[OpenAFS-devel] Panics with 2.4.17/x86 SMP

Daniel Jacobowitz dmj+afs@andrew.cmu.edu
Fri, 18 Jan 2002 15:39:43 -0500


Running a self-compiled kernel with no interesting patches, I get crashes
and hung processes when I try to look around in AFS.  Interestingly, I
didn't when I did this without authenticating first.

The oopses I got look like they're off in a lock in the kernel, except for
the last one, which is in openafs.mp.  Any suggestions?




ksymoops 2.4.3 on i686 2.4.17drow.  Options used
     -v /usr/src/kernel/2.4.17/kernel-source-2.4.17/vmlinux (specified)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.17drow/ (default)
     -m /boot/System.map-2.4.17drow (default)

invalid operand: 0000
CPU:    1
EIP:    0010:[<c0145d01>]    Tainted: PF
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 5a5a5a00   ebx: ee6979a0   ecx: ee5b3d80   edx: ee6979d0
esi: ee5b3d80   edi: f768bde0   ebp: ee6979a0   esp: f7663f18
ds: 0018   es: 0018   ss: 0018
Process devfsd (pid: 26, stackpage=f7663000)
Stack: f1ddc2c0 c017094e ee6979a0 ee5b3d80 ee6979a0 00000000 f7663fa4 f768f540 
       c013d58e ee6979a0 00000000 f7663f74 c013dd51 f768f540 f7663f74 00000000 
       f75d0000 00000000 f7663fa4 00000009 00000009 f75d0005 00000000 f75d0004 
Call Trace: [<c017094e>] [<c013d58e>] [<c013dd51>] [<c013dfca>] [<c013e441>] 
   [<c013b18d>] [<c01347b4>] [<c0106f7b>] 
Code: 0f 0b f0 fe 0d 80 e6 37 c0 0f 88 a4 82 16 00 85 c9 74 12 8b 

>>EIP; c0145d00 <d_instantiate+10/44>   <=====
Trace; c017094e <devfs_d_revalidate_wait+8e/b8>
Trace; c013d58e <cached_lookup+2e/54>
Trace; c013dd50 <link_path_walk+580/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b18c <sys_stat64+18/70>
Trace; c01347b4 <sys_read+bc/c4>
Trace; c0106f7a <system_call+32/38>
Code;  c0145d00 <d_instantiate+10/44>
00000000 <_EIP>:
Code;  c0145d00 <d_instantiate+10/44>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c0145d02 <d_instantiate+12/44>
   2:   f0 fe 0d 80 e6 37 c0      lock decb 0xc037e680
Code;  c0145d08 <d_instantiate+18/44>
   9:   0f 88 a4 82 16 00         js     1682b3 <_EIP+0x1682b3> c02adfb2 <stext_lock+2c0a/9590>
Code;  c0145d0e <d_instantiate+1e/44>
   f:   85 c9                     test   %ecx,%ecx
Code;  c0145d10 <d_instantiate+20/44>
  11:   74 12                     je     25 <_EIP+0x25> c0145d24 <d_instantiate+34/44>
Code;  c0145d12 <d_instantiate+22/44>
  13:   8b 00                     mov    (%eax),%eax

invalid operand: 0000
CPU:    0
EIP:    0010:[<c0145d01>]    Tainted: PF
EFLAGS: 00210287
eax: 5a5a5a00   ebx: d7344640   ecx: c66be260   edx: d7344670
esi: c66be260   edi: f768bde0   ebp: d7344640   esp: c33cbf18
ds: 0018   es: 0018   ss: 0018
Process devfsd (pid: 32519, stackpage=c33cb000)
Stack: f1ddc3c0 c017094e d7344640 c66be260 d7344640 00000000 c33cbfa4 f768f540 
       c013d58e d7344640 00000000 c33cbf74 c013dd51 f768f540 c33cbf74 00000000 
       c2d15000 00000000 c33cbfa4 00000009 00000009 c2d15006 00000000 c2d15004 
Call Trace: [<c017094e>] [<c013d58e>] [<c013dd51>] [<c013dfca>] [<c013e441>] 
   [<c013b18d>] [<c01347b4>] [<c0106f7b>] 
Code: 0f 0b f0 fe 0d 80 e6 37 c0 0f 88 a4 82 16 00 85 c9 74 12 8b 

>>EIP; c0145d00 <d_instantiate+10/44>   <=====
Trace; c017094e <devfs_d_revalidate_wait+8e/b8>
Trace; c013d58e <cached_lookup+2e/54>
Trace; c013dd50 <link_path_walk+580/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b18c <sys_stat64+18/70>
Trace; c01347b4 <sys_read+bc/c4>
Trace; c0106f7a <system_call+32/38>
Code;  c0145d00 <d_instantiate+10/44>
00000000 <_EIP>:
Code;  c0145d00 <d_instantiate+10/44>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c0145d02 <d_instantiate+12/44>
   2:   f0 fe 0d 80 e6 37 c0      lock decb 0xc037e680
Code;  c0145d08 <d_instantiate+18/44>
   9:   0f 88 a4 82 16 00         js     1682b3 <_EIP+0x1682b3> c02adfb2 <stext_lock+2c0a/9590>
Code;  c0145d0e <d_instantiate+1e/44>
   f:   85 c9                     test   %ecx,%ecx
Code;  c0145d10 <d_instantiate+20/44>
  11:   74 12                     je     25 <_EIP+0x25> c0145d24 <d_instantiate+34/44>
Code;  c0145d12 <d_instantiate+22/44>
  13:   8b 00                     mov    (%eax),%eax

invalid operand: 0000
CPU:    0
EIP:    0010:[<c0145d01>]    Tainted: PF
EFLAGS: 00210202
eax: 5a5a5a00   ebx: d4cc51c0   ecx: dcebc0a0   edx: d4cc51f0
esi: dcebc0a0   edi: f768bde0   ebp: d4cc51c0   esp: c7ae5f18
ds: 0018   es: 0018   ss: 0018
Process devfsd (pid: 12281, stackpage=c7ae5000)
Stack: cc4675c0 c017094e d4cc51c0 dcebc0a0 d4cc51c0 00000000 c7ae5fa4 f768f540 
       c013d58e d4cc51c0 00000000 c7ae5f74 c013dd51 f768f540 c7ae5f74 00000000 
       c991f000 00000000 c7ae5fa4 00000009 00000009 c991f006 00000000 c991f004 
Call Trace: [<c017094e>] [<c013d58e>] [<c013dd51>] [<c013dfca>] [<c013e441>] 
   [<c013b18d>] [<c01347b4>] [<c0106f7b>] 
Code: 0f 0b f0 fe 0d 80 e6 37 c0 0f 88 a4 82 16 00 85 c9 74 12 8b 

>>EIP; c0145d00 <d_instantiate+10/44>   <=====
Trace; c017094e <devfs_d_revalidate_wait+8e/b8>
Trace; c013d58e <cached_lookup+2e/54>
Trace; c013dd50 <link_path_walk+580/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b18c <sys_stat64+18/70>
Trace; c01347b4 <sys_read+bc/c4>
Trace; c0106f7a <system_call+32/38>
Code;  c0145d00 <d_instantiate+10/44>
00000000 <_EIP>:
Code;  c0145d00 <d_instantiate+10/44>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c0145d02 <d_instantiate+12/44>
   2:   f0 fe 0d 80 e6 37 c0      lock decb 0xc037e680
Code;  c0145d08 <d_instantiate+18/44>
   9:   0f 88 a4 82 16 00         js     1682b3 <_EIP+0x1682b3> c02adfb2 <stext_lock+2c0a/9590>
Code;  c0145d0e <d_instantiate+1e/44>
   f:   85 c9                     test   %ecx,%ecx
Code;  c0145d10 <d_instantiate+20/44>
  11:   74 12                     je     25 <_EIP+0x25> c0145d24 <d_instantiate+34/44>
Code;  c0145d12 <d_instantiate+22/44>
  13:   8b 00                     mov    (%eax),%eax

Unable to handle kernel paging request at virtual address ffffffff
f9c10675
*pde = 00003063
Oops: 0002
CPU:    1
EIP:    0010:[<f9c10675>]    Tainted: PF
EFLAGS: 00210282
eax: 00000018   ebx: db968620   ecx: ffffffff   edx: 00000002
esi: f2145ca0   edi: f2145d10   ebp: fffffffb   esp: e44adcd0
ds: 0018   es: 0018   ss: 0018
Process ls (pid: 17008, stackpage=e44ad000)
Stack: f9c3512c 00021592 00000000 00000000 f2145ca0 f2145d10 00000000 f9c19d47 
       f9c3512c 00021592 00000000 00000000 e44aded4 e44adec8 c2064c2c fb62b7a0 
       00000000 00000000 00000000 f9c3db40 fb62b7a0 00000000 e44aded4 f9bf92bc 
Call Trace: [<f9c3512c>] [<f9c19d47>] [<f9c3512c>] [<f9c3db40>] [<f9bf92bc>] 
   [<f9bf258e>] [<f9beb4dc>] [<f9bf4b8b>] [<f9bf4c3d>] [<f9c3db40>] [<f9bedd4e>] 
   [<f9c19693>] [<f9c1d214>] [<c013d62e>] [<c013da16>] [<c013dfca>] [<c013e441>] 
   [<c013b1fd>] [<c0106f7b>] 
Code: c6 05 ff ff ff ff 2a 83 c4 10 83 c4 0c c3 90 55 57 56 53 8b 

>>EIP; f9c10674 <[openafs.mp]osi_Panic+24/34>   <=====
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c19d46 <[openafs.mp]osi_UFSOpen+172/1e0>
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9bf92bc <[openafs.mp]afs_UFSHandleLink+80/110>
Trace; f9bf258e <[openafs.mp]EvalMountPoint+42/3b4>
Trace; f9beb4dc <[openafs.mp]afs_GetVCache+390/4ec>
Trace; f9bf4b8a <[openafs.mp]afs_lookup+9da/ea4>
Trace; f9bf4c3c <[openafs.mp]afs_lookup+a8c/ea4>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9bedd4e <[openafs.mp]afs_access+15e/270>
Trace; f9c19692 <[openafs.mp]crref+a/68>
Trace; f9c1d214 <[openafs.mp]afs_linux_lookup+6c/194>
Trace; c013d62e <real_lookup+7a/108>
Trace; c013da16 <link_path_walk+246/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b1fc <sys_lstat64+18/70>
Trace; c0106f7a <system_call+32/38>
Code;  f9c10674 <[openafs.mp]osi_Panic+24/34>
00000000 <_EIP>:
Code;  f9c10674 <[openafs.mp]osi_Panic+24/34>   <=====
   0:   c6 05 ff ff ff ff 2a      movb   $0x2a,0xffffffff   <=====
Code;  f9c1067a <[openafs.mp]osi_Panic+2a/34>
   7:   83 c4 10                  add    $0x10,%esp
Code;  f9c1067e <[openafs.mp]osi_Panic+2e/34>
   a:   83 c4 0c                  add    $0xc,%esp
Code;  f9c10680 <[openafs.mp]osi_Panic+30/34>
   d:   c3                        ret    
Code;  f9c10682 <[openafs.mp]osi_Panic+32/34>
   e:   90                        nop    
Code;  f9c10682 <[openafs.mp]osi_Panic+32/34>
   f:   55                        push   %ebp
Code;  f9c10684 <[openafs.mp]osi_utoa+0/ac>
  10:   57                        push   %edi
Code;  f9c10684 <[openafs.mp]osi_utoa+0/ac>
  11:   56                        push   %esi
Code;  f9c10686 <[openafs.mp]osi_utoa+2/ac>
  12:   53                        push   %ebx
Code;  f9c10686 <[openafs.mp]osi_utoa+2/ac>
  13:   8b 00                     mov    (%eax),%eax

Unable to handle kernel paging request at virtual address ffffffff
f9c10675
*pde = 00003063
Oops: 0002
CPU:    1
EIP:    0010:[<f9c10675>]    Tainted: PF
EFLAGS: 00210282
eax: 00000018   ebx: c00477c0   ecx: ffffffff   edx: 00000002
esi: eb5464e0   edi: eb546550   ebp: fffffffb   esp: e6a29cd0
ds: 0018   es: 0018   ss: 0018
Process ls (pid: 17532, stackpage=e6a29000)
Stack: f9c3512c 000214db 00000000 00000000 eb5464e0 eb546550 00000000 f9c19d47 
       f9c3512c 000214db 00000000 00000000 e6a29ed4 e6a29ec8 c20604b0 fb62b998 
       c20fc0dc fb62f0b8 0000a000 f9c3db40 fb62b998 00000000 e6a29ed4 f9bf92bc 
Call Trace: [<f9c3512c>] [<f9c19d47>] [<f9c3512c>] [<f9c3db40>] [<f9bf92bc>] 
   [<f9bf258e>] [<f9bf4b8b>] [<f9bf4c3d>] [<f9c3db40>] [<f9c19693>] [<f9c1d214>] 
   [<c013d62e>] [<c013dd67>] [<c013dfca>] [<c013e441>] [<c013b1fd>] [<c0106f7b>] 
Code: c6 05 ff ff ff ff 2a 83 c4 10 83 c4 0c c3 90 55 57 56 53 8b 

>>EIP; f9c10674 <[openafs.mp]osi_Panic+24/34>   <=====
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c19d46 <[openafs.mp]osi_UFSOpen+172/1e0>
Trace; f9c3512c <[openafs.mp]rcsid+1cc/2a0>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9bf92bc <[openafs.mp]afs_UFSHandleLink+80/110>
Trace; f9bf258e <[openafs.mp]EvalMountPoint+42/3b4>
Trace; f9bf4b8a <[openafs.mp]afs_lookup+9da/ea4>
Trace; f9bf4c3c <[openafs.mp]afs_lookup+a8c/ea4>
Trace; f9c3db40 <[openafs.mp]afs_global_lock+0/14>
Trace; f9c19692 <[openafs.mp]crref+a/68>
Trace; f9c1d214 <[openafs.mp]afs_linux_lookup+6c/194>
Trace; c013d62e <real_lookup+7a/108>
Trace; c013dd66 <link_path_walk+596/7e0>
Trace; c013dfca <path_walk+1a/1c>
Trace; c013e440 <__user_walk+34/50>
Trace; c013b1fc <sys_lstat64+18/70>
Trace; c0106f7a <system_call+32/38>
Code;  f9c10674 <[openafs.mp]osi_Panic+24/34>
00000000 <_EIP>:
Code;  f9c10674 <[openafs.mp]osi_Panic+24/34>   <=====
   0:   c6 05 ff ff ff ff 2a      movb   $0x2a,0xffffffff   <=====
Code;  f9c1067a <[openafs.mp]osi_Panic+2a/34>
   7:   83 c4 10                  add    $0x10,%esp
Code;  f9c1067e <[openafs.mp]osi_Panic+2e/34>
   a:   83 c4 0c                  add    $0xc,%esp
Code;  f9c10680 <[openafs.mp]osi_Panic+30/34>
   d:   c3                        ret    
Code;  f9c10682 <[openafs.mp]osi_Panic+32/34>
   e:   90                        nop    
Code;  f9c10682 <[openafs.mp]osi_Panic+32/34>
   f:   55                        push   %ebp
Code;  f9c10684 <[openafs.mp]osi_utoa+0/ac>
  10:   57                        push   %edi
Code;  f9c10684 <[openafs.mp]osi_utoa+0/ac>
  11:   56                        push   %esi
Code;  f9c10686 <[openafs.mp]osi_utoa+2/ac>
  12:   53                        push   %ebx
Code;  f9c10686 <[openafs.mp]osi_utoa+2/ac>
  13:   8b 00                     mov    (%eax),%eax



-- 
Daniel Jacobowitz                           Carnegie Mellon University
MontaVista Software                         Debian GNU/Linux Developer