On Wednesday 13 Jul 2005 16:30, Ingo Molnar wrote:
> * Ingo Molnar <[email protected]> wrote:
> > it worked upon the first try, and indeed my testbox crashed within 10
> > seconds:
> >
> > BUG: Unable to handle kernel NULL pointer dereference
> > BUG: Unable to handle kernel NULL pointer dereference at virtual address
> > 00000006
>
> a couple of crashes later i got an important clue:
>
> BUG: bad soft irq-flag value 00000f64, openvpn/3386!
> [<c0104052>] dump_stack+0x1f/0x21 (20)
> [<c013b883>] check_soft_flags+0x73/0xc9 (24)
> [<00000f78>] 0xf78 (1066836133)
>
> it turns out that a small portion of the softirq processing path was
> still using the soft IRQ-flag, instead of the raw IRQ-flag! Given enough
> irq and softirq workload, we were interrupted in a piece of code where
> the data structure was inconsistent. (tinfo.task was already changed,
> but %esp not yet) Since interrupts were enabled during the crash
> printout, it would crash again and again as it got more interrupts. The
> backtrace printout crashed too due to the inconsistency. That's why you
> got those repeat ============= lines.
>
> the patch below should fix this bug and i've uploaded the -51-30 patch
> with this fix included. Could you check whether 4K stacks are now stable
> for you under PREEMPT_RT?
>
> so your intuitition about this being related to 4K stacks was completely
> right.
>
Ingo,
This fixes the issue. It's one more 'crossed t' on the rt-preempt patches.
I'll let you know if I discover anything else; your work has already allowed
us to bring the responsiveness of our instrument to 300us which is low enough
for the real-time PCR industry. Thanks a lot!
This debugging process has been extremely eye opening, thanks for the detailed
descriptions of what's gone wrong at every stage. I just wish I was competent
enough to fix these things myself.
--
Cheers,
Alistair.
personal: alistair()devzero!co!uk
university: s0348365()sms!ed!ac!uk
student: CS/CSim Undergraduate
contact: 1F2 55 South Clerk Street,
Edinburgh. EH8 9PP.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
|
|