GPF: in ppp_tty_read during heavy swapping, kernel 2.0.35

Daniel Ryde (ryde@tripnet.se)
Tue, 8 Sep 1998 14:46:37 +0200 (CEST)


Terminal servers here running several ppp daemons gets GPF during
heavy swapping (15-20Mb, loadavg 2-4):

general protection: 0000
CPU: 0
EIP: 0010:[<00196a80>]
EFLAGS: 00010286
eax: 00000000 ebx: 01616618 ecx: 00000005 edx: f000ef6f
esi: 00000006 edi: 080628dc ebp: 000005e0 esp: 01c5ff58
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 28497, process nr: 38, stackpage=01c5f000)
Stack: 00f43000 017da7b4 00b04d00 000005e0 00000005 0010d406 00174afd 00f43000
017da7b4 080628da 000005e0 00000000 017da7b4 000005e0 00b04d00 00122ae0
00b04d00 017da7b4 080628da 000005e0 00b01c0c 00000005 0805ff64 bffffdd0
Call Trace: [<0010d406>] [<00174afd>] [<00122ae0>] [<0010a705>] [<0018a2b8>]
Code: 8a 52 20 88 54 24 14 ff 40 0c 8b 43 6c 8b 08 21 48 0c 0f b6

>>EIP: 196a80 <ppp_tty_read+2b0/304>
Trace: 10d406 <do_sys_vm86+e2/e4>
Trace: 174afd <tty_read+9d/bc>
Trace: 122ae0 <sys_read+c0/e8>
Trace: 10a705 <system_call+55/80>
Trace: 18a2b8 <ne_probe+58/98>

Code: 196a80 <ppp_tty_read+2b0/304>
Code: 196a80 <ppp_tty_read+2b0/304> 8a 52 20 movb 0x20(%edx),%dl
Code: 196a83 <ppp_tty_read+2b3/304> 88 54 24 14 movb %dl,0x14(%esp,1)
Code: 196a87 <ppp_tty_read+2b7/304> ff 40 0c incl 0xc(%eax)
Code: 196a90 <ppp_tty_read+2c0/304> 8b 43 6c movl 0x6c(%ebx),%eax
Code: 196a93 <ppp_tty_read+2c3/304> 8b 08 movl (%eax),%ecx
Code: 196a95 <ppp_tty_read+2c5/304> 21 48 0c andl %ecx,0xc(%eax)
Code: 196a98 <ppp_tty_read+2c8/304> 0f b6 00 movzbl (%eax),%eax
Code: 196aa1 <ppp_tty_read+2d1/304> 90 nop
Code: 196aa2 <ppp_tty_read+2d2/304> 90 nop
Code: 196aa3 <ppp_tty_read+2d3/304> 90 nop

general protection: 0000
CPU: 0
EIP: 0010:[<00196a80>]
EFLAGS: 00010286
eax: 00000000 ebx: 008c4814 ecx: 00000005 edx: f000ef6f
esi: 00000006 edi: 080628dc ebp: 000005e0 esp: 017f3f58
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 28629, process nr: 26, stackpage=017f3000)
Stack: 0072d000 00443154 003b8700 000005e0 00000005 000c5706 00174afd 0072d000
00443154 080628da 000005e0 00000000 00443154 000005e0 003b8700 00122ae0
003b8700 00443154 080628da 000005e0 005dc414 00000005 0805ff64 bffffdd0
Call Trace: [<00174afd>] [<00122ae0>] [<0010a705>] [<0018a2b8>]
Code: 8a 52 20 88 54 24 14 ff 40 0c 8b 43 6c 8b 08 21 48 0c 0f b6

>>EIP: 196a80 <ppp_tty_read+2b0/304>
Trace: 174afd <tty_read+9d/bc>
Trace: 122ae0 <sys_read+c0/e8>
Trace: 10a705 <system_call+55/80>
Trace: 18a2b8 <ne_probe+58/98>

Code: 196a80 <ppp_tty_read+2b0/304>
Code: 196a80 <ppp_tty_read+2b0/304> 8a 52 20 movb 0x20(%edx),%dl
Code: 196a83 <ppp_tty_read+2b3/304> 88 54 24 14 movb %dl,0x14(%esp,1)
Code: 196a87 <ppp_tty_read+2b7/304> ff 40 0c incl 0xc(%eax)
Code: 196a90 <ppp_tty_read+2c0/304> 8b 43 6c movl 0x6c(%ebx),%eax
Code: 196a93 <ppp_tty_read+2c3/304> 8b 08 movl (%eax),%ecx
Code: 196a95 <ppp_tty_read+2c5/304> 21 48 0c andl %ecx,0xc(%eax)
Code: 196a98 <ppp_tty_read+2c8/304> 0f b6 00 movzbl (%eax),%eax
Code: 196aa1 <ppp_tty_read+2d1/304> 90 nop
Code: 196aa2 <ppp_tty_read+2d2/304> 90 nop
Code: 196aa3 <ppp_tty_read+2d3/304> 90 nop

Boot message:
Loaded 3379 symbols from /System.map.
Symbols match kernel version 2.0.35.
No module symbols loaded - kernel modules not enabled.
Console: 16 point font, 400 scans
Console: colour VGA+ 80x25, 1 virtual console (max 63)
pcibios_init : BIOS32 Service Directory structure at 0x000f8440
pcibios_init : BIOS32 Service Directory entry at 0xf7e90
pcibios_init : PCI BIOS revision 2.10 entry at 0xf7ec0
Probing PCI hardware.
Calibrating delay loop.. ok - 53.25 BogoMIPS
Memory: 31036k/32768k available (632k kernel code, 384k reserved, 716k data)
Swansea University Computer Society NET3.035 for Linux 2.0
NET3: Unix domain sockets 0.13 for Linux NET3.035.
Swansea University Computer Society TCP/IP for NET3.034
IP Protocols: ICMP, UDP, TCP
Checking 386/387 coupling... Ok, fpu using exception 16 error reporting.
Checking 'hlt' instruction... Ok.
Intel Pentium with F0 0F bug - workaround enabled.
alias mapping IDT readonly ... ... done
Linux version 2.0.35 (ryde@hobbe) (gcc version 2.7.2.1) #2 Fri Aug 7 10:48:35 CEST 1998
Starting kswapd v 1.4.2.2
Serial driver version 4.13 with no serial options enabled
tty00 at 0x03f8 (irq = 4) is a 16550A
tty01 at 0x02f8 (irq = 3) is a 16550A
ide: i82371 PIIX (Triton) on PCI bus 0 function 57
ide0: BM-DMA at 0xe800-0xe807
ide1: BM-DMA at 0xe808-0xe80f
hda: FUJITSU M1623TAU, 1623MB w/128kB Cache, CHS=824/64/63, DMA
ide0 at 0x1f0-0x1f7,0x3f6 on irq 14
Floppy drive(s): fd0 is 1.44M
FDC 0 is a post-1991 82077
PPP: version 2.2.0 (dynamic channel allocation)
TCP compression code copyright 1989 Regents of the University of California
PPP Dynamic channel allocation code copyright 1995 Caldera, Inc.
PPP line discipline registered.
SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256).
CSLIP: code copyright 1989 Regents of the University of California.
SLIP linefill/keepalive option.
eth0: 3Com 3c590 Vortex 10Mbps at 0xe000, 00:20:af:cf:21:35, IRQ 11
32K byte-wide RAM 1:1 Rx:Tx split, 10baseT interface.
eth0: Overriding PCI latency timer (CFLT) setting of 32, new value is 248.
3c59x.c:v0.99E 5/12/98 Donald Becker http://cesdis.gsfc.nasa.gov/linux/drivers/vortex.html
Partition check:
hda: hda1 hda2
VFS: Mounted root (ext2 filesystem) readonly.
Adding Swap: 66492k swap-space (priority -1)

Kernel .config:
CONFIG_NET=y
CONFIG_PCI=y
CONFIG_SYSVIPC=y
CONFIG_BINFMT_AOUT=y
CONFIG_BINFMT_ELF=y
CONFIG_KERNEL_ELF=y
CONFIG_M586=y
CONFIG_BLK_DEV_FD=y
CONFIG_BLK_DEV_IDE=y
CONFIG_BLK_DEV_TRITON=y
CONFIG_NET_ALIAS=y
CONFIG_INET=y
CONFIG_IP_FORWARD=y
CONFIG_SYN_COOKIES=y
CONFIG_IP_ALIAS=y
CONFIG_IP_NOSR=y
CONFIG_SKB_LARGE=y
CONFIG_NETDEVICES=y
CONFIG_DUMMY=y
CONFIG_PPP=y
CONFIG_SLIP=y
CONFIG_SLIP_COMPRESSED=y
CONFIG_SLIP_SMART=y
CONFIG_NET_ETHERNET=y
CONFIG_NET_VENDOR_3COM=y
CONFIG_VORTEX=y
CONFIG_NET_PCI=y
CONFIG_DEC_ELCP=y
CONFIG_EPIC=y
CONFIG_NET_ISA=y
CONFIG_NE2000=y
CONFIG_MINIX_FS=y
CONFIG_EXT2_FS=y
CONFIG_NLS=y
CONFIG_FAT_FS=y
CONFIG_MSDOS_FS=y
CONFIG_NLS_CODEPAGE_437=y
CONFIG_NLS_CODEPAGE_850=y
CONFIG_NLS_ISO8859_1=y
CONFIG_PROC_FS=y
CONFIG_SERIAL=y
CONFIG_SECURE_STACK=y
CONFIG_SECURE_LINK=y
CONFIG_SECURE_PIPE=y

Best Regards

Daniel Ryde, System Administrator
__________________________________________________________________________
Tripnet AB Visit Address: Telephone: +46 31 7252500
Box 5071 Avagen 42 Facsimile: +46 31 7252501
S-402 22 GOTEBORG GOTEBORG Email: ryde@tripnet.se
Sweden Sweden

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/faq.html