2.3.11-pre3 SMP bug

Bernhard Rosenkraenzer (bero@mandrakesoft.com)
Tue, 13 Jul 1999 17:41:26 +0200 (CEST)


There's a SMP bug in 2.3.11-pre3, probably network related (happens every
time I try to run fetchmail, telnet, ftp or lynx; ping works):

[root@locutus /root]# fetchmail
kernel BUG at /usr/src/RPM/BUILD/linux/include/asm/smplock.h:53!
invalid operand: 0000
CPU: 0
EIP: 0010:[<8016b4b9>]
EFLAGS: 00010286
eax: 00000041 ebx: 8f507b60 ecx: 80223a28 edx: 00000002
esi: 0000000b edi: 8dba8000 ebp: 00000001 esp: 8dba9e94
ds: 0018 es: 0018 ss: 0018
Process fetchmail (pid: 572, stackpage=8dba9000)
Stack: 00000035 8dba9f74 8e82b180 8017b67e 8dbf431c 000005b4 8dba8000 8dba9ee0
8e82b248 8dba8000 00000001 7fffd770 00000000 00000000 000005b4 00000000
00000000 8e82b248 8dba9f74 00000000 8017288b 8e82b180 8dba9f74 8e82b180
Call Trace: [<8017b67e>] [<8017288b>] [<8017b6ff>] [<80153ee5>] [<80154058>] [<8017b67e>] [<801540e0>]
[<8012b452>] [<80109328>]
Code: 0f 0b 83 c4 0c 89 f6 8b 4c 24 14 ff 49 30 79 09 f0 0f ba 35
Segmentation fault

ksymoops says:
Options used: -V (default)
-o /lib/modules/2.3.11-1mdksmp (specified)
-k /proc/ksyms (specified)
-l /proc/modules (specified)
-m /boot/System.map-2.3.11-1mdksmp (specified)
-c 1 (specified)

invalid operand: 0000
CPU: 0
EIP: 0010:[<8016b4b9>]
EFLAGS: 00010286
eax: 00000041 ebx: 8f507b60 ecx: 80223a28 edx: 00000002
esi: 0000000b edi: 8dba8000 ebp: 00000001 esp: 8dba9e94
ds: 0018 es: 0018 ss: 0018
Process fetchmail (pid: 572, stackpage=8dba9000)
Stack: 00000035 8dba9f74 8e82b180 8017b67e 8dbf431c 000005b4 8dba8000 8dba9ee0
8e82b248 8dba8000 00000001 7fffd770 00000000 00000000 000005b4 00000000
00000000 8e82b248 8dba9f74 00000000 8017288b 8e82b180 8dba9f74 8e82b180
Call Trace: [<8017b67e>] [<8017288b>] [<8017b6ff>] [<80153ee5>] [<80154058>] [<8017b67e>] [<801540e0>]
[<8012b452>] [<80109328>]
Code: 0f 0b 83 c4 0c 89 f6 8b 4c 24 14 ff 49 30 79 09 f0 0f ba 35

>>EIP: 8016b4b9 <tcp_do_sendmsg+5c2/859>
Trace: 8017b67e <inet_sendmsg+0/8e>
Trace: 8017288b <tcp_v4_sendmsg+5c/66>
Trace: 8017b6ff <inet_sendmsg+81/8e>
Trace: 80153ee5 <sock_sendmsg+88/ab>
Trace: 80154058 <sock_write+0/95>
Trace: 8017b67e <inet_sendmsg+0/8e>
Trace: 801540e0 <sock_write+88/95>
Trace: 8012b452 <sys_write+f5/118>
Code: 8016b4b9 <tcp_do_sendmsg+5c2/859> 00000000 <_EIP>: <===
Code: 8016b4b9 <tcp_do_sendmsg+5c2/859> 0: 0f 0b ud2a <===
Code: 8016b4bb <tcp_do_sendmsg+5c4/859> 2: 83 c4 0c addl $0xc,%esp
Code: 8016b4be <tcp_do_sendmsg+5c7/859> 5: 89 f6 movl %esi,%esi
Code: 8016b4c0 <tcp_do_sendmsg+5c9/859> 7: 8b 4c 24 14 movl 0x14(%esp,1),%ecx
Code: 8016b4c4 <tcp_do_sendmsg+5cd/859> b: ff 49 30 decl 0x30(%ecx)
Code: 8016b4c7 <tcp_do_sendmsg+5d0/859> e: 79 09 jns 8016b4d2 <tcp_do_sendmsg+5db/859>
Code: 8016b4c9 <tcp_do_sendmsg+5d2/859> 10: f0 0f ba 35 00 00 00 lock btrl $0x0,0x0
Code: 8016b4d0 <tcp_do_sendmsg+5d9/859> 17: 00 00

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/