99bf000) Stack: c9e0bfa0 00000000 00001906 0700000a 00000014 00000000 c020648d c9e0bfa0 cf0af0c0 c03219ac c99be000 c99d71c0 cf0af0c0 6361632f c91bc810 c0229262 cf0af0c0 c99bfd48 c0349b38 c0208efc c99bfd58 c02289c9 cf0af0c0 c99bfd48 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 40 3c 8b 4c 24 1c 89 41 3c c7 47 18 00 00 00 00 8b 54 24 >>EIP; c020609e <===== Trace; c020648d Trace; c0229262 Trace; c0208efc Trace; c02289c9 Trace; c0208efc Trace; c0208f10 Trace; c0208f10 Trace; c0200517 Trace; c0227c3a Trace; c0208efc Trace; c0200298 Trace; c0208efc Trace; c0208efc Trace; c0200517 Trace; c0208efc Trace; c020849b Trace; c0208efc Trace; c021e058 Trace; c02085c6 Trace; c021e058 Trace; ea00000a Trace; c01f8b0e <__kfree_skb+132/138> Trace; c021e4ee Trace; c021e058 Trace; ea00000a Trace; ea00000a Trace; ea00000a Trace; c0223c96 Trace; c01f5c45 Trace; c023ae9a Trace; c011345d Trace; c016a214 Trace; c023dde9 Trace; c023ad45 Trace; c0239043 Trace; c023c58b <__rpc_execute+c3/338> Trace; c023c989 <__rpc_schedule+119/15c> Trace; c023d26e Trace; c0107480 Code; c020609e 00000000 <_EIP>: Code; c020609e <===== 0: 8b 40 3c mov 0x3c(%eax),%eax <===== Code; c02060a1 3: 8b 4c 24 1c mov 0x1c(%esp,1),%ecx Code; c02060a5 7: 89 41 3c mov %eax,0x3c(%ecx) Code; c02060a8 a: c7 47 18 00 00 00 00 movl $0x0,0x18(%edi) Code; c02060af 11: 8b 54 24 00 mov 0x0(%esp,1),%edx Kernel panic: Aiee, killing interrupt handler! 1 warning issued. Results may not be reliable. ksymoops 2.3.4 on i686 2.4.0-test13-pre4. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0-test13-pre4/ (default) -m /boot/System.map-2.4.0-test13-pre4 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Unable to handle kernel paging request at virtual address 400fcab8 c020609e *pde = 0e6eb067 Oops: 0000 CPU: 1 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010202 eax: 400fca7c ebx: cf96d8c0 ecx: c89a2024 edx: cf1eae60 esi: 00001720 edi: cf96d820 ebp: 00001158 esp: c898bc4c ds: 0018 es: 0018 ss: 0018 Process rpciod (pid: 809, stackpage=c898b000) Stack: cf1eae60 00000000 000082a9 0700000a 00000014 00000000 c020648d cf1eae60 cf96d820 c03219ac c898a000 cb0f6120 cf96d820 400fca7c c89a2010 c0229262 cf96d820 c898bd48 c0349b38 c0208efc c898bd58 c02289c9 cf96d820 c898bd48 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 40 3c 8b 4c 24 1c 89 41 3c c7 47 18 00 00 00 00 8b 54 24 >>EIP; c020609e <===== Trace; c020648d Trace; c0229262 Trace; c0208efc Trace; c02289c9 Trace; c0208efc Trace; c0208f10 Trace; c0208f10 Trace; c0200517 Trace; c0227c3a Trace; c0208efc Trace; c0200298 Trace; c0208efc Trace; c0208efc Trace; c0200517 Trace; c0208efc Trace; c020849b Trace; c0208efc Trace; c021e058 Trace; c02085c6 Trace; c021e058 Trace; ea00000a Trace; c01f8b0e <__kfree_skb+132/138> Trace; c021e4ee Trace; c021e058 Trace; ea00000a Trace; ea00000a Trace; ea00000a Trace; c0223c96 Trace; c01f5c45 Trace; c023ae9a Trace; c0205736 Trace; c020586c Trace; c0163820 Trace; c016cf08 Trace; c023dde9 Trace; c023ad45 Trace; c0239043 Trace; c023c58b <__rpc_execute+c3/338> Trace; c023c989 <__rpc_schedule+119/15c> Trace; c023d26e Trace; c0107480 Code; c020609e 00000000 <_EIP>: Code; c020609e <===== 0: 8b 40 3c mov 0x3c(%eax),%eax <===== Code; c02060a1 3: 8b 4c 24 1c mov 0x1c(%esp,1),%ecx Code; c02060a5 7: 89 41 3c mov %eax,0x3c(%ecx) Code; c02060a8 a: c7 47 18 00 00 00 00 movl $0x0,0x18(%edi) Code; c02060af 11: 8b 54 24 00 mov 0x0(%esp,1),%edx Kernel panic: Aiee, killing interrupt handler! 1 warning issued. Results may not be reliable. Regards, -- Jasper Spaans - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org Please read the FAQ at http://www.tux.org/lkml/