xfs
[Top] [All Lists]

Re: Another XFS crash

To: Andi Kleen <ak@xxxxxxx>
Subject: Re: Another XFS crash
From: Rajagopal Ananthanarayanan <ananth@xxxxxxx>
Date: Fri, 31 Mar 2000 08:46:02 -0800
Cc: linux-xfs@xxxxxxxxxxx
References: <200003311518.JAA28479@xxxxxxxxxxxxxxxxxxxxxxxx>
Sender: owner-linux-xfs@xxxxxxxxxxx
Jim Mostek wrote:
>
>
        [ ... how to extract debug info ... ]

One small but important addition. Current kdb
code does not trace through "error_code" correctly,
although the stack frame right below it is the
most important one ... especially as in the
following backtrace. One way around this is
to pick the "ebp" at a higher stack frame and
do an "mds". In the example below, I would
pick the ebp for do_page_fault() ... which happens
to be 0xc5f3fb84. So do:

kdb> mds 0xc5f3fb84

Do mds a few more times (without arguments mds
continues at where it left off) so that we
get a symbolic dump of what's on stack. We
need info till we hit a known stack frame, in
the following, that would be till you see
generic_buffer_fdatasync+0x1c

We'll look into changing kdb to do this
backtrace automatically.

regards,

ananth.

> 
> >
> >
> >My XFS machine just crashed again:
> >
> >Unable to handle kernel paging request at virtual address dead4ead
> >*pde = 00000000
> >Entering kdb (0xc5f3e000) on processor 1 Panic: Oops
> >due to panic @ 0xc012f96f
> >eax = 0x00000000  ebx = 0x00012fff  ecx = 0xc0352784  edx = 0x00000000
> >esi = 0x00000000  edi = 0xdead4ead  esp = 0xc0352784  eip = 0xc012f96f
> >ebp = 0xc5f3fbdc   ss = 0x00012fff   cs = 0x00000010  eflags = 0x00010246
> > ds = 0x00000018   es = 0x00000018  origeax = 0xffffffff  &regs = 0xc5f3fb94
> >[1E]nktdebri>n g kdb (0xc786c000) on processor 0 due to NonMaskable 
> >Interrupt @ 0xc012ab7a
> >eax = 0xffffffff  ebx = 0x377efe82  ecx = 0xc0349200  edx = 0x00000000
> >esi = 0xc0159b50  edi = 0xc1463ce0  esp = 0xc0349200  eip = 0xc012ab7a
> >ebp = 0xc786df24   ss = 0x00000000   cs = 0x00000010  eflags = 0x00000297
> > ds = 0xc0110018   es = 0xc0340018  origeax = 0xffffffff  &regs = 0xc786dee8
> >[0]kdb>
> >[0]kdb>
> >[0]kdb> bt
> >    EBP       EIP         Function(args)
> >0xc786df24 0xc012ab7a  _spin_lock_+0x32( 0xc0349200)
> >0xc786df60 0xc0159b51  do_select+0x115( 0x1, 0xc786dfa4, 0xc786dfa0)
> >0xc786dfbc 0xc015a10b  sys_select+0x34f( 0x1, 0xbffffccc, 0x0, 0x0, 0x0)
> >0xbffffd4c 0xc010bd68  system_call
> >[0]kdb> cpu 1
> >Entering kdb (0xc5f3e000) on processor 1 due to cpu switch
> >[1]kdb> bt
> >    EBP       EIP         Function(args)
> >0xc5f3f928 0xc0242346  get_kbd_char+0x6( )
> >0xc5f3f93c 0xc02424d2  kdba_read+0x2e( 0xc5f3f998, 0xff)
> >0xc5f3f94c 0xc019af40  kdb_read+0x10( 0xc5f3f998, 0xff, 0xc02733d9, 0x1)
> >0xc5f3f96c 0xc019af6a  kdb_getstr+0x26( 0xc5f3f998, 0xff, 0xc02733d9, 
> >0xc02735e4)
> >0xc5f3fa98 0xc0199330  kdb+0x498( 0x4, 0x0, 0xc5f3fb94)
> >0xc5f3faac 0xc0243063  kdba_callback_die+0x1b( 0xc5f3fb94, 0x0, 0xffffffff, 
> >0xc025113e)
> >0xc5f3fad0 0xc010c466  die+0x86( 0xc025113e, 0xc5f3fb94, 0x0, 0xc5f3e000, 
> >0x0)
> >0xc5f3fb84 0xc0117c3c  do_page_fault+0x3ac( 0xc5f3fb94, 0x0, 0x12fff, 
> >0xc0352784, 0x0)
> >0xc5f3fbdc 0xc010bebd  error_code+0x2d( 0xc7102000, 0x0, 0x12fff, 0xc012f888)
> >0xc5f3fc00 0xc012faf4  generic_buffer_fdatasync+0x1c( 0xc7102000, 0x0, 
> >0x12fff)
> >0xc5f3fc20 0xc0143a32  pagebuf_flushinval+0x2a( 0xc7102000, 0x0, 0x0, 
> >0x12fff, 0x0)
> >0xc5f3fc40 0xc88d797f  fs_flushinval_pages+0x23( 0xc7103820, 0x0, 0x0, 
> >0x12fff, 0x0)
> >0xc5f3fc70 0xc88d4115  xfs_reclaim+0x151( 0xc7103820, 0x0, 0xc1464ec8)
> >0xc5f3fc90 0xc88de68c  vn_unhash+0x118( 0xc14e1d58, 0x0)
> >0xc5f3fcc8 0xc88deb85  vn_alloc+0x2e1( 0xc0a2a540, 0x2, 0x0)
> >0xc5f3fd20 0xc88b4fde  xfs_iget+0x1fe( 0xc094f000, 0x0, 0x171196, 0x0, 0x0)
> >0xc5f3fd68 0xc88cbd36  xfs_dir_lookup_int+0x136( 0x0, 0xc71032f0, 0x5, 
> >0xc5058800, 0xc5f3ff30)
> >0xc5f3fdc8 0xc88d0489  xfs_lookup+0x9d( 0xc71032f0, 0xc5058800, 0xc5f3fe00, 
> >0xc5f3ff30, 0x0)
> >0xc5f3ff3c 0xc88d8473  linvfs_lookup+0x7b( 0xc4b6b5a0, 0xc50587a0)
> >0xc5f3ff5c 0xc0154f60  real_lookup+0xa0( 0xc5058820, 0xc5f3ff7c, 0x0)
> >0xc5f3ff88 0xc01551d8  lookup_dentry+0x134( 0xc5c88003, 0xc5058820, 0x0)
> >0xc5f3ffa4 0xc01553ad  __namei+0x29( 0x8055a59, 0x0, 0xc5f3e000, 0xbffff8a4)
> >[1]more>
> >0xc5f3ffbc 0xc0150cf8  sys_newlstat+0x6c( 0x8055a59, 0xbffff7fc, 0x8055a59, 
> >0xbffff8a4, 0x8055a59)
> >0xbffff83c 0xc010bd68  system_call
> >[1]kdb>
> >

<Prev in Thread] Current Thread [Next in Thread>