lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <6101e8c40806091004q35f75dc4ve3ec9f230457957f@mail.gmail.com>
Date:	Mon, 9 Jun 2008 19:04:26 +0200
From:	"Oliver Pinter" <oliver.pntr@...il.com>
To:	zsirmo@...rmo.hu
Cc:	"Phil Oester" <kernel@...uxace.com>,
	"Ilpo Järvinen" <ilpo.jarvinen@...sinki.fi>,
	"Andrew Morton" <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>,
	"Ingo Molnar" <mingo@...e.hu>, netdev <netdev@...r.kernel.org>,
	"Matt Carlson" <mcarlson@...adcom.com>,
	"Michael Chan" <mchan@...adcom.com>,
	"Brian Vowell" <brian.vowell@...il.com>
Subject: Re: bug report

an other case, but with nvidia

http://frugalware.org/paste/2639

On 6/8/08, Zsiros Attila <zsirmo@...rmo.hu> wrote:
> Hy!
>
> Newer log
> http://www.cyberszeg.hu/log/kern2.log
>
> Zsirmo
>
> Oliver Pinter írta:
>> Hi!
>>
>> Attila first use one other nic (rtl8169), and after one other (3com
>> BCM570). All NIC producted this error...
>> the full thread in Hungarian Unix Portal: http://hup.hu/node/56295
>>
>> On 6/7/08, Phil Oester <kernel@...uxace.com> wrote:
>>
>>> On Sat, Jun 07, 2008 at 02:50:06PM +0200, Oliver Pinter wrote:
>>>
>>>> [snip]
>>>> Jun  6 14:04:11 www kernel: [ 6464.556309] clamscan: page allocation
>>>> failure. order:3, mode:0x4020 <------------- this
>>>>
>>> "Me too".  Lots of order 3 allocation failures on e1000 nics
>>> since upgrading some heavy traffic boxes to 2.6.25 (though from 2.6.21,
>>> so unclear on when it began).
>>>
>>> Phil
>>>
>>> Jun  2 11:11:24 px01 kernel: swapper: page allocation failure. order:3,
>>> mode:0x4020
>>> Jun  2 11:11:24 px01 kernel: Pid: 0, comm: swapper Not tainted
>>> 2.6.25.2-x86_64.1 #1
>>> Jun  2 11:11:24 px01 kernel:
>>> Jun  2 11:11:24 px01 kernel: Call Trace:
>>> Jun  2 11:11:24 px01 kernel:  <IRQ>  [<ffffffff8024ce51>]
>>> __alloc_pages+0x2dd/0x2f6
>>> Jun  2 11:11:24 px01 kernel:  [<ffffffff8026578d>]
>>> __slab_alloc+0x16e/0x4f9
>>> Jun  2 11:11:24 px01 kernel:  [<ffffffff80394e84>]
>>> tcp_collapse+0x164/0x394
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff802656d0>]
>>> __slab_alloc+0xb1/0x4f9
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff80394e84>]
>>> tcp_collapse+0x164/0x394
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8026685d>]
>>> __kmalloc_track_caller+0x82/0xb8
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8036a124>] __alloc_skb+0x5b/0x121
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff80394e84>]
>>> tcp_collapse+0x164/0x394
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff80395261>]
>>> tcp_prune_queue+0x1ad/0x21e
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff803954ba>]
>>> tcp_data_queue+0x1e8/0xbab
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff803974e8>]
>>> tcp_rcv_established+0x64c/0x6fc
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8039c76f>]
>>> tcp_v4_do_rcv+0x2c/0x1b4
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8039e43e>] tcp_v4_rcv+0x6b3/0x705
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff80384cdc>]
>>> ip_local_deliver_finish+0xf6/0x1b3
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff80384bc3>]
>>> ip_rcv_finish+0x2bf/0x2e2
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8023ada3>]
>>> getnstimeofday+0x2f/0x83
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8036e6b2>]
>>> netif_receive_skb+0x1af/0x21b
>>> Jun  2 11:11:25 px01 kernel:  [<ffffffff8032da6d>]
>>> e1000_clean_rx_irq+0x3f3/0x4e7
>>>
>>>
>>>
>>
>>
>>
>
>


-- 
Thanks,
Oliver
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ