From: Mark H. <ma...@os...> - 2004-05-19 16:25:48
|
On Tue, 2004-05-18 at 10:39, Jon Maloy wrote: > Hi Mark, > I haven't tried with 64 processes yet, but I will try to reproduce > and trouble-shoot this problem when I have time. Right now I am > spending some time on making the lock handling at port/socket level > more symmetric and easier to follow. It will have some > performance implications, but it will not have any major impact, > I think. > > I must admit that I am not familiar with Bugzilla. Is this the base > for the bug reporting/tracking system we already have for each > project, or is it something else ? The bug report system has only > been used sporadically, as you may have noticed, but I have no > problems with starting to use it more systematically; - I think > indeed we will have to if TIPC makes it into the kernel. > > /Jon > > Mark Haverkamp wrote: > > >I was running a modified tipc benchmark program that used 64 processes > >instead of 32. I also had my kernel compiled with page alloc debug > >turned on (memory allocations are unmapped when free to catch bad access > >as soon as possible). It was part way through the 16K size when the > >panic happened. It was on the server side. > > > >Any thoughts on using the sourceforge bugzilla to keep track of current > >bugs? > > > >Mark. > > > > > >[root@cl019 root]# > >Unable to handle kernel paging request at virtual address f1067fe4 > > printing eip: > >f8a8617e > >*pde = 00585067 [ ... ] > > After I Installed the latest tipc this morning I got another crash similar to the last except this time the pointer is NULL. Looking at the disassembly, it is calling buf_busy in tipc_recv_msg. I think at line 1624. [root@cl019 root]# Unable to handle kernel NULL pointer dereference at virtual address 00000008 printing eip: f8e43204 *pde = 00000000 Oops: 0000 [#1] SMP DEBUG_PAGEALLOC CPU: 0 EIP: 0060:[<f8e43204>] Not tainted EFLAGS: 00010246 (2.6.6-rc3) EIP is at tipc_recv_msg+0x174/0x8a0 [tipc] eax: 00000000 ebx: f650af50 ecx: 000091bc edx: f4903f50 esi: f650af94 edi: f3f24bf8 ebp: c04fbea0 esp: c04fbe48 ds: 007b es: 007b ss: 0068 Process swapper (pid: 0, threadinfo=c04fa000 task=c04621c0) Stack: f5b52bf8 00000000 f7fffe60 ee376000 0000005a 0000005a 00000246 f650af50 0000000c 000091bc 0000920b ef0f8e18 f475cf50 f48767f8 00000001 00000000 f743ba20 0000000b c04fbeb0 f8e6cdc0 f475cf50 c054f970 c04fbeb0 f8e61959 Call Trace: [<f8e61959>] recv_msg+0x39/0x50 [tipc] [<c0375e92>] netif_receive_skb+0x172/0x1b0 [<c0375f54>] process_backlog+0x84/0x120 [<c0376070>] net_rx_action+0x80/0x120 [<c0124c38>] __do_softirq+0xb8/0xc0 [<c0124c75>] do_softirq+0x35/0x40 [<c0107cf5>] do_IRQ+0x175/0x230 [<c0103040>] default_idle+0x0/0x40 [<c0105ce0>] common_interrupt+0x18/0x20 [<c0103040>] default_idle+0x0/0x40 [<c0103070>] default_idle+0x30/0x40 [<c0103106>] cpu_idle+0x46/0x50 [<c04fc9aa>] start_kernel+0x18a/0x1d0 [<c04fc520>] unknown_bootoption+0x0/0x130 -- Mark Haverkamp <ma...@os...> |