kernel bug page_alloc.c 2.4.18-14

kernel bug page_alloc.c 2.4.18-14

Post by j.. » Wed, 12 Mar 2003 20:40:14



This dual CPU system will stay up for a few days, and then it starts reporting these
errors to the console, shortly after these messages start appearing it will lock up.
Below is the output from dmesg. Below that is my system info. Is there a patch for
this? This is the standard redhat 8.0 kernel (2.4.18-14smp).

Thanks,

-Jeff Moss
j...@americom.com

 ------------[ cut here ]------------
kernel BUG at page_alloc.c:125!
invalid operand: 0000
ipt_MASQUERADE ipt_state iptable_filter ip_nat_ftp iptable_nat ip_tables ip_co
CPU:    1
EIP:    0010:[<c0140b5e>]    Not tainted
EFLAGS: 00010286

EIP is at __free_pages_ok [kernel] 0x2e (2.4.18-14smp)
eax: 0200080c   ebx: c1dcb478   ecx: c1dcb478   edx: 00000000
esi: f2100e60   edi: 080fd000   ebp: 00000000   esp: c6fb1ed0
ds: 0018   es: 0018   ss: 0018
Process sshd2 (pid: 8073, stackpage=c6fb1000)
Stack: c03338e0 080f6000 0000008a c53a23e8 c013416c e502c520 d94fa9e0 401cd39c
       edfea734 0000008b 00000073 0000008b 080fd000 0000008b c01321a2 c1dcb478
       e615e080 08048000 000b5000 08448000 c03d85c0 0000008b 080fd000 e615e084
Call Trace: [<c013416c>] zap_pte_range [kernel] 0x1ec (0xc6fb1ee0))
[<c01321a2>] do_zap_page_range [kernel] 0x152 (0xc6fb1f08))
[<c01326a8>] zap_page_range [kernel] 0x58 (0xc6fb1f40))
[<c0135af2>] exit_mmap [kernel] 0xe2 (0xc6fb1f64))
[<c011f3f1>] mmput [kernel] 0x51 (0xc6fb1f8c))
[<c0124b9f>] do_exit [kernel] 0xdf (0xc6fb1f9c))
[<c0124e13>] sys_exit [kernel] 0x13 (0xc6fb1fb8))
[<c0109437>] system_call [kernel] 0x33 (0xc6fb1fc0))

Code: 0f 0b 7d 00 39 bc 27 c0 8b 53 08 85 d2 0f 85 c2 02 00 00 8b
 ------------[ cut here ]------------
kernel BUG at page_alloc.c:125!
invalid operand: 0000
ipt_MASQUERADE ipt_state iptable_filter ip_nat_ftp iptable_nat ip_tables ip_co
CPU:    1
EIP:    0010:[<c0140b5e>]    Not tainted
EFLAGS: 00010286

EIP is at __free_pages_ok [kernel] 0x2e (2.4.18-14smp)
eax: 0200080c   ebx: c1dcb478   ecx: c1dcb478   edx: 00000000
esi: f2100e60   edi: 080fd000   ebp: 00000000   esp: c4679ed0
ds: 0018   es: 0018   ss: 0018
Process sshd2 (pid: 9309, stackpage=c4679000)
Stack: c03338e0 080f6000 0000008a c639c3e8 c013416c c4b311c0 ed45ad20 401cd39c
       f0c47734 0000008b 00000073 0000008b 080fd000 0000008b c01321a2 c1dcb478
       e4b86080 08048000 000b5000 08448000 c03d85c0 0000008b 080fd000 e4b86084
Call Trace: [<c013416c>] zap_pte_range [kernel] 0x1ec (0xc4679ee0))
[<c01321a2>] do_zap_page_range [kernel] 0x152 (0xc4679f08))
[<c01326a8>] zap_page_range [kernel] 0x58 (0xc4679f40))
[<c0135af2>] exit_mmap [kernel] 0xe2 (0xc4679f64))
[<c011f3f1>] mmput [kernel] 0x51 (0xc4679f8c))
[<c0124b9f>] do_exit [kernel] 0xdf (0xc4679f9c))
[<c0124e13>] sys_exit [kernel] 0x13 (0xc4679fb8))
[<c0109437>] system_call [kernel] 0x33 (0xc4679fc0))

Code: 0f 0b 7d 00 39 bc 27 c0 8b 53 08 85 d2 0f 85 c2 02 00 00 8b
 ------------[ cut here ]------------
kernel BUG at page_alloc.c:125!
invalid operand: 0000
ipt_MASQUERADE ipt_state iptable_filter ip_nat_ftp iptable_nat ip_tables ip_co
CPU:    0
EIP:    0010:[<c0140b5e>]    Not tainted
EFLAGS: 00010286

EIP is at __free_pages_ok [kernel] 0x2e (2.4.18-14smp)
eax: 0200080c   ebx: c1dcb478   ecx: c1dcb478   edx: 00000000
esi: f2100e60   edi: 080fd000   ebp: 00000000   esp: dd31ded0
ds: 0018   es: 0018   ss: 0018
Process sshd2 (pid: 10175, stackpage=dd31d000)
Stack: c03338e0 080f6000 0000008a da68e3e8 c013416c c77eb5e0 d42b3f80 401cd39c
       ec299734 0000008b 00000073 0000008b 080fd000 0000008b c01321a2 c1dcb478
       ea863080 08048000 000b5000 08448000 c03d7dc0 0000008b 080fd000 ea863084
Call Trace: [<c013416c>] zap_pte_range [kernel] 0x1ec (0xdd31dee0))
[<c01321a2>] do_zap_page_range [kernel] 0x152 (0xdd31df08))
[<c01326a8>] zap_page_range [kernel] 0x58 (0xdd31df40))
[<c0135af2>] exit_mmap [kernel] 0xe2 (0xdd31df64))
[<c011f3f1>] mmput [kernel] 0x51 (0xdd31df8c))
[<c0124b9f>] do_exit [kernel] 0xdf (0xdd31df9c))
[<c0124e13>] sys_exit [kernel] 0x13 (0xdd31dfb8))
[<c0109437>] system_call [kernel] 0x33 (0xdd31dfc0))

Code: 0f 0b 7d 00 39 bc 27 c0 8b 53 08 85 d2 0f 85 c2 02 00 00 8b
 ------------[ cut here ]------------
kernel BUG at page_alloc.c:125!
invalid operand: 0000
ipt_MASQUERADE ipt_state iptable_filter ip_nat_ftp iptable_nat ip_tables ip_co
CPU:    0
EIP:    0010:[<c0140b5e>]    Not tainted
EFLAGS: 00010286

EIP is at __free_pages_ok [kernel] 0x2e (2.4.18-14smp)
eax: 0200080c   ebx: c1dcb478   ecx: c1dcb478   edx: 00000000
esi: f2100e60   edi: 080fd000   ebp: 00000000   esp: f58dbed0
ds: 0018   es: 0018   ss: 0018
Process sshd2 (pid: 10272, stackpage=f58db000)
Stack: c03338e0 080f6000 0000008a eebe03e8 c013416c c34a4088 c01b40fc c34a4088
       c361d1a0 0000008b 00000073 0000008b 080fd000 0000008b c01321a2 c1dcb478
       ecb97080 08048000 000b5000 08448000 c03d7dc0 0000008b 080fd000 ecb97084
Call Trace: [<c013416c>] zap_pte_range [kernel] 0x1ec (0xf58dbee0))
[<c01b40fc>] account_io_end [kernel] 0x2c (0xf58dbee8))
[<c01321a2>] do_zap_page_range [kernel] 0x152 (0xf58dbf08))
[<c01326a8>] zap_page_range [kernel] 0x58 (0xf58dbf40))
[<c0135af2>] exit_mmap [kernel] 0xe2 (0xf58dbf64))
[<c011f3f1>] mmput [kernel] 0x51 (0xf58dbf8c))
[<c0124b9f>] do_exit [kernel] 0xdf (0xf58dbf9c))
[<c0124e13>] sys_exit [kernel] 0x13 (0xf58dbfb8))
[<c0109437>] system_call [kernel] 0x33 (0xf58dbfc0))

Code: 0f 0b 7d 00 39 bc 27 c0 8b 53 08 85 d2 0f 85 c2 02 00 00 8b
 ------------[ cut here ]------------
kernel BUG at page_alloc.c:125!
invalid operand: 0000
ipt_MASQUERADE ipt_state iptable_filter ip_nat_ftp iptable_nat ip_tables ip_co
CPU:    0
EIP:    0010:[<c0140b5e>]    Not tainted
EFLAGS: 00010286

EIP is at __free_pages_ok [kernel] 0x2e (2.4.18-14smp)
eax: 0200080c   ebx: c1dcb478   ecx: c1dcb478   edx: 00000000
esi: f2100e60   edi: 080fd000   ebp: 00000000   esp: f58dbed0
ds: 0018   es: 0018   ss: 0018
Process sshd2 (pid: 10282, stackpage=f58db000)
Stack: c03338e0 080f6000 0000008a efdd03e8 c013416c f00dd480 f3a271e0 401cd39c
       f0521734 0000008b 00000073 0000008b 080fd000 0000008b c01321a2 c1dcb478
       c3f20080 08048000 000b5000 08448000 c03d7dc0 0000008b 080fd000 c3f20084
Call Trace: [<c013416c>] zap_pte_range [kernel] 0x1ec (0xf58dbee0))
[<c01321a2>] do_zap_page_range [kernel] 0x152 (0xf58dbf08))
[<c01326a8>] zap_page_range [kernel] 0x58 (0xf58dbf40))
[<c0135af2>] exit_mmap [kernel] 0xe2 (0xf58dbf64))
[<c011f3f1>] mmput [kernel] 0x51 (0xf58dbf8c))
[<c0124b9f>] do_exit [kernel] 0xdf (0xf58dbf9c))
[<c0124e13>] sys_exit [kernel] 0x13 (0xf58dbfb8))
[<c0109437>] system_call [kernel] 0x33 (0xf58dbfc0))

Code: 0f 0b 7d 00 39 bc 27 c0 8b 53 08 85 d2 0f 85 c2 02 00 00 8b

SYSTEM INFO

00:00.0 Host bridge: VIA Technologies, Inc. VT82C691 [Apollo PRO] (rev c4)
        Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap+ 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort+

>SERR- <PERR-

        Latency: 8
        Region 0: Memory at d0000000 (32-bit, prefetchable) [size=64M]
        Capabilities: <available only to root>

00:01.0 PCI bridge: VIA Technologies, Inc. VT82C598/694x [Apollo MVP3/Pro133x AGP]
(prog-if 00 [Normal decode])
        Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap+ 66Mhz+ UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort+

>SERR- <PERR-

        Latency: 0
        Bus: primary=00, secondary=01, subordinate=01, sec-latency=0
        I/O behind bridge: 0000f000-00000fff
        Memory behind bridge: d6000000-d7ffffff
        Prefetchable memory behind bridge: d4000000-d5ffffff
        BridgeCtl: Parity- SERR- NoISA+ VGA+ MAbort- >Reset- FastB2B-
        Capabilities: <available only to root>

00:07.0 ISA bridge: VIA Technologies, Inc. VT82C596 ISA [Mobile South] (rev 23)
        Subsystem: VIA Technologies, Inc. VT82C596/A/B PCI to ISA Bridge
        Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping+ SERR-
FastB2B-
        Status: Cap- 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort-

>SERR- <PERR-

        Latency: 0

00:07.1 IDE interface: VIA Technologies, Inc. Bus Master IDE (rev 10) (prog-if 8a
[Master SecP PriP])
        Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap+ 66Mhz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort-

>SERR- <PERR-

        Latency: 32
        Region 4: I/O ports at c000 [size=16]
        Capabilities: <available only to root>

00:07.2 USB Controller: VIA Technologies, Inc. UHCI USB (rev 11) (prog-if 00 [UHCI])
        Subsystem: Unknown device 0925:1234
        Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap+ 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort-

>SERR- <PERR-

        Latency: 32, cache line size 08
        Interrupt: pin D routed to IRQ 12
        Region 4: I/O ports at c400 [size=32]
        Capabilities: <available only to root>

00:07.3 Bridge: VIA Technologies, Inc. VT82C596 Power Management (rev 30)
        Control: I/O- Mem- BusMaster- SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap- 66Mhz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort-

>SERR- <PERR-

00:08.0 Ethernet controller: Lite-On Communications Inc LNE100TX (rev 20)
        Subsystem: Netgear FA310TX
        Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap- 66Mhz- UDF- FastB2B+ ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort-
>SERR- <PERR-

        Latency: 32
        Interrupt: pin A routed to IRQ 11
        Region 0: I/O ports at c800 [size=256]
        Region 1: Memory at d9000000 (32-bit, non-prefetchable) [size=256]
        Expansion ROM at <unassigned> [disabled] [size=256K]

00:0a.0 Ethernet controller: 3Com Corporation 3c900 Combo [Boomerang]
        Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR-
FastB2B-
        Status: Cap- 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort-

>SERR- <PERR-

        Latency: 32 (750ns min, 2000ns max)
        Interrupt: pin A routed to IRQ 10
        Region 0: I/O ports at cc00 [size=64]
        Expansion ROM at <unassigned>
...

read more »

 
 
 

kernel bug page_alloc.c 2.4.18-14

Post by jjs » Wed, 12 Mar 2003 21:10:06



>This dual CPU system will stay up for a few days, and then it starts reporting these
>errors to the console, shortly after these messages start appearing it will lock up.
>Below is the output from dmesg. Below that is my system info. Is there a patch for
>this? This is the standard redhat 8.0 kernel (2.4.18-14smp).

You really should get your system up-to-date.

There have been a number of updates to the
redhat kernel since the original release.

Best Regards,

Joe

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in

More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

 
 
 

kernel bug page_alloc.c 2.4.18-14

Post by Alan Co » Wed, 12 Mar 2003 21:10:09



> This dual CPU system will stay up for a few days, and then it starts reporting these
> errors to the console, shortly after these messages start appearing it will lock up.
> Below is the output from dmesg. Below that is my system info. Is there a patch for
> this? This is the standard redhat 8.0 kernel (2.4.18-14smp).
>From the trace its hard to tell, its random corruption by the look of

it. Could be hw or sw. The best place to file bugs on Red Hat kernels
is http://bugzilla.redhat.com. There is a newer kernel update but I
don't know if it fixes anything you might be hitting from the info
given.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in

More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/