On Thursday 23 June 2011, 16:32:45 sf...@users.sourceforge.net wrote: [...] > But I am not sure whether the crash problem will be solved too, since > I don't remember the old version you are using. If the cause of your > problem is new to me, then the patch may not solve it.
Close, but no cigar. For some reason, the system appears much more stable, but after rolling out the setup, I harvested this: Jun 25 15:21:46 kuno kernel: [ 4121.973627] ------------[ cut here ]------------ Jun 25 15:21:46 kuno kernel: [ 4121.974561] kernel BUG at /usr/src/packages/BUILD/kernel-desktop-2.6.31.14/linux-2.6.31/mm/truncate.c:44 6! Jun 25 15:21:46 kuno kernel: [ 4121.974561] invalid opcode: 0000 [#1] PREEMPT SMP Jun 25 15:21:46 kuno kernel: [ 4121.974561] last sysfs file: /sys/devices/system/cpu/cpu1/cache/index2/shared_cpu_map Jun 25 15:21:46 kuno kernel: [ 4121.974561] Modules linked in: appletalk ax25 ipx p8022 psnap llc p8023 nls_utf8 snd_pcm_oss autofs4 bin fmt_misc snd_mixer_oss snd_seq vmnet vmblock vmci vmmon cpufreq_conservative cpufreq_userspace cpufreq_powersave powernow_k8 fuse loop s nd_usb_audio snd_usb_lib snd_rawmidi snd_seq_device snd_hda_codec_realtek snd_hda_intel gspca_zc3xx nvidia(P) snd_hda_codec wmi gspca_ma in snd_hwdep snd_pcm videodev processor v4l1_compat thermal snd_timer button shpchp snd pcspkr snd_page_alloc i2c_nforce2 pci_hotplug th ermal_sys aufs squashfs nfs lockd fscache nfs_acl auth_rpcgss sunrpc dm_mod brd af_packet ide_pci_generic amd74xx ide_core ata_generic f orcedeth pata_amd parport_pc parport Jun 25 15:21:46 kuno kernel: [ 4122.005280] Jun 25 15:21:46 kuno kernel: [ 4122.005280] Pid: 10368, comm: krdc Tainted: P (2.6.31.14-6-desktop #1) To Be Filled By O.E.M. Jun 25 15:21:46 kuno kernel: [ 4122.005280] EIP: 0060:[<c02e391d>] EFLAGS: 00010202 CPU: 0 Jun 25 15:21:46 kuno kernel: [ 4122.005280] EIP is at invalidate_inode_pages2_range+0x1dd/0x270 Jun 25 15:21:46 kuno kernel: [ 4122.005280] EAX: 00000002 EBX: 00000000 ECX: 00000000 EDX: 00000000 Jun 25 15:21:46 kuno kernel: [ 4122.005280] ESI: 00000001 EDI: f5db4460 EBP: d4431de4 ESP: d4431d70 Jun 25 15:21:46 kuno kernel: [ 4122.005280] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 Jun 25 15:21:46 kuno kernel: [ 4122.005280] Process krdc (pid: 10368, ti=d4430000 task=f2db0230 task.ti=d4430000) Jun 25 15:21:46 kuno kernel: [ 4122.005280] Stack: Jun 25 15:21:46 kuno kernel: [ 4122.005280] 00000000 00000000 00000000 ffffffff ef52f9a4 00000001 00000000 00000000 Jun 25 15:21:46 kuno kernel: [ 4122.005280] <0> 00000000 0000000e 00000000 f5db4460 f5db4440 f5db4420 f4b511a0 f5db94e0 Jun 25 15:21:46 kuno kernel: [ 4122.005280] <0> f5db94c0 f4b51180 f5db9480 f4b51160 f4b51140 f4b51120 f4b51100 f4b510e0 Jun 25 15:21:46 kuno kernel: [ 4122.005280] Call Trace: Jun 25 15:21:46 kuno kernel: [ 4122.005280] [<c02e39cc>] invalidate_inode_pages2+0x1c/0x40 Jun 25 15:21:46 kuno kernel: [ 4122.005280] [<f800dbb4>] nfs_invalidate_mapping_nolock+0x24/0x110 [nfs] Jun 25 15:21:46 kuno kernel: [ 4122.005280] [<f800f254>] nfs_revalidate_mapping+0xd4/0xe0 [nfs] Jun 25 15:21:46 kuno kernel: [ 4122.005280] [<f800b55b>] nfs_file_mmap+0x4b/0x90 [nfs] Jun 25 15:21:47 kuno kernel: [ 4122.005280] [<f80e3b82>] aufs_mmap+0x182/0x2b0 [aufs] Jun 25 15:21:47 kuno kernel: [ 4122.005280] [<c02fd5d5>] mmap_region+0x375/0x4d0 Jun 25 15:21:47 kuno kernel: [ 4122.005280] [<c02fd9a5>] do_mmap_pgoff+0x275/0x370 Jun 25 15:21:47 kuno kernel: [ 4122.005280] [<c020934c>] sys_mmap2+0xdc/0x100 Jun 25 15:21:47 kuno kernel: [ 4122.005280] [<c02042b3>] sysenter_do_call+0x12/0x28 Jun 25 15:21:47 kuno kernel: [ 4122.005280] [<ffffe424>] 0xffffe424 Jun 25 15:21:47 kuno kernel: [ 4122.005280] Code: 0c c1 e2 0c c7 44 24 08 00 00 00 00 c7 04 24 00 10 00 00 c7 44 24 04 00 00 00 00 e8 ce 20 01 00 8b 47 08 85 c0 0f 88 72 ff ff ff <0f> 0b eb fe 8d b4 26 00 00 00 00 ba 0e 00 00 00 89 f8 e8 1c 37 Jun 25 15:21:47 kuno kernel: [ 4122.005280] EIP: [<c02e391d>] invalidate_inode_pages2_range+0x1dd/0x270 SS:ESP 0068:d4431d70 Jun 25 15:21:47 kuno kernel: [ 4122.011057] ---[ end trace fa198d1359ef500b ]--- > Anyway I'd suggest you to upgrade to latest aufs2.1-31 and apply this > patch first. If you meet the problem, then let me know again. Is it possible, that your patch raises the stability for some amount, but doesn't solve it fully or does is happen all by chance? I can imagine, how awful it is for you to get to the "real" source. Here's a small, but hopefully correct way to get to the offending one. Given, that you're able to download and expand the kernel-source rpm (probably with alien) from here: http://download.opensuse.org/repositories/home%3A/frispete%3A/kernel-2.6.31/openSUSE_11.1/src/kernel-source-2.6.31.14-6.1.src.rpm please find the necessary scripts attached. Copy scripts.tar.bz2 to the source dir, and then do the following: # expand tarballs for f in {patches,scripts}*.tar.bz2; do tar -xvjpf $f; done # expand kernel source, and apply all patches scripts/sequence-patch.sh Afterwards, you find the expanded source with all patches applied in: tmp/linux-2.6.31 This is a quilt tree, hence having quilt installed would be good idea. I would be truly grateful, if you could take another look. Let me know, if I can provide more infos, or even a ssh login for you to my systems. Thanks, Pete
scripts.tar.bz2
Description: application/tbz
------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense.. http://p.sf.net/sfu/splunk-d2d-c1