netdev
[Top] [All Lists]

Unable to handle kernel paging request at virtual address 04000460

To: <linux-net@xxxxxxxxxxxxxxx>, <netdev@xxxxxxxxxxx>, <linux@xxxxxxxxxxxxx>
Subject: Unable to handle kernel paging request at virtual address 04000460
From: <raghunathan.venkatesan@xxxxxxxxx>
Date: Wed, 1 Jun 2005 17:01:23 +0530
Sender: netdev-bounce@xxxxxxxxxxx
Thread-index: AcVgd+bKyjXc1BZZTzOXOhBhBJ2c9wAwfS0wAFOR2UABBPMC8A==
Thread-topic: Unable to handle kernel paging request at virtual address 04000460
Hi Everyone,
We are facing the following crash in custom Linux 2.4.26 kernel, when we
run a netperf TCP Stream (sizes varying from 64 to 32586 bytes) test
over an IPSEC tunnel created between a host and a VPN server through our
box. This is a Au1550 MIPS32 based board (DB1550 Cabernet board from
AMD). We observe that crash happens randomly (the PrId keeps changing at
each crash), because of burstiness in the netperf tool generated
traffic. Please look into the following capture below. I'd like some
help in debugging this issue. The same set of IPSEC drivers (not from
Linux) works fine on a custom Linux 2.4.25 based kernel. We debugged the
Oops traces and found that all problems arise in skbuff (donno where in
skbuff). Is there a patch that needs to be applied for Linux 2.4.26 ? 

Thanks & Regards,
Raghu Venkatesan
Project Manager (E & PE, Semiconductor & Access),
CDC2, Sozhanganallur,
Chennai - 600 119, INDIA
+91 -44-24500200 Ext. 2643
raghunathan.venkatesan@xxxxxxxxx
 

Attachment: recent.cap_send1.oops
Description: recent.cap_send1.oops

Attachment: recent.cap.oops
Description: recent.cap.oops

Attachment: recent.cap_recv.oops
Description: recent.cap_recv.oops

Attachment: recent.cap_send.oops
Description: recent.cap_send.oops

<Prev in Thread] Current Thread [Next in Thread>