> Hi!
>
> > The system has dual pentium pro 166s, Tyan S1682D motherboard. IO-APIC is
> > enabled.
>
> Could you please try it with SMP disabled?
Yep, no lockup w/o SMP. I tried with SMP + IO-APIC disabled and it still
locked up (is there a better way to do this than to edit the code?).
I snarfed mingo's NMI watchdog and was able to get oopses. There's three,
I'm pretty sure the third is an artifact of the watchdog. Looks like a
deadlock in the signal handling.
Note: slock_text is a symbol I put in right at the start of .text.lock,
it makes more sense than printing huge offsets from whatever happens to
end the .text segment.
Dean
NMI Watchdog detected LOCKUP on CPU3, forcing oops
Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 05b15000, %cr3 = 05b15000
*pde = 00000000
Oops: 0002
CPU: 3
EIP: 0010:[<c010b110>]
EFLAGS: 00010092
eax: 00000033 ebx: 00000003 ecx: c7e6c000 edx: c020165c
esi: c08de8b8 edi: c5a901f4 ebp: 0000000a esp: c5a95e84
ds: 0018 es: 0018 ss:0018
Process httpd (pid: 1297, process nr: 23, stackpage=c5a95000)
Stack: c01d9059 00000003 c5a94000 c010a082 c5a95e9c 00000000 c71f4000 c5a94000
00000032 c08de8b8 c5a901f4 0000000a c08de800 c0220018 00000018 ffffffff
c01d719c 00000010 00000002 c71f4000 00000004 fffffffd 00000511 c01001f4
Call Trace: [<c01d9059>] [<c010a082>] [<c01d719c>] [<c01001f4>] [<c0112cb9>] [<c0112df2>] [<c0113697>]
[<c01101f4>] [<c0108e90>] [<c011218b>] [<c012900d>] [<c0109f46>]
Code: c7 05 00 00 00 00 00 00 00 00 83 c4 08 5b c3 90 89 14 9d 5c
NMI Watchdog detected LOCKUP on CPU0, forcing oops
Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 02961000, %cr3 = 02961000
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c010b110>]
EFLAGS: 00010082
eax: 00000033 ebx: 00000000 ecx: c7e6c000 edx: c020165c
esi: 00000001 edi: c71f5f98 ebp: c71f5fac esp: c71f5f20
ds: 0018 es: 0018 ss: 0018
Process httpd (pid: 1432, process nr: 28, stackpage=c71f5000)
Stack: c01d9059 00000000 c71f4000 c010a082 c71f5f38 00000000 00000001 bffffb2c
00000000 00000001 c71f5f98 c71f5fac c71f4000 c71f0018 00000018 ffffffff
c01d7260 00000010 00000002 bffffb1c 00000001 00000000 bffffb08 c0108e90
Call Trace: [<c01d9059>] [<c010a082>] [<c01d7260>] [<c0108e90>] [<c0109f46>]
Code: c7 05 00 00 00 00 00 00 00 00 83 c4 08 5b c3 90 89 14 9d 5c
NMI Watchdog detected LOCKUP on CPU3, forcing oops
Unable to handle kernel NULL pointer dereference at virtual address 00000000
current->tss.cr3 = 07fce000, %cr3 = 07fce000
*pde = 00000000
Oops: 0002
CPU: 3
EIP: 0010:[<c010b110>]
EFLAGS: 00010086
eax: 00000033 ebx: 00000003 ecx: c7e6c000 edx: c020165c
esi: ffffffff edi: 00000591 ebp: bffffa10 esp: c0089f4c
ds: 0018 es: 0018 ss:0018
Process httpd (pid: 1, process nr: 2, stackpage=c0089000)
Stack: c01d9059 00000003 c0088000 c010a082 c0089f64 00000000 c737e000 00000283
c022cee8 ffffffff 00000591 bffffa10 c5a94000 c7370018 00000018 ffffffff
c01d75f9 00000010 00000002 c737e000 c011b0fe c737e000 c0088000 00000000
Call Trace: [<c01d9059>] [<c010a082>] [<c01d75f9>] [<c011b0fe>] [<c0109f46>]
Code: c7 05 00 00 00 00 00 00 00 00 83 c4 08 5b c3 90 89 14 9d 5c
Using `System.map' to map addresses to symbols.
>>EIP: c010b110 <do_nmi+54/78>
Trace: c01d9059 <stext_lock+2085/30e3>
Trace: c010a082 <error_code+32/3c>
Trace: c01d719c <stext_lock+1c8/30e3>
Trace: c01001f4 <nocpuid+4d/77>
Trace: c0112cb9 <kill_pg_info+49/74>
Trace: c0112df2 <kill_something_info+26/128>
Trace: c0113697 <sys_kill+4f/5c>
Trace: c01101f4 <pci_conf1_read_config_word+1c/8c>
Trace: c0108e90 <sys_sigaction+94/100>
Trace: c011218b <do_page_fault+1b7/3d0>
Trace: c012900d <sys_write+129/1a8>
Trace: c0109f46 <system_call+3a/40>
Code: c010b110 <do_nmi+54/78>
Code: c010b110 <do_nmi+54/78> c7 05 00 00 00 movl $0x0,0x0
Code: c010b115 <do_nmi+59/78> 00 00 00 00 00
Code: c010b120 <do_nmi+64/78> 83 c4 08 addl $0x8,%esp
Code: c010b123 <do_nmi+67/78> 5b popl %ebx
Code: c010b124 <do_nmi+68/78> c3 ret
Code: c010b125 <do_nmi+69/78> 90 nop
Code: c010b126 <do_nmi+6a/78> 89 14 9d 5c 00 movl %edx,0x9090005c(,%ebx,4)
Code: c010b133 <do_nmi+77/78> 90 nop
>>EIP: c010b110 <do_nmi+54/78>
Trace: c01d9059 <stext_lock+2085/30e3>
Trace: c010a082 <error_code+32/3c>
Trace: c01d7260 <stext_lock+28c/30e3>
Trace: c0108e90 <sys_sigaction+94/100>
Trace: c0109f46 <system_call+3a/40>
Code: c010b110 <do_nmi+54/78>
Code: c010b110 <do_nmi+54/78> c7 05 00 00 00 movl $0x0,0x0
Code: c010b115 <do_nmi+59/78> 00 00 00 00 00
Code: c010b120 <do_nmi+64/78> 83 c4 08 addl $0x8,%esp
Code: c010b123 <do_nmi+67/78> 5b popl %ebx
Code: c010b124 <do_nmi+68/78> c3 ret
Code: c010b125 <do_nmi+69/78> 90 nop
Code: c010b126 <do_nmi+6a/78> 89 14 9d 5c 00 movl %edx,0x9090005c(,%ebx,4)
Code: c010b133 <do_nmi+77/78> 90 nop
>>EIP: c010b110 <do_nmi+54/78>
Trace: c01d9059 <stext_lock+2085/30e3>
Trace: c010a082 <error_code+32/3c>
Trace: c01d75f9 <stext_lock+625/30e3>
Trace: c011b0fe <sys_wait4+37a/438>
Trace: c0109f46 <system_call+3a/40>
Code: c010b110 <do_nmi+54/78>
Code: c010b110 <do_nmi+54/78> c7 05 00 00 00 movl $0x0,0x0
Code: c010b115 <do_nmi+59/78> 00 00 00 00 00
Code: c010b120 <do_nmi+64/78> 83 c4 08 addl $0x8,%esp
Code: c010b123 <do_nmi+67/78> 5b popl %ebx
Code: c010b124 <do_nmi+68/78> c3 ret
Code: c010b125 <do_nmi+69/78> 90 nop
Code: c010b126 <do_nmi+6a/78> 89 14 9d 5c 00 movl %edx,0x9090005c(,%ebx,4)
Code: c010b133 <do_nmi+77/78> 90 nop
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu