public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Andrew Taylor <taylor@array.ca>
To: linux-kernel@vger.kernel.org
Cc: Andrew Taylor <taylor@array.ca>, Biswa Patnaik <biswa@array.ca>
Subject: Re: [Oops] 2.6.10: PREEMPT SMP
Date: Tue, 8 Mar 2005 15:50:48 -0500	[thread overview]
Message-ID: <20050308205048.GC1546@monk> (raw)

Hello,

We have been experiencing a very similar oops on a Dell poweredge 2600, running Fedora Core 3 (FC3). This host is mainly used as a samba fileserver. The problem has been seen on 2 different machines (both Dell-pe-2600s).

The problem is only ever seen when running the SMP kernel in conjunction with samba.

We have been experiencing problems since early January when the samba/nfs/io load was increased considerably. Since then a number of 2.4 kernels have been used:
2.4.22.2115nptlsmp (FC1)
2.4.22-1.2199smp (FC1)
2.4.29 (vanilla kernel)
2.6.10-1.741_FC3smp (FC3)
2.6.10-1.766_FC3smp (FC3)

All 2.4 kernels produced the same result: full system lock-up, with no messages on the console or the log files.

The 2.6.10 kernel is giving an oops which has been seen 3 time in the last 3 days. A very similar one was seen pointing to eip: c01b2d98 on the 2.6.10-1.741 kernel.
  
I have included the kallsyms and System.map relevant to the instruction pointed to by the EIP. I can include the full files if required. 

printing eip:
c01b387c
*pde = 2fcdd001
Oops: 0000 [#1]
SMP
Modules linked in: nfsd exportfs md5 ipv6 parport_pc lp parport autofs4 nfs lockd sunrpc video button battery ac uhci_hcd hw_random e1000 floppy sg dm_snapshot dm_zero dm_mirror ext3 jbd dm_mod mptscsih mptbase sd_mod scsi_mod
CPU:    1
EIP:    0060:[<c01b387c>]    Not tainted VLI
EFLAGS: 00010203   (2.6.10-1.766_FC3smp)
EIP is at __rb_rotate_left+0x8/0x36
eax: f57be640   ebx: c041e5e4   ecx: f57be640   edx: 00000000
esi: f57be640   edi: f5f39c80   ebp: c041e5e4   esp: efa2eed0
ds: 007b   es: 007b   ss: 0068
Process smbd (pid: 8536, threadinfo=efa2e000 task=f7612a60)
Stack: f5ac1980 c01b3988 f5f39c80 f5f39c80 f5ac1988 00000267 c01965d7 f5ac1980
0000000d efa2ef54 efa2ef61 ffffffea c019668b 00000015 00000000 00000267
c03191e0 efa2ef54 00000000 f599ed80 00000267 c01977df ffffffff 001f0000
Call Trace:
[<c01b3988>] rb_insert_color+0xa8/0xc1
[<c01965d7>] key_user_lookup+0xcf/0xfc
[<c019668b>] key_alloc+0x53/0x2b6
[<c01977df>] keyring_alloc+0x1a/0x48
[<c0198d43>] alloc_uid_keyring+0x2b/0x7c
[<c0125d2e>] alloc_uid+0xae/0x133
[<c01291d4>] set_user+0xb/0x8b
[<c01295f2>] sys_setresuid+0x11a/0x1b9
[<c0103c97>] syscall_call+0x7/0xb
Code: 82 04 01 00 00 00 75 ea 41 83 f9 01 76 ed 31 c0 5b c3 57 b9 45 00 00 00 89 c7 31 c0 f3 ab 5f c3 90 90 90 53 89 d3 8b 50 08 89 c1 <8b> 42 0c 85 c0 89 41 08 74 02 89 08 89 4a 0c 8b 01 85 c0 89 02


/proc/kallsyms grepped on c01b3.

c01b3024 t newary
c01b313c T sys_semget
c01b325a t try_atomic_semop
c01b336b t update_queue
c01b33de t count_semncnt
c01b342c t count_semzcnt
c01b347a t freeary
c01b34f6 t copy_semid_to_user
c01b354b t semctl_nolock
c01b3731 t semctl_main
c01b3ad6 t semctl_down
c01b3c39 T sys_semctl
c01b3ce9 t lookup_undo
c01b3d19 t find_undo


root@msh2-c boot]# grep -i c01b3 /boot/System.map-2.6.10-1.766_FC3smp 
c01b304b T match_int
c01b3052 T match_octal
c01b305c T match_hex
c01b3066 T match_strcpy
c01b3098 T match_strdup
c01b30c0 t radix_tree_node_alloc
c01b3109 T radix_tree_preload
c01b317d t radix_tree_extend
c01b321c T radix_tree_insert
c01b3303 T radix_tree_lookup
c01b3349 T radix_tree_tag_set
c01b33b8 T radix_tree_tag_clear
c01b347a t __lookup
c01b3547 T radix_tree_gang_lookup
c01b3595 t __lookup_tag
c01b369d T radix_tree_gang_lookup_tag
c01b36f0 T radix_tree_delete
c01b3835 T radix_tree_tagged
c01b3863 t radix_tree_node_ctor
c01b3874 t __rb_rotate_left
c01b38aa t __rb_rotate_right
c01b38e0 T rb_insert_color
c01b39a1 t __rb_erase_color
c01b3b0c T rb_erase
c01b3bcd T rb_first
c01b3be5 T rb_last
c01b3bfd T rb_next
c01b3c26 T rb_prev
c01b3c4f T rb_replace_node
c01b3c94 T rwsem_wake
c01b3d89 T rwsem_downgrade_wake
c01b3e14 T strnicmp
c01b3e75 T strcpy
c01b3e89 T strncpy
c01b3ea8 T strlcpy
c01b3eeb T strcat
c01b3f0a T strncat
c01b3f35 T strlcat
c01b3f97 T strcmp
c01b3fae T strncmp
c01b3fe0 T strchr
c01b3ff0 T strrchr

Cheers,

Andrew Taylor 

Systems Engineer
Array Systems Computing Inc.  
email: taylor@array.ca
http:  www.array.ca

             reply	other threads:[~2005-03-08 20:59 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-03-08 20:50 Andrew Taylor [this message]
2005-03-21 23:35 ` [Oops] 2.6.10: PREEMPT SMP Andrew Morton
2005-03-24  0:42   ` Andrew Taylor
  -- strict thread matches above, loose matches on Subject: below --
2005-02-18 11:29 Klaus Steinberger
2005-01-31 16:27 Xavier Bestel
2005-02-04 11:43 ` David Howells

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20050308205048.GC1546@monk \
    --to=taylor@array.ca \
    --cc=biswa@array.ca \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox