> I setup a 2.2.6 knfs dual-pII server with the raid patches, with raid0
> running across 3 18G disks. Things were running fine for about a week
> and then started experiencing kernel oopses quite regularly. I thought
> it may have been knfsd, so I switched back to user space nfsd but with
> no luck. I finally ran a ksymoops and it seems raid0_map is the culprit.
> Can anyone help?
> 

I also reported an oops that traced to raid0_map about a month ago.  I can
repost it, but basically my system has very similar specs to yours: dual
PII (450mhz) running 2.2.4 + raid0145-19990309.  My system also had
another patch installed, the DAC960 hardware RAID controller patch, which
is a very non-intrusive patch.  My stack trace was:

 >>EIP: c01766ee <raid0_map+8a/118>
Trace: d08b9000 <driver_template+e270/392bc>
Trace: d08bb170 <driver_template+103e0/392bc>
Trace: d08b7000 <driver_template+c270/392bc>
Trace: c016eff9 <md_map+41/4c>
Trace: c016b095 <ll_rw_block+e9/21c>
Trace: c0129818 <brw_page+2c8/3bc>
Trace: c0129a89 <generic_readpage+e9/f8>
Trace: c011e4cf <try_to_read_ahead+10f/128>


Basically identicial.  I have heard nothing about it though.

David
> 
> --
> 
> Unable to handle kernel paging request at virtual address e001e998
> current->tss.cr3 = 1e979000, %cr3 = 1e979000
> *pde = 1ffef063
> Oops: 0000
> CPU:    1
> EIP:    0010:[<c017b6d0>]
> EFLAGS: 00010212
> eax: 03a17b9b   ebx: e001e998   ecx: e001b040   edx: 00000008
> esi: 742f7363   edi: e85ee6c6   ebp: 00000005   esp: de97bdf8
> ds: 0018   es: 0018   ss: 0018
> Process rpc.nfsd (pid: 75, process nr: 16, stackpage=de97b000)
> Stack: 00000004 00000009 e001b040 00000020 e0019000 00000040 00000000 c0178803 
>        dfba6480 00000900 c8f9c14e c8f9c150 00000002 00000000 c0174a57 00000900 
>        c8f9c14e c8f9c150 00000002 00000004 22666967 00000010 00000000 00000400 
> Call Trace: [<e001b040>] [<e0019000>] [<c0178803>] [<c0174a57>] [<c0129db1>] 
>[<c0129f79>] [<c011ed75>] 
>        [<c011f1ba>] [<c011f577>] [<c011f4c4>] [<c012778a>] [<c0109034>] 
> Code: 8b 3b 8b 07 03 47 08 39 c6 7c 1f 8b 5b 04 85 db 75 16 56 68 
> Copying default arch from ksymoops, bfd_arch=8 bfd_mach=0
> 
> >>EIP; c017b6d0 <raid0_map+8c/11c>
> Trace; e001b040 <_end+1fdedabc/1fdf1ac8>
> Trace; e0019000 <_end+1fdeba7c/1fdf1ac8>
> Trace; c0178803 <md_map+3f/44>
> Trace; c0174a57 <ll_rw_block+eb/210>
> Trace; c0129db1 <brw_page+29d/390>
> Trace; c0129f79 <generic_readpage+81/90>
> Trace; c011ed75 <try_to_read_ahead+10d/124>
> Trace; c011f1ba <do_generic_file_read+2fa/604>
> Trace; c011f577 <generic_file_read+63/7c>
> Trace; c011f4c4 <file_read_actor+0/50>
> Trace; c012778a <sys_read+c2/e8>
> Trace; c0109034 <system_call+34/40>
> Code;  c017b6d0 <raid0_map+8c/11c>             00000000 <_EIP>:
> Code;  c017b6d0 <raid0_map+8c/11c>                0:  8b 3b                   movl   
>(%ebx),%edi
> Code;  c017b6d2 <raid0_map+8e/11c>                2:  8b 07                   movl   
>(%edi),%eax
> Code;  c017b6d4 <raid0_map+90/11c>                4:  03 47 08                addl   
>0x8(%edi),%eax
> Code;  c017b6d7 <raid0_map+93/11c>                7:  39 c6                   cmpl   
>%eax,%esi
> Code;  c017b6d9 <raid0_map+95/11c>                9:  7c 1f                   jl     
>2a <_EIP+0x2a> c017b6fa <raid0_map+b6/11c>
> Code;  c017b6db <raid0_map+97/11c>                b:  8b 5b 04                movl   
>0x4(%ebx),%ebx
> Code;  c017b6de <raid0_map+9a/11c>                e:  85 db                   testl  
>%ebx,%ebx
> Code;  c017b6e0 <raid0_map+9c/11c>               10:  75 16                   jne    
>28 <_EIP+0x28> c017b6f8 <raid0_map+b4/11c>
> Code;  c017b6e2 <raid0_map+9e/11c>               12:  56                      pushl  
>%esi
> Code;  c017b6e3 <raid0_map+9f/11c>               13:  68 00 00 00 00          pushl  
>$0x0
> 
> 
> 1 warning issued.  Results may not be reliable.
> 
> 

-- 
/==============================\
| David Mansfield              |
| [EMAIL PROTECTED]             |
\==============================/


Reply via email to