linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* 2.6.0-test2 oops - NPTL triggered
@ 2003-08-06  2:13 Greg Schafer
  2003-08-06  5:17 ` Andrew Morton
  2003-08-06  5:23 ` OSDL
  0 siblings, 2 replies; 5+ messages in thread
From: Greg Schafer @ 2003-08-06  2:13 UTC (permalink / raw)
  To: linux-kernel

[-- Attachment #1: Type: text/plain, Size: 354 bytes --]

Hi

An otherwise fine running kernel-2.6.0-test2 repeatably gives this when
running the NPTL testsuite.

ksymoops output attached.

 - kernel compiled with gcc-2.95.4 (s'pose I should try 3.2.3)
 - recent binutils
 - board is Tyan S2466N-4M with pair of Athlon 2200's

This is a UP kernel (trying to narrow down the cause).

Thanks
Greg
(not subscribed)

[-- Attachment #2: oops.txt --]
[-- Type: text/plain, Size: 5983 bytes --]

ksymoops 2.4.9 on i686 2.6.0-test2.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.6.0-test2/ (default)
     -m /boot/System.map-2.6.0-test2 (specified)

Error (regular_file): read_ksyms stat /proc/ksyms failed
No modules in ksyms, skipping objects
No ksyms, skipping lsmod
Call Trace:
 [<c0115093>] __might_sleep+0x53/0x60
 [<c01129b5>] do_page_fault+0x65/0x3fa
 [<c0112950>] do_page_fault+0x0/0x3fa
 [<c014ebdc>] vfs_follow_link+0xcc/0x140
 [<c0108e95>] error_code+0x2d/0x38
 [<c012384c>] _detach_pid+0x1c/0x80
 [<c0123a03>] switch_exec_pids+0x13/0x100
 [<c0149fa8>] flush_old_exec+0x2c8/0x660
 [<c0163639>] load_elf_binary+0x479/0xb00
 [<c012d44c>] buffered_rmqueue+0xbc/0xd0
 [<c014a5f5>] search_binary_handler+0x75/0x1b0
 [<c014a86a>] do_execve+0x13a/0x190
 [<c010789f>] sys_execve+0x2f/0x70
 [<c0108c99>] sysenter_past_esp+0x52/0x71
Unable to handle kernel paging request at virtual address 00100104
c012384c
*pde = 00000000
Oops: 0002 [#1]
CPU:    0
EIP:    0060:[<c012384c>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010082
eax: f77f2db0   ebx: f77f2dbc   ecx: 00200200   edx: 00100100
esi: f77f2d00   edi: f77f2d00   ebp: f0e99cc0   esp: f0e99cbc
ds: 007b   es: 007b   ss: 0068
Stack: f0f2a6e0 f0e99cd8 c0123a03 f77f2d00 00000000 f77f2da4 00000002 f0e99d20 
       c0149fa8 f77f2d00 f0f2a6e0 f0e98000 00000002 c0292d37 f0e99e60 f0e98000 
       f176a6a0 00000000 00000000 00000000 f0e98000 f7feaf40 f7311580 f661eac0 
Call Trace:
 [<c0123a03>] switch_exec_pids+0x13/0x100
 [<c0149fa8>] flush_old_exec+0x2c8/0x660
 [<c0163639>] load_elf_binary+0x479/0xb00
 [<c012d44c>] buffered_rmqueue+0xbc/0xd0
 [<c014a5f5>] search_binary_handler+0x75/0x1b0
 [<c014a86a>] do_execve+0x13a/0x190
 [<c010789f>] sys_execve+0x2f/0x70
 [<c0108c99>] sysenter_past_esp+0x52/0x71
Code: 89 4a 04 89 11 c7 00 00 01 10 00 c7 40 04 00 02 20 00 ff 4b 


Trace; c0115093 <__might_sleep+53/60>
Trace; c01129b5 <do_page_fault+65/3fa>
Trace; c0112950 <do_page_fault+0/3fa>
Trace; c014ebdc <vfs_follow_link+cc/140>
Trace; c0108e95 <error_code+2d/38>
Trace; c012384c <_detach_pid+1c/80>
Trace; c0123a03 <switch_exec_pids+13/100>
Trace; c0149fa8 <flush_old_exec+2c8/660>
Trace; c0163639 <load_elf_binary+479/b00>
Trace; c012d44c <buffered_rmqueue+bc/d0>
Trace; c014a5f5 <search_binary_handler+75/1b0>
Trace; c014a86a <do_execve+13a/190>
Trace; c010789f <sys_execve+2f/70>
Trace; c0108c99 <sysenter_past_esp+52/71>

>>EIP; c012384c <_detach_pid+1c/80>   <=====

>>eax; f77f2db0 <_end+374676ac/3fc728fc>
>>ebx; f77f2dbc <_end+374676b8/3fc728fc>
>>esi; f77f2d00 <_end+374675fc/3fc728fc>
>>edi; f77f2d00 <_end+374675fc/3fc728fc>
>>ebp; f0e99cc0 <_end+30b0e5bc/3fc728fc>
>>esp; f0e99cbc <_end+30b0e5b8/3fc728fc>

Trace; c0123a03 <switch_exec_pids+13/100>
Trace; c0149fa8 <flush_old_exec+2c8/660>
Trace; c0163639 <load_elf_binary+479/b00>
Trace; c012d44c <buffered_rmqueue+bc/d0>
Trace; c014a5f5 <search_binary_handler+75/1b0>
Trace; c014a86a <do_execve+13a/190>
Trace; c010789f <sys_execve+2f/70>
Trace; c0108c99 <sysenter_past_esp+52/71>

Code;  c012384c <_detach_pid+1c/80>
00000000 <_EIP>:
Code;  c012384c <_detach_pid+1c/80>   <=====
   0:   89 4a 04                  mov    %ecx,0x4(%edx)   <=====
Code;  c012384f <_detach_pid+1f/80>
   3:   89 11                     mov    %edx,(%ecx)
Code;  c0123851 <_detach_pid+21/80>
   5:   c7 00 00 01 10 00         movl   $0x100100,(%eax)
Code;  c0123857 <_detach_pid+27/80>
   b:   c7 40 04 00 02 20 00      movl   $0x200200,0x4(%eax)
Code;  c012385e <_detach_pid+2e/80>
  12:   ff 4b 00                  decl   0x0(%ebx)

 <1>Unable to handle kernel paging request at virtual address 00100104
c012384c
*pde = 00000000
Oops: 0002 [#2]
CPU:    0
EIP:    0060:[<c012384c>]    Not tainted
EFLAGS: 00010082
eax: f009a710   ebx: f009a71c   ecx: 00200200   edx: 00100100
esi: f009a660   edi: f009a660   ebp: f0e99cc0   esp: f0e99cbc
ds: 007b   es: 007b   ss: 0068
Stack: f0f2a6e0 f0e99cd8 c0123a03 f009a660 00000000 f009a704 00000002 f0e99d20 
       c0149fa8 f009a660 f0f2a6e0 f0e98000 f0e99e60 f7a98240 f7a981c0 f0e98000 
       f176a6a0 00000000 00000000 00000000 f0e98000 f7feaac0 f661eac0 efbfb040 
Call Trace:
 [<c0123a03>] switch_exec_pids+0x13/0x100
 [<c0149fa8>] flush_old_exec+0x2c8/0x660
 [<c0163639>] load_elf_binary+0x479/0xb00
 [<c012d44c>] buffered_rmqueue+0xbc/0xd0
 [<c012d44c>] buffered_rmqueue+0xbc/0xd0
 [<c012d4ee>] __alloc_pages+0x8e/0x2d0
 [<c014a5f5>] search_binary_handler+0x75/0x1b0
 [<c014a86a>] do_execve+0x13a/0x190
 [<c010789f>] sys_execve+0x2f/0x70
 [<c0108c99>] sysenter_past_esp+0x52/0x71
Code: 89 4a 04 89 11 c7 00 00 01 10 00 c7 40 04 00 02 20 00 ff 4b 


>>EIP; c012384c <_detach_pid+1c/80>   <=====

>>eax; f009a710 <_end+2fd0f00c/3fc728fc>
>>ebx; f009a71c <_end+2fd0f018/3fc728fc>
>>esi; f009a660 <_end+2fd0ef5c/3fc728fc>
>>edi; f009a660 <_end+2fd0ef5c/3fc728fc>
>>ebp; f0e99cc0 <_end+30b0e5bc/3fc728fc>
>>esp; f0e99cbc <_end+30b0e5b8/3fc728fc>

Trace; c0123a03 <switch_exec_pids+13/100>
Trace; c0149fa8 <flush_old_exec+2c8/660>
Trace; c0163639 <load_elf_binary+479/b00>
Trace; c012d44c <buffered_rmqueue+bc/d0>
Trace; c012d44c <buffered_rmqueue+bc/d0>
Trace; c012d4ee <__alloc_pages+8e/2d0>
Trace; c014a5f5 <search_binary_handler+75/1b0>
Trace; c014a86a <do_execve+13a/190>
Trace; c010789f <sys_execve+2f/70>
Trace; c0108c99 <sysenter_past_esp+52/71>

Code;  c012384c <_detach_pid+1c/80>
00000000 <_EIP>:
Code;  c012384c <_detach_pid+1c/80>   <=====
   0:   89 4a 04                  mov    %ecx,0x4(%edx)   <=====
Code;  c012384f <_detach_pid+1f/80>
   3:   89 11                     mov    %edx,(%ecx)
Code;  c0123851 <_detach_pid+21/80>
   5:   c7 00 00 01 10 00         movl   $0x100100,(%eax)
Code;  c0123857 <_detach_pid+27/80>
   b:   c7 40 04 00 02 20 00      movl   $0x200200,0x4(%eax)
Code;  c012385e <_detach_pid+2e/80>
  12:   ff 4b 00                  decl   0x0(%ebx)


1 error issued.  Results may not be reliable.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 2.6.0-test2 oops - NPTL triggered
  2003-08-06  2:13 2.6.0-test2 oops - NPTL triggered Greg Schafer
@ 2003-08-06  5:17 ` Andrew Morton
  2003-08-06  7:33   ` Greg Schafer
  2003-08-06  5:23 ` OSDL
  1 sibling, 1 reply; 5+ messages in thread
From: Andrew Morton @ 2003-08-06  5:17 UTC (permalink / raw)
  To: Greg Schafer; +Cc: linux-kernel

Greg Schafer <gschafer@zip.com.au> wrote:
>
> An otherwise fine running kernel-2.6.0-test2 repeatably gives this when
>  running the NPTL testsuite.

>From where does one obtain the NPTL testsuite?

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 2.6.0-test2 oops - NPTL triggered
  2003-08-06  2:13 2.6.0-test2 oops - NPTL triggered Greg Schafer
  2003-08-06  5:17 ` Andrew Morton
@ 2003-08-06  5:23 ` OSDL
  2003-08-06  7:39   ` Greg Schafer
  1 sibling, 1 reply; 5+ messages in thread
From: OSDL @ 2003-08-06  5:23 UTC (permalink / raw)
  To: Greg Schafer, linux-kernel

Greg Schafer wrote:
> 
> An otherwise fine running kernel-2.6.0-test2 repeatably gives this when
> running the NPTL testsuite.
> 
> ksymoops output attached.
> 
>  - kernel compiled with gcc-2.95.4 (s'pose I should try 3.2.3)
>  - recent binutils
>  - board is Tyan S2466N-4M with pair of Athlon 2200's
> 
> This is a UP kernel (trying to narrow down the cause).

It looks like the list poisoning triggers:

        ecx: 00200200 edx: 00100100

those are the poison values for the prev/next fields of lists (see
<linux/list.h>).

So it looks like switch_exec_pids() is removing a list entry that was
already removed.

                Linus

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 2.6.0-test2 oops - NPTL triggered
  2003-08-06  5:17 ` Andrew Morton
@ 2003-08-06  7:33   ` Greg Schafer
  0 siblings, 0 replies; 5+ messages in thread
From: Greg Schafer @ 2003-08-06  7:33 UTC (permalink / raw)
  To: Andrew Morton; +Cc: linux-kernel

On Tue, Aug 05, 2003 at 10:17:39PM -0700, Andrew Morton wrote:
> Greg Schafer <gschafer@zip.com.au> wrote:
> >
> > An otherwise fine running kernel-2.6.0-test2 repeatably gives this when
> >  running the NPTL testsuite.
> 
> From where does one obtain the NPTL testsuite?

It's part of the NPTL package which is provided as an addon to glibc:-

https://listman.redhat.com/archives/phil-list/2003-August/msg00000.html

Greg

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: 2.6.0-test2 oops - NPTL triggered
  2003-08-06  5:23 ` OSDL
@ 2003-08-06  7:39   ` Greg Schafer
  0 siblings, 0 replies; 5+ messages in thread
From: Greg Schafer @ 2003-08-06  7:39 UTC (permalink / raw)
  To: OSDL; +Cc: linux-kernel

On Tue, Aug 05, 2003 at 10:23:18PM -0700, OSDL wrote:
> It looks like the list poisoning triggers:
> 
>         ecx: 00200200 edx: 00100100
> 
> those are the poison values for the prev/next fields of lists (see
> <linux/list.h>).
> 
> So it looks like switch_exec_pids() is removing a list entry that was
> already removed.

Indeed. FWIW, a newer compiler gave the same results. This is way beyond my
debugging skills but I can reliably reproduce and am willing to test
anything you can suggest.

Greg

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2003-08-06  7:40 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2003-08-06  2:13 2.6.0-test2 oops - NPTL triggered Greg Schafer
2003-08-06  5:17 ` Andrew Morton
2003-08-06  7:33   ` Greg Schafer
2003-08-06  5:23 ` OSDL
2003-08-06  7:39   ` Greg Schafer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).