Re: bug in slab.c
On Mon, Jul 30, 2007 at 11:05:09AM -0700, Christoph Lameter wrote: > Looks like the slab header was corrupted. If this can be reproduced then > you need to enable slub debugging to find the kernel function that > corrupts memory. Yup, I'll try that if it happens again. > Otherwise it could be bad memory? Hmm, the box is relatively new, but one never knows. Ah, and it was after I've resumed the machine from suspend-to-disk, but not right after the start but some minutes later. Robert -- Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de Pengutronix - Linux Solutions for Science and Industry Handelsregister: Amtsgericht Hildesheim, HRA 2686 Hannoversche Str. 2, 31134 Hildesheim, Germany Phone: +49-5121-206917-0 | Fax: +49-5121-206917-9 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Mon, 30 Jul 2007, Robert Schwebel wrote: > On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote: > > > My Dell Latitude D520 just dies with this BUG: > > > > Reproducible, I assume. > > No, happened only one time. Looks like the slab header was corrupted. If this can be reproduced then you need to enable slub debugging to find the kernel function that corrupts memory. Otherwise it could be bad memory? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote: > > My Dell Latitude D520 just dies with this BUG: > > Reproducible, I assume. No, happened only one time. > Have you tried testing a kernel which doesn't have those drivers? > > (It'd be a clever little driver to cause that BUG though) Yup :-) It didn't happen again in the meantime, but anyway. I'll keep you informed. Robert -- Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de Pengutronix - Linux Solutions for Science and Industry Handelsregister: Amtsgericht Hildesheim, HRA 2686 Hannoversche Str. 2, 31134 Hildesheim, Germany Phone: +49-5121-206917-0 | Fax: +49-5121-206917-9 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Sun, 29 Jul 2007 09:37:39 +0200 Robert Schwebel <[EMAIL PROTECTED]> wrote: > Hi, > > My Dell Latitude D520 just dies with this BUG: Reproducible, I assume. > --8<--8<--8<--8<-- > Jul 29 09:30:00 localhost kernel: [ cut here ] > Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980! > Jul 29 09:30:00 localhost kernel: invalid opcode: [#1] > Jul 29 09:30:00 localhost kernel: PREEMPT SMP > Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp > rfcomm l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf > usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip > ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_ > ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table > nfs nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop > pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm > snd_timer yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound > core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc > pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid > dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 > mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc > essor fan > Jul 29 09:30:00 localhost kernel: CPU:1 > Jul 29 09:30:00 localhost kernel: EIP:0060:[]Not tainted VLI > Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046 (2.6.22.1 #1) > Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447 > Jul 29 09:30:00 localhost kernel: eax: 000f ebx: 0005 ecx: > d4c0 edx: d4c0 > Jul 29 09:30:00 localhost kernel: esi: e451e000 edi: 0026 ebp: > c18ea800 esp: edbedd90 > Jul 29 09:30:00 localhost kernel: ds: 007b es: 007b fs: 00d8 gs: 0033 > ss: 0068 > Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 > task=dfc02a50 task.ti=edbec000) > Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 > 0001 00200202 > Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 > ef84c6c0 04d0 c0163e6f ef84c6c0 > Jul 29 09:30:00 localhost kernel:0040 c0246212 dfcc2c40 > e2c91740 04d0 efd29740 > Jul 29 09:30:00 localhost kernel: Call Trace: > Jul 29 09:30:00 localhost kernel: [] __kmalloc+0x4f/0x58 > Jul 29 09:30:00 localhost kernel: [] __alloc_skb+0x49/0xf5 > Jul 29 09:30:00 localhost kernel: [] sock_alloc_send_skb+0x6e/0x196 > Jul 29 09:30:00 localhost kernel: [] > unix_stream_sendmsg+0x14d/0x309 > Jul 29 09:30:00 localhost kernel: [] sock_aio_write+0xf9/0x105 > Jul 29 09:30:00 localhost kernel: [] do_sync_write+0xc7/0x10a > Jul 29 09:30:00 localhost kernel: [] > autoremove_wake_function+0x0/0x35 > Jul 29 09:30:00 localhost kernel: [] sock_ioctl+0x1a2/0x1c1 > Jul 29 09:30:00 localhost kernel: [] sock_ioctl+0x0/0x1c1 > Jul 29 09:30:00 localhost kernel: [] vfs_write+0xbc/0x12a > Jul 29 09:30:00 localhost kernel: [] sys_write+0x41/0x67 > Jul 29 09:30:00 localhost kernel: [] sysenter_past_esp+0x5f/0x85 > Jul 29 09:30:00 localhost kernel: === > Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 > 00 8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b > 54 24 08 8b 42 20 39 46 10 72 2d <0f> 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 > 8b 50 14 8b 04 24 0f > Jul 29 09:30:00 localhost kernel: EIP: [] > cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90 > Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with > preempt_count 1 > Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 > 802.11bg channels, 23 802.11a channels) > --8<--8<--8<--8<-- > > [EMAIL PROTECTED]:~# uname -a > Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 > GNU/Linux > > The only non-standard thing is the ipw drivers (ipw3945-1.2.1). > Have you tried testing a kernel which doesn't have those drivers? (It'd be a clever little driver to cause that BUG though) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Sun, 29 Jul 2007 09:37:39 +0200 Robert Schwebel [EMAIL PROTECTED] wrote: Hi, My Dell Latitude D520 just dies with this BUG: Reproducible, I assume. --8--8--8--8-- Jul 29 09:30:00 localhost kernel: [ cut here ] Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980! Jul 29 09:30:00 localhost kernel: invalid opcode: [#1] Jul 29 09:30:00 localhost kernel: PREEMPT SMP Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp rfcomm l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_ ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table nfs nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_timer yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc essor fan Jul 29 09:30:00 localhost kernel: CPU:1 Jul 29 09:30:00 localhost kernel: EIP:0060:[c0163ac4]Not tainted VLI Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046 (2.6.22.1 #1) Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447 Jul 29 09:30:00 localhost kernel: eax: 000f ebx: 0005 ecx: d4c0 edx: d4c0 Jul 29 09:30:00 localhost kernel: esi: e451e000 edi: 0026 ebp: c18ea800 esp: edbedd90 Jul 29 09:30:00 localhost kernel: ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 task=dfc02a50 task.ti=edbec000) Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 0001 00200202 Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 ef84c6c0 04d0 c0163e6f ef84c6c0 Jul 29 09:30:00 localhost kernel:0040 c0246212 dfcc2c40 e2c91740 04d0 efd29740 Jul 29 09:30:00 localhost kernel: Call Trace: Jul 29 09:30:00 localhost kernel: [c0163e6f] __kmalloc+0x4f/0x58 Jul 29 09:30:00 localhost kernel: [c0246212] __alloc_skb+0x49/0xf5 Jul 29 09:30:00 localhost kernel: [c0242bef] sock_alloc_send_skb+0x6e/0x196 Jul 29 09:30:00 localhost kernel: [c029a7d2] unix_stream_sendmsg+0x14d/0x309 Jul 29 09:30:00 localhost kernel: [c02401d3] sock_aio_write+0xf9/0x105 Jul 29 09:30:00 localhost kernel: [c016677b] do_sync_write+0xc7/0x10a Jul 29 09:30:00 localhost kernel: [c0131fac] autoremove_wake_function+0x0/0x35 Jul 29 09:30:00 localhost kernel: [c02405a2] sock_ioctl+0x1a2/0x1c1 Jul 29 09:30:00 localhost kernel: [c0240400] sock_ioctl+0x0/0x1c1 Jul 29 09:30:00 localhost kernel: [c0166f73] vfs_write+0xbc/0x12a Jul 29 09:30:00 localhost kernel: [c01674ea] sys_write+0x41/0x67 Jul 29 09:30:00 localhost kernel: [c0103d42] sysenter_past_esp+0x5f/0x85 Jul 29 09:30:00 localhost kernel: === Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 00 8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b 54 24 08 8b 42 20 39 46 10 72 2d 0f 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 8b 50 14 8b 04 24 0f Jul 29 09:30:00 localhost kernel: EIP: [c0163ac4] cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90 Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with preempt_count 1 Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 802.11bg channels, 23 802.11a channels) --8--8--8--8-- [EMAIL PROTECTED]:~# uname -a Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 GNU/Linux The only non-standard thing is the ipw drivers (ipw3945-1.2.1). Have you tried testing a kernel which doesn't have those drivers? (It'd be a clever little driver to cause that BUG though) - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote: My Dell Latitude D520 just dies with this BUG: Reproducible, I assume. No, happened only one time. Have you tried testing a kernel which doesn't have those drivers? (It'd be a clever little driver to cause that BUG though) Yup :-) It didn't happen again in the meantime, but anyway. I'll keep you informed. Robert -- Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de Pengutronix - Linux Solutions for Science and Industry Handelsregister: Amtsgericht Hildesheim, HRA 2686 Hannoversche Str. 2, 31134 Hildesheim, Germany Phone: +49-5121-206917-0 | Fax: +49-5121-206917-9 - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Mon, 30 Jul 2007, Robert Schwebel wrote: On Mon, Jul 30, 2007 at 12:16:04AM -0700, Andrew Morton wrote: My Dell Latitude D520 just dies with this BUG: Reproducible, I assume. No, happened only one time. Looks like the slab header was corrupted. If this can be reproduced then you need to enable slub debugging to find the kernel function that corrupts memory. Otherwise it could be bad memory? - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: bug in slab.c
On Mon, Jul 30, 2007 at 11:05:09AM -0700, Christoph Lameter wrote: Looks like the slab header was corrupted. If this can be reproduced then you need to enable slub debugging to find the kernel function that corrupts memory. Yup, I'll try that if it happens again. Otherwise it could be bad memory? Hmm, the box is relatively new, but one never knows. Ah, and it was after I've resumed the machine from suspend-to-disk, but not right after the start but some minutes later. Robert -- Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de Pengutronix - Linux Solutions for Science and Industry Handelsregister: Amtsgericht Hildesheim, HRA 2686 Hannoversche Str. 2, 31134 Hildesheim, Germany Phone: +49-5121-206917-0 | Fax: +49-5121-206917-9 - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
bug in slab.c
Hi, My Dell Latitude D520 just dies with this BUG: --8<--8<--8<--8<-- Jul 29 09:30:00 localhost kernel: [ cut here ] Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980! Jul 29 09:30:00 localhost kernel: invalid opcode: [#1] Jul 29 09:30:00 localhost kernel: PREEMPT SMP Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp rfcomm l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_ ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table nfs nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_timer yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc essor fan Jul 29 09:30:00 localhost kernel: CPU:1 Jul 29 09:30:00 localhost kernel: EIP:0060:[]Not tainted VLI Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046 (2.6.22.1 #1) Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447 Jul 29 09:30:00 localhost kernel: eax: 000f ebx: 0005 ecx: d4c0 edx: d4c0 Jul 29 09:30:00 localhost kernel: esi: e451e000 edi: 0026 ebp: c18ea800 esp: edbedd90 Jul 29 09:30:00 localhost kernel: ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 task=dfc02a50 task.ti=edbec000) Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 0001 00200202 Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 ef84c6c0 04d0 c0163e6f ef84c6c0 Jul 29 09:30:00 localhost kernel:0040 c0246212 dfcc2c40 e2c91740 04d0 efd29740 Jul 29 09:30:00 localhost kernel: Call Trace: Jul 29 09:30:00 localhost kernel: [] __kmalloc+0x4f/0x58 Jul 29 09:30:00 localhost kernel: [] __alloc_skb+0x49/0xf5 Jul 29 09:30:00 localhost kernel: [] sock_alloc_send_skb+0x6e/0x196 Jul 29 09:30:00 localhost kernel: [] unix_stream_sendmsg+0x14d/0x309 Jul 29 09:30:00 localhost kernel: [] sock_aio_write+0xf9/0x105 Jul 29 09:30:00 localhost kernel: [] do_sync_write+0xc7/0x10a Jul 29 09:30:00 localhost kernel: [] autoremove_wake_function+0x0/0x35 Jul 29 09:30:00 localhost kernel: [] sock_ioctl+0x1a2/0x1c1 Jul 29 09:30:00 localhost kernel: [] sock_ioctl+0x0/0x1c1 Jul 29 09:30:00 localhost kernel: [] vfs_write+0xbc/0x12a Jul 29 09:30:00 localhost kernel: [] sys_write+0x41/0x67 Jul 29 09:30:00 localhost kernel: [] sysenter_past_esp+0x5f/0x85 Jul 29 09:30:00 localhost kernel: === Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 00 8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b 54 24 08 8b 42 20 39 46 10 72 2d <0f> 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 8b 50 14 8b 04 24 0f Jul 29 09:30:00 localhost kernel: EIP: [] cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90 Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with preempt_count 1 Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 802.11bg channels, 23 802.11a channels) --8<--8<--8<--8<-- [EMAIL PROTECTED]:~# uname -a Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 GNU/Linux The only non-standard thing is the ipw drivers (ipw3945-1.2.1). Robert -- Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de Pengutronix - Linux Solutions for Science and Industry Handelsregister: Amtsgericht Hildesheim, HRA 2686 Hannoversche Str. 2, 31134 Hildesheim, Germany Phone: +49-5121-206917-0 | Fax: +49-5121-206917-9 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
bug in slab.c
Hi, My Dell Latitude D520 just dies with this BUG: --8--8--8--8-- Jul 29 09:30:00 localhost kernel: [ cut here ] Jul 29 09:30:00 localhost kernel: kernel BUG at mm/slab.c:2980! Jul 29 09:30:00 localhost kernel: invalid opcode: [#1] Jul 29 09:30:00 localhost kernel: PREEMPT SMP Jul 29 09:30:00 localhost kernel: Modules linked in: button psmouse hidp rfcomm l2cap hci_vhci dtl1_cs btuart_cs bt3c_cs bluecard_cs bf usb bcm203x hci_uart michael_mic arc4 ecb ieee80211_crypt_tkip ieee80211_crypt_ccmp ipw3945 ieee80211 ieee80211_crypt i915 drm cpufreq_ ondemand cpufreq_userspace cpufreq_powersave speedstep_centrino freq_table nfs nfsd exportfs lockd nfs_acl sunrpc ac battery sbp2 loop pcmcia firmware_class snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_timer yenta_socket hci_usb rsrc_nonstatic snd serio_raw sound core bluetooth i2c_i801 intel_agp pcmcia_core snd_page_alloc i2c_core rtc pcspkr evdev ext3 jbd mbcache sha256 aes cbc blkcipher usbhid dm_crypt dm_mirror dm_snapshot dm_mod sd_mod ohci1394 ieee1394 ata_piix b44 mii libata scsi_mod ehci_hcd uhci_hcd usbcore thermal proc essor fan Jul 29 09:30:00 localhost kernel: CPU:1 Jul 29 09:30:00 localhost kernel: EIP:0060:[c0163ac4]Not tainted VLI Jul 29 09:30:00 localhost kernel: EFLAGS: 00210046 (2.6.22.1 #1) Jul 29 09:30:00 localhost kernel: EIP is at cache_alloc_refill+0xeb/0x447 Jul 29 09:30:00 localhost kernel: eax: 000f ebx: 0005 ecx: d4c0 edx: d4c0 Jul 29 09:30:00 localhost kernel: esi: e451e000 edi: 0026 ebp: c18ea800 esp: edbedd90 Jul 29 09:30:00 localhost kernel: ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 Jul 29 09:30:00 localhost kernel: Process firefox-bin (pid: 3865, ti=edbec000 task=dfc02a50 task.ti=edbec000) Jul 29 09:30:00 localhost kernel: Stack: 000f 04d0 d4c0 dfffd2c0 0001 00200202 Jul 29 09:30:00 localhost kernel:d63a0218 e60df3c0 d4c0 00200286 ef84c6c0 04d0 c0163e6f ef84c6c0 Jul 29 09:30:00 localhost kernel:0040 c0246212 dfcc2c40 e2c91740 04d0 efd29740 Jul 29 09:30:00 localhost kernel: Call Trace: Jul 29 09:30:00 localhost kernel: [c0163e6f] __kmalloc+0x4f/0x58 Jul 29 09:30:00 localhost kernel: [c0246212] __alloc_skb+0x49/0xf5 Jul 29 09:30:00 localhost kernel: [c0242bef] sock_alloc_send_skb+0x6e/0x196 Jul 29 09:30:00 localhost kernel: [c029a7d2] unix_stream_sendmsg+0x14d/0x309 Jul 29 09:30:00 localhost kernel: [c02401d3] sock_aio_write+0xf9/0x105 Jul 29 09:30:00 localhost kernel: [c016677b] do_sync_write+0xc7/0x10a Jul 29 09:30:00 localhost kernel: [c0131fac] autoremove_wake_function+0x0/0x35 Jul 29 09:30:00 localhost kernel: [c02405a2] sock_ioctl+0x1a2/0x1c1 Jul 29 09:30:00 localhost kernel: [c0240400] sock_ioctl+0x0/0x1c1 Jul 29 09:30:00 localhost kernel: [c0166f73] vfs_write+0xbc/0x12a Jul 29 09:30:00 localhost kernel: [c01674ea] sys_write+0x41/0x67 Jul 29 09:30:00 localhost kernel: [c0103d42] sysenter_past_esp+0x5f/0x85 Jul 29 09:30:00 localhost kernel: === Jul 29 09:30:00 localhost kernel: Code: 8b 30 39 c6 75 19 c7 40 38 01 00 00 00 8b 70 10 8b 44 24 0c 83 c0 10 39 c6 0f 84 9e 00 00 00 8b 54 24 08 8b 42 20 39 46 10 72 2d 0f 0b eb fe 8b 44 24 08 8b 5e 14 8b 4d 00 8b 50 14 8b 04 24 0f Jul 29 09:30:00 localhost kernel: EIP: [c0163ac4] cache_alloc_refill+0xeb/0x447 SS:ESP 0068:edbedd90 Jul 29 09:30:00 localhost kernel: note: firefox-bin[3865] exited with preempt_count 1 Jul 29 09:30:03 localhost kernel: ipw3945: Detected geography ABG (13 802.11bg channels, 23 802.11a channels) --8--8--8--8-- [EMAIL PROTECTED]:~# uname -a Linux thebe 2.6.22.1 #1 SMP PREEMPT Fri Jul 13 08:23:52 CEST 2007 i686 GNU/Linux The only non-standard thing is the ipw drivers (ipw3945-1.2.1). Robert -- Dipl.-Ing. Robert Schwebel | http://www.pengutronix.de Pengutronix - Linux Solutions for Science and Industry Handelsregister: Amtsgericht Hildesheim, HRA 2686 Hannoversche Str. 2, 31134 Hildesheim, Germany Phone: +49-5121-206917-0 | Fax: +49-5121-206917-9 - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: linux 2.4.32: kernel BUG in slab.c:1582
Hi ! On Wed, Dec 20, 2006 at 12:21:59PM -0700, Sebastian Kuzminsky wrote: > Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap) > running Linux 2.4.32, and lately I've been getting kernel BUGs like this: > > kernel: kernel BUG at slab.c:1582! > kernel: invalid operand: > kernel: CPU:0 > kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted > kernel: EFLAGS: 00010293 > kernel: eax: c10b7354 ebx: 3ef0 ecx: 0002b450 edx: c11c > kernel: esi: 000ad140 edi: c3ef0634 ebp: 0023 esp: c10c3f4c > kernel: ds: 0018 es: 0018 ss: 0018 > kernel: Process kswapd (pid: 4, stackpage=c10c3000) > kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca > c10b7354 c3ef0634 > kernel:003c 01d0 0009 c0232f18 c01429b5 0379 > c012a7b8 0006 > kernel:01d0 c0232f18 0001 c10c2000 > c012a947 > kernel: Call Trace:[prune_dcache+266/320] > [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] > [kswapd_balance_pgdat+87/160] [kswapd_balance+22/48] > kernel: [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] > [kswapd+0/176] > kernel: > kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89 > > > The system is a bit tight on memory, but /proc/meminfo reports MemFree + > Buffers + Cached > 10 MB. > > After kswapd stepped on the BUG, it happened several more times by > different processes and different code paths, but always ending with this: > > Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] > [try_to_free_pages_zone+104/208] [balance_classzone+76/560] > [__alloc_pages+363/624] > > > The BUG is this one: > > /** > * kmem_cache_free - Deallocate an object > * @cachep: The cache the allocation was from. > * @objp: The previously allocated object. > * > * Free an object which was previously allocated from this > * cache. > */ > void kmem_cache_free (kmem_cache_t *cachep, void *objp) > { > unsigned long flags; > #if DEBUG > CHECK_PAGE(virt_to_page(objp)); > if (cachep != GET_PAGE_CACHE(virt_to_page(objp))) > BUG(); > #endif > > local_irq_save(flags); > __kmem_cache_free(cachep, objp); > local_irq_restore(flags); > } > > > So prune_dcache() gets called to free up some memory, but then it hands > kmem_cache_free an inconsistent object to free? Is this indicative of > memory corruption? Could be. Especially on such a machine, it was the era of unreliable memory busses between RAM, chipsets and CPUs, unreliable cache sticks, unreliable RAM sticks, and unreliable voltage regulators causing lockups and cache corruption. I don't think the problem is related to low memory because you should get OOM messages if this was the case. Have you tried running memtest on this machine ? I would bet that it could find errors. I do still run a P133 which stayed up for 2 years before the mains was cut, but I've encountered many of them showing frequent lockups in the past, particularly on those with a small cache card plugged into a special slot close to the CPU. You may try to disable the cache in the BIOS, because I suspect that performance is less of a problem for you on such a machine than reliability. Slightly increasing the CPU voltage might also compensate for an aging regulator. Best regards, Willy - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: linux 2.4.32: kernel BUG in slab.c:1582
Hi ! On Wed, Dec 20, 2006 at 12:21:59PM -0700, Sebastian Kuzminsky wrote: Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap) running Linux 2.4.32, and lately I've been getting kernel BUGs like this: kernel: kernel BUG at slab.c:1582! kernel: invalid operand: kernel: CPU:0 kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted kernel: EFLAGS: 00010293 kernel: eax: c10b7354 ebx: 3ef0 ecx: 0002b450 edx: c11c kernel: esi: 000ad140 edi: c3ef0634 ebp: 0023 esp: c10c3f4c kernel: ds: 0018 es: 0018 ss: 0018 kernel: Process kswapd (pid: 4, stackpage=c10c3000) kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca c10b7354 c3ef0634 kernel:003c 01d0 0009 c0232f18 c01429b5 0379 c012a7b8 0006 kernel:01d0 c0232f18 0001 c10c2000 c012a947 kernel: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] [kswapd_balance_pgdat+87/160] [kswapd_balance+22/48] kernel: [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] [kswapd+0/176] kernel: kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89 The system is a bit tight on memory, but /proc/meminfo reports MemFree + Buffers + Cached 10 MB. After kswapd stepped on the BUG, it happened several more times by different processes and different code paths, but always ending with this: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] [balance_classzone+76/560] [__alloc_pages+363/624] The BUG is this one: /** * kmem_cache_free - Deallocate an object * @cachep: The cache the allocation was from. * @objp: The previously allocated object. * * Free an object which was previously allocated from this * cache. */ void kmem_cache_free (kmem_cache_t *cachep, void *objp) { unsigned long flags; #if DEBUG CHECK_PAGE(virt_to_page(objp)); if (cachep != GET_PAGE_CACHE(virt_to_page(objp))) BUG(); #endif local_irq_save(flags); __kmem_cache_free(cachep, objp); local_irq_restore(flags); } So prune_dcache() gets called to free up some memory, but then it hands kmem_cache_free an inconsistent object to free? Is this indicative of memory corruption? Could be. Especially on such a machine, it was the era of unreliable memory busses between RAM, chipsets and CPUs, unreliable cache sticks, unreliable RAM sticks, and unreliable voltage regulators causing lockups and cache corruption. I don't think the problem is related to low memory because you should get OOM messages if this was the case. Have you tried running memtest on this machine ? I would bet that it could find errors. I do still run a P133 which stayed up for 2 years before the mains was cut, but I've encountered many of them showing frequent lockups in the past, particularly on those with a small cache card plugged into a special slot close to the CPU. You may try to disable the cache in the BIOS, because I suspect that performance is less of a problem for you on such a machine than reliability. Slightly increasing the CPU voltage might also compensate for an aging regulator. Best regards, Willy - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
linux 2.4.32: kernel BUG in slab.c:1582
Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap) running Linux 2.4.32, and lately I've been getting kernel BUGs like this: kernel: kernel BUG at slab.c:1582! kernel: invalid operand: kernel: CPU:0 kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted kernel: EFLAGS: 00010293 kernel: eax: c10b7354 ebx: 3ef0 ecx: 0002b450 edx: c11c kernel: esi: 000ad140 edi: c3ef0634 ebp: 0023 esp: c10c3f4c kernel: ds: 0018 es: 0018 ss: 0018 kernel: Process kswapd (pid: 4, stackpage=c10c3000) kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca c10b7354 c3ef0634 kernel:003c 01d0 0009 c0232f18 c01429b5 0379 c012a7b8 0006 kernel:01d0 c0232f18 0001 c10c2000 c012a947 kernel: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] [kswapd_balance_pgdat+87/160] [kswapd_balance+22/48] kernel: [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] [kswapd+0/176] kernel: kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89 The system is a bit tight on memory, but /proc/meminfo reports MemFree + Buffers + Cached > 10 MB. After kswapd stepped on the BUG, it happened several more times by different processes and different code paths, but always ending with this: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] [balance_classzone+76/560] [__alloc_pages+363/624] The BUG is this one: /** * kmem_cache_free - Deallocate an object * @cachep: The cache the allocation was from. * @objp: The previously allocated object. * * Free an object which was previously allocated from this * cache. */ void kmem_cache_free (kmem_cache_t *cachep, void *objp) { unsigned long flags; #if DEBUG CHECK_PAGE(virt_to_page(objp)); if (cachep != GET_PAGE_CACHE(virt_to_page(objp))) BUG(); #endif local_irq_save(flags); __kmem_cache_free(cachep, objp); local_irq_restore(flags); } So prune_dcache() gets called to free up some memory, but then it hands kmem_cache_free an inconsistent object to free? Is this indicative of memory corruption? -- Sebastian Kuzminsky There are two kinds of people in this world: Those who finish what they begin. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
linux 2.4.32: kernel BUG in slab.c:1582
Hi folks, I've got an old PC (Pentium 133 MHz, 64 MB RAM, no swap) running Linux 2.4.32, and lately I've been getting kernel BUGs like this: kernel: kernel BUG at slab.c:1582! kernel: invalid operand: kernel: CPU:0 kernel: EIP:0010:[kmem_cache_free+105/624]Not tainted kernel: EFLAGS: 00010293 kernel: eax: c10b7354 ebx: 3ef0 ecx: 0002b450 edx: c11c kernel: esi: 000ad140 edi: c3ef0634 ebp: 0023 esp: c10c3f4c kernel: ds: 0018 es: 0018 ss: 0018 kernel: Process kswapd (pid: 4, stackpage=c10c3000) kernel: Stack: c10b7354 c2c13e3c c3ef0634 c036dd3c 0023 c01426ca c10b7354 c3ef0634 kernel:003c 01d0 0009 c0232f18 c01429b5 0379 c012a7b8 0006 kernel:01d0 c0232f18 0001 c10c2000 c012a947 kernel: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] [kswapd_balance_pgdat+87/160] [kswapd_balance+22/48] kernel: [kswapd+143/176] [_stext+0/48] [arch_kernel_thread+35/48] [kswapd+0/176] kernel: kernel: Code: 0f 0b 2e 06 7a c0 20 c0 9c 8f 04 24 fa 3b 1d 20 82 28 c0 89 The system is a bit tight on memory, but /proc/meminfo reports MemFree + Buffers + Cached 10 MB. After kswapd stepped on the BUG, it happened several more times by different processes and different code paths, but always ending with this: Call Trace:[prune_dcache+266/320] [shrink_dcache_memory+37/64] [try_to_free_pages_zone+104/208] [balance_classzone+76/560] [__alloc_pages+363/624] The BUG is this one: /** * kmem_cache_free - Deallocate an object * @cachep: The cache the allocation was from. * @objp: The previously allocated object. * * Free an object which was previously allocated from this * cache. */ void kmem_cache_free (kmem_cache_t *cachep, void *objp) { unsigned long flags; #if DEBUG CHECK_PAGE(virt_to_page(objp)); if (cachep != GET_PAGE_CACHE(virt_to_page(objp))) BUG(); #endif local_irq_save(flags); __kmem_cache_free(cachep, objp); local_irq_restore(flags); } So prune_dcache() gets called to free up some memory, but then it hands kmem_cache_free an inconsistent object to free? Is this indicative of memory corruption? -- Sebastian Kuzminsky There are two kinds of people in this world: Those who finish what they begin. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: ac17 "kernel BUG at slab.c:1244!"
Hello, At Fri, 22 Jun 2001 15:01:43 +, Gav wrote: > > This second one was immediately after rebooting, and hard locked at getty. > > kernel BUG at slab.c:1244! > invalid operand: > CPU:0 > EIP:0010:[] > EFLAGS: 00010082 > eax: 001b ebx: c187f788 ecx: 0001 edx: 2704 > esi: dfa5c000 edi: dfa5c9aa ebp: 00012800 esp: da801e2c > ds: 0018 es: 0018 ss: 0018 > Process mingetty (pid: 811, stackpage=da801000) > Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001 >dfa5c000 c0230b4a c030a2e0 0006 0406 c01931dd 0c3c >0007 0406 c0193e48 c198df88 0005 dfa5d000 > Call Trace: [] [] [] [] [] >[] [] [] [] [] > [] >[] [] > > Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17 > > >>EIP; c0126850<= > Trace; c0230b4a <_mmx_memcpy+fa/260> > Trace; c01931dd > Trace; c0193e48 > Trace; c0126d9c > Trace; c019485e > Trace; c012e932 > Trace; c010fd26 > Trace; c012eac6 > Trace; c012db40 > Trace; c012da69 > Trace; c0137c5a > Trace; c012dd43 > Trace; c0106ca7 <__up_wakeup+10fb/23f4> > Code; c0126850 > <_EIP>: > Code; c0126850<= >0: 0f 0b ud2a <= > Code; c0126852 >2: 5dpop%ebp > Code; c0126853 >3: 8b 6b 10 mov0x10(%ebx),%ebp > Code; c0126856 >6: 58pop%eax > Code; c0126857 >7: 81 e5 00 04 00 00 and$0x400,%ebp > Code; c012685d >d: 74 4b je 5a <_EIP+0x5a> c01268aa > > Code; c012685f >f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax > > > 1 warning and 1 error issued. Results may not be reliable. > > This kernel was built with gcc 2.96 on an Athlon 1.33Ghz. > > Hope this is usefull, > I found a bug of release_mem() in tty_io.c and it may cause this oops. release_mem() frees the memory of tty_struct, but does not reset tty_files field of tty_struct. So, when fput() was called, it changes tty_files of already freed tty_struct. diff -r -u linux.org/drivers/char/tty_io.c linux/drivers/char/tty_io.c --- linux.org/drivers/char/tty_io.c Tue Jun 26 09:46:07 2001 +++ linux/drivers/char/tty_io.c Tue Jun 26 10:00:24 2001 @@ -1024,6 +1024,7 @@ } o_tty->magic = 0; (*o_tty->driver.refcount)--; + list_del(_tty->tty_files); free_tty_struct(o_tty); } @@ -1035,6 +1036,7 @@ } tty->magic = 0; (*tty->driver.refcount)--; + list_del(>tty_files); free_tty_struct(tty); } - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: ac17 "kernel BUG at slab.c:1244!"
Gav wrote: > The first occurrence of this I didn't even notice until i checked my logs. I have seen the same here, once with ac13 and twice with ac15 so far. Completely standard hardware, PIII, 440BX motherboard, esssolo1. -- LarsG - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: ac17 kernel BUG at slab.c:1244!
Gav wrote: The first occurrence of this I didn't even notice until i checked my logs. I have seen the same here, once with ac13 and twice with ac15 so far. Completely standard hardware, PIII, 440BX motherboard, esssolo1. -- LarsG - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: ac17 kernel BUG at slab.c:1244!
Hello, At Fri, 22 Jun 2001 15:01:43 +, Gav wrote: This second one was immediately after rebooting, and hard locked at getty. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[c0126850] EFLAGS: 00010082 eax: 001b ebx: c187f788 ecx: 0001 edx: 2704 esi: dfa5c000 edi: dfa5c9aa ebp: 00012800 esp: da801e2c ds: 0018 es: 0018 ss: 0018 Process mingetty (pid: 811, stackpage=da801000) Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001 dfa5c000 c0230b4a c030a2e0 0006 0406 c01931dd 0c3c 0007 0406 c0193e48 c198df88 0005 dfa5d000 Call Trace: [c0230b4a] [c01931dd] [c0193e48] [c0126d9c] [c019485e] [c012e932] [c010fd26] [c012eac6] [c012db40] [c012da69] [c0137c5a] [c012dd43] [c0106ca7] Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17 EIP; c0126850 kmalloc+140/1e0 = Trace; c0230b4a _mmx_memcpy+fa/260 Trace; c01931dd parport_pc_unregister_port+a5d/b90 Trace; c0193e48 tty_hung_up_p+588/1d30 Trace; c0126d9c kfree+1ec/290 Trace; c019485e tty_hung_up_p+f9e/1d30 Trace; c012e932 default_llseek+952/9c0 Trace; c010fd26 do_BUG+246/740 Trace; c012eac6 unregister_chrdev+96/a0 Trace; c012db40 dentry_open+c0/140 Trace; c012da69 filp_open+49/60 Trace; c0137c5a getname+5a/a0 Trace; c012dd43 get_unused_fd+183/220 Trace; c0106ca7 __up_wakeup+10fb/23f4 Code; c0126850 kmalloc+140/1e0 _EIP: Code; c0126850 kmalloc+140/1e0 = 0: 0f 0b ud2a = Code; c0126852 kmalloc+142/1e0 2: 5dpop%ebp Code; c0126853 kmalloc+143/1e0 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0126856 kmalloc+146/1e0 6: 58pop%eax Code; c0126857 kmalloc+147/1e0 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c012685d kmalloc+14d/1e0 d: 74 4b je 5a _EIP+0x5a c01268aa kmalloc+19a/1e0 Code; c012685f kmalloc+14f/1e0 f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax 1 warning and 1 error issued. Results may not be reliable. This kernel was built with gcc 2.96 on an Athlon 1.33Ghz. Hope this is usefull, I found a bug of release_mem() in tty_io.c and it may cause this oops. release_mem() frees the memory of tty_struct, but does not reset tty_files field of tty_struct. So, when fput() was called, it changes tty_files of already freed tty_struct. diff -r -u linux.org/drivers/char/tty_io.c linux/drivers/char/tty_io.c --- linux.org/drivers/char/tty_io.c Tue Jun 26 09:46:07 2001 +++ linux/drivers/char/tty_io.c Tue Jun 26 10:00:24 2001 @@ -1024,6 +1024,7 @@ } o_tty-magic = 0; (*o_tty-driver.refcount)--; + list_del(o_tty-tty_files); free_tty_struct(o_tty); } @@ -1035,6 +1036,7 @@ } tty-magic = 0; (*tty-driver.refcount)--; + list_del(tty-tty_files); free_tty_struct(tty); } - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
ac17 "kernel BUG at slab.c:1244!"
The first occurrence of this I didn't even notice until i checked my logs. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00010082 eax: 001b ebx: c187f788 ecx: 0001 edx: 2765 esi: d9a5f000 edi: d9a5f9aa ebp: 00012800 esp: d9fcbda4 ds: 0018 es: 0018 ss: 0018 Process kdeinit (pid: 993, stackpage=d9fcb000) Stack: c023d5c5 04dc d9a5f000 1000 d9a5f9aa 0246 ca0fe000 0282 d9fcbf5c 04c8 dfa43128 0007 d9fca000 0002 c01f47d7 087c 0007 d9dbef40 c01f3ed5 0840 0007 0810 Call Trace: [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17 >>EIP; c0126850<= Trace; c01f47d7 Trace; c01f3ed5 Trace; c0223ab7 Trace; c01f1beb Trace; c01f1f23 Trace; c01f1faa Trace; c012e4e1 Trace; c0126d9c Trace; c013c988 <__pollwait+838/1040> Trace; c012e651 Trace; c0106ca7 <__up_wakeup+10fb/23f4> Code; c0126850 <_EIP>: Code; c0126850<= 0: 0f 0b ud2a <= Code; c0126852 2: 5dpop%ebp Code; c0126853 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0126856 6: 58pop%eax Code; c0126857 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c012685d d: 74 4b je 5a <_EIP+0x5a> c01268aa Code; c012685f f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax 1 warning and 1 error issued. Results may not be reliable. This second one was immediately after rebooting, and hard locked at getty. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00010082 eax: 001b ebx: c187f788 ecx: 0001 edx: 2704 esi: dfa5c000 edi: dfa5c9aa ebp: 00012800 esp: da801e2c ds: 0018 es: 0018 ss: 0018 Process mingetty (pid: 811, stackpage=da801000) Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001 dfa5c000 c0230b4a c030a2e0 0006 0406 c01931dd 0c3c 0007 0406 c0193e48 c198df88 0005 dfa5d000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17 >>EIP; c0126850<= Trace; c0230b4a <_mmx_memcpy+fa/260> Trace; c01931dd Trace; c0193e48 Trace; c0126d9c Trace; c019485e Trace; c012e932 Trace; c010fd26 Trace; c012eac6 Trace; c012db40 Trace; c012da69 Trace; c0137c5a Trace; c012dd43 Trace; c0106ca7 <__up_wakeup+10fb/23f4> Code; c0126850 <_EIP>: Code; c0126850<= 0: 0f 0b ud2a <= Code; c0126852 2: 5dpop%ebp Code; c0126853 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0126856 6: 58pop%eax Code; c0126857 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c012685d d: 74 4b je 5a <_EIP+0x5a> c01268aa Code; c012685f f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax 1 warning and 1 error issued. Results may not be reliable. This kernel was built with gcc 2.96 on an Athlon 1.33Ghz. Hope this is usefull, -- Regards, Gavin Baker - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
ac17 kernel BUG at slab.c:1244!
The first occurrence of this I didn't even notice until i checked my logs. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[c0126850] EFLAGS: 00010082 eax: 001b ebx: c187f788 ecx: 0001 edx: 2765 esi: d9a5f000 edi: d9a5f9aa ebp: 00012800 esp: d9fcbda4 ds: 0018 es: 0018 ss: 0018 Process kdeinit (pid: 993, stackpage=d9fcb000) Stack: c023d5c5 04dc d9a5f000 1000 d9a5f9aa 0246 ca0fe000 0282 d9fcbf5c 04c8 dfa43128 0007 d9fca000 0002 c01f47d7 087c 0007 d9dbef40 c01f3ed5 0840 0007 0810 Call Trace: [c01f47d7] [c01f3ed5] [c0223ab7] [c01f1beb] [c01f1f23] [c01f1faa] [c012e4e1] [c0126d9c] [c013c988] [c012e651] [c0106ca7] Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17 EIP; c0126850 kmalloc+140/1e0 = Trace; c01f47d7 alloc_skb+d7/310 Trace; c01f3ed5 sock_alloc_send_skb+85/f0 Trace; c0223ab7 ip_rt_ioctl+3a67/5110 Trace; c01f1beb sock_sendmsg+6b/90 Trace; c01f1f23 sock_recvmsg+313/5b0 Trace; c01f1faa sock_recvmsg+39a/5b0 Trace; c012e4e1 default_llseek+501/9c0 Trace; c0126d9c kfree+1ec/290 Trace; c013c988 __pollwait+838/1040 Trace; c012e651 default_llseek+671/9c0 Trace; c0106ca7 __up_wakeup+10fb/23f4 Code; c0126850 kmalloc+140/1e0 _EIP: Code; c0126850 kmalloc+140/1e0 = 0: 0f 0b ud2a = Code; c0126852 kmalloc+142/1e0 2: 5dpop%ebp Code; c0126853 kmalloc+143/1e0 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0126856 kmalloc+146/1e0 6: 58pop%eax Code; c0126857 kmalloc+147/1e0 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c012685d kmalloc+14d/1e0 d: 74 4b je 5a _EIP+0x5a c01268aa kmalloc+19a/1e0 Code; c012685f kmalloc+14f/1e0 f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax 1 warning and 1 error issued. Results may not be reliable. This second one was immediately after rebooting, and hard locked at getty. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[c0126850] EFLAGS: 00010082 eax: 001b ebx: c187f788 ecx: 0001 edx: 2704 esi: dfa5c000 edi: dfa5c9aa ebp: 00012800 esp: da801e2c ds: 0018 es: 0018 ss: 0018 Process mingetty (pid: 811, stackpage=da801000) Stack: c023d5c5 04dc dfa5c000 1000 dfa5c9aa 0246 0007 0001 dfa5c000 c0230b4a c030a2e0 0006 0406 c01931dd 0c3c 0007 0406 c0193e48 c198df88 0005 dfa5d000 Call Trace: [c0230b4a] [c01931dd] [c0193e48] [c0126d9c] [c019485e] [c012e932] [c010fd26] [c012eac6] [c012db40] [c012da69] [c0137c5a] [c012dd43] [c0106ca7] Code: 0f 0b 5d 8b 6b 10 58 81 e5 00 04 00 00 74 4b b8 a5 c2 0f 17 EIP; c0126850 kmalloc+140/1e0 = Trace; c0230b4a _mmx_memcpy+fa/260 Trace; c01931dd parport_pc_unregister_port+a5d/b90 Trace; c0193e48 tty_hung_up_p+588/1d30 Trace; c0126d9c kfree+1ec/290 Trace; c019485e tty_hung_up_p+f9e/1d30 Trace; c012e932 default_llseek+952/9c0 Trace; c010fd26 do_BUG+246/740 Trace; c012eac6 unregister_chrdev+96/a0 Trace; c012db40 dentry_open+c0/140 Trace; c012da69 filp_open+49/60 Trace; c0137c5a getname+5a/a0 Trace; c012dd43 get_unused_fd+183/220 Trace; c0106ca7 __up_wakeup+10fb/23f4 Code; c0126850 kmalloc+140/1e0 _EIP: Code; c0126850 kmalloc+140/1e0 = 0: 0f 0b ud2a = Code; c0126852 kmalloc+142/1e0 2: 5dpop%ebp Code; c0126853 kmalloc+143/1e0 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0126856 kmalloc+146/1e0 6: 58pop%eax Code; c0126857 kmalloc+147/1e0 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c012685d kmalloc+14d/1e0 d: 74 4b je 5a _EIP+0x5a c01268aa kmalloc+19a/1e0 Code; c012685f kmalloc+14f/1e0 f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax 1 warning and 1 error issued. Results may not be reliable. This kernel was built with gcc 2.96 on an Athlon 1.33Ghz. Hope this is usefull, -- Regards, Gavin Baker - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
BUG at slab.c:1244! 2.4.5-ac13
I tend to get these after a few days uptime. This one locked X hard, ping and ssh over net etc still worked ok. Pretty standard x86 PC hardware. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00213082 eax: 001b ebx: cfffc768 ecx: c0217700 edx: 0002906e esi: c8a5b000 edi: c8a5b9aa ebp: 00012800 esp: ca2e7df8 ds: 0018 es: 0018 ss: 0018 Process X (pid: 11139, stackpage=ca2e7000) Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 1000 0020 00203246 c01a4e86 0a1c 0007 c58a97a0 09e0 c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 ca2e6000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f ksymoops 0.7c on i686 2.4.5-ac13. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.5-ac13/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. invalid operand: CPU:0 EIP:0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00213082 eax: 001b ebx: cfffc768 ecx: c0217700 edx: 0002906e esi: c8a5b000 edi: c8a5b9aa ebp: 00012800 esp: ca2e7df8 ds: 0018 es: 0018 ss: 0018 Process X (pid: 11139, stackpage=ca2e7000) Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 1000 0020 00203246 c01a4e86 0a1c 0007 c58a97a0 09e0 c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 ca2e6000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f >>EIP; c012842f<= Trace; c01a4e86 Trace; c01a4671 Trace; c01d34e0 Trace; c01d35df Trace; c01d34e0 Trace; c01a233d Trace; c01d34e0 Trace; c01a265c Trace; c01a26de Trace; c0130c93 Trace; c0117e65 Trace; c0130df9 Trace; c0106b17 Trace; c010002b Code; c012842f <_EIP>: Code; c012842f<= 0: 0f 0b ud2a <= Code; c0128431 2: 83 c4 08 add$0x8,%esp Code; c0128434 5: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0128437 8: f7 c5 00 04 00 00 test $0x400,%ebp Code; c012843d e: 74 53 je 63 <_EIP+0x63> c0128492 Code; c012843f 10: b8 a5 c2 0f 00mov$0xfc2a5,%eax 1 warning issued. Results may not be reliable.-- -- LarsG - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
BUG at slab.c:1244! 2.4.5-ac13
I tend to get these after a few days uptime. This one locked X hard, ping and ssh over net etc still worked ok. Pretty standard x86 PC hardware. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[c012842f] EFLAGS: 00213082 eax: 001b ebx: cfffc768 ecx: c0217700 edx: 0002906e esi: c8a5b000 edi: c8a5b9aa ebp: 00012800 esp: ca2e7df8 ds: 0018 es: 0018 ss: 0018 Process X (pid: 11139, stackpage=ca2e7000) Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 1000 0020 00203246 c01a4e86 0a1c 0007 c58a97a0 09e0 c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 ca2e6000 Call Trace: [c01a4e86] [c01a4671] [c01d34e0] [c01d35df] [c01d34e0] [c01a233d] [c01d34e0] [c01a265c] [c01a26de] [c0130c93] [c0117e65] [c0130df9] [c0106b17] [c010002b] Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f ksymoops 0.7c on i686 2.4.5-ac13. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.5-ac13/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. invalid operand: CPU:0 EIP:0010:[c012842f] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00213082 eax: 001b ebx: cfffc768 ecx: c0217700 edx: 0002906e esi: c8a5b000 edi: c8a5b9aa ebp: 00012800 esp: ca2e7df8 ds: 0018 es: 0018 ss: 0018 Process X (pid: 11139, stackpage=ca2e7000) Stack: c01e5225 04dc ceac71b4 c0273fa0 0007 0002 c8a5b000 1000 0020 00203246 c01a4e86 0a1c 0007 c58a97a0 09e0 c01a4671 09e0 0007 ce146ad4 09e0 c01d34e0 c58a94b4 ca2e6000 Call Trace: [c01a4e86] [c01a4671] [c01d34e0] [c01d35df] [c01d34e0] [c01a233d] [c01d34e0] [c01a265c] [c01a26de] [c0130c93] [c0117e65] [c0130df9] [c0106b17] [c010002b] Code: 0f 0b 83 c4 08 8b 6b 10 f7 c5 00 04 00 00 74 53 b8 a5 c2 0f EIP; c012842f kmalloc+12f/1d8 = Trace; c01a4e86 alloc_skb+de/190 Trace; c01a4671 sock_alloc_send_skb+71/108 Trace; c01d34e0 unix_stream_sendmsg+0/2e0 Trace; c01d35df unix_stream_sendmsg+ff/2e0 Trace; c01d34e0 unix_stream_sendmsg+0/2e0 Trace; c01a233d sock_sendmsg+81/a4 Trace; c01d34e0 unix_stream_sendmsg+0/2e0 Trace; c01a265c sock_readv_writev+8c/98 Trace; c01a26de sock_writev+36/40 Trace; c0130c93 do_readv_writev+183/254 Trace; c0117e65 sys_gettimeofday+1d/94 Trace; c0130df9 sys_writev+41/54 Trace; c0106b17 system_call+33/38 Trace; c010002b startup_32+2b/a5 Code; c012842f kmalloc+12f/1d8 _EIP: Code; c012842f kmalloc+12f/1d8 = 0: 0f 0b ud2a = Code; c0128431 kmalloc+131/1d8 2: 83 c4 08 add$0x8,%esp Code; c0128434 kmalloc+134/1d8 5: 8b 6b 10 mov0x10(%ebx),%ebp Code; c0128437 kmalloc+137/1d8 8: f7 c5 00 04 00 00 test $0x400,%ebp Code; c012843d kmalloc+13d/1d8 e: 74 53 je 63 _EIP+0x63 c0128492 kmalloc+192/1d8 Code; c012843f kmalloc+13f/1d8 10: b8 a5 c2 0f 00mov$0xfc2a5,%eax 1 warning issued. Results may not be reliable.-- -- LarsG - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
2.4.5-ac5 BUG in slab.c
I was playing with (a romfs) initrd and modularising everything, including ext2 and ide-*. (gcc version 2.96 2731 (Red Hat Linux 7.1 2.96-81)) More info on request. ksymoops 2.4.0 on i686 2.4.5-ac5-4. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.5-ac5-4/ (default) -m /boot/System.map-2.4.5-ac5-4 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (expand_objects): cannot stat(/lib/ext2.o) for ext2 ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/eepro100.o) for eepro100 ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/ide-disk.o) for ide-disk ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/ide-probe-mod.o) for ide-probe-mod ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/ide-mod.o) for ide-mod ksymoops: No such file or directory kernel BUG at slab.c:1200! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00210082 eax: 001b ebx: c824e000 ecx: 0001 edx: 6518 esi: edi: c144713c ebp: cd14fa4c esp: c6fd7ee8 ds: 0018 es: 0018 ss: 0018 Process netscape-commun (pid: 3901, stackpage=c6fd7000) Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4 c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb Call Trace: [] [] [] [] [] [] Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00 Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/net/ipv4/netfilter/netfilter.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/net/ipv6/netfilter/netfilter.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/md/mddev.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/net/wireless/orinoco_drvs.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/char/drm/drm.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/misc/misc.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/cdrom/driver.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/media/radio/radio.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/media/video/video.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/media/media.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/sound/sounddrivers.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/parport/driver.o Warning (map_ksym_to_module): cannot match loaded module ext2 to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module eepro100 to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module ide-disk to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module ide-probe-mod to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module ide-mod to a unique module object. Trace may not be reliable. Reading Oops report from the terminal kernel BUG at slab.c:1200! invalid operand: CPU:0 EIP:0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00210082 eax: 001b ebx: c824e000 ecx: 0001 edx: 6518 esi: edi: c144713c ebp: cd14fa4c esp: c6fd7ee8 ds: 0018 es: 0018 ss: 0018 Process netscape-commun (pid: 3901, stackpage=c6fd7000) Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4 c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb Call Trace: [] [] [] [] [] [] Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00 >>EIP; c01280d9<= Trace; c01286a5 Trace; c013bafe Trace; c013e3d8 Trace; c0130254 Trace; c0130543 Trace; c0106e5b Code; c01280d9 <_EIP>: Code; c01280d9<= 0: 0f 0b ud2a <= Code; c01280db 2: 5apop%edx Code; c01280dc 3: 59pop%ecx Code; c01280dd 4: 8b 5d 14 mov0x14(%ebp),%ebx Code; c01280e0 7: 83 fb ff cmp$0x,%ebx Code; c0
2.4.5-ac5 BUG in slab.c
I was playing with (a romfs) initrd and modularising everything, including ext2 and ide-*. (gcc version 2.96 2731 (Red Hat Linux 7.1 2.96-81)) More info on request. ksymoops 2.4.0 on i686 2.4.5-ac5-4. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.5-ac5-4/ (default) -m /boot/System.map-2.4.5-ac5-4 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (expand_objects): cannot stat(/lib/ext2.o) for ext2 ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/eepro100.o) for eepro100 ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/ide-disk.o) for ide-disk ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/ide-probe-mod.o) for ide-probe-mod ksymoops: No such file or directory Error (expand_objects): cannot stat(/lib/ide-mod.o) for ide-mod ksymoops: No such file or directory kernel BUG at slab.c:1200! invalid operand: CPU:0 EIP:0010:[c01280d9] EFLAGS: 00210082 eax: 001b ebx: c824e000 ecx: 0001 edx: 6518 esi: edi: c144713c ebp: cd14fa4c esp: c6fd7ee8 ds: 0018 es: 0018 ss: 0018 Process netscape-commun (pid: 3901, stackpage=c6fd7000) Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4 c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb Call Trace: [c01286a5] [c013bafe] [c013e3d8] [c0130254] [c0130543] [c0106e5b] Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00 Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/net/ipv4/netfilter/netfilter.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/net/ipv6/netfilter/netfilter.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/md/mddev.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/net/wireless/orinoco_drvs.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/char/drm/drm.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/misc/misc.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/cdrom/driver.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/media/radio/radio.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/media/video/video.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/media/media.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/sound/sounddrivers.o Warning (read_object): no symbols in /lib/modules/2.4.5-ac5-4/build/drivers/parport/driver.o Warning (map_ksym_to_module): cannot match loaded module ext2 to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module eepro100 to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module ide-disk to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module ide-probe-mod to a unique module object. Trace may not be reliable. Warning (map_ksym_to_module): cannot match loaded module ide-mod to a unique module object. Trace may not be reliable. Reading Oops report from the terminal kernel BUG at slab.c:1200! invalid operand: CPU:0 EIP:0010:[c01280d9] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00210082 eax: 001b ebx: c824e000 ecx: 0001 edx: 6518 esi: edi: c144713c ebp: cd14fa4c esp: c6fd7ee8 ds: 0018 es: 0018 ss: 0018 Process netscape-commun (pid: 3901, stackpage=c6fd7000) Stack: c01bfacb 04b0 c824e019 cd14fa4c c824f019 c824e019 c01286a5 c144713c cd14fa4c c824e019 0001 00200246 ce680934 ffeb c6fd7f84 cb5c0de4 c013bafe c144713c c824e019 c6fd7f84 ce680934 0001 0002 fffb Call Trace: [c01286a5] [c013bafe] [c013e3d8] [c0130254] [c0130543] [c0106e5b] Code: 0f 0b 5a 59 8b 5d 14 83 fb ff 74 2b 8d 74 26 00 8d bc 27 00 EIP; c01280d9 kmem_extra_free_checks+59/a0 = Trace; c01286a5 kmem_cache_free+215/2c0 Trace; c013bafe open_namei+5ee/600 Trace; c013e3d8 vfs_readdir+58/80 Trace; c0130254 filp_open+34/60 Trace; c0130543 sys_open+33/b0 Trace; c0106e5b system_call+33/38 Code; c01280d9 kmem_extra_free_checks+59/a0 _EIP: Code; c01280d9 kmem_extra_free_checks+59/a0 = 0: 0f 0b ud2a = Code; c01280db
Re: [bug] at slab.c ...
... and yesterday my box completely lockups and magic keys didn't work too for me ... no messages in logs ... Best regards, .R.V. -- _ |-| __ Robert Vojta -= Oo.oO =- |=| [Ll] IPEX, s.r.o. "^" `o PGP signature
Re: [bug] at slab.c ...
... and yesterday my box completely lockups and magic keys didn't work too for me ... no messages in logs ... Best regards, .R.V. -- _ |-| __ Robert Vojta vojta-at-ipex.cz -= Oo.oO =- |=| [Ll] IPEX, s.r.o. ^ `o PGP signature
Re: [bug] at slab.c ...
> What X server ? and also run the trace through ksymoops It's fresh installation of RH 7.1 (XFree86-4.0.3-5) ... >>EIP; c0129884<= Trace; c01b08db Trace; c01affd7 Trace; c01e4e79 Trace; c0129ddc Trace; c01adc1c Trace; c01b0a9b Trace; c01adf53 Trace; c01adfeb Trace; c01321bc <__remove_inode_queue+1c/20> Trace; c0129ddc Trace; c0140412 Trace; c0132323 Trace; c0106cab Code; c0129884 <_EIP>: Code; c0129884<= 0: 0f 0b ud2a <= Code; c0129886 2: 58pop%eax Code; c0129887 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c012988a 6: 5apop%edx Code; c012988b 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c0129891 d: 74 4d je 5c <_EIP+0x5c> c01298e0 Code; c0129893 f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax Best, .R.V. -- _ |-| __ Robert Vojta -= Oo.oO =- |=| [Ll] IPEX, s.r.o. "^" `o PGP signature
[bug] at slab.c ...
Hi, I download kernel 2.4.5 and -ac6 patches and I see this ... After that I have black rxvt window on my desktop and I can't remove it in any way. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00010082 eax: 001b ebx: c1103768 ecx: 0001 edx: 1dcb esi: c1a57000 edi: c1a579aa ebp: 00012800 esp: c165fda4 ds: 0018 es: 0018 ss: 0018 Process rxvt (pid: 772, stackpage=c165f000) Stack: c01f8dca 04dc c1a57000 1000 c1a579aa 0246 0001 270f c165fe50 c2fe1214 0007 c165e000 080c c01b08db 085c 0007 c126c400 c01affd7 0820 0007 080c Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 58 8b 6b 10 5a 81 e5 00 04 00 00 74 4d b8 a5 c2 0f 17 If you want more informations, please write me and I will send you as much as will be possible. Best regards, .R.V. -- _ |-| __ Robert Vojta -= Oo.oO =- |=| [Ll] IPEX, s.r.o. "^" `o PGP signature
[bug] at slab.c ...
Hi, I download kernel 2.4.5 and -ac6 patches and I see this ... After that I have black rxvt window on my desktop and I can't remove it in any way. kernel BUG at slab.c:1244! invalid operand: CPU:0 EIP:0010:[c0129884] EFLAGS: 00010082 eax: 001b ebx: c1103768 ecx: 0001 edx: 1dcb esi: c1a57000 edi: c1a579aa ebp: 00012800 esp: c165fda4 ds: 0018 es: 0018 ss: 0018 Process rxvt (pid: 772, stackpage=c165f000) Stack: c01f8dca 04dc c1a57000 1000 c1a579aa 0246 0001 270f c165fe50 c2fe1214 0007 c165e000 080c c01b08db 085c 0007 c126c400 c01affd7 0820 0007 080c Call Trace: [c01b08db] [c01affd7] [c01e4e79] [c0129ddc] [c01adc1c] [c01b0a9b] [c01adf53] [c01adfeb] [c01321bc] [c0129ddc] [c0140412] [c0132323] [c0106cab] [c010002b] Code: 0f 0b 58 8b 6b 10 5a 81 e5 00 04 00 00 74 4d b8 a5 c2 0f 17 If you want more informations, please write me and I will send you as much as will be possible. Best regards, .R.V. -- _ |-| __ Robert Vojta vojta-at-ipex.cz -= Oo.oO =- |=| [Ll] IPEX, s.r.o. ^ `o PGP signature
Re: [bug] at slab.c ...
What X server ? and also run the trace through ksymoops It's fresh installation of RH 7.1 (XFree86-4.0.3-5) ... EIP; c0129884 try_to_swap_out+174/1d0 = Trace; c01b08db skb_checksum+3b/220 Trace; c01affd7 pskb_copy+167/170 Trace; c01e4e79 netlink_create+59/d0 Trace; c0129ddc reclaim_page+1ec/3c0 Trace; c01adc1c sys_recvmsg+ac/200 Trace; c01b0a9b skb_checksum+1fb/220 Trace; c01adf53 sys_socketcall+1a3/200 Trace; c01adfeb sock_register+3b/40 Trace; c01321bc __remove_inode_queue+1c/20 Trace; c0129ddc reclaim_page+1ec/3c0 Trace; c0140412 locks_mandatory_locked+2/40 Trace; c0132323 set_blocksize+63/1f0 Trace; c0106cab system_call+33/38 Code; c0129884 try_to_swap_out+174/1d0 _EIP: Code; c0129884 try_to_swap_out+174/1d0 = 0: 0f 0b ud2a = Code; c0129886 try_to_swap_out+176/1d0 2: 58pop%eax Code; c0129887 try_to_swap_out+177/1d0 3: 8b 6b 10 mov0x10(%ebx),%ebp Code; c012988a try_to_swap_out+17a/1d0 6: 5apop%edx Code; c012988b try_to_swap_out+17b/1d0 7: 81 e5 00 04 00 00 and$0x400,%ebp Code; c0129891 try_to_swap_out+181/1d0 d: 74 4d je 5c _EIP+0x5c c01298e0 swap_out_pmd+0/100 Code; c0129893 try_to_swap_out+183/1d0 f: b8 a5 c2 0f 17mov$0x170fc2a5,%eax Best, .R.V. -- _ |-| __ Robert Vojta vojta-at-ipex.cz -= Oo.oO =- |=| [Ll] IPEX, s.r.o. ^ `o PGP signature
Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28
Keith Owens wrote: > > On Wed, 21 Mar 2001 23:15:14 -0800, > Greg Billock <[EMAIL PROTECTED]> wrote: > >Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee! > > > >Copied from screen after interrupt handler killed, so sorry for > >incompleteness. This > >bug is reproducable so if necessary, I can try it again > > The complete oops report is required, and it needs to be run through > ksymoops. See Documentation/oops-tracing.txt. It's a known problem, I think. USB is incompatible with slab redzoning. Turn off `Debug memory allocation' in the kernel hacking menu. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28
On Wed, 21 Mar 2001 23:15:14 -0800, Greg Billock <[EMAIL PROTECTED]> wrote: >Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee! > >Copied from screen after interrupt handler killed, so sorry for >incompleteness. This >bug is reproducable so if necessary, I can try it again The complete oops report is required, and it needs to be run through ksymoops. See Documentation/oops-tracing.txt. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
[BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28
Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee! Copied from screen after interrupt handler killed, so sorry for incompleteness. This bug is reproducable so if necessary, I can try it again kernel BUG at slab.c:1402! invalid operand: CPU: 0 EIP: 0010: [] EFLAGS: 00010086 eax: 1b ebx: 26d6a4 ecx: 81 edx: 14 esi: c82d3 edi: c82d3564 ebp: cdffb0a0 esp: c0289e98 ds: 18 es: 18 ss: 18 Process swapper (pid: 0, stackpage= c0289000) ... Kernel panic: Aiee, killing interrupt handler! Sorry for the incomplete data. The system doesn't write anything to logs about the crash, since it is a pretty hard one, but I can reproduce this bug if it hasn't been reported yet (I didn't find it in archives) or the above is insufficient. More data: AMD K6-2 400 processor, >200MB memory Gnu C2.96 Binutils 2.10.0.18 Linux C library 1.92.so Procps 2.0.7 Mount 2.10m Net-tools (2000-05-21) sh-utils 2.0 Modules: 8139too, nls_iso8859-1, nls_cp437, vfat, fat, usb-ohci, usbcore -Greg Billock [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
[BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28
Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee! Copied from screen after interrupt handler killed, so sorry for incompleteness. This bug is reproducable so if necessary, I can try it again kernel BUG at slab.c:1402! invalid operand: CPU: 0 EIP: 0010: [c012ddb4] EFLAGS: 00010086 eax: 1b ebx: 26d6a4 ecx: 81 edx: 14 esi: c82d3 edi: c82d3564 ebp: cdffb0a0 esp: c0289e98 ds: 18 es: 18 ss: 18 Process swapper (pid: 0, stackpage= c0289000) ... Kernel panic: Aiee, killing interrupt handler! Sorry for the incomplete data. The system doesn't write anything to logs about the crash, since it is a pretty hard one, but I can reproduce this bug if it hasn't been reported yet (I didn't find it in archives) or the above is insufficient. More data: AMD K6-2 400 processor, 200MB memory Gnu C2.96 Binutils 2.10.0.18 Linux C library 1.92.so Procps 2.0.7 Mount 2.10m Net-tools (2000-05-21) sh-utils 2.0 Modules: 8139too, nls_iso8859-1, nls_cp437, vfat, fat, usb-ohci, usbcore -Greg Billock [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28
On Wed, 21 Mar 2001 23:15:14 -0800, Greg Billock [EMAIL PROTECTED] wrote: Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee! Copied from screen after interrupt handler killed, so sorry for incompleteness. This bug is reproducable so if necessary, I can try it again The complete oops report is required, and it needs to be run through ksymoops. See Documentation/oops-tracing.txt. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [BUG] kernel BUG at slab.c:1402! -- 2.4.2-0.1.28
Keith Owens wrote: On Wed, 21 Mar 2001 23:15:14 -0800, Greg Billock [EMAIL PROTECTED] wrote: Summary: Hotplugging a USB device causes an unrecoverable kernel Aiee! Copied from screen after interrupt handler killed, so sorry for incompleteness. This bug is reproducable so if necessary, I can try it again The complete oops report is required, and it needs to be run through ksymoops. See Documentation/oops-tracing.txt. It's a known problem, I think. USB is incompatible with slab redzoning. Turn off `Debug memory allocation' in the kernel hacking menu. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Tim Fletcher writes: > What ever a none privilaged user space apps does witness: > > root@localhost# dd if=/dev/random of=/dev/mem If you can do that as a non-priviledged user, then you've got bigger security problems than that. /dev/mem should NOT be read/writable by anyone other than root. Its permissions should be no more than 600. -- Russell King ([EMAIL PROTECTED])The developer of ARM Linux http://www.arm.linux.org.uk/personal/aboutme.html - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Tim Fletcher writes: What ever a none privilaged user space apps does witness: root@localhost# dd if=/dev/random of=/dev/mem If you can do that as a non-priviledged user, then you've got bigger security problems than that. /dev/mem should NOT be read/writable by anyone other than root. Its permissions should be no more than 600. -- Russell King ([EMAIL PROTECTED])The developer of ARM Linux http://www.arm.linux.org.uk/personal/aboutme.html - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
> I sent the below patch to Linus earlier today. I didn't copy > any mailing list because it's a bit security-related. Oh well. Its been in -ac for while but using a define since its a constant so it not a secret 8) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
> > > kernel BUG at slab.c:1542! > > The kernel should never oops, no matter what user space does to it. What ever a none privilaged user space apps does witness: root@localhost# dd if=/dev/random of=/dev/mem -- Tim Fletcher - Network manager .~. /V\ L I N U X [EMAIL PROTECTED]// \\ >Don't fear the penguin< [EMAIL PROTECTED] /( )\ irc: Night-Shade on quakenet ^^-^^ Justice is incidental to law and order. -- J. Edgar Hoover - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
> The kernel appears to run fine with this bug() removed. > > BTW- gimp and a few other apps also manage to trigger it.. You can add sane with an advansys scsi card and various scsi scanners to that list -- Tim Fletcher - Network manager .~. /V\ L I N U X [EMAIL PROTECTED]// \\ >Don't fear the penguin< [EMAIL PROTECTED] /( )\ irc: Night-Shade on quakenet ^^-^^ Justice is incidental to law and order. -- J. Edgar Hoover - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
True, It's just odd that we're having the same problem with the X server, so its a double whammy ;) Daniel Phillips wrote: > Shawn Starr wrote: > > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering > > extention. This has been discussed on the Xpert XFree86 mailing list. There > > is a fix in the works (depends on the TrueType fonts your using). > > A BUG is a BUG: > > > > kernel BUG at slab.c:1542! > > The kernel should never oops, no matter what user space does to it. > > -- > Daniel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Daniel Phillips wrote: > > I don't know much about the history of this bug but it's quite clear > it's deliberately inserted: > > void * kmalloc (size_t size, int flags) > > BUG(); // too big size > return NULL; > I sent the below patch to Linus earlier today. I didn't copy any mailing list because it's a bit security-related. Oh well. If wmem_max is set to > 256kbytes, an application can set SO_SNDBUF on a unix domain stream socket to >256k and do a write() of >256k. unix_stream_sendmsg() then tries to kmalloc >128k and the kernel dies. I don't like the idea of simply returning NULL from kmalloc in this case, because an application which does setsockopt(fd, SOL_SOCKET, SO_SNDBUF, 256kbytes); write(fd, buf, 256kbytes); will work perfectly well, until someone increases wmem_max to greater than 256k. This administrative action will cause the above application to mysteriously start failing. --- linux-2.4.1-pre10/include/linux/slab.h Mon Jan 1 18:29:35 2001 +++ linux-akpm/include/linux/slab.h Wed Jan 24 12:29:34 2001 @@ -75,6 +75,9 @@ extern kmem_cache_t*fs_cachep; extern kmem_cache_t*sigact_cachep; +/* Largest kmalloc which we support */ +extern size_t kmalloc_max; + #endif /* __KERNEL__ */ #endif /* _LINUX_SLAB_H */ --- linux-2.4.1-pre10/mm/slab.c Tue Jan 23 19:28:16 2001 +++ linux-akpm/mm/slab.cWed Jan 24 12:57:47 2001 @@ -360,6 +360,9 @@ /* Place maintainer for reaping. */ static kmem_cache_t *clock_searchp = _cache; +/* Largest kmalloc which we support */ +size_t kmalloc_max; + #define cache_chain (cache_cache.next) #ifdef CONFIG_SMP @@ -455,6 +458,7 @@ SLAB_CACHE_DMA|SLAB_HWCACHE_ALIGN, NULL, NULL); if (!sizes->cs_dmacachep) BUG(); + kmalloc_max = sizes->cs_size; sizes++; } while (sizes->cs_size); } --- linux-2.4.1-pre10/kernel/ksyms.cTue Jan 23 19:28:16 2001 +++ linux-akpm/kernel/ksyms.c Wed Jan 24 12:17:28 2001 @@ -104,6 +104,7 @@ EXPORT_SYMBOL(kmem_cache_alloc); EXPORT_SYMBOL(kmem_cache_free); EXPORT_SYMBOL(kmalloc); +EXPORT_SYMBOL(kmalloc_max); EXPORT_SYMBOL(kfree); EXPORT_SYMBOL(vfree); EXPORT_SYMBOL(__vmalloc); --- linux-2.4.1-pre10/net/unix/af_unix.cTue Jan 23 19:28:16 2001 +++ linux-akpm/net/unix/af_unix.c Wed Jan 24 12:57:35 2001 @@ -1319,6 +1319,10 @@ if (size > sk->sndbuf/2 - 16) size = sk->sndbuf/2 - 16; + /* Avoid oversized kmallocs */ + if (size > kmalloc_max / 2 - 16) + size = kmalloc_max / 2 - 16; + /* * Keep to page sized kmalloc()'s as various people * have suggested. Big mallocs stress the vm too - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Gregory Maxwell wrote: > > On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote: > > > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering > > > extention. This has been discussed on the Xpert XFree86 mailing list. There > > > is a fix in the works (depends on the TrueType fonts your using). > > > > A BUG is a BUG: > > > > > > kernel BUG at slab.c:1542! > > > > The kernel should never oops, no matter what user space does to it. > > The kernel appears to run fine with this bug() removed. I don't know much about the history of this bug but it's quite clear it's deliberately inserted: void * kmalloc (size_t size, int flags) BUG(); // too big size return NULL; It says "kernel allocation will *never* fail, and if you try to kmalloc something too large, that's a bug too" - not a reason to try again. I'd check with Linus before solving the problem that way ;-) -- Daniel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote: > > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering > > extention. This has been discussed on the Xpert XFree86 mailing list. There > > is a fix in the works (depends on the TrueType fonts your using). > > A BUG is a BUG: > > > > kernel BUG at slab.c:1542! > > The kernel should never oops, no matter what user space does to it. The kernel appears to run fine with this bug() removed. BTW- gimp and a few other apps also manage to trigger it.. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Shawn Starr wrote: > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering > extention. This has been discussed on the Xpert XFree86 mailing list. There > is a fix in the works (depends on the TrueType fonts your using). A BUG is a BUG: > > kernel BUG at slab.c:1542! The kernel should never oops, no matter what user space does to it. -- Daniel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Shawn Starr wrote: This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). A BUG is a BUG: kernel BUG at slab.c:1542! The kernel should never oops, no matter what user space does to it. -- Daniel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote: This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). A BUG is a BUG: kernel BUG at slab.c:1542! The kernel should never oops, no matter what user space does to it. The kernel appears to run fine with this bug() removed. BTW- gimp and a few other apps also manage to trigger it.. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Gregory Maxwell wrote: On Wed, Jan 24, 2001 at 01:58:22PM +0100, Daniel Phillips wrote: This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). A BUG is a BUG: kernel BUG at slab.c:1542! The kernel should never oops, no matter what user space does to it. The kernel appears to run fine with this bug() removed. I don't know much about the history of this bug but it's quite clear it's deliberately inserted: void * kmalloc (size_t size, int flags) if allocation succeeds, exit BUG(); // too big size return NULL; It says "kernel allocation will *never* fail, and if you try to kmalloc something too large, that's a bug too" - not a reason to try again. I'd check with Linus before solving the problem that way ;-) -- Daniel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
Daniel Phillips wrote: I don't know much about the history of this bug but it's quite clear it's deliberately inserted: void * kmalloc (size_t size, int flags) if allocation succeeds, exit BUG(); // too big size return NULL; I sent the below patch to Linus earlier today. I didn't copy any mailing list because it's a bit security-related. Oh well. If wmem_max is set to 256kbytes, an application can set SO_SNDBUF on a unix domain stream socket to 256k and do a write() of 256k. unix_stream_sendmsg() then tries to kmalloc 128k and the kernel dies. I don't like the idea of simply returning NULL from kmalloc in this case, because an application which does setsockopt(fd, SOL_SOCKET, SO_SNDBUF, 256kbytes); write(fd, buf, 256kbytes); will work perfectly well, until someone increases wmem_max to greater than 256k. This administrative action will cause the above application to mysteriously start failing. --- linux-2.4.1-pre10/include/linux/slab.h Mon Jan 1 18:29:35 2001 +++ linux-akpm/include/linux/slab.h Wed Jan 24 12:29:34 2001 @@ -75,6 +75,9 @@ extern kmem_cache_t*fs_cachep; extern kmem_cache_t*sigact_cachep; +/* Largest kmalloc which we support */ +extern size_t kmalloc_max; + #endif /* __KERNEL__ */ #endif /* _LINUX_SLAB_H */ --- linux-2.4.1-pre10/mm/slab.c Tue Jan 23 19:28:16 2001 +++ linux-akpm/mm/slab.cWed Jan 24 12:57:47 2001 @@ -360,6 +360,9 @@ /* Place maintainer for reaping. */ static kmem_cache_t *clock_searchp = cache_cache; +/* Largest kmalloc which we support */ +size_t kmalloc_max; + #define cache_chain (cache_cache.next) #ifdef CONFIG_SMP @@ -455,6 +458,7 @@ SLAB_CACHE_DMA|SLAB_HWCACHE_ALIGN, NULL, NULL); if (!sizes-cs_dmacachep) BUG(); + kmalloc_max = sizes-cs_size; sizes++; } while (sizes-cs_size); } --- linux-2.4.1-pre10/kernel/ksyms.cTue Jan 23 19:28:16 2001 +++ linux-akpm/kernel/ksyms.c Wed Jan 24 12:17:28 2001 @@ -104,6 +104,7 @@ EXPORT_SYMBOL(kmem_cache_alloc); EXPORT_SYMBOL(kmem_cache_free); EXPORT_SYMBOL(kmalloc); +EXPORT_SYMBOL(kmalloc_max); EXPORT_SYMBOL(kfree); EXPORT_SYMBOL(vfree); EXPORT_SYMBOL(__vmalloc); --- linux-2.4.1-pre10/net/unix/af_unix.cTue Jan 23 19:28:16 2001 +++ linux-akpm/net/unix/af_unix.c Wed Jan 24 12:57:35 2001 @@ -1319,6 +1319,10 @@ if (size sk-sndbuf/2 - 16) size = sk-sndbuf/2 - 16; + /* Avoid oversized kmallocs */ + if (size kmalloc_max / 2 - 16) + size = kmalloc_max / 2 - 16; + /* * Keep to page sized kmalloc()'s as various people * have suggested. Big mallocs stress the vm too - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
True, It's just odd that we're having the same problem with the X server, so its a double whammy ;) Daniel Phillips wrote: Shawn Starr wrote: This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). A BUG is a BUG: kernel BUG at slab.c:1542! The kernel should never oops, no matter what user space does to it. -- Daniel - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
kernel BUG at slab.c:1542! The kernel should never oops, no matter what user space does to it. What ever a none privilaged user space apps does witness: root@localhost# dd if=/dev/random of=/dev/mem -- Tim Fletcher - Network manager .~. /V\ L I N U X [EMAIL PROTECTED]// \\ Don't fear the penguin [EMAIL PROTECTED] /( )\ irc: Night-Shade on quakenet ^^-^^ Justice is incidental to law and order. -- J. Edgar Hoover - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
The kernel appears to run fine with this bug() removed. BTW- gimp and a few other apps also manage to trigger it.. You can add sane with an advansys scsi card and various scsi scanners to that list -- Tim Fletcher - Network manager .~. /V\ L I N U X [EMAIL PROTECTED]// \\ Don't fear the penguin [EMAIL PROTECTED] /( )\ irc: Night-Shade on quakenet ^^-^^ Justice is incidental to law and order. -- J. Edgar Hoover - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
I sent the below patch to Linus earlier today. I didn't copy any mailing list because it's a bit security-related. Oh well. Its been in -ac for while but using a define since its a constant so it not a secret 8) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
If it makes the kernel do Bad Things, the kernel needs to be fixed. -d Shawn Starr wrote: > This is not a kernel bug, This is a bug in the XFree86 TrueType rendering > extention. This has been discussed on the Xpert XFree86 mailing list. There > is a fix in the works (depends on the TrueType fonts your using). > > Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS > X11R6.5.1 merge sources) not 4.0.2 stable. -- There is a natural aristocracy among men. The grounds of this are virtue and talents. Thomas Jefferson The good thing about standards is that there are so many to choose from. Andrew S. Tanenbaum - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS X11R6.5.1 merge sources) not 4.0.2 stable. Shawn. Jorge Nerin wrote: > Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9 > compiled with kgcc, and the same bug in pre1, pre4 & pre9. I only need > to run xfontsel and the xfs dies, every time, prefectly reproductable. > > Using XFree86-xfs-4.0.1-1, and this XFree packages: > XFree86-4.0.1-1 > XFree86-tools-4.0.1-1 > XFree86-xdm-4.0.1-1 > XFree86-libs-4.0.1-1 > XFree86-xfs-4.0.1-1 > XFree86-75dpi-fonts-4.0.1-1 > XFree86-SVGA-3.3.6-33 > XFree86-twm-4.0.1-1 > XFree86-VGA16-3.3.6-33 > XFree86-Xnest-4.0.1-1 > XFree86-devel-4.0.1-1 > XFree86-V4L-4.0.1-1 > > Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and > also some patches are welcome. > > ksymoops 2.3.4 on i586 2.4.1-pre9. Options used > -V (default) > -k /proc/ksyms (default) > -l /proc/modules (default) > -o /lib/modules/2.4.1-pre9/ (default) > -m /usr/src/linux/System.map (default) > > Warning: You did not tell me where to find symbol information. I will > assume that the log matches the kernel and modules that are running > right now and I'll use the default options above for symbol resolution. > If the current kernel and/or modules do not match the log, you can get > more accurate output by telling me the kernel version and where to find > map, modules, ksyms etc. ksymoops -h explains the options. > > activating NMI Watchdog ... done. > cpu: 0, clocks: 668150, slice: 222716 > cpu: 1, clocks: 668150, slice: 222716 > 8139too Fast Ethernet driver 0.9.13 loaded > invalid operand: > CPU:1 > EIP:0010:[] > Using defaults from ksymoops -t elf32-i386 -a i386 > EFLAGS: 00010292 > eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 > esi: 0003 edi: c431 ebp: c431 esp: c4311de4 > ds: 0018 es: 0018 ss: 0018 > Process xfs (pid: 909, stackpage=c4311000) > Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 > c0111d3b >c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 > c431 >0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec > c01d1550 > Call Trace: [] [] [] [] > [] [] [] >[] [] [] [] [] > [] > Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 > > >>EIP; c012c056<= > Trace; c0111d3b > Trace; c0196cfa > Trace; c01963fe > Trace; c01d1550 > Trace; c01d167e > Trace; c01d1550 > Trace; c0193fad > Trace; c01d1550 > Trace; c0194260 > Trace; c01942e2 > Trace; c0134763 > Trace; c01348c9 > Trace; c0108fc7 > Code; c012c056 > <_EIP>: > Code; c012c056<= >0: 0f 0b ud2a <= > Code; c012c058 >2: 83 c4 0c add$0xc,%esp > Code; c012c05b >5: 90nop > Code; c012c05c >6: 8d 74 26 00 lea0x0(%esi,1),%esi > Code; c012c060 >a: 31 c0 xor%eax,%eax > Code; c012c062 >c: 5bpop%ebx > Code; c012c063 >d: 5epop%esi > Code; c012c064 >e: 5f pop%edi > Code; c012c065 >f: 5dpop%ebp > Code; c012c066 > 10: 83 c4 0c add$0xc,%esp > Code; c012c069 > 13: c3ret > > 1 warning issued. Results may not be reliable. > > kernel BUG at slab.c:1542! > invalid operand: > CPU:1 > EIP:0010:[kmalloc+274/296] > EFLAGS: 00010292 > eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 > esi: 0003 edi: c431 ebp: c431 esp: c4311de4 > ds: 0018 es: 0018 ss: 0018 > Process xfs (pid: 909, stackpage=c4311000) > Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 > c0111d3b >c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 > c431 >0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec > c01d1550 > Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416] > [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784] > [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784] > [sock_sendmsg+129/164] >[unix_stream_sendmsg+0/784] [sock_readv_writev+140/152] > [sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+
kernel BUG at slab.c:1542! (2.4.1-pre9)
Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9 compiled with kgcc, and the same bug in pre1, pre4 & pre9. I only need to run xfontsel and the xfs dies, every time, prefectly reproductable. Using XFree86-xfs-4.0.1-1, and this XFree packages: XFree86-4.0.1-1 XFree86-tools-4.0.1-1 XFree86-xdm-4.0.1-1 XFree86-libs-4.0.1-1 XFree86-xfs-4.0.1-1 XFree86-75dpi-fonts-4.0.1-1 XFree86-SVGA-3.3.6-33 XFree86-twm-4.0.1-1 XFree86-VGA16-3.3.6-33 XFree86-Xnest-4.0.1-1 XFree86-devel-4.0.1-1 XFree86-V4L-4.0.1-1 Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and also some patches are welcome. ksymoops 2.3.4 on i586 2.4.1-pre9. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.1-pre9/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. activating NMI Watchdog ... done. cpu: 0, clocks: 668150, slice: 222716 cpu: 1, clocks: 668150, slice: 222716 8139too Fast Ethernet driver 0.9.13 loaded invalid operand: CPU:1 EIP:0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010292 eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 esi: 0003 edi: c431 ebp: c431 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 c0111d3b c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 c431 0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec c01d1550 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 >>EIP; c012c056<= Trace; c0111d3b Trace; c0196cfa Trace; c01963fe Trace; c01d1550 Trace; c01d167e Trace; c01d1550 Trace; c0193fad Trace; c01d1550 Trace; c0194260 Trace; c01942e2 Trace; c0134763 Trace; c01348c9 Trace; c0108fc7 Code; c012c056 <_EIP>: Code; c012c056<= 0: 0f 0b ud2a <= Code; c012c058 2: 83 c4 0c add$0xc,%esp Code; c012c05b 5: 90nop Code; c012c05c 6: 8d 74 26 00 lea0x0(%esi,1),%esi Code; c012c060 a: 31 c0 xor%eax,%eax Code; c012c062 c: 5bpop%ebx Code; c012c063 d: 5epop%esi Code; c012c064 e: 5fpop%edi Code; c012c065 f: 5dpop%ebp Code; c012c066 10: 83 c4 0c add$0xc,%esp Code; c012c069 13: c3ret 1 warning issued. Results may not be reliable. kernel BUG at slab.c:1542! invalid operand: CPU:1 EIP:0010:[kmalloc+274/296] EFLAGS: 00010292 eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 esi: 0003 edi: c431 ebp: c431 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 c0111d3b c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 c431 0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec c01d1550 Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416] [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784] [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784] [sock_sendmsg+129/164] [unix_stream_sendmsg+0/784] [sock_readv_writev+140/152] [sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+65/84] [system_call+55/64] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 -- Jorge Nerin <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
kernel BUG at slab.c:1542! (2.4.1-pre9)
Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9 compiled with kgcc, and the same bug in pre1, pre4 pre9. I only need to run xfontsel and the xfs dies, every time, prefectly reproductable. Using XFree86-xfs-4.0.1-1, and this XFree packages: XFree86-4.0.1-1 XFree86-tools-4.0.1-1 XFree86-xdm-4.0.1-1 XFree86-libs-4.0.1-1 XFree86-xfs-4.0.1-1 XFree86-75dpi-fonts-4.0.1-1 XFree86-SVGA-3.3.6-33 XFree86-twm-4.0.1-1 XFree86-VGA16-3.3.6-33 XFree86-Xnest-4.0.1-1 XFree86-devel-4.0.1-1 XFree86-V4L-4.0.1-1 Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and also some patches are welcome. ksymoops 2.3.4 on i586 2.4.1-pre9. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.1-pre9/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. activating NMI Watchdog ... done. cpu: 0, clocks: 668150, slice: 222716 cpu: 1, clocks: 668150, slice: 222716 8139too Fast Ethernet driver 0.9.13 loaded invalid operand: CPU:1 EIP:0010:[c012c056] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010292 eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 esi: 0003 edi: c431 ebp: c431 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 c0111d3b c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 c431 0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec c01d1550 Call Trace: [c0111d3b] [c0196cfa] [c01963fe] [c01d1550] [c01d167e] [c01d1550] [c0193fad] [c01d1550] [c0194260] [c01942e2] [c0134763] [c01348c9] [c0108fc7] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 EIP; c012c056 kmalloc+112/128 = Trace; c0111d3b smp_call_function_interrupt+1f/34 Trace; c0196cfa alloc_skb+102/1a0 Trace; c01963fe sock_alloc_send_skb+72/12c Trace; c01d1550 unix_stream_sendmsg+0/310 Trace; c01d167e unix_stream_sendmsg+12e/310 Trace; c01d1550 unix_stream_sendmsg+0/310 Trace; c0193fad sock_sendmsg+81/a4 Trace; c01d1550 unix_stream_sendmsg+0/310 Trace; c0194260 sock_readv_writev+8c/98 Trace; c01942e2 sock_writev+36/40 Trace; c0134763 do_readv_writev+183/254 Trace; c01348c9 sys_writev+41/54 Trace; c0108fc7 system_call+37/40 Code; c012c056 kmalloc+112/128 _EIP: Code; c012c056 kmalloc+112/128 = 0: 0f 0b ud2a = Code; c012c058 kmalloc+114/128 2: 83 c4 0c add$0xc,%esp Code; c012c05b kmalloc+117/128 5: 90nop Code; c012c05c kmalloc+118/128 6: 8d 74 26 00 lea0x0(%esi,1),%esi Code; c012c060 kmalloc+11c/128 a: 31 c0 xor%eax,%eax Code; c012c062 kmalloc+11e/128 c: 5bpop%ebx Code; c012c063 kmalloc+11f/128 d: 5epop%esi Code; c012c064 kmalloc+120/128 e: 5fpop%edi Code; c012c065 kmalloc+121/128 f: 5dpop%ebp Code; c012c066 kmalloc+122/128 10: 83 c4 0c add$0xc,%esp Code; c012c069 kmalloc+125/128 13: c3ret 1 warning issued. Results may not be reliable. kernel BUG at slab.c:1542! invalid operand: CPU:1 EIP:0010:[kmalloc+274/296] EFLAGS: 00010292 eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 esi: 0003 edi: c431 ebp: c431 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 c0111d3b c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 c431 0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec c01d1550 Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416] [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784] [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784] [sock_sendmsg+129/164] [unix_stream_sendmsg+0/784] [sock_readv_writev+140/152] [sock_writev+54/64] [do_readv_writev+387/596] [sys_writev+65/84] [system_call+55/64] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 -- Jorge Nerin [EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS X11R6.5.1 merge sources) not 4.0.2 stable. Shawn. Jorge Nerin wrote: Hello, this is perfectly reproductable, fresh RH7.0 kernel 2.4.1-pre9 compiled with kgcc, and the same bug in pre1, pre4 pre9. I only need to run xfontsel and the xfs dies, every time, prefectly reproductable. Using XFree86-xfs-4.0.1-1, and this XFree packages: XFree86-4.0.1-1 XFree86-tools-4.0.1-1 XFree86-xdm-4.0.1-1 XFree86-libs-4.0.1-1 XFree86-xfs-4.0.1-1 XFree86-75dpi-fonts-4.0.1-1 XFree86-SVGA-3.3.6-33 XFree86-twm-4.0.1-1 XFree86-VGA16-3.3.6-33 XFree86-Xnest-4.0.1-1 XFree86-devel-4.0.1-1 XFree86-V4L-4.0.1-1 Pentium 2x200mmx 96mb ram, voodoo 3 200pci, more info as requested, and also some patches are welcome. ksymoops 2.3.4 on i586 2.4.1-pre9. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.1-pre9/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. activating NMI Watchdog ... done. cpu: 0, clocks: 668150, slice: 222716 cpu: 1, clocks: 668150, slice: 222716 8139too Fast Ethernet driver 0.9.13 loaded invalid operand: CPU:1 EIP:0010:[c012c056] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010292 eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 esi: 0003 edi: c431 ebp: c431 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 c0111d3b c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 c431 0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec c01d1550 Call Trace: [c0111d3b] [c0196cfa] [c01963fe] [c01d1550] [c01d167e] [c01d1550] [c0193fad] [c01d1550] [c0194260] [c01942e2] [c0134763] [c01348c9] [c0108fc7] Code: 0f 0b 83 c4 0c 90 8d 74 26 00 31 c0 5b 5e 5f 5d 83 c4 0c c3 EIP; c012c056 kmalloc+112/128 = Trace; c0111d3b smp_call_function_interrupt+1f/34 Trace; c0196cfa alloc_skb+102/1a0 Trace; c01963fe sock_alloc_send_skb+72/12c Trace; c01d1550 unix_stream_sendmsg+0/310 Trace; c01d167e unix_stream_sendmsg+12e/310 Trace; c01d1550 unix_stream_sendmsg+0/310 Trace; c0193fad sock_sendmsg+81/a4 Trace; c01d1550 unix_stream_sendmsg+0/310 Trace; c0194260 sock_readv_writev+8c/98 Trace; c01942e2 sock_writev+36/40 Trace; c0134763 do_readv_writev+183/254 Trace; c01348c9 sys_writev+41/54 Trace; c0108fc7 system_call+37/40 Code; c012c056 kmalloc+112/128 _EIP: Code; c012c056 kmalloc+112/128 = 0: 0f 0b ud2a = Code; c012c058 kmalloc+114/128 2: 83 c4 0c add$0xc,%esp Code; c012c05b kmalloc+117/128 5: 90nop Code; c012c05c kmalloc+118/128 6: 8d 74 26 00 lea0x0(%esi,1),%esi Code; c012c060 kmalloc+11c/128 a: 31 c0 xor%eax,%eax Code; c012c062 kmalloc+11e/128 c: 5bpop%ebx Code; c012c063 kmalloc+11f/128 d: 5epop%esi Code; c012c064 kmalloc+120/128 e: 5fpop%edi Code; c012c065 kmalloc+121/128 f: 5dpop%ebp Code; c012c066 kmalloc+122/128 10: 83 c4 0c add$0xc,%esp Code; c012c069 kmalloc+125/128 13: c3ret 1 warning issued. Results may not be reliable. kernel BUG at slab.c:1542! invalid operand: CPU:1 EIP:0010:[kmalloc+274/296] EFLAGS: 00010292 eax: 001b ebx: c27cc680 ecx: 0008 edx: c5802ca0 esi: 0003 edi: c431 ebp: c431 esp: c4311de4 ds: 0018 es: 0018 ss: 0018 Process xfs (pid: 909, stackpage=c4311000) Stack: c01e97a5 c01e9825 0606 c27cc680 0003 c431 c431 c0111d3b c5fe3f0c 01a8 c0196cfa 0003fff4 0003 c5c96c20 c431 0ff0 0206 c01963fe 0003fff0 0003 c2f8a164 0003ffec c01d1550 Call Trace: [smp_call_function_interrupt+31/52] [alloc_skb+258/416] [sock_alloc_send_skb+114/300] [unix_stream_sendmsg+0/784] [unix_stream_sendmsg+302/784] [unix_stream_sendmsg+0/784] [sock_sendmsg+129/164] [unix_stream_sendmsg+0/784
Re: kernel BUG at slab.c:1542!(2.4.1-pre9)
If it makes the kernel do Bad Things, the kernel needs to be fixed. -d Shawn Starr wrote: This is not a kernel bug, This is a bug in the XFree86 TrueType rendering extention. This has been discussed on the Xpert XFree86 mailing list. There is a fix in the works (depends on the TrueType fonts your using). Unless otherwise, Im using 2.4.1-pre9 with no such faults (XFree86 CVS X11R6.5.1 merge sources) not 4.0.2 stable. -- There is a natural aristocracy among men. The grounds of this are virtue and talents. Thomas Jefferson The good thing about standards is that there are so many to choose from. Andrew S. Tanenbaum - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"
On Wed, 17 Jan 2001, Rick Richardson wrote: > Problem: kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542" This BUG() has been been removed in the later -ac patches as it was meant to be a temporary debugging help during the -test3 slab.c changes. This does not however remove the constraint that kmalloc can only allocate a maximum of 128KB. How you solve this will depend what you want to use the memory for. -- Hans - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"
** Reply to message from Brian Pomerantz <[EMAIL PROTECTED]> on Wed, 17 Jan 2001 12:17:19 -0800 > The most you can kmalloc() is 128KB unless this has changed in the 2.4 > kernel which I doubt. If you want a region of memory that large, use > vmalloc(). Of course, this doesn't guarantee a contiguous region. Couldn't you also use get_free_pages (commonly abbreviated as "gfp")? You can alloc up to 2MB chunks on an x86 I think. -- Timur Tabi - [EMAIL PROTECTED] Interactive Silicon - http://www.interactivesi.com When replying to a mailing-list message, please direct the reply to the mailing list only. Don't send another copy to me. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"
On Wed, Jan 17, 2001 at 01:54:20PM -0600, Rick Richardson wrote: > > [please cc me on any responses] > > Environment: 2.4.0 released, Pentium III with 256MB's of RAM. > Problem: kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542" > The most you can kmalloc() is 128KB unless this has changed in the 2.4 kernel which I doubt. If you want a region of memory that large, use vmalloc(). Of course, this doesn't guarantee a contiguous region. BAPper - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
kmalloc() of 4MB causes "kernel BUG at slab.c:1542!"
[please cc me on any responses] Environment: 2.4.0 released, Pentium III with 256MB's of RAM. Problem: kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542" Here is the dmesg output: kernel BUG at slab.c:1542! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00010282 eax: 001b ebx: d2922000 ecx: cdf6c000 edx: esi: 0007 edi: ebp: 0806f124 esp: cb1bdef4 ds: 0018 es: 0018 ss: 0018 Process insmod (pid: 24167, stackpage=cb1bd000) Stack: c02148eb c021498b 0606 0286 0001 c02a75ec 0029 d2922000 d2922083 0100 0007 d29221c0 0100 c0116c65 cc8a6000 020c cc8a7000 0060 ffea 0003 c2be5420 0060 Call Trace: [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 31 c0 83 c4 10 5b 5e c3 eb 0d 90 90 90 90 90 Repeat by: Compile simple driver attached. $ insmod test.o Amt=4096 -- Rick Richardson [EMAIL PROTECTED] http://home.mn.rr.com/richardsons/ Twins Cities traffic animations are at http://members.nbci.com/tctraffic/#1 Most Minnesotans think Global Warming is a good thing. #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include static size_t Amt = 1; MODULE_PARM(Amt, "l"); MODULE_PARM_DESC(Amt, "Pages of memory to allocate"); static void *mem; static int __init init(void) { /* Announce this module has been loaded. */ printk(KERN_INFO "test loading; allocate %d bytes\n", Amt*4096); mem = kmalloc(Amt*4096, GFP_KERNEL); if (!mem) return (-ENOMEM); printk(KERN_INFO "test loaded\n"); return 0; } static void __exit fini(void) { printk(KERN_INFO "test unloading\n"); kfree(mem); } module_init(init); module_exit(fini);
kmalloc() of 4MB causes kernel BUG at slab.c:1542!
[please cc me on any responses] Environment: 2.4.0 released, Pentium III with 256MB's of RAM. Problem: kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542" Here is the dmesg output: kernel BUG at slab.c:1542! invalid operand: CPU:0 EIP:0010:[c0129b84] EFLAGS: 00010282 eax: 001b ebx: d2922000 ecx: cdf6c000 edx: esi: 0007 edi: ebp: 0806f124 esp: cb1bdef4 ds: 0018 es: 0018 ss: 0018 Process insmod (pid: 24167, stackpage=cb1bd000) Stack: c02148eb c021498b 0606 0286 0001 c02a75ec 0029 d2922000 d2922083 0100 0007 d29221c0 0100 c0116c65 cc8a6000 020c cc8a7000 0060 ffea 0003 c2be5420 0060 Call Trace: [d2922000] [d2922083] [d29221c0] [c0116c65] [d292] [d2922060] [c0109057] Code: 0f 0b 83 c4 0c 31 c0 83 c4 10 5b 5e c3 eb 0d 90 90 90 90 90 Repeat by: Compile simple driver attached. $ insmod test.o Amt=4096 -- Rick Richardson [EMAIL PROTECTED] http://home.mn.rr.com/richardsons/ Twins Cities traffic animations are at http://members.nbci.com/tctraffic/#1 Most Minnesotans think Global Warming is a good thing. #include linux/config.h #include linux/module.h #include linux/types.h #include linux/string.h #include linux/kernel.h #include linux/sched.h #include linux/timer.h #include linux/config.h #include linux/socket.h #include linux/sockios.h #include linux/errno.h #include linux/in.h #include linux/mm.h #include linux/inet.h #include linux/netdevice.h #include linux/etherdevice.h #include linux/if_arp.h #include linux/skbuff.h #include linux/proc_fs.h #include linux/stat.h #include linux/init.h static size_t Amt = 1; MODULE_PARM(Amt, "l"); MODULE_PARM_DESC(Amt, "Pages of memory to allocate"); static void *mem; static int __init init(void) { /* Announce this module has been loaded. */ printk(KERN_INFO "test loading; allocate %d bytes\n", Amt*4096); mem = kmalloc(Amt*4096, GFP_KERNEL); if (!mem) return (-ENOMEM); printk(KERN_INFO "test loaded\n"); return 0; } static void __exit fini(void) { printk(KERN_INFO "test unloading\n"); kfree(mem); } module_init(init); module_exit(fini);
Re: kmalloc() of 4MB causes kernel BUG at slab.c:1542!
On Wed, Jan 17, 2001 at 01:54:20PM -0600, Rick Richardson wrote: [please cc me on any responses] Environment: 2.4.0 released, Pentium III with 256MB's of RAM. Problem: kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542" The most you can kmalloc() is 128KB unless this has changed in the 2.4 kernel which I doubt. If you want a region of memory that large, use vmalloc(). Of course, this doesn't guarantee a contiguous region. BAPper - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kmalloc() of 4MB causes kernel BUG at slab.c:1542!
** Reply to message from Brian Pomerantz [EMAIL PROTECTED] on Wed, 17 Jan 2001 12:17:19 -0800 The most you can kmalloc() is 128KB unless this has changed in the 2.4 kernel which I doubt. If you want a region of memory that large, use vmalloc(). Of course, this doesn't guarantee a contiguous region. Couldn't you also use get_free_pages (commonly abbreviated as "gfp")? You can alloc up to 2MB chunks on an x86 I think. -- Timur Tabi - [EMAIL PROTECTED] Interactive Silicon - http://www.interactivesi.com When replying to a mailing-list message, please direct the reply to the mailing list only. Don't send another copy to me. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kmalloc() of 4MB causes kernel BUG at slab.c:1542!
On Wed, 17 Jan 2001, Rick Richardson wrote: Problem: kmalloc() of 4M causes kernel message "kernel BUG at slab.c:1542" This BUG() has been been removed in the later -ac patches as it was meant to be a temporary debugging help during the -test3 slab.c changes. This does not however remove the constraint that kmalloc can only allocate a maximum of 128KB. How you solve this will depend what you want to use the memory for. -- Hans - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:804!
I'd guess this is because of a bug that crept into test9, where a TD is now leaked ... you can get rid of the slab BUG warning by commenting out the line at the top of drivers/usb/usb-ohci.c that #defines OHCI_MEM_SLAB. That TD leak prevents the kmem_cache from getting freed, and hence prevents that module from getting reloaded. It was a mistake to leave that #defined at this time, though of course it _ought_ to be fine to do that. - Dave - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:804!
I'd guess this is because of a bug that crept into test9, where a TD is now leaked ... you can get rid of the slab BUG warning by commenting out the line at the top of drivers/usb/usb-ohci.c that #defines OHCI_MEM_SLAB. That TD leak prevents the kmem_cache from getting freed, and hence prevents that module from getting reloaded. It was a mistake to leave that #defined at this time, though of course it _ought_ to be fine to do that. - Dave - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:804!
>>>>> "christian" == Christian Reiser <[EMAIL PROTECTED]> writes: christian> Hi, christian> i hope i am right here, and this problem wasn't mailed a thousand times christian> before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt christian> older...) christian> I am playing around with usb and usb-storage, and then i wanted to reload christian> the usb-ohci-module, during the insmod i got this error: christian> Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 christian> Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered christian> kmem_cache_destroy: Can't free all objects c116a890 christian> : usb-ohci.h: td_cache remained christian> kernel BUG at slab.c:804! christian> invalid operand: christian> CPU:0 christian> EIP:0010:[] christian> EFLAGS: 00010282 christian> eax: 001a ebx: c116a8ec ecx: c19e2000 edx: c23b9780 christian> esi: c116a8e0 edi: c48ef78b ebp: c116a8f4 esp: c19e3ef8 christian> ds: 0018 es: 0018 ss: 0018 christian> Process insmod (pid: 1026, stackpage=c19e3000) christian> Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048 christian> c116a908 christian>c116a950 c02b14a8 c19e3f28 0020 c48ec069 c48ef783 christian> 0020 christian>0020 00022000 c48ec000 c48ef606 c48ec000 christian> c01177db christian> Call Trace: [] [] [] [] christian> [] [] [] christian>[] [] [] [] [] christian> [] christian> Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0 christian> ... hope it could help ... Hi could you pass the output through ksymoops to know the backtrace, see the linux/Reporting_bugs file. Without that info it is very difficult to know what is happening. Later, Juan. -- In theory, practice and theory are the same, but in practice they are different -- Larry McVoy - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:804!
On Thu, 26 Oct 2000 15:39:59 +0200 (CEST), Christian Reiser <[EMAIL PROTECTED]> wrote: > kernel BUG at slab.c:804! >Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0 >... hope it could help ... Almost completely useless until you follow the procedures in linux/REPORTING-BUGS. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
kernel BUG at slab.c:804!
Hi, i hope i am right here, and this problem wasn't mailed a thousand times before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt older...) I am playing around with usb and usb-storage, and then i wanted to reload the usb-ohci-module, during the insmod i got this error: Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered kmem_cache_destroy: Can't free all objects c116a890 : usb-ohci.h: td_cache remained kernel BUG at slab.c:804! invalid operand: CPU:0 EIP:0010:[] EFLAGS: 00010282 eax: 001a ebx: c116a8ec ecx: c19e2000 edx: c23b9780 esi: c116a8e0 edi: c48ef78b ebp: c116a8f4 esp: c19e3ef8 ds: 0018 es: 0018 ss: 0018 Process insmod (pid: 1026, stackpage=c19e3000) Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048 c116a908 c116a950 c02b14a8 c19e3f28 0020 c48ec069 c48ef783 0020 0020 00022000 c48ec000 c48ef606 c48ec000 c01177db Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0 ... hope it could help ... Ciao Christian ps: i am not on the list - please cc me~ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
kernel BUG at slab.c:804!
Hi, i hope i am right here, and this problem wasn't mailed a thousand times before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt older...) I am playing around with usb and usb-storage, and then i wanted to reload the usb-ohci-module, during the insmod i got this error: Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered kmem_cache_destroy: Can't free all objects c116a890 : usb-ohci.h: td_cache remained kernel BUG at slab.c:804! invalid operand: CPU:0 EIP:0010:[c0125974] EFLAGS: 00010282 eax: 001a ebx: c116a8ec ecx: c19e2000 edx: c23b9780 esi: c116a8e0 edi: c48ef78b ebp: c116a8f4 esp: c19e3ef8 ds: 0018 es: 0018 ss: 0018 Process insmod (pid: 1026, stackpage=c19e3000) Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048 c116a908 c116a950 c02b14a8 c19e3f28 0020 c48ec069 c48ef783 0020 0020 00022000 c48ec000 c48ef606 c48ec000 c01177db Call Trace: [c02197e7] [c0219867] [c48ec051] [c48ec048] [c48ec069] [c48ef783] [c48ec000] [c48ef606] [c48ec000] [c01177db] [c48e5000] [c48ec048] [c010a2e3] Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0 ... hope it could help ... Ciao Christian ps: i am not on the list - please cc me~ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:804!
On Thu, 26 Oct 2000 15:39:59 +0200 (CEST), Christian Reiser [EMAIL PROTECTED] wrote: kernel BUG at slab.c:804! Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0 ... hope it could help ... Almost completely useless until you follow the procedures in linux/REPORTING-BUGS. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
Re: kernel BUG at slab.c:804!
"christian" == Christian Reiser [EMAIL PROTECTED] writes: christian Hi, christian i hope i am right here, and this problem wasn't mailed a thousand times christian before - but it is not older than 3 days (2.4.0-test10-pre5 is'nt christian older...) christian I am playing around with usb and usb-storage, and then i wanted to reload christian the usb-ohci-module, during the insmod i got this error: christian Oct 26 15:11:00 christian kernel: usb.c: kusbd: /sbin/hotplug remove 2 christian Oct 26 15:11:00 christian kernel: usb.c: USB bus 2 deregistered christian kmem_cache_destroy: Can't free all objects c116a890 christian : usb-ohci.h: td_cache remained christian kernel BUG at slab.c:804! christian invalid operand: christian CPU:0 christian EIP:0010:[c0125974] christian EFLAGS: 00010282 christian eax: 001a ebx: c116a8ec ecx: c19e2000 edx: c23b9780 christian esi: c116a8e0 edi: c48ef78b ebp: c116a8f4 esp: c19e3ef8 christian ds: 0018 es: 0018 ss: 0018 christian Process insmod (pid: 1026, stackpage=c19e3000) christian Stack: c02197e7 c0219867 0324 2000 0001 c48ec051 c48ec048 christian c116a908 christianc116a950 c02b14a8 c19e3f28 0020 c48ec069 c48ef783 christian 0020 christian0020 00022000 c48ec000 c48ef606 c48ec000 christian c01177db christian Call Trace: [c02197e7] [c0219867] [c48ec051] [c48ec048] christian [c48ec069] [c48ef783] [c48ec000] christian[c48ef606] [c48ec000] [c01177db] [c48e5000] [c48ec048] christian [c010a2e3] christian Code: 0f 0b 83 c4 0c 8d b4 26 00 00 00 00 8b 1b 81 fb bc 23 26 c0 christian ... hope it could help ... Hi could you pass the output through ksymoops to know the backtrace, see the linux/Reporting_bugs file. Without that info it is very difficult to know what is happening. Later, Juan. -- In theory, practice and theory are the same, but in practice they are different -- Larry McVoy - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/