Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Thu, 6 Mar 2003 04:24:05 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Thu, 6 Mar 2003 04:24:05 -0500 Received: from babsi.intermeta.de ([212.34.181.3]:44811 "EHLO mail.intermeta.de") by vger.kernel.org with ESMTP id ; Thu, 6 Mar 2003 04:23:59 -0500 Subject: Re: [2.4.21-pre5-ac1] Oops and crash From: Henning Schmiedehausen To: Linux Kernel Mailing List Cc: Alan Cox In-Reply-To: <1046864514.7605.14.camel@forge.intermeta.de> References: <1046864514.7605.14.camel@forge.intermeta.de> Content-Type: multipart/mixed; boundary="=-mTMffauh0pWgGlQgiqUw" Organization: INTERMETA - Gesellschaft =?ISO-8859-1?Q?f=C3=BCr?= Mehrwertdienste mbH Message-Id: <1046943259.15620.19.camel@forge.intermeta.de> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.2.2 Date: 06 Mar 2003 10:34:19 +0100 X-Spam-Score: -33 () EMAIL_ATTRIBUTION,IN_REP_TO,QUOTED_EMAIL_TEXT,QUOTE_TWICE_1,REFERENCES,REPLY_WITH_QUOTES,USER_AGENT_XIMIAN Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 13919 Lines: 335 --=-mTMffauh0pWgGlQgiqUw Content-Type: text/plain Content-Transfer-Encoding: 7bit On Wed, 2003-03-05 at 12:41, Henning Schmiedehausen wrote: > Hi, > > serial console is my friend. :-) Freshly captured oops from tonight, box > was frozen after that. and another oops from tonight. Same configuration, same kernel. This seems to be TCP network related. I can push hundreds of megabytes over NFS / UDP and have no problem. But when the nightly backup starts at which does heavy CPU (gzip), network (well, streaming with 1 MBit/sec) and disk I/O (reading the data to back up from the disk), the machine seems to freeze. Am I really the only one seeing this? This might be ancient hardware but it definitely isn't exotic. :-) I'll go back to 2.4.18-26.7.x for now. > > Pentium Pro 200 - Natoma/Triton II Chipset, 192 MBytes RAM. Box is rock > solid under RedHat 7.3 release and errata kernel. > > Kernel Config and boot messages attached. This is a stock > 2.4.21-pre5-ac1 kernel compiled for i686. At the crash time, it had > the following modules loaded: > > % lsmod > Module Size Used by Not tainted > parport_pc 17412 1 (autoclean) > lp 8416 0 (autoclean) > parport 33440 1 (autoclean) [parport_pc lp] > autofs 11108 2 (autoclean) > nfsd 75584 8 (autoclean) > lockd 55424 1 (autoclean) [nfsd] > sunrpc 75540 1 (autoclean) [nfsd lockd] > 3c59x 28264 1 > ext3 65088 7 > jbd 46252 7 [ext3] > > and the following PCI devices are installed > > % lspci -vvt > -[00]-+-00.0 Intel Corp. 440FX - 82441FX PMC [Natoma] > +-07.0 Intel Corp. 82371SB PIIX3 ISA [Natoma/Triton II] > +-07.1 Intel Corp. 82371SB PIIX3 IDE [Natoma/Triton II] > +-0c.0 3Com Corporation 3c900 Combo [Boomerang] > \-0e.0 ATI Technologies Inc 215CT [Mach64 CT] Regards Henning -- Dipl.-Inf. (Univ.) Henning P. Schmiedehausen INTERMETA GmbH hps@intermeta.de +49 9131 50 654 0 http://www.intermeta.de/ Java, perl, Solaris, Linux, xSP Consulting, Web Services freelance consultant -- Jakarta Turbine Development -- hero for hire --=-mTMffauh0pWgGlQgiqUw Content-Disposition: attachment; filename=oops3 Content-Type: text/plain; name=oops3; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit ksymoops 2.4.4 on i686 2.4.21-pre5-ac1. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.21-pre5-ac1/ (default) -m /boot/System.map-2.4.21-pre5-ac1 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (expand_objects): object /lib/ext3.o for module ext3 has changed since load Warning (expand_objects): object /lib/jbd.o for module jbd has changed since load Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010087 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c07bfd50 ds: 0018 es: 0018 ss: 0018 Process gzip (pid: 3787, stackpage=c07bf000) Stack: 00000018 00000018 ffffff0b c0211a44 cafc3200 000001f0 00000568 c82c5b9c c01c482c 000006bc 000001f0 cbb614e0 00000000 c01e21b2 00000680 000001f0 00000000 00000058 00000016 00000046 00000001 c016fe76 c13ef2e0 00000000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c0211a44 Trace; c01c482c Trace; c01e21b2 Trace; c016fe76 Trace; c01a1f14 Trace; c01a7710 Trace; c01daab2 Trace; c0116b58 <__wake_up+38/60> Trace; c01dae65 Trace; c01a7bc7 Trace; c01fd1f5 Trace; c01c18af Trace; cc870344 <[3c59x]boomerang_rx+2a4/450> Trace; c016fda1 Trace; c01c1ac7 Trace; c0120d16 Trace; c0137306 Trace; c011d8cb Trace; c011d7d4 Trace; c011d5fb Trace; c0109dec Trace; c010883b Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <1>Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010087 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c0717d50 ds: 0018 es: 0018 ss: 0018 Process sed (pid: 3792, stackpage=c0717000) Stack: c0663cc0 c82c51dc c82c51dc c01ec6d8 cbb613a0 000001f0 ffffffe0 c82c51dc c01c482c 000006bc 000001f0 c82c5118 c0717f30 c01e21b2 00000680 000001f0 00000082 c8f3d620 00000046 c016fda1 00000615 fc4c8917 0000000b 00000000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c01ec6d8 Trace; c01c482c Trace; c01e21b2 Trace; c016fda1 Trace; c0116b58 <__wake_up+38/60> Trace; c016fda1 Trace; c0116b58 <__wake_up+38/60> Trace; c016fda1 Trace; c016fe76 Trace; c01a2e2b Trace; c01a7781 Trace; c01fd1f5 Trace; c01c18af Trace; c010734b <__switch_to+2b/100> Trace; c0116af7 Trace; c01c1ac7 Trace; c0137306 Trace; c0109c3a Trace; c0109db8 Trace; c0109ddc Trace; c010883b Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <1>Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010083 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c081dd50 ds: 0018 es: 0018 ss: 0018 Process sendbackup (pid: 3785, stackpage=c081d000) Stack: 00000000 00000000 c9f02ea0 c081ddb4 c0663860 000001f0 ffffffe0 c82c56bc c01c482c 000006bc 000001f0 c82c55f8 c081df30 c01e21b2 00000680 000001f0 0001803b c0138cd8 cbb2cb00 00000305 c0138ce9 c135e000 00000000 cbb2cb00 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c01c482c Trace; c01e21b2 Trace; c0138cd8 Trace; c0138ce9 Trace; cc80dc19 <[jbd]do_get_write_access+469/490> Trace; cc80dc78 <[jbd]journal_get_write_access+38/50> Trace; cc81fff1 <[ext3]ext3_reserve_inode_write+31/b0> Trace; cc820143 <[ext3]ext3_dirty_inode+93/d0> Trace; cc81ff84 <[ext3]ext3_mark_iloc_dirty+24/60> Trace; cc81ff95 <[ext3]ext3_mark_iloc_dirty+35/60> Trace; cc80e571 <[jbd]journal_stop+1b1/1c0> Trace; c01fd1f5 Trace; c01c18af Trace; c01c1ac7 Trace; c0137306 Trace; c0109c3a Trace; c011cf2b Trace; c010883b Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <1>Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010087 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c028de84 ds: 0018 es: 0018 ss: 0018 Process swapper (pid: 0, stackpage=c028d000) Stack: c019a74b c01a820b 00000001 cbb61760 cba6b760 00000020 cbe7b400 00000109 c01c482c 0000065c 00000020 0000008c cbe7b400 cc8703d6 00000620 00000020 0000001f 00000000 00009400 0000001f cbe7b560 00000001 00000096 cb266000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c019a74b Trace; c01a820b <__ide_dma_begin+2b/40> Trace; c01c482c Trace; cc8703d6 <[3c59x]boomerang_rx+336/450> Trace; c011644b Trace; c01ef5bb Trace; cc86fabf <[3c59x]boomerang_interrupt+12f/3a0> Trace; c012124d Trace; c0109c3a Trace; c0109db8 Trace; c0106de0 Trace; c0105000 <_stext+0/0> Trace; c010c1c8 Trace; c0106de0 Trace; c0106de0 Trace; c0105000 <_stext+0/0> Trace; c0106e03 Trace; c0106e54 Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <0>Kernel panic: Aiee, killing interrupt handler! 3 warnings issued. Results may not be reliable. --=-mTMffauh0pWgGlQgiqUw-- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/