FAQ Search Today's Posts Mark Forums Read
» Video Reviews

» Linux Archive

Linux-archive is a website aiming to archive linux email lists and to make them easily accessible for linux users/developers.


» Sponsor

» Partners

» Sponsor

Go Back   Linux Archive > Debian > Debian Kernel

 
 
LinkBack Thread Tools
 
Old 07-28-2010, 08:19 AM
Bastian Blank
 
Default Bug#590658: linux-image-2.6.26-2-686-bigmem: 2.6.26-2 bigmem nfs4 kerberos kernel panic

severity 590658 important
thanks

On Wed, Jul 28, 2010 at 09:42:13AM +0200, ulysse31 wrote:
Who?

> Package: linux-2.6
> Version: 2.6.26-24
> Severity: critical
> Justification: breaks the whole system

No, the kernel is the system.

> ** Tainted: P (1)
> * Proprietary module has been loaded.

This voids your warranty.

Bastian

--
Knowledge, sir, should be free to all!
-- Harry Mudd, "I, Mudd", stardate 4513.3



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 20100728081911.GA10450@wavehammer.waldi.eu.org">ht tp://lists.debian.org/20100728081911.GA10450@wavehammer.waldi.eu.org
 
Old 07-28-2010, 09:42 AM
Victor Gomes Do Vale
 
Default Bug#590658: linux-image-2.6.26-2-686-bigmem: 2.6.26-2 bigmem nfs4 kerberos kernel panic

Bastian Blank wrote:

severity 590658 important
thanks

On Wed, Jul 28, 2010 at 09:42:13AM +0200, ulysse31 wrote:
Who?



Package: linux-2.6
Version: 2.6.26-24
Severity: critical
Justification: breaks the whole system



No, the kernel is the system.



** Tainted: P (1)
* Proprietary module has been loaded.



This voids your warranty.


The only modules that "taints" the kernel is the nvidia.ko which is no
really linked to what we have on the stack ..., and i tried to boot
without it in vesa mode, the problem subsist ...
If you want I can create a new bug report, without the "taint", but it
won't change the fact that the bug exist ...



Bastian




ulysse31




--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 4C4FFB6F.9030802@cellectis.com">http://lists.debian.org/4C4FFB6F.9030802@cellectis.com
 
Old 07-29-2010, 01:09 AM
Ben Hutchings
 
Default Bug#590658: linux-image-2.6.26-2-686-bigmem: 2.6.26-2 bigmem nfs4 kerberos kernel panic

On Wed, 2010-07-28 at 09:42 +0200, ulysse31 wrote:
[...]
> kernel:[63659.784275] invalid opcode: 0000 [#1] SMP
[...]
> kernel:[63659.784275] [<c017b969>] kmem_cache_alloc+0x47/0x87
[...]
> kernel:[63659.784275] Code: 8b 75 00 39 ee 75 15 8b 75 10 8d 45 10 c7 45 34 01 00 00 00 39 c6 0f 84 a5 00 00 00 8b 4c 24 0c 8b 81 98 00 00 00 39
[...]

Although the code dump is incomplete, I was able to find a match. This
byte sequence appears only in cache_alloc_refill(). There is a ud2a
instruction a few bytes further on which appears to correspond to this
assertion:

/*
* The slab was either on partial or free list so
* there must be at least one object available for
* allocation.
*/
BUG_ON(slabp->inuse < 0 || slabp->inuse >= cachep->num);

This means that the free list has been corrupted in some way. I don't
see any references to a bug in the NFS client that might do that -
though, just because the corruption is found when the NFS client is
active, doesn't mean it caused the corruption.

Before we investigate the software any further, please check the RAM on
the affected machine, e.g. using memtest86+.

Ben.

--
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.
 
Old 07-30-2010, 11:23 AM
Victor Gomes Do Vale
 
Default Bug#590658: linux-image-2.6.26-2-686-bigmem: 2.6.26-2 bigmem nfs4 kerberos kernel panic

Ben Hutchings wrote:

On Wed, 2010-07-28 at 09:42 +0200, ulysse31 wrote:
[...]


kernel:[63659.784275] invalid opcode: 0000 [#1] SMP


[...]


kernel:[63659.784275] [<c017b969>] kmem_cache_alloc+0x47/0x87


[...]

kernel:[63659.784275] Code: 8b 75 00 39 ee 75 15 8b 75 10 8d 45 10 c7 45 34 01 00 00 00 39 c6 0f 84 a5 00 00 00 8b 4c 24 0c 8b 81 98 00 00 00 39


[...]

Although the code dump is incomplete, I was able to find a match. This
byte sequence appears only in cache_alloc_refill(). There is a ud2a
instruction a few bytes further on which appears to correspond to this
assertion:

/*
* The slab was either on partial or free list so
* there must be at least one object available for
* allocation.
*/
BUG_ON(slabp->inuse < 0 || slabp->inuse >= cachep->num);

This means that the free list has been corrupted in some way. I don't
see any references to a bug in the NFS client that might do that -
though, just because the corruption is found when the NFS client is
active, doesn't mean it caused the corruption.

Before we investigate the software any further, please check the RAM on
the affected machine, e.g. using memtest86+.

Ben.



Hi again,

Well, I tested the memory with memtest86, it gave me nothing (2 pass clear).
I booted and set the X with vesa mode and nvidia unloaded yesterday, the
machine was dead this morning.

Do you have other ideas ?
Thanks again for you time.





--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 4C52B640.7060300@cellectis.com">http://lists.debian.org/4C52B640.7060300@cellectis.com
 
Old 08-01-2010, 06:50 PM
Ben Hutchings
 
Default Bug#590658: linux-image-2.6.26-2-686-bigmem: 2.6.26-2 bigmem nfs4 kerberos kernel panic

On Fri, 2010-07-30 at 13:23 +0200, Victor Gomes Do Vale wrote:
[...]
> Well, I tested the memory with memtest86, it gave me nothing (2 pass clear).
> I booted and set the X with vesa mode and nvidia unloaded yesterday, the
> machine was dead this morning.
> Do you have other ideas ?

Please test the linux-image-2.6.32-5-686-bigmem package from the
'unstable' suite.

Ben.

--
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.
 

Thread Tools




All times are GMT. The time now is 04:50 AM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.
Copyright 2007 - 2008, www.linux-archive.org