Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S264246AbUFUPLY (ORCPT ); Mon, 21 Jun 2004 11:11:24 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S266261AbUFUPLY (ORCPT ); Mon, 21 Jun 2004 11:11:24 -0400 Received: from main.gmane.org ([80.91.224.249]:34462 "EHLO main.gmane.org") by vger.kernel.org with ESMTP id S264246AbUFUPLI (ORCPT ); Mon, 21 Jun 2004 11:11:08 -0400 X-Injected-Via-Gmane: http://gmane.org/ To: linux-kernel@vger.kernel.org From: Rodrigo Ventura Subject: kernel oops with v2.6.7 and tracepath6 Date: Mon, 21 Jun 2004 16:08:59 +0100 Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Complaints-To: usenet@sea.gmane.org X-Gmane-NNTP-Posting-Host: gtisr.ist.utl.pt User-Agent: Gnus/5.1006 (Gnus v5.10.6) XEmacs/21.4 (Security Through Obscurity, linux) Cancel-Lock: sha1:UTkF4eptScCfMIyjpIa+IXzuvQg= Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 7457 Lines: 186 Hello, I just got a kernel oops (two actually) after runmning tracepath6 (from suse's iputils-ss021109-147.rpm) in a suse9.1-i386 machine: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Machine check exception polling timer started. 3c59x: Donald Becker and others. www.scyld.com/network/vortex.html 0000:00:0a.0: 3Com PCI 3c905B Cyclone 100baseTx at 0xa800. Vers LK1.1.19 Bank 2: 940040000000017a kernel BUG at net/core/skbuff.c:104! invalid operand: 0000 [#1] CPU: 0 EIP: 0060:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00210286 (2.6.7) eax: 0000002d ebx: cb70a620 ecx: 00000000 edx: c036e458 esi: c58a70f8 edi: c30d6002 ebp: c58a70d4 esp: c0a51bf4 ds: 007b es: 007b ss: 0068 Stack: c0356100 c02e36cf 000005f4 0000000e cfe3f000 c02e36db cb70a620 0000000e c02e36cf c0104bd5 c0a51c24 00200246 00000000 cfe2fe38 00000000 c0a51ccc c58a7194 c02e4679 c0a51ccc cb70a620 0000007b ffffffff c01fa25e 11000060 Call Trace: [] ip6_output2+0x2af/0x2e0 [] ip6_output2+0x2bb/0x2e0 [] ip6_output2+0x2af/0x2e0 [] error_code+0x2d/0x38 [] ip6_fragment+0x359/0x8b0 [] csum_partial_copy_generic+0x3a/0xfc [] ip6_output+0x34/0x50 [] ip6_output2+0x0/0x2e0 [] ip6_push_pending_frames+0x289/0x440 [] udp_v6_push_pending_frames+0x11c/0x180 [] udpv6_sendmsg+0x6c1/0x8a0 [] sock_recvmsg+0xb4/0x110 [] inet_sendmsg+0x4a/0x60 [] sock_sendmsg+0x9e/0xf0 [] pty_write+0x145/0x190 [] copy_from_user+0x54/0x80 [] sys_recvmsg+0x1f6/0x230 [] sockfd_lookup+0x1c/0x90 [] sys_sendto+0xfb/0x130 [] default_wake_function+0x0/0x20 [] default_wake_function+0x0/0x20 [] sys_send+0x37/0x40 [] sys_socketcall+0x18a/0x260 [] sysenter_past_esp+0x52/0x71 Code: 0f 0b 68 00 2c 36 35 c0 83 c4 14 c3 89 f6 8d bc 27 00 00 00 >>EIP; c027e52b <===== >>ebx; cb70a620 >>edx; c036e458 >>esi; c58a70f8 >>edi; c30d6002 >>ebp; c58a70d4 >>esp; c0a51bf4 Trace; c02e36cf Trace; c02e36db Trace; c02e36cf Trace; c0104bd5 Trace; c02e4679 Trace; c01fa25e Trace; c02e3734 Trace; c02e3420 Trace; c02e5799 Trace; c02f71ac Trace; c02f78d1 Trace; c027a814 Trace; c02c276a Trace; c027a70e Trace; c022afd5 Trace; c01fad54 Trace; c027c616 Trace; c027a47c Trace; c027be1b Trace; c0116a00 Trace; c0116a00 Trace; c027be87 Trace; c027c7da Trace; c0104159 Code; c027e52b 00000000 <_EIP>: Code; c027e52b <===== 0: 0f 0b ud2a <===== Code; c027e52d 2: 68 00 2c 36 35 push $0x35362c00 Code; c027e532 7: c0 83 c4 14 c3 89 f6 rolb $0xf6,0x89c314c4(%ebx) Code; c027e539 e: 8d bc 27 00 00 00 00 lea 0x0(%edi),%edi kernel BUG at net/core/skbuff.c:104! invalid operand: 0000 [#2] CPU: 0 EIP: 0060:[] Not tainted EFLAGS: 00210286 (2.6.7) eax: 0000002d ebx: cb70a1a0 ecx: 00000000 edx: c036e458 esi: c58a70f8 edi: c25d5802 ebp: c58a70d4 esp: c0a51bf4 ds: 007b es: 007b ss: 0068 Stack: c0356100 c02e36cf 000005f4 0000000e cfe3f000 c02e36db cb70a1a0 0000000e c02e36cf c0104bd5 c0a51c24 00200246 00000000 cfe2fc38 00000000 c0a51ccc c24fe714 c02e4679 c0a51ccc cb70a1a0 0000007b ffffffff c01fa25e 11000060 Call Trace: [] ip6_output2+0x2af/0x2e0 [] ip6_output2+0x2bb/0x2e0 [] ip6_output2+0x2af/0x2e0 [] error_code+0x2d/0x38 [] ip6_fragment+0x359/0x8b0 [] csum_partial_copy_generic+0x3a/0xfc [] ip6_output+0x34/0x50 [] ip6_output2+0x0/0x2e0 [] ip6_push_pending_frames+0x289/0x440 [] udp_v6_push_pending_frames+0x11c/0x180 [] udpv6_sendmsg+0x6c1/0x8a0 [] sock_recvmsg+0xb4/0x110 [] inet_sendmsg+0x4a/0x60 [] sock_sendmsg+0x9e/0xf0 [] pty_write+0x145/0x190 [] copy_from_user+0x54/0x80 [] sys_recvmsg+0x1f6/0x230 [] sockfd_lookup+0x1c/0x90 [] sys_sendto+0xfb/0x130 [] schedule+0x1a2/0x4c0 [] sys_send+0x37/0x40 [] sys_socketcall+0x18a/0x260 [] sysenter_past_esp+0x52/0x71 Code: 0f 0b 68 00 2c 36 35 c0 83 c4 14 c3 89 f6 8d bc 27 00 00 00 >>EIP; c027e52b <===== >>ebx; cb70a1a0 >>edx; c036e458 >>esi; c58a70f8 >>edi; c25d5802 >>ebp; c58a70d4 >>esp; c0a51bf4 Trace; c02e36cf Trace; c02e36db Trace; c02e36cf Trace; c0104bd5 Trace; c02e4679 Trace; c01fa25e Trace; c02e3734 Trace; c02e3420 Trace; c02e5799 Trace; c02f71ac Trace; c02f78d1 Trace; c027a814 Trace; c02c276a Trace; c027a70e Trace; c022afd5 Trace; c01fad54 Trace; c027c616 Trace; c027a47c Trace; c027be1b Trace; c031de52 Trace; c027be87 Trace; c027c7da Trace; c0104159 Code; c027e52b 00000000 <_EIP>: Code; c027e52b <===== 0: 0f 0b ud2a <===== Code; c027e52d 2: 68 00 2c 36 35 push $0x35362c00 Code; c027e532 7: c0 83 c4 14 c3 89 f6 rolb $0xf6,0x89c314c4(%ebx) Code; c027e539 e: 8d bc 27 00 00 00 00 lea 0x0(%edi),%edi -- *** Rodrigo Martins de Matos Ventura *** Web page: http://www.isr.ist.utl.pt/~yoda *** Teaching Assistant and PhD Student at ISR: *** Instituto de Sistemas e Robotica, Polo de Lisboa *** Instituto Superior Tecnico, Lisboa, PORTUGAL *** PGP fingerprint = 0119 AD13 9EEE 264A 3F10 31D3 89B3 C6C4 60C6 4585 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/