[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: nptl 0.33



Hi,

Here are the first results I had running nptl-0.33 on ia64 (kernel
2.5.64).

* make subdirs=nptl check

tst-dlsym1 sometimes fails with a segmentation fault. But sometimes it
works.

tst-eintr1 seems to put the kernel in a unstable state. I usually get an
oops shortly after running it. (see attached file)

All other tests run OK.

* mozilla seems to run smoothly, but whines about an unaligned access at
startup.

* BEA's Java virtual machine JRockit 8.0 crashes and prints a dump when I
run it with nptl. I'm wondering if anyone had any positive experience with
JRockit and nptl (not only on ia64, on any platform).

	Regards,

		Simon.

Unable to handle kernel NULL pointer dereferencebash[18778]: Oops 11003706212352

Pid: 18778, CPU 2, comm:                 bash
psr : 0000121008026018 ifs : 800000000000040c ip  : [<e0000000044b63e1>]    Not tainted
ip is at buffered_rmqueue+0x2a1/0x360
unat: 0000000000000288 pfs : 000000000000040c rsc : 0000000000000003
rnat: 000000000002a959 bsps: e000000004402f80 pr  : 0000000000000159
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
b0  : e0000000044b63e0 b6  : e000000004470780 b7  : e00000000440d820
f6  : 1003e000000000000000a f7  : 1003e0a3d70a3d70a3eb8
f8  : 1003ee000000004b70480 f9  : 10002a000000000000000
r1  : e000000004ef6da0 r2  : 0000000000000000 r3  : e000000189b1fe68
r8  : 0000000000000023 r9  : 6000000000014210 r10 : 0000000000000000
r11 : 6000000000040a40 r12 : e000000189b1fc10 r13 : e000000189b18000
r14 : 0000000000000000 r15 : e000000004c3fcc8 r16 : e000000183e3002c
r17 : 0000000000000073 r18 : e000000189b18000 r19 : e000000183e30040
r20 : e000000004b729d8 r21 : e000000004b729d0 r22 : e000000183e3002c
r23 : e000000183e30048 r24 : e000000004c42a88 r25 : 0000000000000002
r26 : 0000000000000001 r27 : 0000000000000001 r28 : e00000000440d820
r29 : 0000000000000001 r30 : 0000000000000000 r31 : 0000000000000081

Call Trace:
 [<e000000004414030>] show_stack+0x50/0xc0 sp=0xe000000189b1f7f0 bsp=0xe000000189b19440
 [<e000000004414890>] show_regs+0x7b0/0x7e0 sp=0xe000000189b1f9c0 bsp=0xe000000189b193e8
 [<e00000000442e110>] die+0x190/0x240 sp=0xe000000189b1f9e0 bsp=0xe000000189b193c0
 [<e00000000444f050>] ia64_do_page_fault+0x850/0x960 sp=0xe000000189b1f9e0 bsp=0xe000000189b19360
 [<e00000000440df80>] ia64_leave_kernel+0x0/0x240 sp=0xe000000189b1fa70 bsp=0xe000000189b19360
 [<e0000000044b63e0>] buffered_rmqueue+0x2a0/0x360 sp=0xe000000189b1fc10 bsp=0xe000000189b19300
 [<e0000000044b65b0>] __alloc_pages+0x110/0x6e0 sp=0xe000000189b1fc10 bsp=0xe000000189b19290
 [<e0000000044b6bf0>] __get_free_pages+0x70/0x180 sp=0xe000000189b1fc10 bsp=0xe000000189b19270
 [<e000000004416150>] dup_task_struct+0x30/0xc0 sp=0xe000000189b1fc10 bsp=0xe000000189b19250
 [<e0000000044773f0>] copy_process+0xb0/0x1880 sp=0xe000000189b1fc10 bsp=0xe000000189b191a8
 [<e000000004478d20>] do_fork+0x160/0x3c0 sp=0xe000000189b1fc10 bsp=0xe000000189b19160
 [<e00000000440d860>] sys_clone2+0x60/0xa0 sp=0xe000000189b1fc30 bsp=0xe000000189b19120
 [<e00000000440df60>] ia64_ret_from_syscall+0x0/0x20 sp=0xe000000189b1fe60 bsp=0xe000000189b190e8
 
Entering kdb (current=0xe000000189b18000, pid 18778) on processor 2 Oops: <NULL>
due to oops @ 0xe0000000044b63e1
 psr: 0x0000121008026018   ifs: 0x800000000000040c    ip: 0xe0000000044b63e0  
unat: 0x0000000000000288   pfs: 0x000000000000040c   rsc: 0x0000000000000003  
rnat: 0x000000000002a959  bsps: 0xe000000004402f80    pr: 0x0000000000000159  
ldrs: 0x0000000000000000   ccv: 0x0000000000000000  fpsr: 0x0009804c8a70033f  
  b0: 0xe0000000044b63e0    b6: 0xe000000004470780    b7: 0xe00000000440d820  
  r1: 0xe000000004ef6da0    r2: 0x0000000000000000    r3: 0xe000000189b1fe68  
  r8: 0x0000000000000023    r9: 0x6000000000014210   r10: 0x0000000000000000  
 r11: 0x6000000000040a40   r12: 0xe000000189b1fc10   r13: 0xe000000189b18000  
 r14: 0x0000000000000000   r15: 0xe000000004c3fcc8   r16: 0xe000000183e3002c  
 r17: 0x0000000000000073   r18: 0xe000000189b18000   r19: 0xe000000183e30040  
 r20: 0xe000000004b729d8   r21: 0xe000000004b729d0   r22: 0xe000000183e3002c  
 r23: 0xe000000183e30048   r24: 0xe000000004c42a88   r25: 0x0000000000000002  
 r26: 0x0000000000000001   r27: 0x0000000000000001   r28: 0xe00000000440d820  
 r29: 0x0000000000000001   r30: 0x0000000000000000   r31: 0x0000000000000081  
&regs = e000000189b1fa80
[2]kdb> bt
Stack traceback for pid 18778
0xe000000189b18000    18778    18776  1    2   R  0xe000000189b18510 *bash
0xe0000000044b63e0 buffered_rmqueue+0x2a0
        args (0xe000000004c42a80, 0x1, 0x0, 0xf, 0x1008026018)
        kernel <NULL> 0x0 0xe0000000044b6140 0x0
0xe0000000044b65b0 __alloc_pages+0x110
        args (0xd0, 0x1, 0xe000000004c44480, 0xe000000004c42a98, 0x200)
        kernel <NULL> 0x0 0xe0000000044b64a0 0x0
0xe0000000044b6bf0 __get_free_pages+0x70
        args (0xd0, 0x1, 0xe000000004416150, 0x207)
        kernel <NULL> 0x0 0xe0000000044b6b80 0x0
0xe000000004416150 dup_task_struct+0x30
        args (0xe000000189b18000, 0x600000000000dba8, 0xe0000000044773f0, 0xa1a)
        kernel <NULL> 0x0 0xe000000004416120 0x0
0xe0000000044773f0 copy_process+0xb0
        args (0x1200011, 0x0, 0xe000000189b1fe70, 0x0, 0x0)
        kernel <NULL> 0x0 0xe000000004477340 0x0
0xe000000004478d20 do_fork+0x160
        args (0x1200011, 0x0, 0xe000000189b1fe70, 0x0, 0x0)
        kernel <NULL> 0x0 0xe000000004478bc0 0x0
0xe00000000440d860 sys_clone2+0x60
        args (0x1200011, 0x0, 0x0, 0x0, 0x200000000002e500)

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]