public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* 2.4.18pre8 Oops: tcp_v4_get_port
@ 2002-03-13 16:50 Simon Kirby
  2002-03-13 22:27 ` David S. Miller
  0 siblings, 1 reply; 2+ messages in thread
From: Simon Kirby @ 2002-03-13 16:50 UTC (permalink / raw)
  To: linux-kernel; +Cc: David S. Miller

Hi,

We've seen this Oops a few times now.  I'm not sure if I was imagining
things, but was this a TCP hash race that was fixed easily in newer
kernels, or is this something else?

Unable to handle kernel paging request at virtual address 1c603920
 printing eip:
c022a471
*pde = 00000000
Oops: 0000
CPU:    1 
EIP:    0010:[<c022a471>]    Not tainted
EFLAGS: 00010296
eax: 001cf9cf   ebx: f72ad2c0   ecx: ce4c3220   edx: 1c603914
esi: 0000b143   edi: 00000000   ebp: f7dd8a18   esp: e020beb4
ds: 0018   es: 0018   ss: 0018
Process wu.ftpd (pid: 13844, stackpage=e020b000)
Stack: 00000000 f72ad2c0 c0332e68 0000b143 00000000 00000000 00000001 c023803c
       f72ad2c0 0000b143 f7d19e80 e020bf14 00000010 400ca008 ffffffea 00000002
       c0200890 f7d19e80 e020bf14 00000010 00000001 00000003 ffffffff 00000000  
Call Trace: [<c023803c>] [<c0200890>] [<c0112b58>] [<c010b9ee>] [<c0201380>]    
   [<c0106f9c>] [<c0106eab>] 

Code: 8b 42 0c 39 43 0c 75 e7 83 7c 24 10 00 74 0d 80 7a 26 00 74

>>EIP; c022a470 <tcp_v4_get_port+154/294>   <=====
Trace; c023803c <inet_bind+180/294>
Trace; c0200890 <sys_bind+54/74>
Trace; c0112b58 <do_page_fault+0/4ac>
Trace; c010b9ee <old_mmap+f2/12c>
Trace; c0201380 <sys_socketcall+78/200>
Trace; c0106f9c <error_code+34/3c>
Trace; c0106eaa <system_call+32/38>
Code;  c022a470 <tcp_v4_get_port+154/294>
00000000 <_EIP-0x1>:
Code;  c022a470 <tcp_v4_get_port+154/294>
   0:   8b 42 0c          movl   0xc(%edx),%eax
Code;  c022a470 <tcp_v4_get_port+154/294>
00000001 <_EIP>:
Code;  c022a470 <tcp_v4_get_port+154/294>   <=====
   1:   42                incl   %edx   <=====
Code;  c022a472 <tcp_v4_get_port+156/294>
   2:   0c 39             orb    $0x39,%al
Code;  c022a474 <tcp_v4_get_port+158/294>
   4:   43                incl   %ebx
Code;  c022a474 <tcp_v4_get_port+158/294>
   5:   0c 75             orb    $0x75,%al
Code;  c022a476 <tcp_v4_get_port+15a/294>
   7:   e7 83             outl   %eax,$0x83
Code;  c022a478 <tcp_v4_get_port+15c/294>
   9:   7c 24             jl     2f <_EIP+0x2e> c022a49e <tcp_v4_get_port+182/294>
Code;  c022a47a <tcp_v4_get_port+15e/294>
   b:   10 00             adcb   %al,(%eax)
Code;  c022a47c <tcp_v4_get_port+160/294>
   d:   74 0d             je     1c <_EIP+0x1b> c022a48a <tcp_v4_get_port+16e/294>
Code;  c022a47e <tcp_v4_get_port+162/294>
   f:   80 7a 26 00       cmpb   $0x0,0x26(%edx)
Code;  c022a482 <tcp_v4_get_port+166/294>
  13:   74 00             je     15 <_EIP+0x14> c022a484 <tcp_v4_get_port+168/294>

Simon-

[  Stormix Technologies Inc.  ][  NetNation Communications Inc. ]
[       sim@stormix.com       ][       sim@netnation.com        ]
[ Opinions expressed are not necessarily those of my employers. ]

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: 2.4.18pre8 Oops: tcp_v4_get_port
  2002-03-13 16:50 2.4.18pre8 Oops: tcp_v4_get_port Simon Kirby
@ 2002-03-13 22:27 ` David S. Miller
  0 siblings, 0 replies; 2+ messages in thread
From: David S. Miller @ 2002-03-13 22:27 UTC (permalink / raw)
  To: sim; +Cc: linux-kernel


It might be cured by this fix.

--- ../../vanilla/2.4/linux/net/ipv4/tcp_minisocks.c	Mon Oct  1 09:19:57 2001
+++ net/ipv4/tcp_minisocks.c	Mon Mar  4 23:48:09 2002
@@ -5,7 +5,7 @@
  *
  *		Implementation of the Transmission Control Protocol(TCP).
  *
- * Version:	$Id: tcp_minisocks.c,v 1.14 2001/09/21 21:27:34 davem Exp $
+ * Version:	$Id: tcp_minisocks.c,v 1.14.2.1 2002/03/05 04:30:08 davem Exp $
  *
  * Authors:	Ross Biro, <bir7@leland.Stanford.Edu>
  *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
@@ -75,17 +75,16 @@
 	/* Disassociate with bind bucket. */
 	bhead = &tcp_bhash[tcp_bhashfn(tw->num)];
 	spin_lock(&bhead->lock);
-	if ((tb = tw->tb) != NULL) {
-		if(tw->bind_next)
-			tw->bind_next->bind_pprev = tw->bind_pprev;
-		*(tw->bind_pprev) = tw->bind_next;
-		tw->tb = NULL;
-		if (tb->owners == NULL) {
-			if (tb->next)
-				tb->next->pprev = tb->pprev;
-			*(tb->pprev) = tb->next;
-			kmem_cache_free(tcp_bucket_cachep, tb);
-		}
+	tb = tw->tb;
+	if(tw->bind_next)
+		tw->bind_next->bind_pprev = tw->bind_pprev;
+	*(tw->bind_pprev) = tw->bind_next;
+	tw->tb = NULL;
+	if (tb->owners == NULL) {
+		if (tb->next)
+			tb->next->pprev = tb->pprev;
+		*(tb->pprev) = tb->next;
+		kmem_cache_free(tcp_bucket_cachep, tb);
 	}
 	spin_unlock(&bhead->lock);
 
@@ -304,9 +303,23 @@
 	struct tcp_bind_hashbucket *bhead;
 	struct sock **head, *sktw;
 
+	/* Step 1: Put TW into bind hash. Original socket stays there too.
+	   Note, that any socket with sk->num!=0 MUST be bound in binding
+	   cache, even if it is closed.
+	 */
+	bhead = &tcp_bhash[tcp_bhashfn(sk->num)];
+	spin_lock(&bhead->lock);
+	tw->tb = (struct tcp_bind_bucket *)sk->prev;
+	BUG_TRAP(sk->prev!=NULL);
+	if ((tw->bind_next = tw->tb->owners) != NULL)
+		tw->tb->owners->bind_pprev = &tw->bind_next;
+	tw->tb->owners = (struct sock*)tw;
+	tw->bind_pprev = &tw->tb->owners;
+	spin_unlock(&bhead->lock);
+
 	write_lock(&ehead->lock);
 
-	/* Step 1: Remove SK from established hash. */
+	/* Step 2: Remove SK from established hash. */
 	if (sk->pprev) {
 		if(sk->next)
 			sk->next->pprev = sk->pprev;
@@ -315,7 +328,7 @@
 		sock_prot_dec_use(sk->prot);
 	}
 
-	/* Step 2: Hash TW into TIMEWAIT half of established hash table. */
+	/* Step 3: Hash TW into TIMEWAIT half of established hash table. */
 	head = &(ehead + tcp_ehash_size)->chain;
 	sktw = (struct sock *)tw;
 	if((sktw->next = *head) != NULL)
@@ -325,20 +338,6 @@
 	atomic_inc(&tw->refcnt);
 
 	write_unlock(&ehead->lock);
-
-	/* Step 3: Put TW into bind hash. Original socket stays there too.
-	   Note, that any socket with sk->num!=0 MUST be bound in binding
-	   cache, even if it is closed.
-	 */
-	bhead = &tcp_bhash[tcp_bhashfn(sk->num)];
-	spin_lock(&bhead->lock);
-	tw->tb = (struct tcp_bind_bucket *)sk->prev;
-	BUG_TRAP(sk->prev!=NULL);
-	if ((tw->bind_next = tw->tb->owners) != NULL)
-		tw->tb->owners->bind_pprev = &tw->bind_next;
-	tw->tb->owners = (struct sock*)tw;
-	tw->bind_pprev = &tw->tb->owners;
-	spin_unlock(&bhead->lock);
 }
 
 /* 

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2002-03-13 22:30 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-03-13 16:50 2.4.18pre8 Oops: tcp_v4_get_port Simon Kirby
2002-03-13 22:27 ` David S. Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox