GPF: kernel 2.0.35 in tcp_recvmsg

Daniel Ryde (ryde@tripnet.se)
Tue, 10 Nov 1998 11:31:16 +0100 (CET)


I don't know if this has been fixed in the recent pre patches, Alan? (Its
a running production systen so I can't play too much with pre paches on
them). From time to time I get these ops from the webservers:

general protection: 0000
CPU: 0
EIP: 0010:[<00144fb8>]
EFLAGS: 00010213
eax: f000e987 ebx: 00000000 ecx: 03a53c30 edx: f000f84d
esi: 03a53ccc edi: 0000019f ebp: 03a53c0c esp: 031c3ee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process apache (pid: 13205, process nr: 61, stackpage=031c3000)
Stack: 03a53c0c 031c3f7c 00000000 00000000 1050a715 03a53c30 00000000 0000019f
0288d810 00ab9f48 00519dc3 0014fca6 03a53c0c 031c3f78 00000e61 00000000
00000000 031c3f7c 00001000 00ab9f00 080874b4 00ab9f90 00135d3f 00ab9f90
Call Trace: [<0014fca6>] [<00135d3f>] [<00122ae0>] [<0010a705>] [<0018d2b8>]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87

>>EIP: 144fb8 <tcp_recvmsg+170/40c>
Trace: 14fca6 <inet_recvmsg+72/88>
Trace: 135d3f <sock_read+ab/c0>
Trace: 122ae0 <sys_read+c0/e8>
Trace: 10a705 <system_call+55/80>
Trace: 18d2b8 <vortex_open+698/6f0>

Code: 144fb8 <tcp_recvmsg+170/40c>
Code: 144fb8 <tcp_recvmsg+170/40c> 8a 40 0d movb 0xd(%eax),%al
Code: 144fbb <tcp_recvmsg+173/40c> a8 02 testb $0x2,%al
Code: 144fbd <tcp_recvmsg+175/40c> 74 04 je 144fc3 <tcp_recvmsg+17b/40c>
Code: 144fbf <tcp_recvmsg+177/40c> ff 4c 24 10 decl 0x10(%esp,1)
Code: 144fc9 <tcp_recvmsg+181/40c> 8b 7c 24 10 movl 0x10(%esp,1),%edi
Code: 144fcd <tcp_recvmsg+185/40c> 39 7b 30 cmpl %edi,0x30(%ebx)
Code: 144fd0 <tcp_recvmsg+188/40c> 0f 87 00 90 90 ja 90909018 <_EIP+90909018>
Code: 144fdb <tcp_recvmsg+193/40c> 90

Here is another one:

general protection: 0000
CPU: 0
EIP: 0010:[<00144dfa>]
EFLAGS: 00010286
eax: 0a0d6576 ebx: 02d1dc0c ecx: 03b01208 edx: 696c412d
esi: 02d1dccc edi: 0389bf7c ebp: 02d1dc0c esp: 0389bed8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process apache (pid: 21099, process nr: 108, stackpage=0389b000)
Stack: 0389bf08 00000202 00145232 02d1dc0c 02d1dc0c 0389bf7c 00000000 00000000
000001a1 02d1dc30 00000000 000001a1 02639414 02c34848 c16dc5a2 0014fca6
02d1dc0c 0389bf78 00000e5f 00000000 00000000 0389bf7c 00001000 02c34800
Call Trace: [<00145232>] [<0014fca6>] [<00135d3f>] [<00122ae0>] [<0010a705>] [<0018d2b8>]
Code: 89 42 04 89 10 6a 01 51 e8 39 30 ff ff 83 c4 08 eb b4 53 e8

>>EIP: 144dfa <cleanup_rbuf+46/94>
Trace: 145232 <tcp_recvmsg+3ea/40c>
Trace: 14fca6 <inet_recvmsg+72/88>
Trace: 135d3f <sock_read+ab/c0>
Trace: 122ae0 <sys_read+c0/e8>
Trace: 10a705 <system_call+55/80>
Trace: 18d2b8 <vortex_open+698/6f0>

Code: 144dfa <cleanup_rbuf+46/94>
Code: 144dfa <cleanup_rbuf+46/94> 89 42 04 movl %eax,0x4(%edx)
Code: 144dfd <cleanup_rbuf+49/94> 89 10 movl %edx,(%eax)
Code: 144dff <cleanup_rbuf+4b/94> 6a 01 pushl $0x1
Code: 144e01 <cleanup_rbuf+4d/94> 51 pushl %ecx
Code: 144e02 <cleanup_rbuf+4e/94> e8 39 30 ff ff call ffff3046 <_EIP+ffff3046>
Code: 144e0d <cleanup_rbuf+59/94> 83 c4 08 addl $0x8,%esp
Code: 144e10 <cleanup_rbuf+5c/94> eb b4 jmp ffffffc6 <_EIP+ffffffc6>
Code: 144e12 <cleanup_rbuf+5e/94> 53 pushl %ebx
Code: 144e13 <cleanup_rbuf+5f/94> e8 00 90 90 90 call 90909018 <_EIP+90909018>

It can happen on diffrent machines, so it's no direct hardware problem. It
happens once or twice per month or so. It does not result in an unusable
system. It's a Vanilla 2.0.35 kernel with Solars' secure linux patch
applied.

Here's the .config:
CONFIG_NET=y
CONFIG_PCI=y
CONFIG_SYSVIPC=y
CONFIG_BINFMT_AOUT=y
CONFIG_BINFMT_ELF=y
CONFIG_KERNEL_ELF=y
CONFIG_M586=y
CONFIG_BLK_DEV_FD=y
CONFIG_BLK_DEV_IDE=y
CONFIG_BLK_DEV_TRITON=y
CONFIG_NET_ALIAS=y
CONFIG_INET=y
CONFIG_IP_FORWARD=y
CONFIG_SYN_COOKIES=y
CONFIG_IP_ALIAS=y
CONFIG_IP_NOSR=y
CONFIG_SKB_LARGE=y
CONFIG_NETDEVICES=y
CONFIG_DUMMY=y
CONFIG_PPP=y
CONFIG_SLIP=y
CONFIG_SLIP_COMPRESSED=y
CONFIG_SLIP_SMART=y
CONFIG_NET_ETHERNET=y
CONFIG_NET_VENDOR_3COM=y
CONFIG_VORTEX=y
CONFIG_NET_PCI=y
CONFIG_DEC_ELCP=y
CONFIG_EPIC=y
CONFIG_NET_ISA=y
CONFIG_NE2000=y
CONFIG_MINIX_FS=y
CONFIG_EXT2_FS=y
CONFIG_NLS=y
CONFIG_FAT_FS=y
CONFIG_MSDOS_FS=y
CONFIG_NLS_CODEPAGE_437=y
CONFIG_NLS_CODEPAGE_850=y
CONFIG_NLS_ISO8859_1=y
CONFIG_PROC_FS=y
CONFIG_SERIAL=y
CONFIG_SECURE_STACK=y
CONFIG_SECURE_LINK=y
CONFIG_SECURE_PIPE=y

Bootmessage:

Console: 16 point font, 400 scans
Console: colour VGA+ 80x25, 1 virtual console (max 63)
pcibios_init : BIOS32 Service Directory structure at 0x000f99d0
pcibios_init : BIOS32 Service Directory entry at 0xf0530
pcibios_init : PCI BIOS revision 2.10 entry at 0xf0560
Probing PCI hardware.
Calibrating delay loop.. ok - 333.41 BogoMIPS
Memory: 63352k/65536k available (632k kernel code, 384k reserved, 1168k data)
Swansea University Computer Society NET3.035 for Linux 2.0
NET3: Unix domain sockets 0.13 for Linux NET3.035.
Swansea University Computer Society TCP/IP for NET3.034
IP Protocols: ICMP, UDP, TCP
Checking 386/387 coupling... Ok, fpu using exception 16 error reporting.
Checking 'hlt' instruction... Ok.
Intel Pentium with F0 0F bug - workaround enabled.
alias mapping IDT readonly ... ... done
Linux version 2.0.35 (ryde@hobbe) (gcc version 2.7.2.1) #2 Fri Aug 7 10:48:35 CEST 1998
Starting kswapd v 1.4.2.2
Serial driver version 4.13 with no serial options enabled
tty00 at 0x03f8 (irq = 4) is a 16550A
tty01 at 0x02f8 (irq = 3) is a 16550A
ide: i82371 PIIX (Triton) on PCI bus 0 function 9
ide0: BM-DMA at 0xe000-0xe007
ide1: BM-DMA at 0xe008-0xe00f
hda: QUANTUM FIREBALL ST3.2A, 3079MB w/81kB Cache, CHS=6256/16/63, UDMA
ide0 at 0x1f0-0x1f7,0x3f6 on irq 14
Floppy drive(s): fd0 is 1.44M
FDC 0 is a post-1991 82077
PPP: version 2.2.0 (dynamic channel allocation)
TCP compression code copyright 1989 Regents of the University of California
PPP Dynamic channel allocation code copyright 1995 Caldera, Inc.
PPP line discipline registered.
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
CSLIP: code copyright 1989 Regents of the University of California.
SLIP linefill/keepalive option.
ne.c:v1.10 9/23/94 Donald Becker (becker@cesdis.gsfc.nasa.gov)
NE*000 ethercard probe at 0x300: 00 80 ad c8 a5 c6
eth0: NE2000 found at 0x300, using IRQ 10.
Partition check:
hda: hda1 hda2
VFS: Mounted root (ext2 filesystem) readonly.
Adding Swap: 32220k swap-space (priority -1)

Best Regards

Daniel Ryde, System Administrator
__________________________________________________________________________
Tripnet AB Visit Address: Telephone: +46 31 7252500
Box 5071 Avagen 42 Facsimile: +46 31 7252501
S-402 22 GOTEBORG GOTEBORG Email: ryde@tripnet.se
Sweden Sweden

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/