Darn - I got an oops running Netpipe (a tcp test)
This is with the Alexey patch to 2.4.2 to fix the
ip_fragment.c oopses and the DaveM 2.4.2 zerocopy patches.
I'm going to back out the davem patch.
Bob
ksymoops 0.7c on i686 2.4.2-zerocopy. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.2-zerocopy/ (default)
-m /usr/src/linux/System.map (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Warning (compare_maps): mismatch on symbol __module_author , gm says d088df40,
sbin/gm says d088fbe0. Ignoring sbin/gm entry
Warning (compare_maps): mismatch on symbol __module_description , gm says
d088df5f, sbin/gm says d088fbff. Ignoring sbin/gm entry
Warning (compare_maps): mismatch on symbol __module_parm_gm_net_copy_threshold
, gm says d088dfc5, sbin/gm says d088fc65. Ignoring sbin/gm entry
Warning (compare_maps): mismatch on symbol __module_parm_gmip_hw_checksum , gm
says d088dfad, sbin/gm says d088fc4d. Ignoring sbin/gm entry
Unable to handle kernel NULL pointer dereference at virtual address 0000000d
c0211bc4
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0211bc4>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 00000000 ebx: c8591308 ecx: 00000000 edx: 00000283
esi: 29655d0d edi: 2965596b ebp: c8591308 esp: c8679e00
ds: 0018 es: 0018 ss: 0018
Process NPtcp.intel_lin (pid: 1064, stackpage=c8679000)
Stack: c8591308 29655d0d 2965596b c809bc20 c9f3bacc c02168b7 c8591160 c9f3baa0
00000001 c0211f3e c8591160 c809bc20 c8591308 2965596b 29655d0d c9f3bd20
c8591234 c8591160 c8678000 c8591160 c8678000 c8591308 c0211fda c8591160
Call Trace: [<c02168b7>] [<c0211f3e>] [<c0211fda>] [<c021217f>] [<c0212d37>]
[<c021a0c4>] [<c021a5
[<c020346f>] [<c02037da>] [<c01fae0e>] [<c01193aa>] [<c01090c1>]
[<c010002b>]
Code: f6 40 0d 03 75 40 8b 75 78 8b 1d d4 5d 2b c0 85 db 7f 0a f7
>>EIP; c0211bc4 <tcp_collapse+68/35c> <=====
Trace; c02168b7 <tcp_send_ack+c3/cc>
Trace; c0211f3e <tcp_collapse_ofo_queue+86/9c>
Trace; c0211fda <tcp_prune_queue+86/184>
Trace; c021217f <tcp_data+a7/120>
Trace; c0212d37 <tcp_rcv_established+6f3/7dc>
Trace; c021a0c4 <tcp_v4_do_rcv+38/120>
Trace; c020346f <ip_local_deliver+eb/164>
Trace; c02037da <ip_rcv+2f2/368>
Trace; c01fae0e <net_rx_action+17e/278>
Trace; c01193aa <do_softirq+5a/88>
Trace; c01090c1 <handle_softirq+5/8>
Trace; c010002b <startup_32+2b/cb>
Code; c0211bc4 <tcp_collapse+68/35c>
00000000 <_EIP>:
Code; c0211bc4 <tcp_collapse+68/35c> <=====
0: f6 40 0d 03 testb $0x3,0xd(%eax) <=====
Code; c0211bc8 <tcp_collapse+6c/35c>
4: 75 40 jne 46 <_EIP+0x46> c0211c0a
<tcp_collapse+ae/35c>
Code; c0211bca <tcp_collapse+6e/35c>
6: 8b 75 78 mov 0x78(%ebp),%esi
Code; c0211bcd <tcp_collapse+71/35c>
9: 8b 1d d4 5d 2b c0 mov 0xc02b5dd4,%ebx
Code; c0211bd3 <tcp_collapse+77/35c>
f: 85 db test %ebx,%ebx
Code; c0211bd5 <tcp_collapse+79/35c>
11: 7f 0a jg 1d <_EIP+0x1d> c0211be1
<tcp_collapse+85/35c>
Code; c0211bd7 <tcp_collapse+7b/35c>
13: f7 00 00 00 00 00 testl $0x0,(%eax)
Kernel panic: Aiee, killing interrupt handler!
5 warnings issued. Results may not be reliable.
|