[OpenAFS-devel] Panics with 2.4.17/x86 SMP
Daniel Jacobowitz
dmj+afs@andrew.cmu.edu
Fri, 18 Jan 2002 15:39:43 -0500
Running a self-compiled kernel with no interesting patches, I get crashes
and hung processes when I try to look around in AFS. Interestingly, I
didn't when I did this without authenticating first.
The oopses I got look like they're off in a lock in the kernel, except for
the last one, which is in openafs.mp. Any suggestions?
ksymoops 2.4.3 on i686 2.4.17drow. Options used
-v /usr/src/kernel/2.4.17/kernel-source-2.4.17/vmlinux (specified)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.17drow/ (default)
-m /boot/System.map-2.4.17drow (default)
invalid operand: 0000
CPU: 1
EIP: 0010:[<c0145d01>] Tainted: PF
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 5a5a5a00 ebx: ee6979a0 ecx: ee5b3d80 edx: ee6979d0
esi: ee5b3d80 edi: f768bde0 ebp: ee6979a0 esp: f7663f18
ds: 0018 es: 0018 ss: 0018
Process devfsd (pid: 26, stackpage=f7663000)
Stack: f1ddc2c0 c017094e ee6979a0 ee5b3d80 ee6979a0 00000000 f7663fa4 f768f540
c013d58e ee6979a0 00000000 f7663f74 c013dd51 f768f540 f7663f74 00000000
f75d0000 00000000 f7663fa4 00000009 00000009 f75d0005 00000000 f75d0004
Call Trace: [<c017094e>] [<c013d58e>] [<c013dd51>] [<c013dfca>] [<c013e441>]
[<c013b18d>] [<c01347b4>] [<c0106f7b>]
Code: 0f 0b f0 fe 0d 80 e6 37 c0 0f 88 a4 82 16 00 85 c9 74 12 8b
>>EIP; c0145d00 <d_instantiate+10/44> <=====
Trace; c017094e <devfs_d_revalidate_wait+8e/b8>
Trace; c013d58e <cached_lookup+2e/54>
Trace; c013dd50 <link_path_walk+580/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b18c <sys_stat64+18/70>
Trace; c01347b4 <sys_read+bc/c4>
Trace; c0106f7a <system_call+32/38>
Code; c0145d00 <d_instantiate+10/44>
00000000 <_EIP>:
Code; c0145d00 <d_instantiate+10/44> <=====
0: 0f 0b ud2a <=====
Code; c0145d02 <d_instantiate+12/44>
2: f0 fe 0d 80 e6 37 c0 lock decb 0xc037e680
Code; c0145d08 <d_instantiate+18/44>
9: 0f 88 a4 82 16 00 js 1682b3 <_EIP+0x1682b3> c02adfb2 <stext_lock+2c0a/9590>
Code; c0145d0e <d_instantiate+1e/44>
f: 85 c9 test %ecx,%ecx
Code; c0145d10 <d_instantiate+20/44>
11: 74 12 je 25 <_EIP+0x25> c0145d24 <d_instantiate+34/44>
Code; c0145d12 <d_instantiate+22/44>
13: 8b 00 mov (%eax),%eax
invalid operand: 0000
CPU: 0
EIP: 0010:[<c0145d01>] Tainted: PF
EFLAGS: 00210287
eax: 5a5a5a00 ebx: d7344640 ecx: c66be260 edx: d7344670
esi: c66be260 edi: f768bde0 ebp: d7344640 esp: c33cbf18
ds: 0018 es: 0018 ss: 0018
Process devfsd (pid: 32519, stackpage=c33cb000)
Stack: f1ddc3c0 c017094e d7344640 c66be260 d7344640 00000000 c33cbfa4 f768f540
c013d58e d7344640 00000000 c33cbf74 c013dd51 f768f540 c33cbf74 00000000
c2d15000 00000000 c33cbfa4 00000009 00000009 c2d15006 00000000 c2d15004
Call Trace: [<c017094e>] [<c013d58e>] [<c013dd51>] [<c013dfca>] [<c013e441>]
[<c013b18d>] [<c01347b4>] [<c0106f7b>]
Code: 0f 0b f0 fe 0d 80 e6 37 c0 0f 88 a4 82 16 00 85 c9 74 12 8b
>>EIP; c0145d00 <d_instantiate+10/44> <=====
Trace; c017094e <devfs_d_revalidate_wait+8e/b8>
Trace; c013d58e <cached_lookup+2e/54>
Trace; c013dd50 <link_path_walk+580/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b18c <sys_stat64+18/70>
Trace; c01347b4 <sys_read+bc/c4>
Trace; c0106f7a <system_call+32/38>
Code; c0145d00 <d_instantiate+10/44>
00000000 <_EIP>:
Code; c0145d00 <d_instantiate+10/44> <=====
0: 0f 0b ud2a <=====
Code; c0145d02 <d_instantiate+12/44>
2: f0 fe 0d 80 e6 37 c0 lock decb 0xc037e680
Code; c0145d08 <d_instantiate+18/44>
9: 0f 88 a4 82 16 00 js 1682b3 <_EIP+0x1682b3> c02adfb2 <stext_lock+2c0a/9590>
Code; c0145d0e <d_instantiate+1e/44>
f: 85 c9 test %ecx,%ecx
Code; c0145d10 <d_instantiate+20/44>
11: 74 12 je 25 <_EIP+0x25> c0145d24 <d_instantiate+34/44>
Code; c0145d12 <d_instantiate+22/44>
13: 8b 00 mov (%eax),%eax
invalid operand: 0000
CPU: 0
EIP: 0010:[<c0145d01>] Tainted: PF
EFLAGS: 00210202
eax: 5a5a5a00 ebx: d4cc51c0 ecx: dcebc0a0 edx: d4cc51f0
esi: dcebc0a0 edi: f768bde0 ebp: d4cc51c0 esp: c7ae5f18
ds: 0018 es: 0018 ss: 0018
Process devfsd (pid: 12281, stackpage=c7ae5000)
Stack: cc4675c0 c017094e d4cc51c0 dcebc0a0 d4cc51c0 00000000 c7ae5fa4 f768f540
c013d58e d4cc51c0 00000000 c7ae5f74 c013dd51 f768f540 c7ae5f74 00000000
c991f000 00000000 c7ae5fa4 00000009 00000009 c991f006 00000000 c991f004
Call Trace: [<c017094e>] [<c013d58e>] [<c013dd51>] [<c013dfca>] [<c013e441>]
[<c013b18d>] [<c01347b4>] [<c0106f7b>]
Code: 0f 0b f0 fe 0d 80 e6 37 c0 0f 88 a4 82 16 00 85 c9 74 12 8b
>>EIP; c0145d00 <d_instantiate+10/44> <=====
Trace; c017094e <devfs_d_revalidate_wait+8e/b8>
Trace; c013d58e <cached_lookup+2e/54>
Trace; c013dd50 <link_path_walk+580/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b18c <sys_stat64+18/70>
Trace; c01347b4 <sys_read+bc/c4>
Trace; c0106f7a <system_call+32/38>
Code; c0145d00 <d_instantiate+10/44>
00000000 <_EIP>:
Code; c0145d00 <d_instantiate+10/44> <=====
0: 0f 0b ud2a <=====
Code; c0145d02 <d_instantiate+12/44>
2: f0 fe 0d 80 e6 37 c0 lock decb 0xc037e680
Code; c0145d08 <d_instantiate+18/44>
9: 0f 88 a4 82 16 00 js 1682b3 <_EIP+0x1682b3> c02adfb2 <stext_lock+2c0a/9590>
Code; c0145d0e <d_instantiate+1e/44>
f: 85 c9 test %ecx,%ecx
Code; c0145d10 <d_instantiate+20/44>
11: 74 12 je 25 <_EIP+0x25> c0145d24 <d_instantiate+34/44>
Code; c0145d12 <d_instantiate+22/44>
13: 8b 00 mov (%eax),%eax
Unable to handle kernel paging request at virtual address ffffffff
f9c10675
*pde = 00003063
Oops: 0002
CPU: 1
EIP: 0010:[<f9c10675>] Tainted: PF
EFLAGS: 00210282
eax: 00000018 ebx: db968620 ecx: ffffffff edx: 00000002
esi: f2145ca0 edi: f2145d10 ebp: fffffffb esp: e44adcd0
ds: 0018 es: 0018 ss: 0018
Process ls (pid: 17008, stackpage=e44ad000)
Stack: f9c3512c 00021592 00000000 00000000 f2145ca0 f2145d10 00000000 f9c19d47
f9c3512c 00021592 00000000 00000000 e44aded4 e44adec8 c2064c2c fb62b7a0
00000000 00000000 00000000 f9c3db40 fb62b7a0 00000000 e44aded4 f9bf92bc
Call Trace: [<f9c3512c>] [<f9c19d47>] [<f9c3512c>] [<f9c3db40>] [<f9bf92bc>]
[<f9bf258e>] [<f9beb4dc>] [<f9bf4b8b>] [<f9bf4c3d>] [<f9c3db40>] [<f9bedd4e>]
[<f9c19693>] [<f9c1d214>] [<c013d62e>] [<c013da16>] [<c013dfca>] [<c013e441>]
[<c013b1fd>] [<c0106f7b>]
Code: c6 05 ff ff ff ff 2a 83 c4 10 83 c4 0c c3 90 55 57 56 53 8b
>>EIP; f9c10674 <[openafs.mp]osi_Panic+24/34> <=====
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c19d46 <[openafs.mp]osi_UFSOpen+172/1e0>
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9bf92bc <[openafs.mp]afs_UFSHandleLink+80/110>
Trace; f9bf258e <[openafs.mp]EvalMountPoint+42/3b4>
Trace; f9beb4dc <[openafs.mp]afs_GetVCache+390/4ec>
Trace; f9bf4b8a <[openafs.mp]afs_lookup+9da/ea4>
Trace; f9bf4c3c <[openafs.mp]afs_lookup+a8c/ea4>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9bedd4e <[openafs.mp]afs_access+15e/270>
Trace; f9c19692 <[openafs.mp]crref+a/68>
Trace; f9c1d214 <[openafs.mp]afs_linux_lookup+6c/194>
Trace; c013d62e <real_lookup+7a/108>
Trace; c013da16 <link_path_walk+246/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b1fc <sys_lstat64+18/70>
Trace; c0106f7a <system_call+32/38>
Code; f9c10674 <[openafs.mp]osi_Panic+24/34>
00000000 <_EIP>:
Code; f9c10674 <[openafs.mp]osi_Panic+24/34> <=====
0: c6 05 ff ff ff ff 2a movb $0x2a,0xffffffff <=====
Code; f9c1067a <[openafs.mp]osi_Panic+2a/34>
7: 83 c4 10 add $0x10,%esp
Code; f9c1067e <[openafs.mp]osi_Panic+2e/34>
a: 83 c4 0c add $0xc,%esp
Code; f9c10680 <[openafs.mp]osi_Panic+30/34>
d: c3 ret
Code; f9c10682 <[openafs.mp]osi_Panic+32/34>
e: 90 nop
Code; f9c10682 <[openafs.mp]osi_Panic+32/34>
f: 55 push %ebp
Code; f9c10684 <[openafs.mp]osi_utoa+0/ac>
10: 57 push %edi
Code; f9c10684 <[openafs.mp]osi_utoa+0/ac>
11: 56 push %esi
Code; f9c10686 <[openafs.mp]osi_utoa+2/ac>
12: 53 push %ebx
Code; f9c10686 <[openafs.mp]osi_utoa+2/ac>
13: 8b 00 mov (%eax),%eax
Unable to handle kernel paging request at virtual address ffffffff
f9c10675
*pde = 00003063
Oops: 0002
CPU: 1
EIP: 0010:[<f9c10675>] Tainted: PF
EFLAGS: 00210282
eax: 00000018 ebx: c00477c0 ecx: ffffffff edx: 00000002
esi: eb5464e0 edi: eb546550 ebp: fffffffb esp: e6a29cd0
ds: 0018 es: 0018 ss: 0018
Process ls (pid: 17532, stackpage=e6a29000)
Stack: f9c3512c 000214db 00000000 00000000 eb5464e0 eb546550 00000000 f9c19d47
f9c3512c 000214db 00000000 00000000 e6a29ed4 e6a29ec8 c20604b0 fb62b998
c20fc0dc fb62f0b8 0000a000 f9c3db40 fb62b998 00000000 e6a29ed4 f9bf92bc
Call Trace: [<f9c3512c>] [<f9c19d47>] [<f9c3512c>] [<f9c3db40>] [<f9bf92bc>]
[<f9bf258e>] [<f9bf4b8b>] [<f9bf4c3d>] [<f9c3db40>] [<f9c19693>] [<f9c1d214>]
[<c013d62e>] [<c013dd67>] [<c013dfca>] [<c013e441>] [<c013b1fd>] [<c0106f7b>]
Code: c6 05 ff ff ff ff 2a 83 c4 10 83 c4 0c c3 90 55 57 56 53 8b
>>EIP; f9c10674 <[openafs.mp]osi_Panic+24/34> <=====
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c19d46 <[openafs.mp]osi_UFSOpen+172/1e0>
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9bf92bc <[openafs.mp]afs_UFSHandleLink+80/110>
Trace; f9bf258e <[openafs.mp]EvalMountPoint+42/3b4>
Trace; f9bf4b8a <[openafs.mp]afs_lookup+9da/ea4>
Trace; f9bf4c3c <[openafs.mp]afs_lookup+a8c/ea4>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9c19692 <[openafs.mp]crref+a/68>
Trace; f9c1d214 <[openafs.mp]afs_linux_lookup+6c/194>
Trace; c013d62e <real_lookup+7a/108>
Trace; c013dd66 <link_path_walk+596/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b1fc <sys_lstat64+18/70>
Trace; c0106f7a <system_call+32/38>
Code; f9c10674 <[openafs.mp]osi_Panic+24/34>
00000000 <_EIP>:
Code; f9c10674 <[openafs.mp]osi_Panic+24/34> <=====
0: c6 05 ff ff ff ff 2a movb $0x2a,0xffffffff <=====
Code; f9c1067a <[openafs.mp]osi_Panic+2a/34>
7: 83 c4 10 add $0x10,%esp
Code; f9c1067e <[openafs.mp]osi_Panic+2e/34>
a: 83 c4 0c add $0xc,%esp
Code; f9c10680 <[openafs.mp]osi_Panic+30/34>
d: c3 ret
Code; f9c10682 <[openafs.mp]osi_Panic+32/34>
e: 90 nop
Code; f9c10682 <[openafs.mp]osi_Panic+32/34>
f: 55 push %ebp
Code; f9c10684 <[openafs.mp]osi_utoa+0/ac>
10: 57 push %edi
Code; f9c10684 <[openafs.mp]osi_utoa+0/ac>
11: 56 push %esi
Code; f9c10686 <[openafs.mp]osi_utoa+2/ac>
12: 53 push %ebx
Code; f9c10686 <[openafs.mp]osi_utoa+2/ac>
13: 8b 00 mov (%eax),%eax
--
Daniel Jacobowitz Carnegie Mellon University
MontaVista Software Debian GNU/Linux Developer