Re: bug in slab.c

2007-07-30 Thread Robert Schwebel
On Mon, Jul 30, 2007 at 11:05:09AM -0700, Christoph Lameter wrote:
> Looks like the slab header was corrupted. If this can be reproduced then 
> you need to enable slub debugging to find the kernel function that 
> corrupts memory.

Yup, I'll try that if it happens again.

> Otherwise it could be bad memory?

Hmm, the box is relatively new, but one never knows. Ah, and it was
after I've resumed the machine from suspend-to-disk, but not right after
the start but some minutes later.

Robert
-- 
 Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de
 Pengutronix - Linux Solutions for Science and Industry
   Handelsregister:  Amtsgericht Hildesheim, HRA 2686
 Hannoversche Str. 2, 31134 Hildesheim, Germany
   Phone: +49-5121-206917-0 |  Fax: +49-5121-206917-9

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Christoph Lameter
On Mon, 30 Jul 2007, Robert Schwebel wrote:

> On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote:
> > > My Dell Latitude D520 just dies with this BUG:
> >
> > Reproducible, I assume.
> 
> No, happened only one time.

Looks like the slab header was corrupted. If this can be reproduced then 
you need to enable slub debugging to find the kernel function that 
corrupts memory.

Otherwise it could be bad memory?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Robert Schwebel
On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote:
> > My Dell Latitude D520 just dies with this BUG:
>
> Reproducible, I assume.

No, happened only one time.

> Have you tried testing a kernel which doesn't have those drivers?
>
> (It'd be a clever little driver to cause that BUG though)

Yup :-) It didn't happen again in the meantime, but anyway. I'll keep
you informed.

Robert
-- 
 Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de
 Pengutronix - Linux Solutions for Science and Industry
   Handelsregister:  Amtsgericht Hildesheim, HRA 2686
 Hannoversche Str. 2, 31134 Hildesheim, Germany
   Phone: +49-5121-206917-0 |  Fax: +49-5121-206917-9

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Andrew Morton
On Sun, 29 Jul 2007 09:37:39 +0200 Robert Schwebel <[EMAIL PROTECTED]> wrote:

> Hi,
> 
> My Dell Latitude D520 just dies with this BUG:

Reproducible, I assume.

> --8<--8<--8<--8<--
> Jul 29 09:30:00 localhost kernel: [ cut here ]
> Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980!
> Jul 29 09:30:00 localhost kernel: invalid opcode:  [#1]
> Jul 29 09:30:00 localhost kernel: PREEMPT SMP 
> Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp 
> rfcomm l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf
> usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip 
> ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_
> ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table 
> nfs nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop 
> pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm 
> snd_timer yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound
> core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc 
> pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid
>  dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 
> mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc
> essor fan
> Jul 29 09:30:00 localhost kernel: CPU:1
> Jul 29 09:30:00 localhost kernel: EIP:0060:[]Not tainted VLI
> Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046   (2.6.22.1 #1)
> Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447
> Jul 29 09:30:00 localhost kernel: eax: 000f   ebx: 0005   ecx: 
> d4c0   edx: d4c0
> Jul 29 09:30:00 localhost kernel: esi: e451e000   edi: 0026   ebp: 
> c18ea800   esp: edbedd90
> Jul 29 09:30:00 localhost kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033  
> ss: 0068
> Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 
> task=dfc02a50 task.ti=edbec000)
> Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 
>   0001 00200202 
> Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 
> ef84c6c0 04d0 c0163e6f ef84c6c0 
> Jul 29 09:30:00 localhost kernel:0040 c0246212  dfcc2c40 
> e2c91740 04d0 efd29740  
> Jul 29 09:30:00 localhost kernel: Call Trace:
> Jul 29 09:30:00 localhost kernel:  [] __kmalloc+0x4f/0x58
> Jul 29 09:30:00 localhost kernel:  [] __alloc_skb+0x49/0xf5
> Jul 29 09:30:00 localhost kernel:  [] sock_alloc_send_skb+0x6e/0x196
> Jul 29 09:30:00 localhost kernel:  [] 
> unix_stream_sendmsg+0x14d/0x309
> Jul 29 09:30:00 localhost kernel:  [] sock_aio_write+0xf9/0x105
> Jul 29 09:30:00 localhost kernel:  [] do_sync_write+0xc7/0x10a
> Jul 29 09:30:00 localhost kernel:  [] 
> autoremove_wake_function+0x0/0x35
> Jul 29 09:30:00 localhost kernel:  [] sock_ioctl+0x1a2/0x1c1
> Jul 29 09:30:00 localhost kernel:  [] sock_ioctl+0x0/0x1c1
> Jul 29 09:30:00 localhost kernel:  [] vfs_write+0xbc/0x12a
> Jul 29 09:30:00 localhost kernel:  [] sys_write+0x41/0x67
> Jul 29 09:30:00 localhost kernel:  [] sysenter_past_esp+0x5f/0x85
> Jul 29 09:30:00 localhost kernel:  ===
> Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 
> 00 8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b
>  54 24 08 8b 42 20 39 46 10 72 2d <0f> 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 
> 8b 50 14 8b 04 24 0f 
> Jul 29 09:30:00 localhost kernel: EIP: [] 
> cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90
> Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with 
> preempt_count 1
> Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 
> 802.11bg channels, 23 802.11a channels)
> --8<--8<--8<--8<--
> 
> [EMAIL PROTECTED]:~# uname -a
> Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 
> GNU/Linux
> 
> The only non-standard thing is the ipw drivers (ipw3945-1.2.1).
> 

Have you tried testing a kernel which doesn't have those drivers?

(It'd be a clever little driver to cause that BUG though)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Andrew Morton
On Sun, 29 Jul 2007 09:37:39 +0200 Robert Schwebel [EMAIL PROTECTED] wrote:

 Hi,
 
 My Dell Latitude D520 just dies with this BUG:

Reproducible, I assume.

 --8--8--8--8--
 Jul 29 09:30:00 localhost kernel: [ cut here ]
 Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980!
 Jul 29 09:30:00 localhost kernel: invalid opcode:  [#1]
 Jul 29 09:30:00 localhost kernel: PREEMPT SMP 
 Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp 
 rfcomm l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf
 usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip 
 ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_
 ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table 
 nfs nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop 
 pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm 
 snd_timer yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound
 core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc 
 pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid
  dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 
 mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc
 essor fan
 Jul 29 09:30:00 localhost kernel: CPU:1
 Jul 29 09:30:00 localhost kernel: EIP:0060:[c0163ac4]Not tainted VLI
 Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046   (2.6.22.1 #1)
 Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447
 Jul 29 09:30:00 localhost kernel: eax: 000f   ebx: 0005   ecx: 
 d4c0   edx: d4c0
 Jul 29 09:30:00 localhost kernel: esi: e451e000   edi: 0026   ebp: 
 c18ea800   esp: edbedd90
 Jul 29 09:30:00 localhost kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033  
 ss: 0068
 Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 
 task=dfc02a50 task.ti=edbec000)
 Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 
   0001 00200202 
 Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 
 ef84c6c0 04d0 c0163e6f ef84c6c0 
 Jul 29 09:30:00 localhost kernel:0040 c0246212  dfcc2c40 
 e2c91740 04d0 efd29740  
 Jul 29 09:30:00 localhost kernel: Call Trace:
 Jul 29 09:30:00 localhost kernel:  [c0163e6f] __kmalloc+0x4f/0x58
 Jul 29 09:30:00 localhost kernel:  [c0246212] __alloc_skb+0x49/0xf5
 Jul 29 09:30:00 localhost kernel:  [c0242bef] sock_alloc_send_skb+0x6e/0x196
 Jul 29 09:30:00 localhost kernel:  [c029a7d2] 
 unix_stream_sendmsg+0x14d/0x309
 Jul 29 09:30:00 localhost kernel:  [c02401d3] sock_aio_write+0xf9/0x105
 Jul 29 09:30:00 localhost kernel:  [c016677b] do_sync_write+0xc7/0x10a
 Jul 29 09:30:00 localhost kernel:  [c0131fac] 
 autoremove_wake_function+0x0/0x35
 Jul 29 09:30:00 localhost kernel:  [c02405a2] sock_ioctl+0x1a2/0x1c1
 Jul 29 09:30:00 localhost kernel:  [c0240400] sock_ioctl+0x0/0x1c1
 Jul 29 09:30:00 localhost kernel:  [c0166f73] vfs_write+0xbc/0x12a
 Jul 29 09:30:00 localhost kernel:  [c01674ea] sys_write+0x41/0x67
 Jul 29 09:30:00 localhost kernel:  [c0103d42] sysenter_past_esp+0x5f/0x85
 Jul 29 09:30:00 localhost kernel:  ===
 Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 
 00 8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b
  54 24 08 8b 42 20 39 46 10 72 2d 0f 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 
 8b 50 14 8b 04 24 0f 
 Jul 29 09:30:00 localhost kernel: EIP: [c0163ac4] 
 cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90
 Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with 
 preempt_count 1
 Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 
 802.11bg channels, 23 802.11a channels)
 --8--8--8--8--
 
 [EMAIL PROTECTED]:~# uname -a
 Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 
 GNU/Linux
 
 The only non-standard thing is the ipw drivers (ipw3945-1.2.1).
 

Have you tried testing a kernel which doesn't have those drivers?

(It'd be a clever little driver to cause that BUG though)
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Robert Schwebel
On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote:
  My Dell Latitude D520 just dies with this BUG:

 Reproducible, I assume.

No, happened only one time.

 Have you tried testing a kernel which doesn't have those drivers?

 (It'd be a clever little driver to cause that BUG though)

Yup :-) It didn't happen again in the meantime, but anyway. I'll keep
you informed.

Robert
-- 
 Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de
 Pengutronix - Linux Solutions for Science and Industry
   Handelsregister:  Amtsgericht Hildesheim, HRA 2686
 Hannoversche Str. 2, 31134 Hildesheim, Germany
   Phone: +49-5121-206917-0 |  Fax: +49-5121-206917-9

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Christoph Lameter
On Mon, 30 Jul 2007, Robert Schwebel wrote:

 On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote:
   My Dell Latitude D520 just dies with this BUG:
 
  Reproducible, I assume.
 
 No, happened only one time.

Looks like the slab header was corrupted. If this can be reproduced then 
you need to enable slub debugging to find the kernel function that 
corrupts memory.

Otherwise it could be bad memory?

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: bug in slab.c

2007-07-30 Thread Robert Schwebel
On Mon, Jul 30, 2007 at 11:05:09AM -0700, Christoph Lameter wrote:
 Looks like the slab header was corrupted. If this can be reproduced then 
 you need to enable slub debugging to find the kernel function that 
 corrupts memory.

Yup, I'll try that if it happens again.

 Otherwise it could be bad memory?

Hmm, the box is relatively new, but one never knows. Ah, and it was
after I've resumed the machine from suspend-to-disk, but not right after
the start but some minutes later.

Robert
-- 
 Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de
 Pengutronix - Linux Solutions for Science and Industry
   Handelsregister:  Amtsgericht Hildesheim, HRA 2686
 Hannoversche Str. 2, 31134 Hildesheim, Germany
   Phone: +49-5121-206917-0 |  Fax: +49-5121-206917-9

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


bug in slab.c

2007-07-29 Thread Robert Schwebel
Hi,

My Dell Latitude D520 just dies with this BUG:

--8<--8<--8<--8<--
Jul 29 09:30:00 localhost kernel: [ cut here ]
Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980!
Jul 29 09:30:00 localhost kernel: invalid opcode:  [#1]
Jul 29 09:30:00 localhost kernel: PREEMPT SMP 
Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp rfcomm 
l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf
usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip 
ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_
ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table nfs 
nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop 
pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_timer 
yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound
core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc 
pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid
 dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 
mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc
essor fan
Jul 29 09:30:00 localhost kernel: CPU:1
Jul 29 09:30:00 localhost kernel: EIP:0060:[]Not tainted VLI
Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046   (2.6.22.1 #1)
Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447
Jul 29 09:30:00 localhost kernel: eax: 000f   ebx: 0005   ecx: d4c0 
  edx: d4c0
Jul 29 09:30:00 localhost kernel: esi: e451e000   edi: 0026   ebp: c18ea800 
  esp: edbedd90
Jul 29 09:30:00 localhost kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 
0068
Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 
task=dfc02a50 task.ti=edbec000)
Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 
  0001 00200202 
Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 
ef84c6c0 04d0 c0163e6f ef84c6c0 
Jul 29 09:30:00 localhost kernel:0040 c0246212  dfcc2c40 
e2c91740 04d0 efd29740  
Jul 29 09:30:00 localhost kernel: Call Trace:
Jul 29 09:30:00 localhost kernel:  [] __kmalloc+0x4f/0x58
Jul 29 09:30:00 localhost kernel:  [] __alloc_skb+0x49/0xf5
Jul 29 09:30:00 localhost kernel:  [] sock_alloc_send_skb+0x6e/0x196
Jul 29 09:30:00 localhost kernel:  [] unix_stream_sendmsg+0x14d/0x309
Jul 29 09:30:00 localhost kernel:  [] sock_aio_write+0xf9/0x105
Jul 29 09:30:00 localhost kernel:  [] do_sync_write+0xc7/0x10a
Jul 29 09:30:00 localhost kernel:  [] 
autoremove_wake_function+0x0/0x35
Jul 29 09:30:00 localhost kernel:  [] sock_ioctl+0x1a2/0x1c1
Jul 29 09:30:00 localhost kernel:  [] sock_ioctl+0x0/0x1c1
Jul 29 09:30:00 localhost kernel:  [] vfs_write+0xbc/0x12a
Jul 29 09:30:00 localhost kernel:  [] sys_write+0x41/0x67
Jul 29 09:30:00 localhost kernel:  [] sysenter_past_esp+0x5f/0x85
Jul 29 09:30:00 localhost kernel:  ===
Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 00 
8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b
 54 24 08 8b 42 20 39 46 10 72 2d <0f> 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 
8b 50 14 8b 04 24 0f 
Jul 29 09:30:00 localhost kernel: EIP: [] 
cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90
Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with 
preempt_count 1
Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 802.11bg 
channels, 23 802.11a channels)
--8<--8<--8<--8<--

[EMAIL PROTECTED]:~# uname -a
Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 GNU/Linux

The only non-standard thing is the ipw drivers (ipw3945-1.2.1).

Robert
-- 
 Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de
 Pengutronix - Linux Solutions for Science and Industry
   Handelsregister:  Amtsgericht Hildesheim, HRA 2686
 Hannoversche Str. 2, 31134 Hildesheim, Germany
   Phone: +49-5121-206917-0 |  Fax: +49-5121-206917-9

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


bug in slab.c

2007-07-29 Thread Robert Schwebel
Hi,

My Dell Latitude D520 just dies with this BUG:

--8--8--8--8--
Jul 29 09:30:00 localhost kernel: [ cut here ]
Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980!
Jul 29 09:30:00 localhost kernel: invalid opcode:  [#1]
Jul 29 09:30:00 localhost kernel: PREEMPT SMP 
Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp rfcomm 
l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf
usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip 
ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_
ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table nfs 
nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop 
pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_timer 
yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound
core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc 
pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid
 dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 
mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc
essor fan
Jul 29 09:30:00 localhost kernel: CPU:1
Jul 29 09:30:00 localhost kernel: EIP:0060:[c0163ac4]Not tainted VLI
Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046   (2.6.22.1 #1)
Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447
Jul 29 09:30:00 localhost kernel: eax: 000f   ebx: 0005   ecx: d4c0 
  edx: d4c0
Jul 29 09:30:00 localhost kernel: esi: e451e000   edi: 0026   ebp: c18ea800 
  esp: edbedd90
Jul 29 09:30:00 localhost kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 
0068
Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 
task=dfc02a50 task.ti=edbec000)
Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 
  0001 00200202 
Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 
ef84c6c0 04d0 c0163e6f ef84c6c0 
Jul 29 09:30:00 localhost kernel:0040 c0246212  dfcc2c40 
e2c91740 04d0 efd29740  
Jul 29 09:30:00 localhost kernel: Call Trace:
Jul 29 09:30:00 localhost kernel:  [c0163e6f] __kmalloc+0x4f/0x58
Jul 29 09:30:00 localhost kernel:  [c0246212] __alloc_skb+0x49/0xf5
Jul 29 09:30:00 localhost kernel:  [c0242bef] sock_alloc_send_skb+0x6e/0x196
Jul 29 09:30:00 localhost kernel:  [c029a7d2] unix_stream_sendmsg+0x14d/0x309
Jul 29 09:30:00 localhost kernel:  [c02401d3] sock_aio_write+0xf9/0x105
Jul 29 09:30:00 localhost kernel:  [c016677b] do_sync_write+0xc7/0x10a
Jul 29 09:30:00 localhost kernel:  [c0131fac] 
autoremove_wake_function+0x0/0x35
Jul 29 09:30:00 localhost kernel:  [c02405a2] sock_ioctl+0x1a2/0x1c1
Jul 29 09:30:00 localhost kernel:  [c0240400] sock_ioctl+0x0/0x1c1
Jul 29 09:30:00 localhost kernel:  [c0166f73] vfs_write+0xbc/0x12a
Jul 29 09:30:00 localhost kernel:  [c01674ea] sys_write+0x41/0x67
Jul 29 09:30:00 localhost kernel:  [c0103d42] sysenter_past_esp+0x5f/0x85
Jul 29 09:30:00 localhost kernel:  ===
Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 00 
8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b
 54 24 08 8b 42 20 39 46 10 72 2d 0f 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 
8b 50 14 8b 04 24 0f 
Jul 29 09:30:00 localhost kernel: EIP: [c0163ac4] 
cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90
Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with 
preempt_count 1
Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 802.11bg 
channels, 23 802.11a channels)
--8--8--8--8--

[EMAIL PROTECTED]:~# uname -a
Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 GNU/Linux

The only non-standard thing is the ipw drivers (ipw3945-1.2.1).

Robert
-- 
 Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de
 Pengutronix - Linux Solutions for Science and Industry
   Handelsregister:  Amtsgericht Hildesheim, HRA 2686
 Hannoversche Str. 2, 31134 Hildesheim, Germany
   Phone: +49-5121-206917-0 |  Fax: +49-5121-206917-9

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: linux 2.4.32: kernel BUG in slab.c:1582

2006-12-27 Thread Willy Tarreau
Hi !

On Wed, Dec 20, 2006 at 12:21:59PM -0700, Sebastian Kuzminsky wrote:
> Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap)
> running Linux 2.4.32, and lately I've been getting kernel BUGs like this:
> 
> kernel: kernel BUG at slab.c:1582!
> kernel: invalid operand: 
> kernel: CPU:0
> kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted
> kernel: EFLAGS: 00010293
> kernel: eax: c10b7354   ebx: 3ef0   ecx: 0002b450   edx: c11c
> kernel: esi: 000ad140   edi: c3ef0634   ebp: 0023   esp: c10c3f4c
> kernel: ds: 0018   es: 0018   ss: 0018
> kernel: Process kswapd (pid: 4, stackpage=c10c3000)
> kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca 
> c10b7354 c3ef0634
> kernel:003c 01d0 0009 c0232f18 c01429b5 0379 
> c012a7b8 0006
> kernel:01d0   c0232f18 0001 c10c2000 
>  c012a947
> kernel: Call Trace:[prune_dcache+266/320] 
> [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] 
> [kswapd_balance_pgdat+87/160] [kswapd_balance+22/48]
> kernel:   [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] 
> [kswapd+0/176]
> kernel:
> kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89
> 
> 
> The system is a bit tight on memory, but /proc/meminfo reports MemFree +
> Buffers + Cached > 10 MB.
> 
> After kswapd stepped on the BUG, it happened several more times by
> different processes and different code paths, but always ending with this:
> 
> Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] 
> [try_to_free_pages_zone+104/208] [balance_classzone+76/560] 
> [__alloc_pages+363/624]
> 
> 
> The BUG is this one:
> 
> /**
>  * kmem_cache_free - Deallocate an object
>  * @cachep: The cache the allocation was from.
>  * @objp: The previously allocated object.
>  *
>  * Free an object which was previously allocated from this
>  * cache.
>  */
> void kmem_cache_free (kmem_cache_t *cachep, void *objp)
> {
> unsigned long flags;
> #if DEBUG
> CHECK_PAGE(virt_to_page(objp));
> if (cachep != GET_PAGE_CACHE(virt_to_page(objp)))
> BUG();
> #endif
> 
> local_irq_save(flags);
> __kmem_cache_free(cachep, objp);
> local_irq_restore(flags);
> }
> 
> 
> So prune_dcache() gets called to free up some memory, but then it hands
> kmem_cache_free an inconsistent object to free?  Is this indicative of
> memory corruption?

Could be. Especially on such a machine, it was the era of unreliable
memory busses between RAM, chipsets and CPUs, unreliable cache sticks,
unreliable RAM sticks, and unreliable voltage regulators causing
lockups and cache corruption. I don't think the problem is related to
low memory because you should get OOM messages if this was the case.

Have you tried running memtest on this machine ? I would bet that it
could find errors. I do still run a P133 which stayed up for 2 years
before the mains was cut, but I've encountered many of them showing
frequent lockups in the past, particularly on those with a small
cache card plugged into a special slot close to the CPU. You may try
to disable the cache in the BIOS, because I suspect that performance
is less of a problem for you on such a machine than reliability.
Slightly increasing the CPU voltage might also compensate for an aging
regulator.

Best regards,
Willy

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: linux 2.4.32: kernel BUG in slab.c:1582

2006-12-27 Thread Willy Tarreau
Hi !

On Wed, Dec 20, 2006 at 12:21:59PM -0700, Sebastian Kuzminsky wrote:
 Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap)
 running Linux 2.4.32, and lately I've been getting kernel BUGs like this:
 
 kernel: kernel BUG at slab.c:1582!
 kernel: invalid operand: 
 kernel: CPU:0
 kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted
 kernel: EFLAGS: 00010293
 kernel: eax: c10b7354   ebx: 3ef0   ecx: 0002b450   edx: c11c
 kernel: esi: 000ad140   edi: c3ef0634   ebp: 0023   esp: c10c3f4c
 kernel: ds: 0018   es: 0018   ss: 0018
 kernel: Process kswapd (pid: 4, stackpage=c10c3000)
 kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca 
 c10b7354 c3ef0634
 kernel:003c 01d0 0009 c0232f18 c01429b5 0379 
 c012a7b8 0006
 kernel:01d0   c0232f18 0001 c10c2000 
  c012a947
 kernel: Call Trace:[prune_dcache+266/320] 
 [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] 
 [kswapd_balance_pgdat+87/160] [kswapd_balance+22/48]
 kernel:   [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] 
 [kswapd+0/176]
 kernel:
 kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89
 
 
 The system is a bit tight on memory, but /proc/meminfo reports MemFree +
 Buffers + Cached  10 MB.
 
 After kswapd stepped on the BUG, it happened several more times by
 different processes and different code paths, but always ending with this:
 
 Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] 
 [try_to_free_pages_zone+104/208] [balance_classzone+76/560] 
 [__alloc_pages+363/624]
 
 
 The BUG is this one:
 
 /**
  * kmem_cache_free - Deallocate an object
  * @cachep: The cache the allocation was from.
  * @objp: The previously allocated object.
  *
  * Free an object which was previously allocated from this
  * cache.
  */
 void kmem_cache_free (kmem_cache_t *cachep, void *objp)
 {
 unsigned long flags;
 #if DEBUG
 CHECK_PAGE(virt_to_page(objp));
 if (cachep != GET_PAGE_CACHE(virt_to_page(objp)))
 BUG();
 #endif
 
 local_irq_save(flags);
 __kmem_cache_free(cachep, objp);
 local_irq_restore(flags);
 }
 
 
 So prune_dcache() gets called to free up some memory, but then it hands
 kmem_cache_free an inconsistent object to free?  Is this indicative of
 memory corruption?

Could be. Especially on such a machine, it was the era of unreliable
memory busses between RAM, chipsets and CPUs, unreliable cache sticks,
unreliable RAM sticks, and unreliable voltage regulators causing
lockups and cache corruption. I don't think the problem is related to
low memory because you should get OOM messages if this was the case.

Have you tried running memtest on this machine ? I would bet that it
could find errors. I do still run a P133 which stayed up for 2 years
before the mains was cut, but I've encountered many of them showing
frequent lockups in the past, particularly on those with a small
cache card plugged into a special slot close to the CPU. You may try
to disable the cache in the BIOS, because I suspect that performance
is less of a problem for you on such a machine than reliability.
Slightly increasing the CPU voltage might also compensate for an aging
regulator.

Best regards,
Willy

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


linux 2.4.32: kernel BUG in slab.c:1582

2006-12-20 Thread Sebastian Kuzminsky
Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap)
running Linux 2.4.32, and lately I've been getting kernel BUGs like this:

kernel: kernel BUG at slab.c:1582!
kernel: invalid operand: 
kernel: CPU:0
kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted
kernel: EFLAGS: 00010293
kernel: eax: c10b7354   ebx: 3ef0   ecx: 0002b450   edx: c11c
kernel: esi: 000ad140   edi: c3ef0634   ebp: 0023   esp: c10c3f4c
kernel: ds: 0018   es: 0018   ss: 0018
kernel: Process kswapd (pid: 4, stackpage=c10c3000)
kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca 
c10b7354 c3ef0634
kernel:003c 01d0 0009 c0232f18 c01429b5 0379 
c012a7b8 0006
kernel:01d0   c0232f18 0001 c10c2000 
 c012a947
kernel: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] 
[try_to_free_pages_zone+104/208] [kswapd_balance_pgdat+87/160] 
[kswapd_balance+22/48]
kernel:   [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] 
[kswapd+0/176]
kernel:
kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89


The system is a bit tight on memory, but /proc/meminfo reports MemFree +
Buffers + Cached > 10 MB.

After kswapd stepped on the BUG, it happened several more times by
different processes and different code paths, but always ending with this:

Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] 
[try_to_free_pages_zone+104/208] [balance_classzone+76/560] 
[__alloc_pages+363/624]


The BUG is this one:

/**
 * kmem_cache_free - Deallocate an object
 * @cachep: The cache the allocation was from.
 * @objp: The previously allocated object.
 *
 * Free an object which was previously allocated from this
 * cache.
 */
void kmem_cache_free (kmem_cache_t *cachep, void *objp)
{
unsigned long flags;
#if DEBUG
CHECK_PAGE(virt_to_page(objp));
if (cachep != GET_PAGE_CACHE(virt_to_page(objp)))
BUG();
#endif

local_irq_save(flags);
__kmem_cache_free(cachep, objp);
local_irq_restore(flags);
}


So prune_dcache() gets called to free up some memory, but then it hands
kmem_cache_free an inconsistent object to free?  Is this indicative of
memory corruption?


-- 
Sebastian Kuzminsky There are two kinds of people in this world:
Those who finish what they begin.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


linux 2.4.32: kernel BUG in slab.c:1582

2006-12-20 Thread Sebastian Kuzminsky
Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap)
running Linux 2.4.32, and lately I've been getting kernel BUGs like this:

kernel: kernel BUG at slab.c:1582!
kernel: invalid operand: 
kernel: CPU:0
kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted
kernel: EFLAGS: 00010293
kernel: eax: c10b7354   ebx: 3ef0   ecx: 0002b450   edx: c11c
kernel: esi: 000ad140   edi: c3ef0634   ebp: 0023   esp: c10c3f4c
kernel: ds: 0018   es: 0018   ss: 0018
kernel: Process kswapd (pid: 4, stackpage=c10c3000)
kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca 
c10b7354 c3ef0634
kernel:003c 01d0 0009 c0232f18 c01429b5 0379 
c012a7b8 0006
kernel:01d0   c0232f18 0001 c10c2000 
 c012a947
kernel: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] 
[try_to_free_pages_zone+104/208] [kswapd_balance_pgdat+87/160] 
[kswapd_balance+22/48]
kernel:   [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] 
[kswapd+0/176]
kernel:
kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89


The system is a bit tight on memory, but /proc/meminfo reports MemFree +
Buffers + Cached  10 MB.

After kswapd stepped on the BUG, it happened several more times by
different processes and different code paths, but always ending with this:

Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] 
[try_to_free_pages_zone+104/208] [balance_classzone+76/560] 
[__alloc_pages+363/624]


The BUG is this one:

/**
 * kmem_cache_free - Deallocate an object
 * @cachep: The cache the allocation was from.
 * @objp: The previously allocated object.
 *
 * Free an object which was previously allocated from this
 * cache.
 */
void kmem_cache_free (kmem_cache_t *cachep, void *objp)
{
unsigned long flags;
#if DEBUG
CHECK_PAGE(virt_to_page(objp));
if (cachep != GET_PAGE_CACHE(virt_to_page(objp)))
BUG();
#endif

local_irq_save(flags);
__kmem_cache_free(cachep, objp);
local_irq_restore(flags);
}


So prune_dcache() gets called to free up some memory, but then it hands
kmem_cache_free an inconsistent object to free?  Is this indicative of
memory corruption?


-- 
Sebastian Kuzminsky There are two kinds of people in this world:
Those who finish what they begin.
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: ac17 "kernel BUG at slab.c:1244!"

2001-06-25 Thread Tachino Nobuhiro


Hello,

At Fri, 22 Jun 2001 15:01:43 +,
Gav wrote:
> 
> This second one was immediately after rebooting, and hard locked at getty.
> 
> kernel BUG at slab.c:1244!
> invalid operand: 
> CPU:0
> EIP:0010:[]
> EFLAGS: 00010082
> eax: 001b   ebx: c187f788   ecx: 0001   edx: 2704
> esi: dfa5c000   edi: dfa5c9aa   ebp: 00012800   esp: da801e2c
> ds: 0018   es: 0018   ss: 0018
> Process mingetty (pid: 811, stackpage=da801000)
> Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001
>dfa5c000 c0230b4a c030a2e0 0006 0406  c01931dd 0c3c
>0007 0406 c0193e48 c198df88 0005   dfa5d000
> Call Trace: [] [] [] [] []
>[] [] [] [] [] 
> []
>[] []
>  
> Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17
> 
> >>EIP; c0126850<=
> Trace; c0230b4a <_mmx_memcpy+fa/260>
> Trace; c01931dd 
> Trace; c0193e48 
> Trace; c0126d9c 
> Trace; c019485e 
> Trace; c012e932 
> Trace; c010fd26 
> Trace; c012eac6 
> Trace; c012db40 
> Trace; c012da69 
> Trace; c0137c5a 
> Trace; c012dd43 
> Trace; c0106ca7 <__up_wakeup+10fb/23f4>
> Code;  c0126850 
>  <_EIP>:
> Code;  c0126850<=
>0:   0f 0b ud2a  <=
> Code;  c0126852 
>2:   5dpop%ebp
> Code;  c0126853 
>3:   8b 6b 10  mov0x10(%ebx),%ebp
> Code;  c0126856 
>6:   58pop%eax
> Code;  c0126857 
>7:   81 e5 00 04 00 00 and$0x400,%ebp
> Code;  c012685d 
>d:   74 4b je 5a <_EIP+0x5a> c01268aa 
> 
> Code;  c012685f 
>f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax
> 
> 
> 1 warning and 1 error issued.  Results may not be reliable.
> 
> This kernel was built with gcc 2.96 on an Athlon 1.33Ghz.
> 
> Hope this is usefull,
> 

I found a bug of release_mem() in tty_io.c and it may cause this
oops. release_mem() frees the memory of tty_struct, but does not
reset tty_files field of tty_struct. So, when fput() was called,
it changes tty_files of already freed tty_struct.



diff -r -u linux.org/drivers/char/tty_io.c linux/drivers/char/tty_io.c
--- linux.org/drivers/char/tty_io.c Tue Jun 26 09:46:07 2001
+++ linux/drivers/char/tty_io.c Tue Jun 26 10:00:24 2001
@@ -1024,6 +1024,7 @@
}
o_tty->magic = 0;
(*o_tty->driver.refcount)--;
+   list_del(_tty->tty_files);
free_tty_struct(o_tty);
}
 
@@ -1035,6 +1036,7 @@
}
tty->magic = 0;
(*tty->driver.refcount)--;
+   list_del(>tty_files);
free_tty_struct(tty);
 }
 

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: ac17 "kernel BUG at slab.c:1244!"

2001-06-25 Thread Lars Gaarden

Gav wrote:

> The first occurrence of this I didn't even notice until i checked my logs. 


I have seen the same here, once with ac13 and twice with ac15 so far.
Completely standard hardware, PIII, 440BX motherboard, esssolo1.


-- 
LarsG

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: ac17 kernel BUG at slab.c:1244!

2001-06-25 Thread Lars Gaarden

Gav wrote:

 The first occurrence of this I didn't even notice until i checked my logs. 


I have seen the same here, once with ac13 and twice with ac15 so far.
Completely standard hardware, PIII, 440BX motherboard, esssolo1.


-- 
LarsG

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: ac17 kernel BUG at slab.c:1244!

2001-06-25 Thread Tachino Nobuhiro


Hello,

At Fri, 22 Jun 2001 15:01:43 +,
Gav wrote:
 
 This second one was immediately after rebooting, and hard locked at getty.
 
 kernel BUG at slab.c:1244!
 invalid operand: 
 CPU:0
 EIP:0010:[c0126850]
 EFLAGS: 00010082
 eax: 001b   ebx: c187f788   ecx: 0001   edx: 2704
 esi: dfa5c000   edi: dfa5c9aa   ebp: 00012800   esp: da801e2c
 ds: 0018   es: 0018   ss: 0018
 Process mingetty (pid: 811, stackpage=da801000)
 Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001
dfa5c000 c0230b4a c030a2e0 0006 0406  c01931dd 0c3c
0007 0406 c0193e48 c198df88 0005   dfa5d000
 Call Trace: [c0230b4a] [c01931dd] [c0193e48] [c0126d9c] [c019485e]
[c012e932] [c010fd26] [c012eac6] [c012db40] [c012da69] 
 [c0137c5a]
[c012dd43] [c0106ca7]
  
 Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17
 
 EIP; c0126850 kmalloc+140/1e0   =
 Trace; c0230b4a _mmx_memcpy+fa/260
 Trace; c01931dd parport_pc_unregister_port+a5d/b90
 Trace; c0193e48 tty_hung_up_p+588/1d30
 Trace; c0126d9c kfree+1ec/290
 Trace; c019485e tty_hung_up_p+f9e/1d30
 Trace; c012e932 default_llseek+952/9c0
 Trace; c010fd26 do_BUG+246/740
 Trace; c012eac6 unregister_chrdev+96/a0
 Trace; c012db40 dentry_open+c0/140
 Trace; c012da69 filp_open+49/60
 Trace; c0137c5a getname+5a/a0
 Trace; c012dd43 get_unused_fd+183/220
 Trace; c0106ca7 __up_wakeup+10fb/23f4
 Code;  c0126850 kmalloc+140/1e0
  _EIP:
 Code;  c0126850 kmalloc+140/1e0   =
0:   0f 0b ud2a  =
 Code;  c0126852 kmalloc+142/1e0
2:   5dpop%ebp
 Code;  c0126853 kmalloc+143/1e0
3:   8b 6b 10  mov0x10(%ebx),%ebp
 Code;  c0126856 kmalloc+146/1e0
6:   58pop%eax
 Code;  c0126857 kmalloc+147/1e0
7:   81 e5 00 04 00 00 and$0x400,%ebp
 Code;  c012685d kmalloc+14d/1e0
d:   74 4b je 5a _EIP+0x5a c01268aa 
 kmalloc+19a/1e0
 Code;  c012685f kmalloc+14f/1e0
f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax
 
 
 1 warning and 1 error issued.  Results may not be reliable.
 
 This kernel was built with gcc 2.96 on an Athlon 1.33Ghz.
 
 Hope this is usefull,
 

I found a bug of release_mem() in tty_io.c and it may cause this
oops. release_mem() frees the memory of tty_struct, but does not
reset tty_files field of tty_struct. So, when fput() was called,
it changes tty_files of already freed tty_struct.



diff -r -u linux.org/drivers/char/tty_io.c linux/drivers/char/tty_io.c
--- linux.org/drivers/char/tty_io.c Tue Jun 26 09:46:07 2001
+++ linux/drivers/char/tty_io.c Tue Jun 26 10:00:24 2001
@@ -1024,6 +1024,7 @@
}
o_tty-magic = 0;
(*o_tty-driver.refcount)--;
+   list_del(o_tty-tty_files);
free_tty_struct(o_tty);
}
 
@@ -1035,6 +1036,7 @@
}
tty-magic = 0;
(*tty-driver.refcount)--;
+   list_del(tty-tty_files);
free_tty_struct(tty);
 }
 

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



ac17 "kernel BUG at slab.c:1244!"

2001-06-22 Thread Gav

The first occurrence of this I didn't even notice until i checked my logs. 

kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[]
EFLAGS: 00010082
eax: 001b   ebx: c187f788   ecx: 0001   edx: 2765
esi: d9a5f000   edi: d9a5f9aa   ebp: 00012800   esp: d9fcbda4
ds: 0018   es: 0018   ss: 0018
Process kdeinit (pid: 993, stackpage=d9fcb000)
Stack: c023d5c5 04dc d9a5f000 1000 d9a5f9aa 0246 ca0fe000 0282
   d9fcbf5c 04c8 dfa43128 0007 d9fca000 0002 c01f47d7 087c
   0007 d9dbef40  c01f3ed5 0840 0007  0810
Call Trace: [] [] [] [] []
   [] [] [] [] [] 
[]
 
 
Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17

>>EIP; c0126850<=
Trace; c01f47d7 
Trace; c01f3ed5 
Trace; c0223ab7 
Trace; c01f1beb 
Trace; c01f1f23 
Trace; c01f1faa 
Trace; c012e4e1 
Trace; c0126d9c 
Trace; c013c988 <__pollwait+838/1040>
Trace; c012e651 
Trace; c0106ca7 <__up_wakeup+10fb/23f4>
Code;  c0126850 
 <_EIP>:
Code;  c0126850<=
   0:   0f 0b ud2a  <=
Code;  c0126852 
   2:   5dpop%ebp
Code;  c0126853 
   3:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c0126856 
   6:   58pop%eax
Code;  c0126857 
   7:   81 e5 00 04 00 00 and$0x400,%ebp
Code;  c012685d 
   d:   74 4b je 5a <_EIP+0x5a> c01268aa 

Code;  c012685f 
   f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax
 
 
1 warning and 1 error issued.  Results may not be reliable.




This second one was immediately after rebooting, and hard locked at getty.

kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[]
EFLAGS: 00010082
eax: 001b   ebx: c187f788   ecx: 0001   edx: 2704
esi: dfa5c000   edi: dfa5c9aa   ebp: 00012800   esp: da801e2c
ds: 0018   es: 0018   ss: 0018
Process mingetty (pid: 811, stackpage=da801000)
Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001
   dfa5c000 c0230b4a c030a2e0 0006 0406  c01931dd 0c3c
   0007 0406 c0193e48 c198df88 0005   dfa5d000
Call Trace: [] [] [] [] []
   [] [] [] [] [] 
[]
   [] []
 
Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17

>>EIP; c0126850<=
Trace; c0230b4a <_mmx_memcpy+fa/260>
Trace; c01931dd 
Trace; c0193e48 
Trace; c0126d9c 
Trace; c019485e 
Trace; c012e932 
Trace; c010fd26 
Trace; c012eac6 
Trace; c012db40 
Trace; c012da69 
Trace; c0137c5a 
Trace; c012dd43 
Trace; c0106ca7 <__up_wakeup+10fb/23f4>
Code;  c0126850 
 <_EIP>:
Code;  c0126850<=
   0:   0f 0b ud2a  <=
Code;  c0126852 
   2:   5dpop%ebp
Code;  c0126853 
   3:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c0126856 
   6:   58pop%eax
Code;  c0126857 
   7:   81 e5 00 04 00 00 and$0x400,%ebp
Code;  c012685d 
   d:   74 4b je 5a <_EIP+0x5a> c01268aa 

Code;  c012685f 
   f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax


1 warning and 1 error issued.  Results may not be reliable.

This kernel was built with gcc 2.96 on an Athlon 1.33Ghz.

Hope this is usefull,

-- Regards, Gavin Baker

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



ac17 kernel BUG at slab.c:1244!

2001-06-22 Thread Gav

The first occurrence of this I didn't even notice until i checked my logs. 

kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[c0126850]
EFLAGS: 00010082
eax: 001b   ebx: c187f788   ecx: 0001   edx: 2765
esi: d9a5f000   edi: d9a5f9aa   ebp: 00012800   esp: d9fcbda4
ds: 0018   es: 0018   ss: 0018
Process kdeinit (pid: 993, stackpage=d9fcb000)
Stack: c023d5c5 04dc d9a5f000 1000 d9a5f9aa 0246 ca0fe000 0282
   d9fcbf5c 04c8 dfa43128 0007 d9fca000 0002 c01f47d7 087c
   0007 d9dbef40  c01f3ed5 0840 0007  0810
Call Trace: [c01f47d7] [c01f3ed5] [c0223ab7] [c01f1beb] [c01f1f23]
   [c01f1faa] [c012e4e1] [c0126d9c] [c013c988] [c012e651] 
[c0106ca7]
 
 
Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17

EIP; c0126850 kmalloc+140/1e0   =
Trace; c01f47d7 alloc_skb+d7/310
Trace; c01f3ed5 sock_alloc_send_skb+85/f0
Trace; c0223ab7 ip_rt_ioctl+3a67/5110
Trace; c01f1beb sock_sendmsg+6b/90
Trace; c01f1f23 sock_recvmsg+313/5b0
Trace; c01f1faa sock_recvmsg+39a/5b0
Trace; c012e4e1 default_llseek+501/9c0
Trace; c0126d9c kfree+1ec/290
Trace; c013c988 __pollwait+838/1040
Trace; c012e651 default_llseek+671/9c0
Trace; c0106ca7 __up_wakeup+10fb/23f4
Code;  c0126850 kmalloc+140/1e0
 _EIP:
Code;  c0126850 kmalloc+140/1e0   =
   0:   0f 0b ud2a  =
Code;  c0126852 kmalloc+142/1e0
   2:   5dpop%ebp
Code;  c0126853 kmalloc+143/1e0
   3:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c0126856 kmalloc+146/1e0
   6:   58pop%eax
Code;  c0126857 kmalloc+147/1e0
   7:   81 e5 00 04 00 00 and$0x400,%ebp
Code;  c012685d kmalloc+14d/1e0
   d:   74 4b je 5a _EIP+0x5a c01268aa 
kmalloc+19a/1e0
Code;  c012685f kmalloc+14f/1e0
   f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax
 
 
1 warning and 1 error issued.  Results may not be reliable.




This second one was immediately after rebooting, and hard locked at getty.

kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[c0126850]
EFLAGS: 00010082
eax: 001b   ebx: c187f788   ecx: 0001   edx: 2704
esi: dfa5c000   edi: dfa5c9aa   ebp: 00012800   esp: da801e2c
ds: 0018   es: 0018   ss: 0018
Process mingetty (pid: 811, stackpage=da801000)
Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001
   dfa5c000 c0230b4a c030a2e0 0006 0406  c01931dd 0c3c
   0007 0406 c0193e48 c198df88 0005   dfa5d000
Call Trace: [c0230b4a] [c01931dd] [c0193e48] [c0126d9c] [c019485e]
   [c012e932] [c010fd26] [c012eac6] [c012db40] [c012da69] 
[c0137c5a]
   [c012dd43] [c0106ca7]
 
Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17

EIP; c0126850 kmalloc+140/1e0   =
Trace; c0230b4a _mmx_memcpy+fa/260
Trace; c01931dd parport_pc_unregister_port+a5d/b90
Trace; c0193e48 tty_hung_up_p+588/1d30
Trace; c0126d9c kfree+1ec/290
Trace; c019485e tty_hung_up_p+f9e/1d30
Trace; c012e932 default_llseek+952/9c0
Trace; c010fd26 do_BUG+246/740
Trace; c012eac6 unregister_chrdev+96/a0
Trace; c012db40 dentry_open+c0/140
Trace; c012da69 filp_open+49/60
Trace; c0137c5a getname+5a/a0
Trace; c012dd43 get_unused_fd+183/220
Trace; c0106ca7 __up_wakeup+10fb/23f4
Code;  c0126850 kmalloc+140/1e0
 _EIP:
Code;  c0126850 kmalloc+140/1e0   =
   0:   0f 0b ud2a  =
Code;  c0126852 kmalloc+142/1e0
   2:   5dpop%ebp
Code;  c0126853 kmalloc+143/1e0
   3:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c0126856 kmalloc+146/1e0
   6:   58pop%eax
Code;  c0126857 kmalloc+147/1e0
   7:   81 e5 00 04 00 00 and$0x400,%ebp
Code;  c012685d kmalloc+14d/1e0
   d:   74 4b je 5a _EIP+0x5a c01268aa 
kmalloc+19a/1e0
Code;  c012685f kmalloc+14f/1e0
   f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax


1 warning and 1 error issued.  Results may not be reliable.

This kernel was built with gcc 2.96 on an Athlon 1.33Ghz.

Hope this is usefull,

-- Regards, Gavin Baker

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



BUG at slab.c:1244! 2.4.5-ac13

2001-06-15 Thread Lars Gaarden

I tend to get these after a few days uptime. This one locked X
hard, ping and ssh over net etc still worked ok.
Pretty standard x86 PC hardware.


kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[]
EFLAGS: 00213082
eax: 001b   ebx: cfffc768   ecx: c0217700   edx: 0002906e
esi: c8a5b000   edi: c8a5b9aa   ebp: 00012800   esp: ca2e7df8
ds: 0018   es: 0018   ss: 0018
Process X (pid: 11139, stackpage=ca2e7000)
Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 
1000
0020 00203246 c01a4e86 0a1c 0007 c58a97a0  
09e0
c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 
ca2e6000
Call Trace: [] [] [] [] []
[] [] [] [] [] 
[]
[] [] []

Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f


ksymoops 0.7c on i686 2.4.5-ac13.  Options used
  -V (default)
  -k /proc/ksyms (default)
  -l /proc/modules (default)
  -o /lib/modules/2.4.5-ac13/ (default)
  -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

invalid operand: 
CPU:0
EIP:0010:[]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00213082
eax: 001b   ebx: cfffc768   ecx: c0217700   edx: 0002906e
esi: c8a5b000   edi: c8a5b9aa   ebp: 00012800   esp: ca2e7df8
ds: 0018   es: 0018   ss: 0018
Process X (pid: 11139, stackpage=ca2e7000)
Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 
1000
0020 00203246 c01a4e86 0a1c 0007 c58a97a0  
09e0
c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 
ca2e6000
Call Trace: [] [] [] [] []
[] [] [] [] [] 
[]
[] [] []
Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f

 >>EIP; c012842f<=
Trace; c01a4e86 
Trace; c01a4671 
Trace; c01d34e0 
Trace; c01d35df 
Trace; c01d34e0 
Trace; c01a233d 
Trace; c01d34e0 
Trace; c01a265c 
Trace; c01a26de 
Trace; c0130c93 
Trace; c0117e65 
Trace; c0130df9 
Trace; c0106b17 
Trace; c010002b 
Code;  c012842f 
 <_EIP>:
Code;  c012842f<=
0:   0f 0b ud2a  <=
Code;  c0128431 
2:   83 c4 08  add$0x8,%esp
Code;  c0128434 
5:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c0128437 
8:   f7 c5 00 04 00 00 test   $0x400,%ebp
Code;  c012843d 
e:   74 53 je 63 <_EIP+0x63> c0128492 

Code;  c012843f 
   10:   b8 a5 c2 0f 00mov$0xfc2a5,%eax


1 warning issued.  Results may not be reliable.--

-- 
LarsG

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



BUG at slab.c:1244! 2.4.5-ac13

2001-06-15 Thread Lars Gaarden

I tend to get these after a few days uptime. This one locked X
hard, ping and ssh over net etc still worked ok.
Pretty standard x86 PC hardware.


kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[c012842f]
EFLAGS: 00213082
eax: 001b   ebx: cfffc768   ecx: c0217700   edx: 0002906e
esi: c8a5b000   edi: c8a5b9aa   ebp: 00012800   esp: ca2e7df8
ds: 0018   es: 0018   ss: 0018
Process X (pid: 11139, stackpage=ca2e7000)
Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 
1000
0020 00203246 c01a4e86 0a1c 0007 c58a97a0  
09e0
c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 
ca2e6000
Call Trace: [c01a4e86] [c01a4671] [c01d34e0] [c01d35df] [c01d34e0]
[c01a233d] [c01d34e0] [c01a265c] [c01a26de] [c0130c93] 
[c0117e65]
[c0130df9] [c0106b17] [c010002b]

Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f


ksymoops 0.7c on i686 2.4.5-ac13.  Options used
  -V (default)
  -k /proc/ksyms (default)
  -l /proc/modules (default)
  -o /lib/modules/2.4.5-ac13/ (default)
  -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

invalid operand: 
CPU:0
EIP:0010:[c012842f]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00213082
eax: 001b   ebx: cfffc768   ecx: c0217700   edx: 0002906e
esi: c8a5b000   edi: c8a5b9aa   ebp: 00012800   esp: ca2e7df8
ds: 0018   es: 0018   ss: 0018
Process X (pid: 11139, stackpage=ca2e7000)
Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 
1000
0020 00203246 c01a4e86 0a1c 0007 c58a97a0  
09e0
c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 
ca2e6000
Call Trace: [c01a4e86] [c01a4671] [c01d34e0] [c01d35df] [c01d34e0]
[c01a233d] [c01d34e0] [c01a265c] [c01a26de] [c0130c93] 
[c0117e65]
[c0130df9] [c0106b17] [c010002b]
Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f

 EIP; c012842f kmalloc+12f/1d8   =
Trace; c01a4e86 alloc_skb+de/190
Trace; c01a4671 sock_alloc_send_skb+71/108
Trace; c01d34e0 unix_stream_sendmsg+0/2e0
Trace; c01d35df unix_stream_sendmsg+ff/2e0
Trace; c01d34e0 unix_stream_sendmsg+0/2e0
Trace; c01a233d sock_sendmsg+81/a4
Trace; c01d34e0 unix_stream_sendmsg+0/2e0
Trace; c01a265c sock_readv_writev+8c/98
Trace; c01a26de sock_writev+36/40
Trace; c0130c93 do_readv_writev+183/254
Trace; c0117e65 sys_gettimeofday+1d/94
Trace; c0130df9 sys_writev+41/54
Trace; c0106b17 system_call+33/38
Trace; c010002b startup_32+2b/a5
Code;  c012842f kmalloc+12f/1d8
 _EIP:
Code;  c012842f kmalloc+12f/1d8   =
0:   0f 0b ud2a  =
Code;  c0128431 kmalloc+131/1d8
2:   83 c4 08  add$0x8,%esp
Code;  c0128434 kmalloc+134/1d8
5:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c0128437 kmalloc+137/1d8
8:   f7 c5 00 04 00 00 test   $0x400,%ebp
Code;  c012843d kmalloc+13d/1d8
e:   74 53 je 63 _EIP+0x63 c0128492 
kmalloc+192/1d8
Code;  c012843f kmalloc+13f/1d8
   10:   b8 a5 c2 0f 00mov$0xfc2a5,%eax


1 warning issued.  Results may not be reliable.--

-- 
LarsG

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



2.4.5-ac5 BUG in slab.c

2001-06-04 Thread Matt Bernstein

I was playing with (a romfs) initrd and modularising everything, including
ext2 and ide-*. (gcc version 2.96 2731 (Red Hat Linux 7.1 2.96-81))

More info on request.

ksymoops 2.4.0 on i686 2.4.5-ac5-4.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.4.5-ac5-4/ (default)
 -m /boot/System.map-2.4.5-ac5-4 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Error (expand_objects): cannot stat(/lib/ext2.o) for ext2
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/eepro100.o) for eepro100
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/ide-disk.o) for ide-disk
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/ide-probe-mod.o) for ide-probe-mod
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/ide-mod.o) for ide-mod
ksymoops: No such file or directory
kernel BUG at slab.c:1200!
invalid operand: 
CPU:0
EIP:0010:[]
EFLAGS: 00210082
eax: 001b   ebx: c824e000   ecx: 0001   edx: 6518
esi:    edi: c144713c   ebp: cd14fa4c   esp: c6fd7ee8
ds: 0018   es: 0018   ss: 0018
Process netscape-commun (pid: 3901, stackpage=c6fd7000)
Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c
   cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4
   c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb
Call Trace: [] [] [] [] []
   []

Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/net/ipv4/netfilter/netfilter.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/net/ipv6/netfilter/netfilter.o
Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/md/mddev.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/net/wireless/orinoco_drvs.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/char/drm/drm.o
Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/misc/misc.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/cdrom/driver.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/media/radio/radio.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/media/video/video.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/media/media.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/sound/sounddrivers.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/parport/driver.o
Warning (map_ksym_to_module): cannot match loaded module ext2 to a unique module 
object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module eepro100 to a unique module 
object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module ide-disk to a unique module 
object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module ide-probe-mod to a unique 
module object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module ide-mod to a unique module 
object.  Trace may not be reliable.
Reading Oops report from the terminal
kernel BUG at slab.c:1200!
invalid operand: 
CPU:0
EIP:0010:[]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00210082
eax: 001b   ebx: c824e000   ecx: 0001   edx: 6518
esi:    edi: c144713c   ebp: cd14fa4c   esp: c6fd7ee8
ds: 0018   es: 0018   ss: 0018
Process netscape-commun (pid: 3901, stackpage=c6fd7000)
Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c
   cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4
   c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb
Call Trace: [] [] [] [] []
   []
Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00

>>EIP; c01280d9<=
Trace; c01286a5 
Trace; c013bafe 
Trace; c013e3d8 
Trace; c0130254 
Trace; c0130543 
Trace; c0106e5b 
Code;  c01280d9 
 <_EIP>:
Code;  c01280d9<=
   0:   0f 0b ud2a  <=
Code;  c01280db 
   2:   5apop%edx
Code;  c01280dc 
   3:   59pop%ecx
Code;  c01280dd 
   4:   8b 5d 14  mov0x14(%ebp),%ebx
Code;  c01280e0 
   7:   83 fb ff  cmp$0x,%ebx
Code;  c0

2.4.5-ac5 BUG in slab.c

2001-06-04 Thread Matt Bernstein

I was playing with (a romfs) initrd and modularising everything, including
ext2 and ide-*. (gcc version 2.96 2731 (Red Hat Linux 7.1 2.96-81))

More info on request.

ksymoops 2.4.0 on i686 2.4.5-ac5-4.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.4.5-ac5-4/ (default)
 -m /boot/System.map-2.4.5-ac5-4 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Error (expand_objects): cannot stat(/lib/ext2.o) for ext2
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/eepro100.o) for eepro100
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/ide-disk.o) for ide-disk
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/ide-probe-mod.o) for ide-probe-mod
ksymoops: No such file or directory
Error (expand_objects): cannot stat(/lib/ide-mod.o) for ide-mod
ksymoops: No such file or directory
kernel BUG at slab.c:1200!
invalid operand: 
CPU:0
EIP:0010:[c01280d9]
EFLAGS: 00210082
eax: 001b   ebx: c824e000   ecx: 0001   edx: 6518
esi:    edi: c144713c   ebp: cd14fa4c   esp: c6fd7ee8
ds: 0018   es: 0018   ss: 0018
Process netscape-commun (pid: 3901, stackpage=c6fd7000)
Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c
   cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4
   c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb
Call Trace: [c01286a5] [c013bafe] [c013e3d8] [c0130254] [c0130543]
   [c0106e5b]

Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/net/ipv4/netfilter/netfilter.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/net/ipv6/netfilter/netfilter.o
Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/md/mddev.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/net/wireless/orinoco_drvs.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/char/drm/drm.o
Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/misc/misc.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/cdrom/driver.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/media/radio/radio.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/media/video/video.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/media/media.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/sound/sounddrivers.o
Warning (read_object): no symbols in 
/lib/modules/2.4.5-ac5-4/build/drivers/parport/driver.o
Warning (map_ksym_to_module): cannot match loaded module ext2 to a unique module 
object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module eepro100 to a unique module 
object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module ide-disk to a unique module 
object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module ide-probe-mod to a unique 
module object.  Trace may not be reliable.
Warning (map_ksym_to_module): cannot match loaded module ide-mod to a unique module 
object.  Trace may not be reliable.
Reading Oops report from the terminal
kernel BUG at slab.c:1200!
invalid operand: 
CPU:0
EIP:0010:[c01280d9]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00210082
eax: 001b   ebx: c824e000   ecx: 0001   edx: 6518
esi:    edi: c144713c   ebp: cd14fa4c   esp: c6fd7ee8
ds: 0018   es: 0018   ss: 0018
Process netscape-commun (pid: 3901, stackpage=c6fd7000)
Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c
   cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4
   c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb
Call Trace: [c01286a5] [c013bafe] [c013e3d8] [c0130254] [c0130543]
   [c0106e5b]
Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00

EIP; c01280d9 kmem_extra_free_checks+59/a0   =
Trace; c01286a5 kmem_cache_free+215/2c0
Trace; c013bafe open_namei+5ee/600
Trace; c013e3d8 vfs_readdir+58/80
Trace; c0130254 filp_open+34/60
Trace; c0130543 sys_open+33/b0
Trace; c0106e5b system_call+33/38
Code;  c01280d9 kmem_extra_free_checks+59/a0
 _EIP:
Code;  c01280d9 kmem_extra_free_checks+59/a0   =
   0:   0f 0b ud2a  =
Code;  c01280db

Re: [bug] at slab.c ...

2001-06-03 Thread Robert Vojta


  ... and yesterday my box completely lockups and magic keys didn't work too
for me ... no messages in logs ...

Best regards,
  .R.V.

-- 
   _
  |-|  __  Robert Vojta   -= Oo.oO =-
  |=| [Ll] IPEX, s.r.o.
  "^" `o

 PGP signature


Re: [bug] at slab.c ...

2001-06-03 Thread Robert Vojta


  ... and yesterday my box completely lockups and magic keys didn't work too
for me ... no messages in logs ...

Best regards,
  .R.V.

-- 
   _
  |-|  __  Robert Vojta vojta-at-ipex.cz  -= Oo.oO =-
  |=| [Ll] IPEX, s.r.o.
  ^ `o

 PGP signature


Re: [bug] at slab.c ...

2001-06-02 Thread Robert Vojta

> What X server ? and also run the trace through ksymoops

  It's fresh installation of RH 7.1 (XFree86-4.0.3-5) ...

>>EIP; c0129884<=
Trace; c01b08db 
Trace; c01affd7 
Trace; c01e4e79 
Trace; c0129ddc 
Trace; c01adc1c 
Trace; c01b0a9b 
Trace; c01adf53 
Trace; c01adfeb 
Trace; c01321bc <__remove_inode_queue+1c/20>
Trace; c0129ddc 
Trace; c0140412 
Trace; c0132323 
Trace; c0106cab 
Code;  c0129884 
 <_EIP>:
Code;  c0129884<=
   0:   0f 0b ud2a  <=
Code;  c0129886 
   2:   58pop%eax
Code;  c0129887 
   3:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c012988a 
   6:   5apop%edx
Code;  c012988b 
   7:   81 e5 00 04 00 00 and$0x400,%ebp
Code;  c0129891 
   d:   74 4d je 5c <_EIP+0x5c> c01298e0 
Code;  c0129893 
   f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax

Best,
  .R.V.

-- 
   _
  |-|  __  Robert Vojta   -= Oo.oO =-
  |=| [Ll] IPEX, s.r.o.
  "^" `o

 PGP signature


[bug] at slab.c ...

2001-06-02 Thread Robert Vojta

Hi,
  I download kernel 2.4.5 and -ac6 patches and I see this ... After that I
have black rxvt window on my desktop and I can't remove it in any way.

kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[]
EFLAGS: 00010082
eax: 001b   ebx: c1103768   ecx: 0001   edx: 1dcb
esi: c1a57000   edi: c1a579aa   ebp: 00012800   esp: c165fda4
ds: 0018   es: 0018   ss: 0018
Process rxvt (pid: 772, stackpage=c165f000)
Stack: c01f8dca 04dc c1a57000 1000 c1a579aa 0246  0001 
   270f c165fe50 c2fe1214 0007 c165e000 080c c01b08db 085c 
   0007 c126c400  c01affd7 0820 0007  080c 
Call Trace: [] [] [] [] [] 
   [] [] [] [] [] [] 
   [] [] [] 

Code: 0f 0b 58 8b 6b 10 5a 81 e5 00 04 00 00 74 4d b8 a5 c2 0f 17

  If you want more informations, please write me and I will send you as
much as will be possible.

Best regards,
  .R.V.

-- 
   _
  |-|  __  Robert Vojta   -= Oo.oO =-
  |=| [Ll] IPEX, s.r.o.
  "^" `o

 PGP signature


[bug] at slab.c ...

2001-06-02 Thread Robert Vojta

Hi,
  I download kernel 2.4.5 and -ac6 patches and I see this ... After that I
have black rxvt window on my desktop and I can't remove it in any way.

kernel BUG at slab.c:1244!
invalid operand: 
CPU:0
EIP:0010:[c0129884]
EFLAGS: 00010082
eax: 001b   ebx: c1103768   ecx: 0001   edx: 1dcb
esi: c1a57000   edi: c1a579aa   ebp: 00012800   esp: c165fda4
ds: 0018   es: 0018   ss: 0018
Process rxvt (pid: 772, stackpage=c165f000)
Stack: c01f8dca 04dc c1a57000 1000 c1a579aa 0246  0001 
   270f c165fe50 c2fe1214 0007 c165e000 080c c01b08db 085c 
   0007 c126c400  c01affd7 0820 0007  080c 
Call Trace: [c01b08db] [c01affd7] [c01e4e79] [c0129ddc] [c01adc1c] 
   [c01b0a9b] [c01adf53] [c01adfeb] [c01321bc] [c0129ddc] [c0140412] 
   [c0132323] [c0106cab] [c010002b] 

Code: 0f 0b 58 8b 6b 10 5a 81 e5 00 04 00 00 74 4d b8 a5 c2 0f 17

  If you want more informations, please write me and I will send you as
much as will be possible.

Best regards,
  .R.V.

-- 
   _
  |-|  __  Robert Vojta vojta-at-ipex.cz  -= Oo.oO =-
  |=| [Ll] IPEX, s.r.o.
  ^ `o

 PGP signature


Re: [bug] at slab.c ...

2001-06-02 Thread Robert Vojta

 What X server ? and also run the trace through ksymoops

  It's fresh installation of RH 7.1 (XFree86-4.0.3-5) ...

EIP; c0129884 try_to_swap_out+174/1d0   =
Trace; c01b08db skb_checksum+3b/220
Trace; c01affd7 pskb_copy+167/170
Trace; c01e4e79 netlink_create+59/d0
Trace; c0129ddc reclaim_page+1ec/3c0
Trace; c01adc1c sys_recvmsg+ac/200
Trace; c01b0a9b skb_checksum+1fb/220
Trace; c01adf53 sys_socketcall+1a3/200
Trace; c01adfeb sock_register+3b/40
Trace; c01321bc __remove_inode_queue+1c/20
Trace; c0129ddc reclaim_page+1ec/3c0
Trace; c0140412 locks_mandatory_locked+2/40
Trace; c0132323 set_blocksize+63/1f0
Trace; c0106cab system_call+33/38
Code;  c0129884 try_to_swap_out+174/1d0
 _EIP:
Code;  c0129884 try_to_swap_out+174/1d0   =
   0:   0f 0b ud2a  =
Code;  c0129886 try_to_swap_out+176/1d0
   2:   58pop%eax
Code;  c0129887 try_to_swap_out+177/1d0
   3:   8b 6b 10  mov0x10(%ebx),%ebp
Code;  c012988a try_to_swap_out+17a/1d0
   6:   5apop%edx
Code;  c012988b try_to_swap_out+17b/1d0
   7:   81 e5 00 04 00 00 and$0x400,%ebp
Code;  c0129891 try_to_swap_out+181/1d0
   d:   74 4d je 5c _EIP+0x5c c01298e0 swap_out_pmd+0/100
Code;  c0129893 try_to_swap_out+183/1d0
   f:   b8 a5 c2 0f 17mov$0x170fc2a5,%eax

Best,
  .R.V.

-- 
   _
  |-|  __  Robert Vojta vojta-at-ipex.cz  -= Oo.oO =-
  |=| [Ll] IPEX, s.r.o.
  ^ `o

 PGP signature


Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28

2001-03-21 Thread Andrew Morton

Keith Owens wrote:
> 
> On Wed, 21 Mar 2001 23:15:14 -0800,
> Greg Billock <[EMAIL PROTECTED]> wrote:
> >Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee!
> >
> >Copied from screen after interrupt handler killed, so sorry for
> >incompleteness. This
> >bug is reproducable so if necessary, I can try it again
> 
> The complete oops report is required, and it needs to be run through
> ksymoops.  See Documentation/oops-tracing.txt.

It's a known problem, I think.  USB is incompatible
with slab redzoning.  Turn off `Debug memory allocation'
in the kernel hacking menu.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28

2001-03-21 Thread Keith Owens

On Wed, 21 Mar 2001 23:15:14 -0800, 
Greg Billock <[EMAIL PROTECTED]> wrote:
>Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee!
>
>Copied from screen after interrupt handler killed, so sorry for
>incompleteness. This
>bug is reproducable so if necessary, I can try it again

The complete oops report is required, and it needs to be run through
ksymoops.  See Documentation/oops-tracing.txt.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



[BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28

2001-03-21 Thread Greg Billock

Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee!

Copied from screen after interrupt handler killed, so sorry for
incompleteness. This
bug is reproducable so if necessary, I can try it again

kernel BUG at slab.c:1402!
invalid operand: 
CPU: 0
EIP: 0010: []
EFLAGS: 00010086
eax: 1b ebx: 26d6a4 ecx: 81 edx: 14
esi: c82d3 edi: c82d3564 ebp: cdffb0a0 esp: c0289e98
ds: 18 es: 18 ss: 18
Process swapper (pid: 0, stackpage= c0289000)
...
Kernel panic: Aiee, killing interrupt handler!

Sorry for the incomplete data. The system doesn't write anything to logs

about the crash, since it is a pretty hard one, but I can reproduce this
bug
if it hasn't been reported yet (I didn't find it in archives) or the
above is
insufficient.

More data:

AMD K6-2 400 processor, >200MB memory
Gnu C2.96
Binutils 2.10.0.18
Linux C library 1.92.so
Procps 2.0.7
Mount 2.10m
Net-tools (2000-05-21)
sh-utils 2.0

Modules: 8139too, nls_iso8859-1, nls_cp437, vfat, fat, usb-ohci, usbcore

-Greg Billock
 [EMAIL PROTECTED]



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



[BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28

2001-03-21 Thread Greg Billock

Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee!

Copied from screen after interrupt handler killed, so sorry for
incompleteness. This
bug is reproducable so if necessary, I can try it again

kernel BUG at slab.c:1402!
invalid operand: 
CPU: 0
EIP: 0010: [c012ddb4]
EFLAGS: 00010086
eax: 1b ebx: 26d6a4 ecx: 81 edx: 14
esi: c82d3 edi: c82d3564 ebp: cdffb0a0 esp: c0289e98
ds: 18 es: 18 ss: 18
Process swapper (pid: 0, stackpage= c0289000)
...
Kernel panic: Aiee, killing interrupt handler!

Sorry for the incomplete data. The system doesn't write anything to logs

about the crash, since it is a pretty hard one, but I can reproduce this
bug
if it hasn't been reported yet (I didn't find it in archives) or the
above is
insufficient.

More data:

AMD K6-2 400 processor, 200MB memory
Gnu C2.96
Binutils 2.10.0.18
Linux C library 1.92.so
Procps 2.0.7
Mount 2.10m
Net-tools (2000-05-21)
sh-utils 2.0

Modules: 8139too, nls_iso8859-1, nls_cp437, vfat, fat, usb-ohci, usbcore

-Greg Billock
 [EMAIL PROTECTED]



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28

2001-03-21 Thread Keith Owens

On Wed, 21 Mar 2001 23:15:14 -0800, 
Greg Billock [EMAIL PROTECTED] wrote:
Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee!

Copied from screen after interrupt handler killed, so sorry for
incompleteness. This
bug is reproducable so if necessary, I can try it again

The complete oops report is required, and it needs to be run through
ksymoops.  See Documentation/oops-tracing.txt.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28

2001-03-21 Thread Andrew Morton

Keith Owens wrote:
 
 On Wed, 21 Mar 2001 23:15:14 -0800,
 Greg Billock [EMAIL PROTECTED] wrote:
 Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee!
 
 Copied from screen after interrupt handler killed, so sorry for
 incompleteness. This
 bug is reproducable so if necessary, I can try it again
 
 The complete oops report is required, and it needs to be run through
 ksymoops.  See Documentation/oops-tracing.txt.

It's a known problem, I think.  USB is incompatible
with slab redzoning.  Turn off `Debug memory allocation'
in the kernel hacking menu.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-25 Thread Russell King

Tim Fletcher writes:
> What ever a none privilaged user space apps does witness:
> 
> root@localhost# dd if=/dev/random of=/dev/mem

If you can do that as a non-priviledged user, then you've got bigger
security problems than that.

/dev/mem should NOT be read/writable by anyone other than root.  Its
permissions should be no more than 600.
--
Russell King ([EMAIL PROTECTED])The developer of ARM Linux
 http://www.arm.linux.org.uk/personal/aboutme.html

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-25 Thread Russell King

Tim Fletcher writes:
 What ever a none privilaged user space apps does witness:
 
 root@localhost# dd if=/dev/random of=/dev/mem

If you can do that as a non-priviledged user, then you've got bigger
security problems than that.

/dev/mem should NOT be read/writable by anyone other than root.  Its
permissions should be no more than 600.
--
Russell King ([EMAIL PROTECTED])The developer of ARM Linux
 http://www.arm.linux.org.uk/personal/aboutme.html

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Alan Cox

> I sent the below patch to Linus earlier today.  I didn't copy
> any mailing list because it's a bit security-related.  Oh well.

Its been in -ac for  while but using a define since its a constant
so it not a secret 8)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Tim Fletcher

> > > kernel BUG at slab.c:1542!
>
> The kernel should never oops, no matter what user space does to it.

What ever a none privilaged user space apps does witness:

root@localhost# dd if=/dev/random of=/dev/mem

-- 
   Tim Fletcher - Network manager   .~.
/V\  L   I   N   U   X
 [EMAIL PROTECTED]// \\  >Don't fear the penguin<
[EMAIL PROTECTED]   /(   )\
 irc: Night-Shade on quakenet  ^^-^^

Justice is incidental to law and order.
-- J. Edgar Hoover

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Tim Fletcher

> The kernel appears to run fine with this bug() removed.
>
> BTW- gimp and a few other apps also manage to trigger it..

You can add sane with an advansys scsi card and various scsi scanners to
that list

-- 
   Tim Fletcher - Network manager   .~.
/V\  L   I   N   U   X
 [EMAIL PROTECTED]// \\  >Don't fear the penguin<
[EMAIL PROTECTED]   /(   )\
 irc: Night-Shade on quakenet  ^^-^^

Justice is incidental to law and order.
-- J. Edgar Hoover

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Shawn Starr

True, It's just odd that we're having the same problem with the X server, so its
a double whammy ;)
Daniel Phillips wrote:

> Shawn Starr wrote:
> > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
> > extention. This has been discussed on the Xpert XFree86 mailing list. There
> > is a fix in the works (depends on the TrueType fonts your using).
>
> A BUG is a BUG:
>
> > > kernel BUG at slab.c:1542!
>
> The kernel should never oops, no matter what user space does to it.
>
> --
> Daniel

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Andrew Morton

Daniel Phillips wrote:
> 
> I don't know much about the history of this bug but it's quite clear
> it's deliberately inserted:
> 
> void * kmalloc (size_t size, int flags)
> 
> BUG(); // too big size
> return NULL;
> 

I sent the below patch to Linus earlier today.  I didn't copy
any mailing list because it's a bit security-related.  Oh well.

If wmem_max is set to > 256kbytes, an application can
set SO_SNDBUF on a unix domain stream socket to >256k
and do a write() of >256k.  unix_stream_sendmsg()
then tries to kmalloc >128k and the kernel dies.

I don't like the idea of simply returning NULL from kmalloc in
this case, because an application which does

setsockopt(fd, SOL_SOCKET, SO_SNDBUF, 256kbytes);
write(fd, buf, 256kbytes);

will work perfectly well, until someone increases wmem_max
to greater than 256k.  This administrative action will
cause the above application to mysteriously start failing.




--- linux-2.4.1-pre10/include/linux/slab.h  Mon Jan  1 18:29:35 2001
+++ linux-akpm/include/linux/slab.h Wed Jan 24 12:29:34 2001
@@ -75,6 +75,9 @@
 extern kmem_cache_t*fs_cachep;
 extern kmem_cache_t*sigact_cachep;
 
+/* Largest kmalloc which we support */
+extern size_t kmalloc_max;
+
 #endif /* __KERNEL__ */
 
 #endif /* _LINUX_SLAB_H */
--- linux-2.4.1-pre10/mm/slab.c Tue Jan 23 19:28:16 2001
+++ linux-akpm/mm/slab.cWed Jan 24 12:57:47 2001
@@ -360,6 +360,9 @@
 /* Place maintainer for reaping. */
 static kmem_cache_t *clock_searchp = _cache;
 
+/* Largest kmalloc which we support */
+size_t kmalloc_max;
+
 #define cache_chain (cache_cache.next)
 
 #ifdef CONFIG_SMP
@@ -455,6 +458,7 @@
  SLAB_CACHE_DMA|SLAB_HWCACHE_ALIGN, NULL, NULL);
if (!sizes->cs_dmacachep)
BUG();
+   kmalloc_max = sizes->cs_size;
sizes++;
} while (sizes->cs_size);
 }
--- linux-2.4.1-pre10/kernel/ksyms.cTue Jan 23 19:28:16 2001
+++ linux-akpm/kernel/ksyms.c   Wed Jan 24 12:17:28 2001
@@ -104,6 +104,7 @@
 EXPORT_SYMBOL(kmem_cache_alloc);
 EXPORT_SYMBOL(kmem_cache_free);
 EXPORT_SYMBOL(kmalloc);
+EXPORT_SYMBOL(kmalloc_max);
 EXPORT_SYMBOL(kfree);
 EXPORT_SYMBOL(vfree);
 EXPORT_SYMBOL(__vmalloc);
--- linux-2.4.1-pre10/net/unix/af_unix.cTue Jan 23 19:28:16 2001
+++ linux-akpm/net/unix/af_unix.c   Wed Jan 24 12:57:35 2001
@@ -1319,6 +1319,10 @@
if (size > sk->sndbuf/2 - 16)
size = sk->sndbuf/2 - 16;
 
+   /* Avoid oversized kmallocs */
+   if (size > kmalloc_max / 2 - 16)
+   size = kmalloc_max / 2 - 16;
+
/*
 *  Keep to page sized kmalloc()'s as various people
 *  have suggested. Big mallocs stress the vm too
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Daniel Phillips

Gregory Maxwell wrote:
> 
> On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote:
> > > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
> > > extention. This has been discussed on the Xpert XFree86 mailing list. There
> > > is a fix in the works (depends on the TrueType fonts your using).
> >
> > A BUG is a BUG:
> >
> > > > kernel BUG at slab.c:1542!
> >
> > The kernel should never oops, no matter what user space does to it.
> 
> The kernel appears to run fine with this bug() removed.

I don't know much about the history of this bug but it's quite clear
it's deliberately inserted:

void * kmalloc (size_t size, int flags)

BUG(); // too big size
return NULL;

It says "kernel allocation will *never* fail, and if you try to kmalloc
something too large, that's a bug too" - not a reason to try again.  I'd
check with Linus before solving the problem that way ;-)

--
Daniel
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Gregory Maxwell

On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote:
> > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
> > extention. This has been discussed on the Xpert XFree86 mailing list. There
> > is a fix in the works (depends on the TrueType fonts your using).
> 
> A BUG is a BUG:
>  
> > > kernel BUG at slab.c:1542!
> 
> The kernel should never oops, no matter what user space does to it.

The kernel appears to run fine with this bug() removed.

BTW- gimp and a few other apps also manage to trigger it..
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Daniel Phillips

Shawn Starr wrote:
> This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
> extention. This has been discussed on the Xpert XFree86 mailing list. There
> is a fix in the works (depends on the TrueType fonts your using).

A BUG is a BUG:
 
> > kernel BUG at slab.c:1542!

The kernel should never oops, no matter what user space does to it.

--
Daniel
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Daniel Phillips

Shawn Starr wrote:
 This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
 extention. This has been discussed on the Xpert XFree86 mailing list. There
 is a fix in the works (depends on the TrueType fonts your using).

A BUG is a BUG:
 
  kernel BUG at slab.c:1542!

The kernel should never oops, no matter what user space does to it.

--
Daniel
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Gregory Maxwell

On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote:
  This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
  extention. This has been discussed on the Xpert XFree86 mailing list. There
  is a fix in the works (depends on the TrueType fonts your using).
 
 A BUG is a BUG:
  
   kernel BUG at slab.c:1542!
 
 The kernel should never oops, no matter what user space does to it.

The kernel appears to run fine with this bug() removed.

BTW- gimp and a few other apps also manage to trigger it..
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Daniel Phillips

Gregory Maxwell wrote:
 
 On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote:
   This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
   extention. This has been discussed on the Xpert XFree86 mailing list. There
   is a fix in the works (depends on the TrueType fonts your using).
 
  A BUG is a BUG:
 
kernel BUG at slab.c:1542!
 
  The kernel should never oops, no matter what user space does to it.
 
 The kernel appears to run fine with this bug() removed.

I don't know much about the history of this bug but it's quite clear
it's deliberately inserted:

void * kmalloc (size_t size, int flags)
if allocation succeeds, exit
BUG(); // too big size
return NULL;

It says "kernel allocation will *never* fail, and if you try to kmalloc
something too large, that's a bug too" - not a reason to try again.  I'd
check with Linus before solving the problem that way ;-)

--
Daniel
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Andrew Morton

Daniel Phillips wrote:
 
 I don't know much about the history of this bug but it's quite clear
 it's deliberately inserted:
 
 void * kmalloc (size_t size, int flags)
 if allocation succeeds, exit
 BUG(); // too big size
 return NULL;
 

I sent the below patch to Linus earlier today.  I didn't copy
any mailing list because it's a bit security-related.  Oh well.

If wmem_max is set to  256kbytes, an application can
set SO_SNDBUF on a unix domain stream socket to 256k
and do a write() of 256k.  unix_stream_sendmsg()
then tries to kmalloc 128k and the kernel dies.

I don't like the idea of simply returning NULL from kmalloc in
this case, because an application which does

setsockopt(fd, SOL_SOCKET, SO_SNDBUF, 256kbytes);
write(fd, buf, 256kbytes);

will work perfectly well, until someone increases wmem_max
to greater than 256k.  This administrative action will
cause the above application to mysteriously start failing.




--- linux-2.4.1-pre10/include/linux/slab.h  Mon Jan  1 18:29:35 2001
+++ linux-akpm/include/linux/slab.h Wed Jan 24 12:29:34 2001
@@ -75,6 +75,9 @@
 extern kmem_cache_t*fs_cachep;
 extern kmem_cache_t*sigact_cachep;
 
+/* Largest kmalloc which we support */
+extern size_t kmalloc_max;
+
 #endif /* __KERNEL__ */
 
 #endif /* _LINUX_SLAB_H */
--- linux-2.4.1-pre10/mm/slab.c Tue Jan 23 19:28:16 2001
+++ linux-akpm/mm/slab.cWed Jan 24 12:57:47 2001
@@ -360,6 +360,9 @@
 /* Place maintainer for reaping. */
 static kmem_cache_t *clock_searchp = cache_cache;
 
+/* Largest kmalloc which we support */
+size_t kmalloc_max;
+
 #define cache_chain (cache_cache.next)
 
 #ifdef CONFIG_SMP
@@ -455,6 +458,7 @@
  SLAB_CACHE_DMA|SLAB_HWCACHE_ALIGN, NULL, NULL);
if (!sizes-cs_dmacachep)
BUG();
+   kmalloc_max = sizes-cs_size;
sizes++;
} while (sizes-cs_size);
 }
--- linux-2.4.1-pre10/kernel/ksyms.cTue Jan 23 19:28:16 2001
+++ linux-akpm/kernel/ksyms.c   Wed Jan 24 12:17:28 2001
@@ -104,6 +104,7 @@
 EXPORT_SYMBOL(kmem_cache_alloc);
 EXPORT_SYMBOL(kmem_cache_free);
 EXPORT_SYMBOL(kmalloc);
+EXPORT_SYMBOL(kmalloc_max);
 EXPORT_SYMBOL(kfree);
 EXPORT_SYMBOL(vfree);
 EXPORT_SYMBOL(__vmalloc);
--- linux-2.4.1-pre10/net/unix/af_unix.cTue Jan 23 19:28:16 2001
+++ linux-akpm/net/unix/af_unix.c   Wed Jan 24 12:57:35 2001
@@ -1319,6 +1319,10 @@
if (size  sk-sndbuf/2 - 16)
size = sk-sndbuf/2 - 16;
 
+   /* Avoid oversized kmallocs */
+   if (size  kmalloc_max / 2 - 16)
+   size = kmalloc_max / 2 - 16;
+
/*
 *  Keep to page sized kmalloc()'s as various people
 *  have suggested. Big mallocs stress the vm too
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Shawn Starr

True, It's just odd that we're having the same problem with the X server, so its
a double whammy ;)
Daniel Phillips wrote:

 Shawn Starr wrote:
  This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
  extention. This has been discussed on the Xpert XFree86 mailing list. There
  is a fix in the works (depends on the TrueType fonts your using).

 A BUG is a BUG:

   kernel BUG at slab.c:1542!

 The kernel should never oops, no matter what user space does to it.

 --
 Daniel

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Tim Fletcher

   kernel BUG at slab.c:1542!

 The kernel should never oops, no matter what user space does to it.

What ever a none privilaged user space apps does witness:

root@localhost# dd if=/dev/random of=/dev/mem

-- 
   Tim Fletcher - Network manager   .~.
/V\  L   I   N   U   X
 [EMAIL PROTECTED]// \\  Don't fear the penguin
[EMAIL PROTECTED]   /(   )\
 irc: Night-Shade on quakenet  ^^-^^

Justice is incidental to law and order.
-- J. Edgar Hoover

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Tim Fletcher

 The kernel appears to run fine with this bug() removed.

 BTW- gimp and a few other apps also manage to trigger it..

You can add sane with an advansys scsi card and various scsi scanners to
that list

-- 
   Tim Fletcher - Network manager   .~.
/V\  L   I   N   U   X
 [EMAIL PROTECTED]// \\  Don't fear the penguin
[EMAIL PROTECTED]   /(   )\
 irc: Night-Shade on quakenet  ^^-^^

Justice is incidental to law and order.
-- J. Edgar Hoover

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-24 Thread Alan Cox

 I sent the below patch to Linus earlier today.  I didn't copy
 any mailing list because it's a bit security-related.  Oh well.

Its been in -ac for  while but using a define since its a constant
so it not a secret 8)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-22 Thread David Ford

If it makes the kernel do Bad Things, the kernel needs to be fixed.

-d

Shawn Starr wrote:

> This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
> extention. This has been discussed on the Xpert XFree86 mailing list. There
> is a fix in the works (depends on the TrueType fonts your using).
>
> Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS
> X11R6.5.1 merge sources) not 4.0.2 stable.

--
  There is a natural aristocracy among men. The grounds of this are virtue and 
talents. Thomas Jefferson
  The good thing about standards is that there are so many to choose from. Andrew S. 
Tanenbaum



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-22 Thread Shawn Starr

This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
extention. This has been discussed on the Xpert XFree86 mailing list. There
is a fix in the works (depends on the TrueType fonts your using).

Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS
X11R6.5.1 merge sources) not 4.0.2 stable.

Shawn.

Jorge Nerin wrote:


> Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9
> compiled with kgcc, and the same bug in pre1, pre4 & pre9. I only need
> to run xfontsel and the xfs dies, every time, prefectly reproductable.
>
> Using XFree86-xfs-4.0.1-1, and this XFree packages:
> XFree86-4.0.1-1
> XFree86-tools-4.0.1-1
> XFree86-xdm-4.0.1-1
> XFree86-libs-4.0.1-1
> XFree86-xfs-4.0.1-1
> XFree86-75dpi-fonts-4.0.1-1
> XFree86-SVGA-3.3.6-33
> XFree86-twm-4.0.1-1
> XFree86-VGA16-3.3.6-33
> XFree86-Xnest-4.0.1-1
> XFree86-devel-4.0.1-1
> XFree86-V4L-4.0.1-1
>
> Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and
> also some patches are welcome.
>
> ksymoops 2.3.4 on i586 2.4.1-pre9.  Options used
>  -V (default)
>  -k /proc/ksyms (default)
>  -l /proc/modules (default)
>  -o /lib/modules/2.4.1-pre9/ (default)
>  -m /usr/src/linux/System.map (default)
>
> Warning: You did not tell me where to find symbol information.  I will
> assume that the log matches the kernel and modules that are running
> right now and I'll use the default options above for symbol resolution.
> If the current kernel and/or modules do not match the log, you can get
> more accurate output by telling me the kernel version and where to find
> map, modules, ksyms etc.  ksymoops -h explains the options.
>
> activating NMI Watchdog ... done.
> cpu: 0, clocks: 668150, slice: 222716
> cpu: 1, clocks: 668150, slice: 222716
> 8139too Fast Ethernet driver 0.9.13 loaded
> invalid operand: 
> CPU:1
> EIP:0010:[]
> Using defaults from ksymoops -t elf32-i386 -a i386
> EFLAGS: 00010292
> eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
> esi: 0003   edi: c431   ebp: c431   esp: c4311de4
> ds: 0018   es: 0018   ss: 0018
> Process xfs (pid: 909, stackpage=c4311000)
> Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
> c0111d3b
>c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
> c431
>0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
> c01d1550
> Call Trace: [] [] [] []
> [] [] []
>[] [] [] [] []
> []
> Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3
>
> >>EIP; c012c056<=
> Trace; c0111d3b 
> Trace; c0196cfa 
> Trace; c01963fe 
> Trace; c01d1550 
> Trace; c01d167e 
> Trace; c01d1550 
> Trace; c0193fad 
> Trace; c01d1550 
> Trace; c0194260 
> Trace; c01942e2 
> Trace; c0134763 
> Trace; c01348c9 
> Trace; c0108fc7 
> Code;  c012c056 
>  <_EIP>:
> Code;  c012c056<=
>0:   0f 0b ud2a  <=
> Code;  c012c058 
>2:   83 c4 0c  add$0xc,%esp
> Code;  c012c05b 
>5:   90nop
> Code;  c012c05c 
>6:   8d 74 26 00   lea0x0(%esi,1),%esi
> Code;  c012c060 
>a:   31 c0 xor%eax,%eax
> Code;  c012c062 
>c:   5bpop%ebx
> Code;  c012c063 
>d:   5epop%esi
> Code;  c012c064 
>e:   5f        pop%edi
> Code;  c012c065 
>f:   5dpop%ebp
> Code;  c012c066 
>   10:   83 c4 0c  add$0xc,%esp
> Code;  c012c069 
>   13:   c3ret
>
> 1 warning issued.  Results may not be reliable.
>
> kernel BUG at slab.c:1542!
> invalid operand: 
> CPU:1
> EIP:0010:[kmalloc+274/296]
> EFLAGS: 00010292
> eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
> esi: 0003   edi: c431   ebp: c431   esp: c4311de4
> ds: 0018   es: 0018   ss: 0018
> Process xfs (pid: 909, stackpage=c4311000)
> Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
> c0111d3b
>c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
> c431
>0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
> c01d1550
> Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416]
> [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784]
> [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784]
> [sock_sendmsg+129/164]
>[unix_stream_sendmsg+0/784] [sock_readv_writev+140/152]
> [sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+

kernel BUG at slab.c:1542! (2.4.1-pre9)

2001-01-22 Thread Jorge Nerin

Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9
compiled with kgcc, and the same bug in pre1, pre4 & pre9. I only need
to run xfontsel and the xfs dies, every time, prefectly reproductable.

Using XFree86-xfs-4.0.1-1, and this XFree packages:
XFree86-4.0.1-1
XFree86-tools-4.0.1-1
XFree86-xdm-4.0.1-1
XFree86-libs-4.0.1-1
XFree86-xfs-4.0.1-1
XFree86-75dpi-fonts-4.0.1-1
XFree86-SVGA-3.3.6-33
XFree86-twm-4.0.1-1
XFree86-VGA16-3.3.6-33
XFree86-Xnest-4.0.1-1
XFree86-devel-4.0.1-1
XFree86-V4L-4.0.1-1

Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and
also some patches are welcome.

ksymoops 2.3.4 on i586 2.4.1-pre9.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.4.1-pre9/ (default)
 -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

activating NMI Watchdog ... done.
cpu: 0, clocks: 668150, slice: 222716
cpu: 1, clocks: 668150, slice: 222716
8139too Fast Ethernet driver 0.9.13 loaded
invalid operand: 
CPU:1
EIP:0010:[]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010292
eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
esi: 0003   edi: c431   ebp: c431   esp: c4311de4
ds: 0018   es: 0018   ss: 0018
Process xfs (pid: 909, stackpage=c4311000)
Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
c0111d3b 
   c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
c431 
   0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
c01d1550 
Call Trace: [] [] [] []
[] [] [] 
   [] [] [] [] []
[] 
Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 

>>EIP; c012c056<=
Trace; c0111d3b 
Trace; c0196cfa 
Trace; c01963fe 
Trace; c01d1550 
Trace; c01d167e 
Trace; c01d1550 
Trace; c0193fad 
Trace; c01d1550 
Trace; c0194260 
Trace; c01942e2 
Trace; c0134763 
Trace; c01348c9 
Trace; c0108fc7 
Code;  c012c056 
 <_EIP>:
Code;  c012c056<=
   0:   0f 0b ud2a  <=
Code;  c012c058 
   2:   83 c4 0c  add$0xc,%esp
Code;  c012c05b 
   5:   90nop
Code;  c012c05c 
   6:   8d 74 26 00   lea0x0(%esi,1),%esi
Code;  c012c060 
   a:   31 c0 xor%eax,%eax
Code;  c012c062 
   c:   5bpop%ebx
Code;  c012c063 
   d:   5epop%esi
Code;  c012c064 
   e:   5fpop%edi
Code;  c012c065 
   f:   5dpop%ebp
Code;  c012c066 
  10:   83 c4 0c  add$0xc,%esp
Code;  c012c069 
  13:   c3ret


1 warning issued.  Results may not be reliable.




kernel BUG at slab.c:1542!
invalid operand: 
CPU:1
EIP:0010:[kmalloc+274/296]
EFLAGS: 00010292
eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
esi: 0003   edi: c431   ebp: c431   esp: c4311de4
ds: 0018   es: 0018   ss: 0018
Process xfs (pid: 909, stackpage=c4311000)
Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
c0111d3b 
   c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
c431 
   0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
c01d1550 
Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416]
[sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784]
[unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784]
[sock_sendmsg+129/164] 
   [unix_stream_sendmsg+0/784] [sock_readv_writev+140/152]
[sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+65/84]
[system_call+55/64] 

Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 


-- 
Jorge Nerin
<[EMAIL PROTECTED]>
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



kernel BUG at slab.c:1542! (2.4.1-pre9)

2001-01-22 Thread Jorge Nerin

Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9
compiled with kgcc, and the same bug in pre1, pre4  pre9. I only need
to run xfontsel and the xfs dies, every time, prefectly reproductable.

Using XFree86-xfs-4.0.1-1, and this XFree packages:
XFree86-4.0.1-1
XFree86-tools-4.0.1-1
XFree86-xdm-4.0.1-1
XFree86-libs-4.0.1-1
XFree86-xfs-4.0.1-1
XFree86-75dpi-fonts-4.0.1-1
XFree86-SVGA-3.3.6-33
XFree86-twm-4.0.1-1
XFree86-VGA16-3.3.6-33
XFree86-Xnest-4.0.1-1
XFree86-devel-4.0.1-1
XFree86-V4L-4.0.1-1

Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and
also some patches are welcome.

ksymoops 2.3.4 on i586 2.4.1-pre9.  Options used
 -V (default)
 -k /proc/ksyms (default)
 -l /proc/modules (default)
 -o /lib/modules/2.4.1-pre9/ (default)
 -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

activating NMI Watchdog ... done.
cpu: 0, clocks: 668150, slice: 222716
cpu: 1, clocks: 668150, slice: 222716
8139too Fast Ethernet driver 0.9.13 loaded
invalid operand: 
CPU:1
EIP:0010:[c012c056]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010292
eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
esi: 0003   edi: c431   ebp: c431   esp: c4311de4
ds: 0018   es: 0018   ss: 0018
Process xfs (pid: 909, stackpage=c4311000)
Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
c0111d3b 
   c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
c431 
   0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
c01d1550 
Call Trace: [c0111d3b] [c0196cfa] [c01963fe] [c01d1550]
[c01d167e] [c01d1550] [c0193fad] 
   [c01d1550] [c0194260] [c01942e2] [c0134763] [c01348c9]
[c0108fc7] 
Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 

EIP; c012c056 kmalloc+112/128   =
Trace; c0111d3b smp_call_function_interrupt+1f/34
Trace; c0196cfa alloc_skb+102/1a0
Trace; c01963fe sock_alloc_send_skb+72/12c
Trace; c01d1550 unix_stream_sendmsg+0/310
Trace; c01d167e unix_stream_sendmsg+12e/310
Trace; c01d1550 unix_stream_sendmsg+0/310
Trace; c0193fad sock_sendmsg+81/a4
Trace; c01d1550 unix_stream_sendmsg+0/310
Trace; c0194260 sock_readv_writev+8c/98
Trace; c01942e2 sock_writev+36/40
Trace; c0134763 do_readv_writev+183/254
Trace; c01348c9 sys_writev+41/54
Trace; c0108fc7 system_call+37/40
Code;  c012c056 kmalloc+112/128
 _EIP:
Code;  c012c056 kmalloc+112/128   =
   0:   0f 0b ud2a  =
Code;  c012c058 kmalloc+114/128
   2:   83 c4 0c  add$0xc,%esp
Code;  c012c05b kmalloc+117/128
   5:   90nop
Code;  c012c05c kmalloc+118/128
   6:   8d 74 26 00   lea0x0(%esi,1),%esi
Code;  c012c060 kmalloc+11c/128
   a:   31 c0 xor%eax,%eax
Code;  c012c062 kmalloc+11e/128
   c:   5bpop%ebx
Code;  c012c063 kmalloc+11f/128
   d:   5epop%esi
Code;  c012c064 kmalloc+120/128
   e:   5fpop%edi
Code;  c012c065 kmalloc+121/128
   f:   5dpop%ebp
Code;  c012c066 kmalloc+122/128
  10:   83 c4 0c  add$0xc,%esp
Code;  c012c069 kmalloc+125/128
  13:   c3ret


1 warning issued.  Results may not be reliable.




kernel BUG at slab.c:1542!
invalid operand: 
CPU:1
EIP:0010:[kmalloc+274/296]
EFLAGS: 00010292
eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
esi: 0003   edi: c431   ebp: c431   esp: c4311de4
ds: 0018   es: 0018   ss: 0018
Process xfs (pid: 909, stackpage=c4311000)
Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
c0111d3b 
   c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
c431 
   0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
c01d1550 
Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416]
[sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784]
[unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784]
[sock_sendmsg+129/164] 
   [unix_stream_sendmsg+0/784] [sock_readv_writev+140/152]
[sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+65/84]
[system_call+55/64] 

Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 


-- 
Jorge Nerin
[EMAIL PROTECTED]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-22 Thread Shawn Starr

This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
extention. This has been discussed on the Xpert XFree86 mailing list. There
is a fix in the works (depends on the TrueType fonts your using).

Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS
X11R6.5.1 merge sources) not 4.0.2 stable.

Shawn.

Jorge Nerin wrote:


 Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9
 compiled with kgcc, and the same bug in pre1, pre4  pre9. I only need
 to run xfontsel and the xfs dies, every time, prefectly reproductable.

 Using XFree86-xfs-4.0.1-1, and this XFree packages:
 XFree86-4.0.1-1
 XFree86-tools-4.0.1-1
 XFree86-xdm-4.0.1-1
 XFree86-libs-4.0.1-1
 XFree86-xfs-4.0.1-1
 XFree86-75dpi-fonts-4.0.1-1
 XFree86-SVGA-3.3.6-33
 XFree86-twm-4.0.1-1
 XFree86-VGA16-3.3.6-33
 XFree86-Xnest-4.0.1-1
 XFree86-devel-4.0.1-1
 XFree86-V4L-4.0.1-1

 Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and
 also some patches are welcome.

 ksymoops 2.3.4 on i586 2.4.1-pre9.  Options used
  -V (default)
  -k /proc/ksyms (default)
  -l /proc/modules (default)
  -o /lib/modules/2.4.1-pre9/ (default)
  -m /usr/src/linux/System.map (default)

 Warning: You did not tell me where to find symbol information.  I will
 assume that the log matches the kernel and modules that are running
 right now and I'll use the default options above for symbol resolution.
 If the current kernel and/or modules do not match the log, you can get
 more accurate output by telling me the kernel version and where to find
 map, modules, ksyms etc.  ksymoops -h explains the options.

 activating NMI Watchdog ... done.
 cpu: 0, clocks: 668150, slice: 222716
 cpu: 1, clocks: 668150, slice: 222716
 8139too Fast Ethernet driver 0.9.13 loaded
 invalid operand: 
 CPU:1
 EIP:0010:[c012c056]
 Using defaults from ksymoops -t elf32-i386 -a i386
 EFLAGS: 00010292
 eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
 esi: 0003   edi: c431   ebp: c431   esp: c4311de4
 ds: 0018   es: 0018   ss: 0018
 Process xfs (pid: 909, stackpage=c4311000)
 Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
 c0111d3b
c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
 c431
0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
 c01d1550
 Call Trace: [c0111d3b] [c0196cfa] [c01963fe] [c01d1550]
 [c01d167e] [c01d1550] [c0193fad]
[c01d1550] [c0194260] [c01942e2] [c0134763] [c01348c9]
 [c0108fc7]
 Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3

 EIP; c012c056 kmalloc+112/128   =
 Trace; c0111d3b smp_call_function_interrupt+1f/34
 Trace; c0196cfa alloc_skb+102/1a0
 Trace; c01963fe sock_alloc_send_skb+72/12c
 Trace; c01d1550 unix_stream_sendmsg+0/310
 Trace; c01d167e unix_stream_sendmsg+12e/310
 Trace; c01d1550 unix_stream_sendmsg+0/310
 Trace; c0193fad sock_sendmsg+81/a4
 Trace; c01d1550 unix_stream_sendmsg+0/310
 Trace; c0194260 sock_readv_writev+8c/98
 Trace; c01942e2 sock_writev+36/40
 Trace; c0134763 do_readv_writev+183/254
 Trace; c01348c9 sys_writev+41/54
 Trace; c0108fc7 system_call+37/40
 Code;  c012c056 kmalloc+112/128
  _EIP:
 Code;  c012c056 kmalloc+112/128   =
0:   0f 0b ud2a  =
 Code;  c012c058 kmalloc+114/128
2:   83 c4 0c  add$0xc,%esp
 Code;  c012c05b kmalloc+117/128
5:   90nop
 Code;  c012c05c kmalloc+118/128
6:   8d 74 26 00   lea0x0(%esi,1),%esi
 Code;  c012c060 kmalloc+11c/128
a:   31 c0 xor%eax,%eax
 Code;  c012c062 kmalloc+11e/128
c:   5bpop%ebx
 Code;  c012c063 kmalloc+11f/128
d:   5epop%esi
 Code;  c012c064 kmalloc+120/128
e:   5fpop%edi
 Code;  c012c065 kmalloc+121/128
f:   5dpop%ebp
 Code;  c012c066 kmalloc+122/128
   10:   83 c4 0c  add$0xc,%esp
 Code;  c012c069 kmalloc+125/128
   13:   c3ret

 1 warning issued.  Results may not be reliable.

 kernel BUG at slab.c:1542!
 invalid operand: 
 CPU:1
 EIP:0010:[kmalloc+274/296]
 EFLAGS: 00010292
 eax: 001b   ebx: c27cc680   ecx: 0008   edx: c5802ca0
 esi: 0003   edi: c431   ebp: c431   esp: c4311de4
 ds: 0018   es: 0018   ss: 0018
 Process xfs (pid: 909, stackpage=c4311000)
 Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431
 c0111d3b
c5fe3f0c 01a8 c0196cfa 0003fff4 0003  c5c96c20
 c431
0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec
 c01d1550
 Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416]
 [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784]
 [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784]
 [sock_sendmsg+129/164]
[unix_stream_sendmsg+0/784

Re: kernel BUG at slab.c:1542!(2.4.1-pre9)

2001-01-22 Thread David Ford

If it makes the kernel do Bad Things, the kernel needs to be fixed.

-d

Shawn Starr wrote:

 This is not a kernel bug, This is a bug in the XFree86 TrueType rendering
 extention. This has been discussed on the Xpert XFree86 mailing list. There
 is a fix in the works (depends on the TrueType fonts your using).

 Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS
 X11R6.5.1 merge sources) not 4.0.2 stable.

--
  There is a natural aristocracy among men. The grounds of this are virtue and 
talents. Thomas Jefferson
  The good thing about standards is that there are so many to choose from. Andrew S. 
Tanenbaum



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"

2001-01-17 Thread Hans Grobler

On Wed, 17 Jan 2001, Rick Richardson wrote:
> Problem:  kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542"

This BUG() has been been removed in the later -ac patches as it was meant
to be a temporary debugging help during the -test3 slab.c changes. This
does not however remove the constraint that kmalloc can only allocate a
maximum of 128KB. How you solve this will depend what you want to use the
memory for.

-- Hans


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"

2001-01-17 Thread Timur Tabi

** Reply to message from Brian Pomerantz <[EMAIL PROTECTED]> on Wed, 17
Jan 2001 12:17:19 -0800


> The most you can kmalloc() is 128KB unless this has changed in the 2.4
> kernel which I doubt.  If you want a region of memory that large, use
> vmalloc().  Of course, this doesn't guarantee a contiguous region.

Couldn't you also use get_free_pages (commonly abbreviated as "gfp")?  You can
alloc up to 2MB chunks on an x86 I think.


-- 
Timur Tabi - [EMAIL PROTECTED]
Interactive Silicon - http://www.interactivesi.com

When replying to a mailing-list message, please direct the reply to the mailing list 
only.  Don't send another copy to me.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"

2001-01-17 Thread Brian Pomerantz

On Wed, Jan 17, 2001 at 01:54:20PM -0600, Rick Richardson wrote:
> 
> [please cc me on any responses]
> 
> Environment: 2.4.0 released, Pentium III with 256MB's of RAM.
> Problem:  kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542"
> 

The most you can kmalloc() is 128KB unless this has changed in the 2.4
kernel which I doubt.  If you want a region of memory that large, use
vmalloc().  Of course, this doesn't guarantee a contiguous region.


BAPper
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"

2001-01-17 Thread Rick Richardson


[please cc me on any responses]

Environment: 2.4.0 released, Pentium III with 256MB's of RAM.
Problem:  kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542"

Here is the dmesg output:

kernel BUG at slab.c:1542!
invalid operand: 
CPU:0
EIP:0010:[]
EFLAGS: 00010282
eax: 001b   ebx: d2922000   ecx: cdf6c000   edx: 
esi: 0007   edi:    ebp: 0806f124   esp: cb1bdef4
ds: 0018   es: 0018   ss: 0018
Process insmod (pid: 24167, stackpage=cb1bd000)
Stack: c02148eb c021498b 0606 0286 0001 c02a75ec 0029 d2922000 
    d2922083 0100 0007 d29221c0 0100 c0116c65  
   cc8a6000 020c cc8a7000 0060 ffea 0003 c2be5420 0060 
Call Trace: [] [] [] [] [] 
[] [] 

Code: 0f 0b 83 c4 0c 31 c0 83 c4 10 5b 5e c3 eb 0d 90 90 90 90 90 

Repeat by:
Compile simple driver attached.
$ insmod test.o Amt=4096


-- 
Rick Richardson  [EMAIL PROTECTED]  http://home.mn.rr.com/richardsons/
Twins Cities traffic animations are at http://members.nbci.com/tctraffic/#1

Most Minnesotans think Global Warming is a good thing.


#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 

static size_t   Amt = 1;
MODULE_PARM(Amt, "l");
MODULE_PARM_DESC(Amt, "Pages of memory to allocate");

static void *mem;

static int __init
init(void)
{
/* Announce this module has been loaded. */
printk(KERN_INFO "test loading; allocate %d bytes\n", Amt*4096);

mem = kmalloc(Amt*4096, GFP_KERNEL);
if (!mem) return (-ENOMEM);

printk(KERN_INFO "test loaded\n");
return 0;
}

static void __exit
fini(void)
{
printk(KERN_INFO "test unloading\n");
kfree(mem);
}

module_init(init);
module_exit(fini);



kmalloc() of 4MB causes kernel BUG at slab.c:1542!

2001-01-17 Thread Rick Richardson


[please cc me on any responses]

Environment: 2.4.0 released, Pentium III with 256MB's of RAM.
Problem:  kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542"

Here is the dmesg output:

kernel BUG at slab.c:1542!
invalid operand: 
CPU:0
EIP:0010:[c0129b84]
EFLAGS: 00010282
eax: 001b   ebx: d2922000   ecx: cdf6c000   edx: 
esi: 0007   edi:    ebp: 0806f124   esp: cb1bdef4
ds: 0018   es: 0018   ss: 0018
Process insmod (pid: 24167, stackpage=cb1bd000)
Stack: c02148eb c021498b 0606 0286 0001 c02a75ec 0029 d2922000 
    d2922083 0100 0007 d29221c0 0100 c0116c65  
   cc8a6000 020c cc8a7000 0060 ffea 0003 c2be5420 0060 
Call Trace: [d2922000] [d2922083] [d29221c0] [c0116c65] [d292] 
[d2922060] [c0109057] 

Code: 0f 0b 83 c4 0c 31 c0 83 c4 10 5b 5e c3 eb 0d 90 90 90 90 90 

Repeat by:
Compile simple driver attached.
$ insmod test.o Amt=4096


-- 
Rick Richardson  [EMAIL PROTECTED]  http://home.mn.rr.com/richardsons/
Twins Cities traffic animations are at http://members.nbci.com/tctraffic/#1

Most Minnesotans think Global Warming is a good thing.


#include linux/config.h
#include linux/module.h
#include linux/types.h
#include linux/string.h
#include linux/kernel.h
#include linux/sched.h
#include linux/timer.h
#include linux/config.h
#include linux/socket.h
#include linux/sockios.h
#include linux/errno.h
#include linux/in.h
#include linux/mm.h
#include linux/inet.h
#include linux/netdevice.h
#include linux/etherdevice.h
#include linux/if_arp.h
#include linux/skbuff.h
#include linux/proc_fs.h
#include linux/stat.h
#include linux/init.h

static size_t   Amt = 1;
MODULE_PARM(Amt, "l");
MODULE_PARM_DESC(Amt, "Pages of memory to allocate");

static void *mem;

static int __init
init(void)
{
/* Announce this module has been loaded. */
printk(KERN_INFO "test loading; allocate %d bytes\n", Amt*4096);

mem = kmalloc(Amt*4096, GFP_KERNEL);
if (!mem) return (-ENOMEM);

printk(KERN_INFO "test loaded\n");
return 0;
}

static void __exit
fini(void)
{
printk(KERN_INFO "test unloading\n");
kfree(mem);
}

module_init(init);
module_exit(fini);



Re: kmalloc() of 4MB causes kernel BUG at slab.c:1542!

2001-01-17 Thread Brian Pomerantz

On Wed, Jan 17, 2001 at 01:54:20PM -0600, Rick Richardson wrote:
 
 [please cc me on any responses]
 
 Environment: 2.4.0 released, Pentium III with 256MB's of RAM.
 Problem:  kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542"
 

The most you can kmalloc() is 128KB unless this has changed in the 2.4
kernel which I doubt.  If you want a region of memory that large, use
vmalloc().  Of course, this doesn't guarantee a contiguous region.


BAPper
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kmalloc() of 4MB causes kernel BUG at slab.c:1542!

2001-01-17 Thread Timur Tabi

** Reply to message from Brian Pomerantz [EMAIL PROTECTED] on Wed, 17
Jan 2001 12:17:19 -0800


 The most you can kmalloc() is 128KB unless this has changed in the 2.4
 kernel which I doubt.  If you want a region of memory that large, use
 vmalloc().  Of course, this doesn't guarantee a contiguous region.

Couldn't you also use get_free_pages (commonly abbreviated as "gfp")?  You can
alloc up to 2MB chunks on an x86 I think.


-- 
Timur Tabi - [EMAIL PROTECTED]
Interactive Silicon - http://www.interactivesi.com

When replying to a mailing-list message, please direct the reply to the mailing list 
only.  Don't send another copy to me.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kmalloc() of 4MB causes kernel BUG at slab.c:1542!

2001-01-17 Thread Hans Grobler

On Wed, 17 Jan 2001, Rick Richardson wrote:
 Problem:  kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542"

This BUG() has been been removed in the later -ac patches as it was meant
to be a temporary debugging help during the -test3 slab.c changes. This
does not however remove the constraint that kmalloc can only allocate a
maximum of 128KB. How you solve this will depend what you want to use the
memory for.

-- Hans


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:804!

2000-10-28 Thread David Brownell

I'd guess this is because of a bug that crept into test9,
where a TD is now leaked ... you can get rid of the slab
BUG warning by commenting out the line at the top of
drivers/usb/usb-ohci.c that #defines OHCI_MEM_SLAB.

That TD leak prevents the kmem_cache from getting freed,
and hence prevents that module from getting reloaded.

It was a mistake to leave that #defined at this time,
though of course it _ought_ to be fine to do that.

- Dave




-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:804!

2000-10-28 Thread David Brownell

I'd guess this is because of a bug that crept into test9,
where a TD is now leaked ... you can get rid of the slab
BUG warning by commenting out the line at the top of
drivers/usb/usb-ohci.c that #defines OHCI_MEM_SLAB.

That TD leak prevents the kmem_cache from getting freed,
and hence prevents that module from getting reloaded.

It was a mistake to leave that #defined at this time,
though of course it _ought_ to be fine to do that.

- Dave




-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:804!

2000-10-26 Thread Juan J. Quintela

>>>>> "christian" == Christian Reiser <[EMAIL PROTECTED]> writes:

christian> Hi,
christian> i hope i am right here, and this problem wasn't mailed a thousand times
christian> before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt
christian> older...)
christian> I am playing around with usb and usb-storage, and then i wanted to reload
christian> the usb-ohci-module, during the insmod i got this error:

christian> Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 
christian> Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered
christian> kmem_cache_destroy: Can't free all objects c116a890
christian> : usb-ohci.h: td_cache remained   
christian>  kernel BUG at slab.c:804!   
christian> invalid operand:    
christian> CPU:0  
christian> EIP:0010:[]  
christian>  EFLAGS: 00010282 
christian>  eax: 001a   ebx: c116a8ec   ecx: c19e2000   edx: c23b9780
christian> esi: c116a8e0   edi: c48ef78b   ebp: c116a8f4   esp: c19e3ef8
christian> ds: 0018   es: 0018   ss: 0018   
christian>  Process insmod (pid: 1026, stackpage=c19e3000)  
christian> Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048
christian> c116a908 
christian>c116a950 c02b14a8 c19e3f28 0020  c48ec069 c48ef783
christian> 0020  
christian>0020 00022000   c48ec000 c48ef606 c48ec000
christian> c01177db
christian>  Call Trace: [] [] [] []
christian> [] [] []
christian>[] [] [] [] []
christian> [] 
christian> Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0

christian> ... hope it could help ...

Hi
could you pass the output through ksymoops to know the
backtrace, see the linux/Reporting_bugs file.  Without that
info it is very difficult to know what is happening.

Later, Juan.


-- 
In theory, practice and theory are the same, but in practice they 
are different -- Larry McVoy
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:804!

2000-10-26 Thread Keith Owens

On Thu, 26 Oct 2000 15:39:59 +0200 (CEST), 
Christian Reiser <[EMAIL PROTECTED]> wrote:
> kernel BUG at slab.c:804!   
>Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0
>... hope it could help ...

Almost completely useless until you follow the procedures in
linux/REPORTING-BUGS.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



kernel BUG at slab.c:804!

2000-10-26 Thread Christian Reiser

Hi,

i hope i am right here, and this problem wasn't mailed a thousand times
before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt
older...)
I am playing around with usb and usb-storage, and then i wanted to reload
the usb-ohci-module, during the insmod i got this error:

Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 
Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered
kmem_cache_destroy: Can't free all objects c116a890
: usb-ohci.h: td_cache remained   
 kernel BUG at slab.c:804!   
invalid operand:    
CPU:0  
EIP:0010:[]  
 EFLAGS: 00010282 
 eax: 001a   ebx: c116a8ec   ecx: c19e2000   edx: c23b9780
esi: c116a8e0   edi: c48ef78b   ebp: c116a8f4   esp: c19e3ef8
ds: 0018   es: 0018   ss: 0018   
 Process insmod (pid: 1026, stackpage=c19e3000)  
Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048
c116a908 
   c116a950 c02b14a8 c19e3f28 0020  c48ec069 c48ef783
0020  
   0020 00022000   c48ec000 c48ef606 c48ec000
c01177db
 Call Trace: [] [] [] []
[] [] []
   [] [] [] [] []
[] 
Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0

... hope it could help ...

Ciao
Christian

ps: i am not on the list - please cc me~

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



kernel BUG at slab.c:804!

2000-10-26 Thread Christian Reiser

Hi,

i hope i am right here, and this problem wasn't mailed a thousand times
before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt
older...)
I am playing around with usb and usb-storage, and then i wanted to reload
the usb-ohci-module, during the insmod i got this error:

Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 
Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered
kmem_cache_destroy: Can't free all objects c116a890
: usb-ohci.h: td_cache remained   
 kernel BUG at slab.c:804!   
invalid operand:    
CPU:0  
EIP:0010:[c0125974]  
 EFLAGS: 00010282 
 eax: 001a   ebx: c116a8ec   ecx: c19e2000   edx: c23b9780
esi: c116a8e0   edi: c48ef78b   ebp: c116a8f4   esp: c19e3ef8
ds: 0018   es: 0018   ss: 0018   
 Process insmod (pid: 1026, stackpage=c19e3000)  
Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048
c116a908 
   c116a950 c02b14a8 c19e3f28 0020  c48ec069 c48ef783
0020  
   0020 00022000   c48ec000 c48ef606 c48ec000
c01177db
 Call Trace: [c02197e7] [c0219867] [c48ec051] [c48ec048]
[c48ec069] [c48ef783] [c48ec000]
   [c48ef606] [c48ec000] [c01177db] [c48e5000] [c48ec048]
[c010a2e3] 
Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0

... hope it could help ...

Ciao
Christian

ps: i am not on the list - please cc me~

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:804!

2000-10-26 Thread Keith Owens

On Thu, 26 Oct 2000 15:39:59 +0200 (CEST), 
Christian Reiser [EMAIL PROTECTED] wrote:
 kernel BUG at slab.c:804!   
Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0
... hope it could help ...

Almost completely useless until you follow the procedures in
linux/REPORTING-BUGS.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: kernel BUG at slab.c:804!

2000-10-26 Thread Juan J. Quintela

 "christian" == Christian Reiser [EMAIL PROTECTED] writes:

christian Hi,
christian i hope i am right here, and this problem wasn't mailed a thousand times
christian before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt
christian older...)
christian I am playing around with usb and usb-storage, and then i wanted to reload
christian the usb-ohci-module, during the insmod i got this error:

christian Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 
christian Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered
christian kmem_cache_destroy: Can't free all objects c116a890
christian : usb-ohci.h: td_cache remained   
christian  kernel BUG at slab.c:804!   
christian invalid operand:    
christian CPU:0  
christian EIP:0010:[c0125974]  
christian  EFLAGS: 00010282 
christian  eax: 001a   ebx: c116a8ec   ecx: c19e2000   edx: c23b9780
christian esi: c116a8e0   edi: c48ef78b   ebp: c116a8f4   esp: c19e3ef8
christian ds: 0018   es: 0018   ss: 0018   
christian  Process insmod (pid: 1026, stackpage=c19e3000)  
christian Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048
christian c116a908 
christianc116a950 c02b14a8 c19e3f28 0020  c48ec069 c48ef783
christian 0020  
christian0020 00022000   c48ec000 c48ef606 c48ec000
christian c01177db
christian  Call Trace: [c02197e7] [c0219867] [c48ec051] [c48ec048]
christian [c48ec069] [c48ef783] [c48ec000]
christian[c48ef606] [c48ec000] [c01177db] [c48e5000] [c48ec048]
christian [c010a2e3] 
christian Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0

christian ... hope it could help ...

Hi
could you pass the output through ksymoops to know the
backtrace, see the linux/Reporting_bugs file.  Without that
info it is very difficult to know what is happening.

Later, Juan.


-- 
In theory, practice and theory are the same, but in practice they 
are different -- Larry McVoy
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/