System: SMP BP6 2x480 Celeron 192MB IMB30GB G400
Oops occured while I'm tunning multithreaded application
while recreating new thread.
Lately I'm having a lot of complete deadlocks also
(this lock has been the lucky one as I could actually report it)
Usual symptoms - doing heavy disk transfers with caching thread
Before my application was not that fast - but as the speed goes up,
hard-locking in kernel seems to be appearing more and more offten.
I'm using around 7 threads and continuously adding new broadcast,
cond_wait
communication. But during last few days I've got up-to 7 deadlocks in a
day -
this is really becoming borring - I've also tested 2.4.5-ac9 &
2.4.5-ac13
both these kernel also lock with similiar conditions.
For more details just ask me (and it's the hardware fault,
nor the problem of RTL3.0 as -ac9 & -ac13 were both used without this
patch and were locking similary)
Here is an Oops
ksymoops 2.3.7 on i686 2.4.5-pre5-RTL3.0. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.5-pre5-RTL3.0/ (default)
-m /usr/src/linux/System.map (default)
Warning (compare_maps): ksyms_base symbol
__VERSIONED_SYMBOL(shmem_file_setup) not found in System.map. Ignoring
c014c9ae
Oops: 0002
CPU: 1
EIP: 0010:[<c014c9ae>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 00000002 ebx: c9705400 ecx: c0248afc edx: c9df4000
esi: c0248c60 edi: 00000002 ebp: ca9283a0 esp: c56fbe84
ds: 0018 es: 0018 ss: 0018
Process top (pid: 27600, stackpage=c56fb000)
Stack: c01473be c9705400 c9df4000 c133e000 c014dbbd c9705400 00007fdd
c9df4000
c133c040 c014e1ae c133e000 c9df4000 00000002 c133c040 ca9283a0
c133c040
ca9283a0 ffffffff ca928405 c014cd19 c133c040 ca9283a0 fffffff4
c56fa000
Call Trace: [<c01473be>] [<c014dbbd>] [<c014e1ae>] [<c014cd19>]
[<c013c78a>] [<c013cc29>] [<c013d92e>]
[<c0144ab9>] [<c0131513>] [<c0131844>] [<c0106d2f>] [<c010002b>]
Code: f0 ff 48 10 8b 42 24 80 48 14 08 52 e8 e1 fe ff ff 83 c4 04
>>EIP; c014c9ae <proc_delete_inode+32/48> <=====
Trace; c01473be <iput+ba/16c>
Trace; c014dbbd <proc_pid_make_inode+ad/b8>
Trace; c014e1ae <proc_pid_lookup+17a/1e0>
Trace; c014cd19 <proc_root_lookup+39/48>
Trace; c013c78a <real_lookup+7a/120>
Trace; c013cc29 <path_walk+28d/8a4>
Trace; c013d92e <open_namei+86/608>
Trace; c0144ab9 <dput+19/154>
Trace; c0131513 <filp_open+3b/5c>
Trace; c0131844 <sys_open+3c/f0>
Trace; c0106d2f <system_call+37/3c>
Trace; c010002b <startup_32+2b/cb>
Code; c014c9ae <proc_delete_inode+32/48>
00000000 <_EIP>:
Code; c014c9ae <proc_delete_inode+32/48> <=====
0: f0 ff 48 10 lock decl 0x10(%eax) <=====
Code; c014c9b2 <proc_delete_inode+36/48>
4: 8b 42 24 mov 0x24(%edx),%eax
Code; c014c9b5 <proc_delete_inode+39/48>
7: 80 48 14 08 orb $0x8,0x14(%eax)
Code; c014c9b9 <proc_delete_inode+3d/48>
b: 52 push %edx
Code; c014c9ba <proc_delete_inode+3e/48>
c: e8 e1 fe ff ff call fffffef2 <_EIP+0xfffffef2>
c014c8a0 <de_put+0/dc>
Code; c014c9bf <proc_delete_inode+43/48>
11: 83 c4 04 add $0x4,%esp
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/