From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754387AbZIQJfc (ORCPT ); Thu, 17 Sep 2009 05:35:32 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752517AbZIQJfb (ORCPT ); Thu, 17 Sep 2009 05:35:31 -0400 Received: from mail-ew0-f206.google.com ([209.85.219.206]:58424 "EHLO mail-ew0-f206.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751810AbZIQJf3 (ORCPT ); Thu, 17 Sep 2009 05:35:29 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=date:from:to:cc:subject:message-id:references:mime-version :content-type:content-disposition:in-reply-to:user-agent; b=P0MpynKJq0RAzFCx6o4V/bocZtMFKlyjx5S9KPnXQr4TVPsOv9KGOK8OrbtXd7BUsH LQlRuVgDHquPifuDIkJuTPQdVF0C0tdIjMX4jNv9Ts73op/PLamgPRkcVI3udAmvX5wL CIocD094EQP63SuyKIG+61EL4HncsXuJyCRHE= Date: Thu, 17 Sep 2009 11:35:30 +0200 From: Frederic Weisbecker To: Denys Fedoryschenko Cc: gregkh@suse.de, linux-kernel@vger.kernel.org Subject: Re: unable to handle kernel NULL pointer / tty / 2.6.31-vanilla/ still persists Message-ID: <20090917093527.GE5184@nowhere> References: <200909151032.53683.denys@visp.net.lb> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <200909151032.53683.denys@visp.net.lb> User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 15, 2009 at 10:32:53AM +0300, Denys Fedoryschenko wrote: > Kernel 2.6.31-rc7 > x86 , 32-bit > gcc 4.4.1 Hi, If you are on -rc7, then you are missing an important fix: tty: make sure to flush any pending work when halting the ldisc Have you tried with 2.6.31 ? Thanks, Frederic. > Happened on heavy network load, looks like as previous one, seems problem > still persists. > It is hyperthreading Xeon, as i heard on such CPU's SMP bugs most easy to > trigger. But for me triggered after few days of operation. > > Here is oops: > > [273169.803628] BUG: unable to handle kernel NULL pointer dereference at > (null) > [273169.803710] IP: [] process_echoes+0x65/0x240 > [273169.803785] *pdpt = 000000002f97d001 *pde = 0000000000000000 > [273169.803854] Oops: 0000 [#1] SMP > [273169.803922] last sysfs > file: /sys/module/nf_conntrack_ipv4/parameters/hashsize > [273169.804045] Modules linked in: ipt_LOG xt_connlimit xt_NOTRACK iptable_raw > ip_gre ipt_REJECT ts_bm xt_string nf_conntrack_netlink nfnetlink iptable_nat > nf_nat nf_c > onntrack_ipv4 nf_conntrack cls_u32 sch_htb tun nf_defrag_ipv > [273169.804068] > [273169.804068] Pid: 6261, comm: login Not tainted (2.6.31-build-0046-32bit > #4) > [273169.804068] EIP: 0060:[] EFLAGS: 00010202 CPU: 1 > [273169.804068] EIP is at process_echoes+0x65/0x240 > [273169.804068] EAX: 00000001 EBX: e6cd0800 ECX: 00001f00 EDX: 00001000 > [273169.804068] ESI: e6cd0800 EDI: 00000000 EBP: f524ad84 ESP: f524ad5c > [273169.804068] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 > [273169.804068] Process login (pid: 6261, ti=f524a000 task=f6910ae0 > task.ti=f524a000) > [273169.804068] Stack: > [273169.804068] e6cd0bc8 e6cd0bdc 00001f00 00000001 00001000 f524ad84 > c0250c12 e6cd080a > [273169.804068] <0> e6cd0800 e6cd0958 f524ae94 c02528b5 e6cd0800 c2020220 > 00000000 e6cd0bf8 > [273169.804068] <0> 00000000 ef07081c 00000000 00000000 ef070820 ef070921 > 00000000 00000001 > [273169.804068] Call Trace: > [273169.804068] [] ? echo_char_raw+0x45/0x4a > [273169.804068] [] ? n_tty_receive_buf+0xbaf/0x10a5 > [273169.804068] [] ? schedule+0x75d/0x7c7 > [273169.804068] [] ? filemap_fault+0x69/0x2e5 > [273169.804068] [] ? tty_ldisc_try+0x36/0x3c > [273169.804068] [] ? flush_to_ldisc+0xf1/0x17f > [273169.804068] [] ? tty_flush_to_ldisc+0xd/0xf > [273169.804068] [] ? n_tty_read+0x2ac/0x5ad > [273169.804068] [] ? default_wake_function+0x0/0xd > [273169.804068] [] ? n_tty_read+0x0/0x5ad > [273169.804068] [] ? tty_read+0x62/0x99 > [273169.804068] [] ? tty_read+0x0/0x99 > [273169.804068] [] ? vfs_read+0x87/0x110 > [273169.804068] [] ? sys_read+0x3b/0x60 > [273169.804068] [] ? syscall_call+0x7/0xb > [273169.804068] Code: 20 00 00 89 45 e0 8b 83 88 03 00 00 8d 90 00 10 00 00 89 > c7 8b 83 90 03 00 00 89 55 e8 03 bb 8c 03 00 00 89 45 e4 e9 63 01 00 00 <8a> > 07 3c ff 0f > 85 35 01 00 00 8d 57 01 3b 55 e8 8d 87 01 f0 ff > [273169.804068] EIP: [] process_echoes+0x65/0x240 SS:ESP > 0068:f524ad5c > [273169.804068] CR2: 0000000000000000 > [273169.807602] ---[ end trace 25fadd9ce705aa28 ]--- > [273169.807701] Kernel panic - not syncing: Fatal exception > [273169.807803] Pid: 6261, comm: login Tainted: G D > 2.6.31-build-0046-32bit #4 > [273169.807964] Call Trace: > [273169.808072] [] ? printk+0xf/0x13 > [273169.808176] [] panic+0x39/0xd9 > [273169.808278] [] oops_end+0x8b/0x9a > [273169.808378] [] no_context+0x13d/0x147 > [273169.808478] [] __bad_area_nosemaphore+0x113/0x11b > [273169.808578] [] ? lock_timer_base+0x1f/0x3e > [273169.808676] [] ? mod_timer+0x108/0x113 > [273169.808775] [] bad_area+0x30/0x39 > [273169.808874] [] do_page_fault+0x16b/0x26f > [273169.808975] [] ? do_page_fault+0x0/0x26f > [273169.809087] [] error_code+0x66/0x6c > [273169.809195] [] ? tty_release_dev+0x29e/0x3e0 > [273169.809377] [] ? do_page_fault+0x0/0x26f > [273169.809486] [] ? process_echoes+0x65/0x240 > [273169.810939] [] ? echo_char_raw+0x45/0x4a > [273169.811040] [] n_tty_receive_buf+0xbaf/0x10a5 > [273169.811156] [] ? schedule+0x75d/0x7c7 > [273169.811267] [] ? filemap_fault+0x69/0x2e5 > [273169.811368] [] ? tty_ldisc_try+0x36/0x3c > [273169.811468] [] flush_to_ldisc+0xf1/0x17f > [273169.811571] [] tty_flush_to_ldisc+0xd/0xf > [273169.811674] [] n_tty_read+0x2ac/0x5ad > [273169.811779] [] ? default_wake_function+0x0/0xd > [273169.811884] [] ? n_tty_read+0x0/0x5ad > [273169.811988] [] tty_read+0x62/0x99 > [273169.812105] [] ? tty_read+0x0/0x99 > [273169.812217] [] vfs_read+0x87/0x110 > > > > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/