[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: nptl 0.33


Here are the first results I had running nptl-0.33 on ia64 (kernel

* make subdirs=nptl check

tst-dlsym1 sometimes fails with a segmentation fault. But sometimes it

tst-eintr1 seems to put the kernel in a unstable state. I usually get an
oops shortly after running it. (see attached file)

All other tests run OK.

* mozilla seems to run smoothly, but whines about an unaligned access at

* BEA's Java virtual machine JRockit 8.0 crashes and prints a dump when I
run it with nptl. I'm wondering if anyone had any positive experience with
JRockit and nptl (not only on ia64, on any platform).



Unable to handle kernel NULL pointer dereferencebash[18778]: Oops 11003706212352

Pid: 18778, CPU 2, comm:                 bash
psr : 0000121008026018 ifs : 800000000000040c ip  : [<e0000000044b63e1>]    Not tainted
ip is at buffered_rmqueue+0x2a1/0x360
unat: 0000000000000288 pfs : 000000000000040c rsc : 0000000000000003
rnat: 000000000002a959 bsps: e000000004402f80 pr  : 0000000000000159
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
b0  : e0000000044b63e0 b6  : e000000004470780 b7  : e00000000440d820
f6  : 1003e000000000000000a f7  : 1003e0a3d70a3d70a3eb8
f8  : 1003ee000000004b70480 f9  : 10002a000000000000000
r1  : e000000004ef6da0 r2  : 0000000000000000 r3  : e000000189b1fe68
r8  : 0000000000000023 r9  : 6000000000014210 r10 : 0000000000000000
r11 : 6000000000040a40 r12 : e000000189b1fc10 r13 : e000000189b18000
r14 : 0000000000000000 r15 : e000000004c3fcc8 r16 : e000000183e3002c
r17 : 0000000000000073 r18 : e000000189b18000 r19 : e000000183e30040
r20 : e000000004b729d8 r21 : e000000004b729d0 r22 : e000000183e3002c
r23 : e000000183e30048 r24 : e000000004c42a88 r25 : 0000000000000002
r26 : 0000000000000001 r27 : 0000000000000001 r28 : e00000000440d820
r29 : 0000000000000001 r30 : 0000000000000000 r31 : 0000000000000081

Call Trace:
 [<e000000004414030>] show_stack+0x50/0xc0 sp=0xe000000189b1f7f0 bsp=0xe000000189b19440
 [<e000000004414890>] show_regs+0x7b0/0x7e0 sp=0xe000000189b1f9c0 bsp=0xe000000189b193e8
 [<e00000000442e110>] die+0x190/0x240 sp=0xe000000189b1f9e0 bsp=0xe000000189b193c0
 [<e00000000444f050>] ia64_do_page_fault+0x850/0x960 sp=0xe000000189b1f9e0 bsp=0xe000000189b19360
 [<e00000000440df80>] ia64_leave_kernel+0x0/0x240 sp=0xe000000189b1fa70 bsp=0xe000000189b19360
 [<e0000000044b63e0>] buffered_rmqueue+0x2a0/0x360 sp=0xe000000189b1fc10 bsp=0xe000000189b19300
 [<e0000000044b65b0>] __alloc_pages+0x110/0x6e0 sp=0xe000000189b1fc10 bsp=0xe000000189b19290
 [<e0000000044b6bf0>] __get_free_pages+0x70/0x180 sp=0xe000000189b1fc10 bsp=0xe000000189b19270
 [<e000000004416150>] dup_task_struct+0x30/0xc0 sp=0xe000000189b1fc10 bsp=0xe000000189b19250
 [<e0000000044773f0>] copy_process+0xb0/0x1880 sp=0xe000000189b1fc10 bsp=0xe000000189b191a8
 [<e000000004478d20>] do_fork+0x160/0x3c0 sp=0xe000000189b1fc10 bsp=0xe000000189b19160
 [<e00000000440d860>] sys_clone2+0x60/0xa0 sp=0xe000000189b1fc30 bsp=0xe000000189b19120
 [<e00000000440df60>] ia64_ret_from_syscall+0x0/0x20 sp=0xe000000189b1fe60 bsp=0xe000000189b190e8
Entering kdb (current=0xe000000189b18000, pid 18778) on processor 2 Oops: <NULL>
due to oops @ 0xe0000000044b63e1
 psr: 0x0000121008026018   ifs: 0x800000000000040c    ip: 0xe0000000044b63e0  
unat: 0x0000000000000288   pfs: 0x000000000000040c   rsc: 0x0000000000000003  
rnat: 0x000000000002a959  bsps: 0xe000000004402f80    pr: 0x0000000000000159  
ldrs: 0x0000000000000000   ccv: 0x0000000000000000  fpsr: 0x0009804c8a70033f  
  b0: 0xe0000000044b63e0    b6: 0xe000000004470780    b7: 0xe00000000440d820  
  r1: 0xe000000004ef6da0    r2: 0x0000000000000000    r3: 0xe000000189b1fe68  
  r8: 0x0000000000000023    r9: 0x6000000000014210   r10: 0x0000000000000000  
 r11: 0x6000000000040a40   r12: 0xe000000189b1fc10   r13: 0xe000000189b18000  
 r14: 0x0000000000000000   r15: 0xe000000004c3fcc8   r16: 0xe000000183e3002c  
 r17: 0x0000000000000073   r18: 0xe000000189b18000   r19: 0xe000000183e30040  
 r20: 0xe000000004b729d8   r21: 0xe000000004b729d0   r22: 0xe000000183e3002c  
 r23: 0xe000000183e30048   r24: 0xe000000004c42a88   r25: 0x0000000000000002  
 r26: 0x0000000000000001   r27: 0x0000000000000001   r28: 0xe00000000440d820  
 r29: 0x0000000000000001   r30: 0x0000000000000000   r31: 0x0000000000000081  
&regs = e000000189b1fa80
[2]kdb> bt
Stack traceback for pid 18778
0xe000000189b18000    18778    18776  1    2   R  0xe000000189b18510 *bash
0xe0000000044b63e0 buffered_rmqueue+0x2a0
        args (0xe000000004c42a80, 0x1, 0x0, 0xf, 0x1008026018)
        kernel <NULL> 0x0 0xe0000000044b6140 0x0
0xe0000000044b65b0 __alloc_pages+0x110
        args (0xd0, 0x1, 0xe000000004c44480, 0xe000000004c42a98, 0x200)
        kernel <NULL> 0x0 0xe0000000044b64a0 0x0
0xe0000000044b6bf0 __get_free_pages+0x70
        args (0xd0, 0x1, 0xe000000004416150, 0x207)
        kernel <NULL> 0x0 0xe0000000044b6b80 0x0
0xe000000004416150 dup_task_struct+0x30
        args (0xe000000189b18000, 0x600000000000dba8, 0xe0000000044773f0, 0xa1a)
        kernel <NULL> 0x0 0xe000000004416120 0x0
0xe0000000044773f0 copy_process+0xb0
        args (0x1200011, 0x0, 0xe000000189b1fe70, 0x0, 0x0)
        kernel <NULL> 0x0 0xe000000004477340 0x0
0xe000000004478d20 do_fork+0x160
        args (0x1200011, 0x0, 0xe000000189b1fe70, 0x0, 0x0)
        kernel <NULL> 0x0 0xe000000004478bc0 0x0
0xe00000000440d860 sys_clone2+0x60
        args (0x1200011, 0x0, 0x0, 0x0, 0x200000000002e500)

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]