netdev
[Top] [All Lists]

2.6.12-rc6-mm1 OOPS in tcp_push_one()

To: linux-kernel@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx
Subject: 2.6.12-rc6-mm1 OOPS in tcp_push_one()
From: Valdis.Kletnieks@xxxxxx
Date: Thu, 09 Jun 2005 00:23:32 -0400
Sender: netdev-bounce@xxxxxxxxxxx
Am at home, running PPP over a modem.  I get a request to push a patch to a
Sourceforge project I have CVS commit access to.  So I do a 'export CVS_RSH=ssh'
and then do a 'cvs commit', and ker-blammo.

Very reproducible - this is about the 6th time in the past hour, always on
a cvs-over-ssh.  Oddly enough, if I trigger it while logged on one of the
virtual consoles, I can c-a-f2 to another console, login, and run dmesg
to capture the wreckage.  Doing it from an xterm window with the X server
running causes the system to lock up hard - I'm betting the oops dies with a
lock held, and the X server immediately hangs because it tries to do some
networking/socket stuff....

[17179956.772000] Unable to handle kernel paging request at virtual address 
a56b6b75
[17179956.776000]  printing eip:
[17179956.788000] c0307f4c
[17179956.792000] *pde = 00000000
[17179956.804000] Oops: 0000 [#1]
[17179956.804000] PREEMPT 
[17179956.804000] Modules linked in: ppp_deflate bsd_comp ppp_async crc_ccitt 
ppp_generic slhc tcp_bic orinoco_cs orinoco hermes pcmcia firmware_class 
ip_conntrack_ftp ipt_pkttype ipt_REJECT ipt_state ip_conntrack ipt_LOG 
ipt_limit ipt_u32 iptable_filter ip_tables ip6t_LOG ip6t_limit ip6table_filter 
ip6_tables thermal processor fan button battery ac i8k ohci1394 ieee1394 
yenta_socket rsrc_nonstatic pcmcia_core intel_agp agpgart floppy
[17179956.804000] CPU:    0
[17179956.804000] EIP:    0060:[<c0307f4c>]    Not tainted VLI
[17179956.804000] EFLAGS: 00010202   (2.6.12-rc6-mm1) 
[17179956.804000] EIP is at tcp_transmit_skb+0x568/0x62b
[17179956.804000] eax: a56b6b6b   ebx: 000004df   ecx: 00000000   edx: c64de048
[17179956.804000] esi: c1ff2b88   edi: 00000001   ebp: c1c29dd4   esp: c1c29da0
[17179956.804000] ds: 007b   es: 007b   ss: 0068
[17179956.804000] Process ssh (pid: 2981, threadinfo=c1c28000 task=c3126a60)
[17179956.804000] Stack: c64de048 c64de080 00000020 00000000 c1ff2b88 c64deb88 
c64debc0 c1c29dd4 
[17179956.804000]        c1fc71bc c64deb88 c1ff2b88 c64deb88 c64debc0 c1c29df4 
c0308f8c 000005a8 
[17179956.804000]        0001f742 00000001 c64deb88 c1ff2b88 000005a8 c1c29e5c 
c02ffba8 00000000 
[17179956.804000] Call Trace:
[17179956.804000]  [<c0103586>] show_stack+0x7a/0x83
[17179956.804000]  [<c01036d6>] show_registers+0x130/0x1a1
[17179956.804000]  [<c0103892>] die+0xd0/0x150
[17179956.804000]  [<c0111930>] do_page_fault+0x454/0x5e0
[17179956.804000]  [<c01031f3>] error_code+0x4f/0x54
[17179956.804000]  [<c0308f8c>] tcp_push_one+0xea/0x190
[17179956.804000]  [<c02ffba8>] tcp_sendmsg+0x71f/0x8f6
[17179956.804000]  [<c0319c14>] inet_sendmsg+0x3c/0x49
[17179956.804000]  [<c02de154>] sock_aio_write+0x117/0x124
[17179956.804000]  [<c014e47d>] do_sync_write+0x89/0xb9
[17179956.804000]  [<c014e56b>] vfs_write+0xbe/0x156
[17179956.804000]  [<c014e69e>] sys_write+0x3b/0x60
[17179956.804000]  [<c0102725>] syscall_call+0x7/0xb
[17179956.804000] Code: e0 04 8b 80 50 bb 4f c0 ff 40 2c 8b 8e d8 02 00 00 31 
d2 8b 45 cc ff 11 89 c7 85 c0 0f 8e c2 00 00 00 8b 55 cc 8b 82 a4 00 00 00 <0f> 
b7 58 0a 66 c7 86 1a 03 00 00 00 00 80 be 26 02 00 00 01 0f 
[17179956.804000]

This look familiar to anybody?

(On a related note, how did tcp_bic get loaded? I requested all the new
congestion stuff be built as modules, didn't specifically request any of
them to actually be loaded....

Attachment: pgp95ntlEMHAf.pgp
Description: PGP signature

<Prev in Thread] Current Thread [Next in Thread>