RE: OOPS report and ksymoops output kswapd

David Lewis (dlewis@vnxsolutions.com)
Mon, 19 May 2003 11:06:59 -0400


Here is another one from the same machine. The process in this one is kswapd
and the eip is different, although to me it appears related to the first
one.

May 19 04:05:36 nicebox kernel: Unable to handle kernel paging request at
virtual address 2022272c
May 19 04:05:36 nicebox kernel: c013670c
May 19 04:05:36 nicebox kernel: *pde = 00000000
May 19 04:05:36 nicebox kernel: Oops: 0002
May 19 04:05:36 nicebox kernel: CPU: 0
May 19 04:05:36 nicebox kernel: EIP: 0010:[<c013670c>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
May 19 04:05:36 nicebox kernel: EFLAGS: 00210046
May 19 04:05:36 nicebox kernel: eax: 20222728 ebx: d6e20000 ecx:
00000000 edx: c8657000
May 19 04:05:36 nicebox kernel: esi: c157735c edi: c157735c ebp:
00000000 esp: df6d5ed8
May 19 04:05:36 nicebox kernel: ds: 0018 es: 0018 ss: 0018
May 19 04:05:36 nicebox kernel: Process kswapd (pid: 5, stackpage=df6d5000)
May 19 04:05:36 nicebox kernel: Stack: 0000000d c1574fc4 c01359b2 c157735c
d6e20080 c1574e00 00200296 d6e08108
May 19 04:05:36 nicebox kernel: c0135a94 c157735c c1574f00 0000003e
c3d1c100 c3d1c100 df6d5f48 c0156330
May 19 04:05:36 nicebox kernel: c157735c c3d1c100 c3d1c100 c0156c54
c3d1c100 00000018 ffffff00 c307e980
May 19 04:05:36 nicebox kernel: Call Trace: [<c01359b2>] [<c0135a94>]
[<c0156330>] [<c0156c54>] [<c0156ee2>]
May 19 04:05:36 nicebox kernel: [<c0156f94>] [<c01370b3>] [<c0137106>]
[<c013721c>] [<c0137298>] [<c01373cd>]
May 19 04:05:36 nicebox kernel: [<c0105000>] [<c01058ce>] [<c0137330>]
May 19 04:05:36 nicebox kernel: Code: 89 50 04 8b 46 08 8d 56 08 89 58 04 89
03 89 53 04 89 5e 08

>>EIP; c013670c <kmem_cache_free_one+6c/a5> <=====

>>eax; 20222728 Before first symbol
>>ebx; d6e20000 <_end+16ab9aa8/1fea4b08>
>>edx; c8657000 <_end+82f0aa8/1fea4b08>
>>esi; c157735c <_end+1210e04/1fea4b08>
>>edi; c157735c <_end+1210e04/1fea4b08>
>>esp; df6d5ed8 <_end+1f36f980/1fea4b08>

Trace; c01359b2 <free_block+32/50>
Trace; c0135a94 <kmem_cache_free+64/90>
Trace; c0156330 <destroy_inode+30/40>
Trace; c0156c54 <dispose_list+44/80>
Trace; c0156ee2 <prune_icache+82/110>
Trace; c0156f94 <shrink_icache_memory+24/40>
Trace; c01370b3 <shrink_caches+83/a0>
Trace; c0137106 <try_to_free_pages_zone+36/50>
Trace; c013721c <kswapd_balance_pgdat+5c/b0>
Trace; c0137298 <kswapd_balance+28/40>
Trace; c01373cd <kswapd+9d/c0>
Trace; c0105000 <_stext+0/0>
Trace; c01058ce <kernel_thread+2e/40>
Trace; c0137330 <kswapd+0/c0>

Code; c013670c <kmem_cache_free_one+6c/a5>
00000000 <_EIP>:
Code; c013670c <kmem_cache_free_one+6c/a5> <=====
0: 89 50 04 mov %edx,0x4(%eax) <=====
Code; c013670f <kmem_cache_free_one+6f/a5>
3: 8b 46 08 mov 0x8(%esi),%eax
Code; c0136712 <kmem_cache_free_one+72/a5>
6: 8d 56 08 lea 0x8(%esi),%edx
Code; c0136715 <kmem_cache_free_one+75/a5>
9: 89 58 04 mov %ebx,0x4(%eax)
Code; c0136718 <kmem_cache_free_one+78/a5>
c: 89 03 mov %eax,(%ebx)
Code; c013671a <kmem_cache_free_one+7a/a5>
e: 89 53 04 mov %edx,0x4(%ebx)
Code; c013671d <kmem_cache_free_one+7d/a5>
11: 89 5e 08 mov %ebx,0x8(%esi)

1 warning issued. Results may not be reliable.

David Lewis
Senior Security Engineer
VNX Solutions, Inc <http://www.vnxsolutions.com>
dlewis@vnxsolutions.com <mailto:dlewis@vnxsolutions.com>
410-459-7428 Cell

-----Original Message-----
From: linux-kernel-owner@vger.kernel.org
[mailto:linux-kernel-owner@vger.kernel.org]On Behalf Of David Lewis
Sent: Sunday, May 18, 2003 7:35 PM
To: linux-kernel@vger.kernel.org
Subject: OOPS report and ksymoops output

Greetings,

I am having trouble tracking down the source of the following oops. I am
having trouble on various machines with various hardware configs. Some are
dual p3 with a via chipset, dual xeon with e7500, and i845GL with P4 3.06
with Hyperthreading enabled. The kernel is a stock 2.4.20 with SMP enabled.
All of the platforms are using a Falcon quattro video capture board, which
uses the bttv driver. This is being compiled as a module and is version
0.7.96. This particular oops is from the 845GL, p4 3.06HT, 512 ddr dram,
2x200Gb HD, 1G swap (2 partitions of 512 each).

I dont have any non-smp hardware available to try to recreate this on (until
a few days from now) so I cant say if it only happens with SMP or not. Below
is the OOPS and the ksymoops output. In this example, it was process ffnext
that caused the oops, but normally it seems to be kswapd that is the
offender. If there is any additionaly info I can provide, or if I am posting
to the wrong place, please let me know! I am anxious to get this resolved
and hopefully I can make a contribution to the linux kernel community in the
process.

May 18 16:16:10 nicebox kernel: Unable to handle kernel paging request at
virtual address 8d8f929b

May 18 16:16:10 nicebox kernel: printing eip:

May 18 16:16:10 nicebox kernel: c013593c

May 18 16:16:10 nicebox kernel: *pde = 00000000

May 18 16:16:10 nicebox kernel: Oops: 0002

May 18 16:16:10 nicebox kernel: CPU: 1

May 18 16:16:10 nicebox kernel: EIP: 0010:[<c013593c>] Not tainted

May 18 16:16:10 nicebox kernel: EFLAGS: 00210056

May 18 16:16:10 nicebox kernel: eax: c1573088 ebx: cf586980 ecx: cf586000
edx: 8d8f9297

May 18 16:16:10 nicebox kernel: esi: 00000000 edi: 0000007d ebp: c1573080
esp: d7003ec8

May 18 16:16:10 nicebox kernel: ds: 0018 es: 0018 ss: 0018

May 18 16:16:10 nicebox kernel: Process ffnext (pid: 32389,
stackpage=d7003000)

May 18 16:16:10 nicebox kernel: Stack: c1573088 c1573090 c1573080 00200246
000001f0 d1828700 c01365bb c1573080

May 18 16:16:11 nicebox kernel: df6d7400 000001f0 db368b00 dbb7a900 d1828700
d1828700 c01555b6 c1573080

May 18 16:16:11 nicebox kernel: 000001f0 d7003f8c fffffff4 dbb7a900 d1828700
d7003f8c c014b9ad d1828700

May 18 16:16:11 nicebox kernel: Call Trace: [<c01365bb>] [<c01555b6>]
[<c014b9ad>] [<c014bef1>] [<c013e263>]

May 18 16:16:11 nicebox kernel: [<c013e663>] [<c010770f>]

May 18 16:16:11 nicebox kernel:

May 18 16:16:11 nicebox kernel: Code: 89 42 04 8b 45 00 89 48 04 89 01 89 69
04 89 4d 00 eb b1 8b

And now the report from ksymoops:

>>EIP; c013593c <kmem_cache_alloc_batch+9c/e0> <=====

>>eax; c1573088 <_end+120cb30/1fea4b08>
>>ebx; cf586980 <_end+f220428/1fea4b08>
>>ecx; cf586000 <_end+f21faa8/1fea4b08>
>>edx; 8d8f9297 Before first symbol
>>ebp; c1573080 <_end+120cb28/1fea4b08>
>>esp; d7003ec8 <_end+16c9d970/1fea4b08>

Trace; c01365bb <__kmem_cache_alloc+5b/140>
Trace; c01555b6 <d_alloc+156/190>
Trace; c014b9ad <lookup_hash+8d/120>
Trace; c014bef1 <open_namei+281/590>
Trace; c013e263 <filp_open+43/70>
Trace; c013e663 <sys_open+53/c0>
Trace; c010770f <system_call+33/38>

Code; c013593c <kmem_cache_alloc_batch+9c/e0>
00000000 <_EIP>:
Code; c013593c <kmem_cache_alloc_batch+9c/e0> <=====
0: 89 42 04 mov %eax,0x4(%edx) <=====
Code; c013593f <kmem_cache_alloc_batch+9f/e0>
3: 8b 45 00 mov 0x0(%ebp),%eax
Code; c0135942 <kmem_cache_alloc_batch+a2/e0>
6: 89 48 04 mov %ecx,0x4(%eax)
Code; c0135945 <kmem_cache_alloc_batch+a5/e0>
9: 89 01 mov %eax,(%ecx)
Code; c0135947 <kmem_cache_alloc_batch+a7/e0>
b: 89 69 04 mov %ebp,0x4(%ecx)
Code; c013594a <kmem_cache_alloc_batch+aa/e0>
e: 89 4d 00 mov %ecx,0x0(%ebp)
Code; c013594d <kmem_cache_alloc_batch+ad/e0>
11: eb b1 jmp ffffffc4 <_EIP+0xffffffc4>
Code; c013594f <kmem_cache_alloc_batch+af/e0>
13: 8b 00 mov (%eax),%eax

David Lewis
Senior Security Engineer
VNX Solutions, Inc
dlewis@vnxsolutions.com
410-459-7428 Cell

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/