> I setup a 2.2.6 knfs dual-pII server with the raid patches, with raid0
> running across 3 18G disks. Things were running fine for about a week
> and then started experiencing kernel oopses quite regularly. I thought
> it may have been knfsd, so I switched back to user space nfsd but with
> no luck. I finally ran a ksymoops and it seems raid0_map is the culprit.
> Can anyone help?
>
I also reported an oops that traced to raid0_map about a month ago. I can
repost it, but basically my system has very similar specs to yours: dual
PII (450mhz) running 2.2.4 + raid0145-19990309. My system also had
another patch installed, the DAC960 hardware RAID controller patch, which
is a very non-intrusive patch. My stack trace was:
>>EIP: c01766ee <raid0_map+8a/118>
Trace: d08b9000 <driver_template+e270/392bc>
Trace: d08bb170 <driver_template+103e0/392bc>
Trace: d08b7000 <driver_template+c270/392bc>
Trace: c016eff9 <md_map+41/4c>
Trace: c016b095 <ll_rw_block+e9/21c>
Trace: c0129818 <brw_page+2c8/3bc>
Trace: c0129a89 <generic_readpage+e9/f8>
Trace: c011e4cf <try_to_read_ahead+10f/128>
Basically identicial. I have heard nothing about it though.
David
>
> --
>
> Unable to handle kernel paging request at virtual address e001e998
> current->tss.cr3 = 1e979000, %cr3 = 1e979000
> *pde = 1ffef063
> Oops: 0000
> CPU: 1
> EIP: 0010:[<c017b6d0>]
> EFLAGS: 00010212
> eax: 03a17b9b ebx: e001e998 ecx: e001b040 edx: 00000008
> esi: 742f7363 edi: e85ee6c6 ebp: 00000005 esp: de97bdf8
> ds: 0018 es: 0018 ss: 0018
> Process rpc.nfsd (pid: 75, process nr: 16, stackpage=de97b000)
> Stack: 00000004 00000009 e001b040 00000020 e0019000 00000040 00000000 c0178803
> dfba6480 00000900 c8f9c14e c8f9c150 00000002 00000000 c0174a57 00000900
> c8f9c14e c8f9c150 00000002 00000004 22666967 00000010 00000000 00000400
> Call Trace: [<e001b040>] [<e0019000>] [<c0178803>] [<c0174a57>] [<c0129db1>]
>[<c0129f79>] [<c011ed75>]
> [<c011f1ba>] [<c011f577>] [<c011f4c4>] [<c012778a>] [<c0109034>]
> Code: 8b 3b 8b 07 03 47 08 39 c6 7c 1f 8b 5b 04 85 db 75 16 56 68
> Copying default arch from ksymoops, bfd_arch=8 bfd_mach=0
>
> >>EIP; c017b6d0 <raid0_map+8c/11c>
> Trace; e001b040 <_end+1fdedabc/1fdf1ac8>
> Trace; e0019000 <_end+1fdeba7c/1fdf1ac8>
> Trace; c0178803 <md_map+3f/44>
> Trace; c0174a57 <ll_rw_block+eb/210>
> Trace; c0129db1 <brw_page+29d/390>
> Trace; c0129f79 <generic_readpage+81/90>
> Trace; c011ed75 <try_to_read_ahead+10d/124>
> Trace; c011f1ba <do_generic_file_read+2fa/604>
> Trace; c011f577 <generic_file_read+63/7c>
> Trace; c011f4c4 <file_read_actor+0/50>
> Trace; c012778a <sys_read+c2/e8>
> Trace; c0109034 <system_call+34/40>
> Code; c017b6d0 <raid0_map+8c/11c> 00000000 <_EIP>:
> Code; c017b6d0 <raid0_map+8c/11c> 0: 8b 3b movl
>(%ebx),%edi
> Code; c017b6d2 <raid0_map+8e/11c> 2: 8b 07 movl
>(%edi),%eax
> Code; c017b6d4 <raid0_map+90/11c> 4: 03 47 08 addl
>0x8(%edi),%eax
> Code; c017b6d7 <raid0_map+93/11c> 7: 39 c6 cmpl
>%eax,%esi
> Code; c017b6d9 <raid0_map+95/11c> 9: 7c 1f jl
>2a <_EIP+0x2a> c017b6fa <raid0_map+b6/11c>
> Code; c017b6db <raid0_map+97/11c> b: 8b 5b 04 movl
>0x4(%ebx),%ebx
> Code; c017b6de <raid0_map+9a/11c> e: 85 db testl
>%ebx,%ebx
> Code; c017b6e0 <raid0_map+9c/11c> 10: 75 16 jne
>28 <_EIP+0x28> c017b6f8 <raid0_map+b4/11c>
> Code; c017b6e2 <raid0_map+9e/11c> 12: 56 pushl
>%esi
> Code; c017b6e3 <raid0_map+9f/11c> 13: 68 00 00 00 00 pushl
>$0x0
>
>
> 1 warning issued. Results may not be reliable.
>
>
--
/==============================\
| David Mansfield |
| [EMAIL PROTECTED] |
\==============================/