Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S267638AbTGTSOe (ORCPT ); Sun, 20 Jul 2003 14:14:34 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S267647AbTGTSOe (ORCPT ); Sun, 20 Jul 2003 14:14:34 -0400 Received: from fed1mtao02.cox.net ([68.6.19.243]:40154 "EHLO fed1mtao02.cox.net") by vger.kernel.org with ESMTP id S267638AbTGTSOc (ORCPT ); Sun, 20 Jul 2003 14:14:32 -0400 Message-ID: <3F1ADED4.8020809@cox.net> Date: Sun, 20 Jul 2003 11:26:28 -0700 From: "Kevin P. Fleming" User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.4) Gecko/20030624 X-Accept-Language: en-us, en MIME-Version: 1.0 To: LKML Subject: Hard-to-catch oops with 2.6.0-test1, is this enough? Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3734 Lines: 89 I've had an oops occurring randomly, and not frequently (every 5-6 days) for weeks now, using 2.5.7? kernels and now today with 2.6.0-test1. I've got the system set up with a serial console, and another system capturing the output (when I set it up), but have never managed to catch the oops message. This morning, however, the oops occurred and I was able to use Alt-SysRq-P and capture that output, which is below. Is this adequate for tracking down the cause of this problem? If not, I'm going to have to set up something that can run 24/7 to catch the real oops message. SysRq : Show Regs Pid: 7, comm: pdflush EIP: 0060:[] CPU: 0 EIP is at panic+0xe7/0x100 EFLAGS: 00000246 Not tainted EAX: 00000000 EBX: c138c000 ECX: 00000000 EDX: 00000000 ESI: 00000000 EDI: c010a1c0 EBP: c5049880 DS: 007b ES: 007b CR0: 8005003b CR2: 41360000 CR3: 0ade1000 CR4: 000002d0 Call Trace: [] die+0xb7/0xd0 [] do_invalid_op+0xc9/0xd0 [] bio_end_io_pagebuf+0xb9/0x130 [] default_wake_function+0x2a/0x30 [] __wake_up_common+0x31/0x60 [] default_wake_function+0x2a/0x30 [] __wake_up_common+0x31/0x60 [] error_code+0x2d/0x38 [] bio_end_io_pagebuf+0xb9/0x130 [] bio_endio+0x53/0x80 [] clone_endio+0x6f/0xb0 [] bio_endio+0x53/0x80 [] __end_that_request_first+0x205/0x230 [] scsi_end_request+0x3b/0xb0 [] scsi_io_completion+0x1bb/0x480 [] sd_rw_intr+0x52/0x1c0 [] scsi_finish_command+0x78/0xc0 [] scsi_softirq+0xae/0xe0 [] do_softirq+0x99/0xa0 [] do_IRQ+0xc2/0xe0 [] common_interrupt+0x18/0x20 [] mark_page_accessed+0x1f/0x30 [] _pagebuf_lookup_pages+0x365/0x3b0 [] pagebuf_get+0xb9/0x140 [] xfs_trans_read_buf+0x17d/0x390 [] xfs_alloc_read_agfl+0x87/0xa0 [] xfs_alloc_fix_freelist+0x2dc/0x470 [] xfs_alloc_log_agf+0x58/0x60 [] xfs_alloc_ag_vextent+0x6a/0x120 [] xfs_alloc_vextent+0x1f0/0x390 [] xfs_bmap_alloc+0x860/0x1350 [] xfs_bmbt_get_state+0x2f/0x40 [] xfs_bmapi+0x56e/0x1400 [] xfs_bmbt_get_state+0x2f/0x40 [] xfs_bmap_do_search_extents+0xb8/0x3d0 [] xfs_log_reserve+0xbd/0xd0 [] xfs_iomap_write_allocate+0x2a8/0x4c0 [] as_set_request+0x25/0x70 [] xfs_iomap+0x3b2/0x4c0 [] dm_request+0x70/0xb0 [] rb_erase+0x63/0x100 [] map_blocks+0x5e/0xd0 [] page_state_convert+0x3f5/0x540 [] elv_next_request+0x16/0x100 [] generic_unplug_device+0x4e/0x50 [] blk_run_queues+0x66/0x80 [] xfs_iflush+0x1de/0x4d0 [] linvfs_writepage+0x58/0x110 [] mpage_writepages+0x1ce/0x290 [] apic_timer_interrupt+0x1a/0x20 [] linvfs_writepage+0x0/0x110 [] do_writepages+0x36/0x40 [] __sync_single_inode+0xa9/0x1f0 [] sync_sb_inodes+0x18c/0x230 [] writeback_inodes+0x33/0x50 [] wb_kupdate+0x9c/0x120 [] __pdflush+0xae/0x160 [] pdflush+0x0/0x20 [] pdflush+0xf/0x20 [] wb_kupdate+0x0/0x120 [] kernel_thread_helper+0x0/0x10 [] kernel_thread_helper+0x5/0x10 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/