RE: [NFS] Kernel Oops in NFS

2007-10-19 Thread Jason . V . Mock
> -Original Message-
> From: Trond Myklebust [mailto:[EMAIL PROTECTED] 
> Sent: Thursday, October 18, 2007 18:24
> To: Mock, JV Jason @ IS
> Cc: [EMAIL PROTECTED]; linux-kernel@vger.kernel.org; 
> Kile, SE Scott @ IS
> Subject: Re: [NFS] Kernel Oops in NFS
> 
> 
> On Thu, 2007-10-18 at 16:01 -0500, [EMAIL PROTECTED] wrote:
> > > We've come across an Oops, in what appears to NFS.
> > > 
> > > 2.6.22.6 vanilla + realtime-lsm
> > > RHEL4 over PXE/NFS_ROOT
...
> > > [] nfs_lookup+0x11b/0x26a SS:ESP 0068:f63b5d4
> > > 
> > > We haven't seen any negative side-effects other than users seeing 
> > > this in Kwrited quite often.  We've yet to update to 2.6.22.9, 
> > > however we've examined the change logs and patches 
> associated with 
> > > NFS between then and now, and don't see anything 
> appropriate for the 
> > > errors we're receiving.  Let me know if you need anything 
> else for 
> > > this...
> > 
> > I was just checking to see if there's anything that I'm 
> missing here, 
> > in regards to never hearing a single thing back about this.
> > 
> > - Jason Mock
> 
> Well... Your Oops did have the 'tainted' flag set, but in 
> this case I believe that the issue is already known. Please try
> 
>   
> http://client.linux-nfs.org/Linux-2.6.x/2.6.22/linux-2.6.22-01
> 0-fix_nfs_reval_fsid.dif
> 
> Trond
> 

Thanks Trond.  The Tainted flag is *probably* due to the NVIDIA driver,
but I'd also have to check the realtime-lsm.  Either way we'll get that
built up and see...

Thanks again!!

- Jason Mock
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


RE: [NFS] Kernel Oops in NFS

2007-10-19 Thread Jason . V . Mock
 -Original Message-
 From: Trond Myklebust [mailto:[EMAIL PROTECTED] 
 Sent: Thursday, October 18, 2007 18:24
 To: Mock, JV Jason @ IS
 Cc: [EMAIL PROTECTED]; linux-kernel@vger.kernel.org; 
 Kile, SE Scott @ IS
 Subject: Re: [NFS] Kernel Oops in NFS
 
 
 On Thu, 2007-10-18 at 16:01 -0500, [EMAIL PROTECTED] wrote:
   We've come across an Oops, in what appears to NFS.
   
   2.6.22.6 vanilla + realtime-lsm
   RHEL4 over PXE/NFS_ROOT
...
   [c01a9fb8] nfs_lookup+0x11b/0x26a SS:ESP 0068:f63b5d4
   
   We haven't seen any negative side-effects other than users seeing 
   this in Kwrited quite often.  We've yet to update to 2.6.22.9, 
   however we've examined the change logs and patches 
 associated with 
   NFS between then and now, and don't see anything 
 appropriate for the 
   errors we're receiving.  Let me know if you need anything 
 else for 
   this...
  
  I was just checking to see if there's anything that I'm 
 missing here, 
  in regards to never hearing a single thing back about this.
  
  - Jason Mock
 
 Well... Your Oops did have the 'tainted' flag set, but in 
 this case I believe that the issue is already known. Please try
 
   
 http://client.linux-nfs.org/Linux-2.6.x/2.6.22/linux-2.6.22-01
 0-fix_nfs_reval_fsid.dif
 
 Trond
 

Thanks Trond.  The Tainted flag is *probably* due to the NVIDIA driver,
but I'd also have to check the realtime-lsm.  Either way we'll get that
built up and see...

Thanks again!!

- Jason Mock
-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [NFS] Kernel Oops in NFS

2007-10-18 Thread Trond Myklebust

On Thu, 2007-10-18 at 16:01 -0500, [EMAIL PROTECTED] wrote:
> > We've come across an Oops, in what appears to NFS.
> > 
> > 2.6.22.6 vanilla + realtime-lsm
> > RHEL4 over PXE/NFS_ROOT
> > 
> > 
> > Oct  9 14:26:13 WS15 gdm(pam_unix)[6038]: session opened for 
> > user mockj by (uid=0) Oct  9 14:26:48 WS15 gconfd 
> > (mockj-7583): starting (version 2.8.1), pid
> > 7583 user 'mockj'
> > Oct  9 14:26:48 WS15 kernel: BUG: unable to handle kernel 
> > NULL pointer dereference at virtual address 0004 Oct  9 
> > 14:26:48 WS15 kernel:  printing eip:
> > Oct  9 14:26:48 WS15 kernel: c01a9fb8
> > Oct  9 14:26:48 WS15 kernel: *pde = c691d067 Oct  9 14:26:48 
> > WS15 kernel: Oops:  [#1] Oct  9 14:26:48 WS15 kernel: 
> > PREEMPT SMP Oct  9 14:26:48 WS15 kernel: Modules linked in: 
> > lm85 w83781d hwmon_vid hwmon ipv6 parport_pc lp parport 
> > autofs4 tulip dm_mirror dm_mod button battery ac mct_u232 
> > usbserial uhci_hcd ehci_hcd nvidia(P) e7xxx_edac edac_mc 
> > rng_core i2c_i801 i2c_core aic79xx scsi_transport_spi 
> > ata_piix libata scsi_mod snd_intel8x0 snd_ac97_codec ac97_bus 
> > snd_pcm_oss snd_mixer_oss snd_pcm snd_page_alloc 
> > snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq 
> > snd_timer snd_seq_device snd soundcore realtime commoncap
> > Oct  9 14:26:48 WS15 kernel: CPU:0
> > Oct  9 14:26:48 WS15 kernel: EIP:0060:[]Tainted: P
> > VLI
> > Oct  9 14:26:48 WS15 kernel: EFLAGS: 00210246   (2.6.22-6.0.WSsmp #1)
> > Oct  9 14:26:48 WS15 kernel: EIP is at nfs_lookup+0x11b/0x26a
> > Oct  9 14:26:48 WS15 kernel: eax:    ebx: c0367600   ecx:
> >    edx: 
> > Oct  9 14:26:48 WS15 kernel: esi:    edi:    ebp:
> >    esp: f63b5d44
> > Oct  9 14:26:48 WS15 kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033
> > ss: 0068
> > Oct  9 14:26:48 WS15 kernel: Process gconfd-2 (pid: 7583, 
> > ti=f63b4000 task=f6273070 task.ti=f63b4000) Oct  9 14:26:48 
> > WS15 kernel: Stack: f63b5d60 f63b5d98 f63b5d9c 7fff
> > f63b5ed8 f63ef118 f63f5e8c f63b0002 
> > Oct  9 14:26:48 WS15 kernel:f63db21c  
> > c014843e 
> > 000e 0001 0001 81c0 
> > Oct  9 14:26:48 WS15 kernel:0002 1459 
> > 00c9 0271
> >  2000 0008 
> > Oct  9 14:26:48 WS15 kernel: Call Trace:
> > Oct  9 14:26:48 WS15 kernel:  [] 
> > write_cache_pages+0x235/0x285 Oct  9 14:26:48 WS15 kernel:  
> > [] nfs_flush_one+0x0/0xe5 Oct  9 14:26:48 WS15 
> > kernel:  [] mapping_tagged+0x2b/0x32 Oct  9 
> > 14:26:48 WS15 kernel:  [] d_alloc+0x15e/0x166 Oct  
> > 9 14:26:48 WS15 kernel:  [] 
> > lookup_one_len+0xc5/0xe0 Oct  9 14:26:48 WS15 kernel:  
> > [] nfs_sillyrename+0x12b/0x253 Oct  9 14:26:48 WS15 
> > kernel:  [] nfs_permission+0x0/0x147 Oct  9 
> > 14:26:48 WS15 kernel:  [] nfs_unlink+0x81/0xfc Oct  
> > 9 14:26:48 WS15 kernel:  [] may_delete+0x55/0x10a 
> > Oct  9 14:26:48 WS15 kernel:  [] 
> > vfs_unlink+0xa1/0xc5 Oct  9 14:26:48 WS15 kernel:  
> > [] do_unlinkat+0x95/0xf5 Oct  9 14:26:48 WS15 
> > kernel:  [] do_syscall_trace+0x15c/0x19d Oct  9 
> > 14:26:48 WS15 kernel:  [] syscall_call+0x7/0xb Oct  
> > 9 14:26:48 WS15 kernel:  [] 
> > cache_make_upcall+0x40/0x129 Oct  9 14:26:48 WS15 kernel:  
> > === Oct  9 14:26:48 WS15 kernel: Code: 24 
> > 14 8b 00 83 c2 20 8b 58 38 8d 44
> > 24 1c 89 04 24 8b 44 24 18 ff 53 20 83 f8 fe 0f 84 93 00 00 
> > 00 85 c0 89
> > c5 0f 88 3d 01 00 00 <8b> 76 04 8b 54 24 18 89 74 24 10 8b 82 
> > a4 00 00 00 8b 54 24 64 Oct  9 14:26:48 WS15 kernel: EIP: 
> > [] nfs_lookup+0x11b/0x26a SS:ESP 0068:f63b5d4
> > 
> > We haven't seen any negative side-effects other than users 
> > seeing this in Kwrited quite often.  We've yet to update to 
> > 2.6.22.9, however we've examined the change logs and patches 
> > associated with NFS between then and now, and don't see 
> > anything appropriate for the errors we're receiving.  Let me 
> > know if you need anything else for this...
> 
> I was just checking to see if there's anything that I'm missing here, in
> regards to never hearing a single thing back about this.
> 
> - Jason Mock

Well... Your Oops did have the 'tainted' flag set, but in this case I
believe that the issue is already known. Please try

  
http://client.linux-nfs.org/Linux-2.6.x/2.6.22/linux-2.6.22-010-fix_nfs_reval_fsid.dif

Trond

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [NFS] Kernel Oops in NFS

2007-10-18 Thread Trond Myklebust

On Thu, 2007-10-18 at 16:01 -0500, [EMAIL PROTECTED] wrote:
  We've come across an Oops, in what appears to NFS.
  
  2.6.22.6 vanilla + realtime-lsm
  RHEL4 over PXE/NFS_ROOT
  
  
  Oct  9 14:26:13 WS15 gdm(pam_unix)[6038]: session opened for 
  user mockj by (uid=0) Oct  9 14:26:48 WS15 gconfd 
  (mockj-7583): starting (version 2.8.1), pid
  7583 user 'mockj'
  Oct  9 14:26:48 WS15 kernel: BUG: unable to handle kernel 
  NULL pointer dereference at virtual address 0004 Oct  9 
  14:26:48 WS15 kernel:  printing eip:
  Oct  9 14:26:48 WS15 kernel: c01a9fb8
  Oct  9 14:26:48 WS15 kernel: *pde = c691d067 Oct  9 14:26:48 
  WS15 kernel: Oops:  [#1] Oct  9 14:26:48 WS15 kernel: 
  PREEMPT SMP Oct  9 14:26:48 WS15 kernel: Modules linked in: 
  lm85 w83781d hwmon_vid hwmon ipv6 parport_pc lp parport 
  autofs4 tulip dm_mirror dm_mod button battery ac mct_u232 
  usbserial uhci_hcd ehci_hcd nvidia(P) e7xxx_edac edac_mc 
  rng_core i2c_i801 i2c_core aic79xx scsi_transport_spi 
  ata_piix libata scsi_mod snd_intel8x0 snd_ac97_codec ac97_bus 
  snd_pcm_oss snd_mixer_oss snd_pcm snd_page_alloc 
  snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq 
  snd_timer snd_seq_device snd soundcore realtime commoncap
  Oct  9 14:26:48 WS15 kernel: CPU:0
  Oct  9 14:26:48 WS15 kernel: EIP:0060:[c01a9fb8]Tainted: P
  VLI
  Oct  9 14:26:48 WS15 kernel: EFLAGS: 00210246   (2.6.22-6.0.WSsmp #1)
  Oct  9 14:26:48 WS15 kernel: EIP is at nfs_lookup+0x11b/0x26a
  Oct  9 14:26:48 WS15 kernel: eax:    ebx: c0367600   ecx:
     edx: 
  Oct  9 14:26:48 WS15 kernel: esi:    edi:    ebp:
     esp: f63b5d44
  Oct  9 14:26:48 WS15 kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033
  ss: 0068
  Oct  9 14:26:48 WS15 kernel: Process gconfd-2 (pid: 7583, 
  ti=f63b4000 task=f6273070 task.ti=f63b4000) Oct  9 14:26:48 
  WS15 kernel: Stack: f63b5d60 f63b5d98 f63b5d9c 7fff
  f63b5ed8 f63ef118 f63f5e8c f63b0002 
  Oct  9 14:26:48 WS15 kernel:f63db21c  
  c014843e 
  000e 0001 0001 81c0 
  Oct  9 14:26:48 WS15 kernel:0002 1459 
  00c9 0271
   2000 0008 
  Oct  9 14:26:48 WS15 kernel: Call Trace:
  Oct  9 14:26:48 WS15 kernel:  [c014843e] 
  write_cache_pages+0x235/0x285 Oct  9 14:26:48 WS15 kernel:  
  [c01b4332] nfs_flush_one+0x0/0xe5 Oct  9 14:26:48 WS15 
  kernel:  [c01488c5] mapping_tagged+0x2b/0x32 Oct  9 
  14:26:48 WS15 kernel:  [c016e227] d_alloc+0x15e/0x166 Oct  
  9 14:26:48 WS15 kernel:  [c013] 
  lookup_one_len+0xc5/0xe0 Oct  9 14:26:48 WS15 kernel:  
  [c01aabba] nfs_sillyrename+0x12b/0x253 Oct  9 14:26:48 WS15 
  kernel:  [c01aba09] nfs_permission+0x0/0x147 Oct  9 
  14:26:48 WS15 kernel:  [c01aae6e] nfs_unlink+0x81/0xfc Oct  
  9 14:26:48 WS15 kernel:  [c01667f4] may_delete+0x55/0x10a 
  Oct  9 14:26:48 WS15 kernel:  [c0167a82] 
  vfs_unlink+0xa1/0xc5 Oct  9 14:26:48 WS15 kernel:  
  [c0167b3b] do_unlinkat+0x95/0xf5 Oct  9 14:26:48 WS15 
  kernel:  [c0105a67] do_syscall_trace+0x15c/0x19d Oct  9 
  14:26:48 WS15 kernel:  [c0103136] syscall_call+0x7/0xb Oct  
  9 14:26:48 WS15 kernel:  [c035] 
  cache_make_upcall+0x40/0x129 Oct  9 14:26:48 WS15 kernel:  
  === Oct  9 14:26:48 WS15 kernel: Code: 24 
  14 8b 00 83 c2 20 8b 58 38 8d 44
  24 1c 89 04 24 8b 44 24 18 ff 53 20 83 f8 fe 0f 84 93 00 00 
  00 85 c0 89
  c5 0f 88 3d 01 00 00 8b 76 04 8b 54 24 18 89 74 24 10 8b 82 
  a4 00 00 00 8b 54 24 64 Oct  9 14:26:48 WS15 kernel: EIP: 
  [c01a9fb8] nfs_lookup+0x11b/0x26a SS:ESP 0068:f63b5d4
  
  We haven't seen any negative side-effects other than users 
  seeing this in Kwrited quite often.  We've yet to update to 
  2.6.22.9, however we've examined the change logs and patches 
  associated with NFS between then and now, and don't see 
  anything appropriate for the errors we're receiving.  Let me 
  know if you need anything else for this...
 
 I was just checking to see if there's anything that I'm missing here, in
 regards to never hearing a single thing back about this.
 
 - Jason Mock

Well... Your Oops did have the 'tainted' flag set, but in this case I
believe that the issue is already known. Please try

  
http://client.linux-nfs.org/Linux-2.6.x/2.6.22/linux-2.6.22-010-fix_nfs_reval_fsid.dif

Trond

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/