[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <18907.41226.669821.298854@stoffel.org>
Date: Tue, 7 Apr 2009 14:52:58 -0400
From: "John Stoffel" <john@...ffel.org>
To: "John Stoffel" <john@...ffel.org>
Cc: Jarek Poplawski <jarkao2@...il.com>, linux-kernel@...r.kernel.org,
netdev@...r.kernel.org, Pete Zaitcev <zaitcev@...hat.com>,
linux-usb@...r.kernel.org
Subject: usb_mon oops Re: tcpdump crashes 2.6.29.1 (and 2.6.29-rc5)
>>>>> "John" == John Stoffel <john@...ffel.org> writes:
>>>>> "Jarek" == Jarek Poplawski <jarkao2@...il.com> writes:
Jarek> On 07-04-2009 05:03, John Stoffel wrote:
>>> Hi,
Jarek> Hi,
Jarek> Looks more like usb_mon crash, so some Cc added.
John> I'll re-build without USB_MON on my system and see what happens.
John> If it works, I'll start a bisection run back to see where the
John> issue first crops up.
Ok, I've rebuit the system, and in my initial quick remote tests,
tcpdump doesn't crash the system. Now I also admit that my test box
on the 192.168.2/24 subnet isn't powered on right now, so who knows.
I'll see if I can go back to 2.6.28 with USB_MON compiled in, and see
if that causes a problem. Who knows...
More later tonight if I'm lucky.
John> But I'm surprised that USB_MON would be the cause when it's a
John> networking tool which is starting up? *shrug*
>>>
>>> I've got an AMD64x2 system, x86_64, SMP, PREEMPT, with 4Gb of RAM,
>>> running 2.6.29.1 (most recently running 2.6.29-rc5 for a while before
>>> that) which crashes when I run 'tcpdump host x.y.z.n'. I'm on
>>> linux-kernel, but not netdev, so please keep me in the headers.
>>>
>>> I have't tried wireshark or ethereal yet, since I just wanted to see
>>> if packets were getting forwarded. My main firewall is a m0n0wall
>>> WRAP board, so there's no much to do there debugging wise. Ping does
>>> seem to work from both the firewall (192.1681.254) to 192.168.2.200
>>> once I put in the proper static route via sail
>>> (192.168.1.3/192.168.2.3).
>>>
>>> Background: I'm working on setting up a PXE boot environment for a new
>>> box without a CDROM. My current system, sail, has eth0 on the
>>> 192.168.1.0/24 subnet, with an IP of 192.168.1.3, and my WAN router
>>> (with DHCP) is setup at 192.168.1.254. So I setup eth1 on the
>>> 192.168.2.0/24 subnet, with a DHCP server on my host, and an IP of
>>> 192.168.2.3 on that subnet. More details:
>>>
>>>
>>> eth0 Link encap:Ethernet HWaddr 00:1e:8c:45:f3:e5
>>> inet addr:192.168.1.3 Bcast:192.168.1.255
>>> Mask:255.255.255.0
>>> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
>>> RX packets:8663 errors:0 dropped:0 overruns:0 frame:0
>>> TX packets:10088 errors:0 dropped:0 overruns:0 carrier:0
>>> collisions:0 txqueuelen:1000
>>> RX bytes:3329485 (3.3 MB) TX bytes:2088101 (2.0 MB)
>>> Interrupt:26 Base address:0xe000
>>>
>>> eth1 Link encap:Ethernet HWaddr 00:1e:8c:46:0e:74
>>> inet addr:192.168.2.3 Bcast:192.168.2.255
>>> Mask:255.255.255.0
>>> UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
>>> RX packets:8 errors:0 dropped:0 overruns:0 frame:0
>>> TX packets:71 errors:0 dropped:0 overruns:0 carrier:0
>>> collisions:0 txqueuelen:1000
>>> RX bytes:1608 (1.6 KB) TX bytes:11169 (11.1 KB)
>>> Interrupt:27 Base address:0xa000
>>>
>>> > cat /proc/sys/net/ipv4/ip_forward
>>> 1
>>>
>>> > cat /proc/version
>>> Linux version 2.6.29.1 (root@...l) (gcc version 4.3.3 (Ubuntu
>>> 4.3.3-5ubuntu4) ) #22 SMP PREEMPT Mon Apr 6 21:41:56 EDT 2009
>>>
>>> > netstat -nr
>>> Kernel IP routing table
>>> Destination Gateway Genmask Flags MSS Window
>>> irtt Iface
>>> 192.168.2.0 0.0.0.0 255.255.255.0 U 0 0
>>> 0 eth1
>>> 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0
>>> 0 eth0
>>> 169.254.0.0 0.0.0.0 255.255.0.0 U 0 0
>>> 0 eth1
>>> 0.0.0.0 192.168.1.254 0.0.0.0 UG 0 0
>>> 0 eth0
>>>
>>> > ip route
>>> 192.168.2.0/24 dev eth1 proto kernel scope link src 192.168.2.3
>>> 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.3
>>> 169.254.0.0/16 dev eth1 scope link metric 1000
>>> default via 192.168.1.254 dev eth0 metric 100
>>>
>>>
>>> > tcpdump --version
>>> tcpdump version 3.9.8
>>> libpcap version 1.0.0
>>>
>>> I don't have any ip_tables stuff loaded, which might be needed for my
>>> setup, but which doesn't seem to be implicated in this crash right
>>> now.
>>>
>>> I can now PXEboot my client just fine, but connections from the
>>> 192.168.2.200 PXE host don't seem to get properly forwarded out to the
>>> internet so I can continue the network boot and install of Debian. So
>>> to figure out what I was going wrong, I would try to do 'tcpdump host
>>> 192.168.2.200' on 'sail' and it would instantly hang. I mucked around
>>> and got netconsole setup and got the following ksymoops.
>>>
>>> Hopefully they'll be helpful. I'll be happy to try and bisect this,
>>> and I'll start moving back in versions to see if I can find where this
>>> crash takes place.
>>>
>>> [ 1396.271782] BUG: unable to handle kernel paging request at ffff880020a15cc0
>>> [ 1396.271809] IP: [<ffffffff803f436b>] memcpy_c+0xb/0x20
>>> [ 1396.271837] PGD 202063 PUD 206063 PMD 20a001e2
>>> [ 1396.271864] Oops: 0000 [#1] PREEMPT SMP
>>> [ 1396.271887] last sysfs file: /sys/module/loop/initstate
>>> [ 1396.271896] CPU 1
>>> [ 1396.271907] Modules linked in: cryptoloop loop kvm_amd netconsole configfs binfmt_misc radeon drm af_packet kvm nfs ftdi_sio usbserial ata_generic pata_jmicron ohci1394 ieee1394 k8temp uvcvideo videodev v4l1_compat v4l2_compat_ioctl32 i2c_nforce2 i2c_core [last unloaded: kvm_amd]
>>> [ 1396.272062] Pid: 0, comm: swapper Not tainted 2.6.29.1 #22 System Product Name
>>> [ 1396.272070] RIP: 0010:[<ffffffff803f436b>] [<ffffffff803f436b>] memcpy_c+0xb/0x20
>>> [ 1396.272087] RSP: 0018:ffff88011e8b7b00 EFLAGS: 00010002
>>> [ 1396.272095] RAX: ffff8800cac5d2c0 RBX: 0000000000000012 RCX: 0000000000000002
>>> [ 1396.272103] RDX: 0000000000000002 RSI: ffff880020a15cc0 RDI: ffff8800cac5d2c0
>>> [ 1396.272112] RBP: ffff88011e8b7b38 R08: 0000000000000080 R09: 000000000004b000
>>> [ 1396.272120] R10: 0000000000000012 R11: 00000000ffffff82 R12: 00000000000002d2
>>> [ 1396.272129] R13: 0000000000000012 R14: ffff880020a15cc0 R15: 0000000000000012
>>> [ 1396.272138] FS: 00007fe36d6f1700(0000) GS:ffff88011f5d92c0(0000) knlGS:0000000000000000
>>> [ 1396.272146] CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
>>> [ 1396.272155] CR2: ffff880020a15cc0 CR3: 0000000115e14000 CR4: 00000000000006e0
>>> [ 1396.272163] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> [ 1396.272172] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> [ 1396.272181] Process swapper (pid: 0, threadinfo ffff88011e8b0000, task ffff88011e89b820)
>>> [ 1396.272189] Stack:
>>> [ 1396.272195] ffffffff804e6444 ffff88010aab2ec0 0000000000000000 0000000000000012
>>> [ 1396.272216] 0000000020a15cc0 00000000000002c0 ffff88010aab2ec0 ffff88011e8b7b78
>>> [ 1396.272247] ffffffff804e760e 0000000000000096 ffff8800cac5d280 ffff88010aab2ec0
>>> [ 1396.272279] Call Trace:
>>> [ 1396.272287] <IRQ> <0> [<ffffffff804e6444>] ? mon_copy_to_buff+0x74/0xa0
>>> [ 1396.272309] [<ffffffff804e760e>] mon_dmapeek_vec+0x9e/0x120
>>> [ 1396.272322] [<ffffffff804e67bf>] mon_bin_event+0x34f/0x3d0
>>> [ 1396.272338] [<ffffffff804e6850>] mon_bin_complete+0x10/0x20
>>> [ 1396.272350] [<ffffffff804e4658>] mon_bus_complete+0x48/0x80
>>> [ 1396.272364] [<ffffffff804e46b4>] mon_complete+0x24/0x40
>>> [ 1396.272376] [<ffffffff804d400b>] usb_hcd_giveback_urb+0x9b/0xe0
>>> [ 1396.272390] [<ffffffff804e8416>] ehci_urb_done+0x106/0x130
>>> [ 1396.272404] [<ffffffff804e9d3a>] qh_completions+0x31a/0x680
>>> [ 1396.272417] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272433] [<ffffffff804ea183>] ehci_work+0xe3/0xbf0
>>> [ 1396.272446] [<ffffffff804f1690>] ehci_irq+0x2b0/0x430
>>> [ 1396.272460] [<ffffffff8026e869>] ? getnstimeofday+0x59/0xe0
>>> [ 1396.272474] [<ffffffff80269979>] ? ktime_get_ts+0x59/0x60
>>> [ 1396.272489] [<ffffffff804d399c>] usb_hcd_irq+0x4c/0xb0
>>> [ 1396.272502] [<ffffffff8028e9d3>] handle_IRQ_event+0x43/0x80
>>> [ 1396.272516] [<ffffffff802902f2>] handle_fasteoi_irq+0x82/0x100
>>> [ 1396.272532] [<ffffffff802161a1>] do_IRQ+0x81/0x110
>>> [ 1396.272545] [<ffffffff80214213>] ret_from_intr+0x0/0x29
>>> [ 1396.272558] <EOI> <0> [<ffffffff8022ef76>] ? native_safe_halt+0x6/0x10
>>> [ 1396.272580] [<ffffffff8021ad8d>] ? default_idle+0x4d/0x50
>>> [ 1396.272594] [<ffffffff8021af41>] ? c1e_idle+0x51/0x120
>>> [ 1396.272607] [<ffffffff80661291>] ? atomic_notifier_call_chain+0x11/0x20
>>> [ 1396.272620] [<ffffffff80212679>] ? cpu_idle+0x69/0xd0
>>> [ 1396.272636] [<ffffffff80656b97>] ? start_secondary+0x182/0x1db
>>> [ 1396.272650] Code: 81 ea d8 1f 00 00 48 3b 42 20 73 07 48 8b 50 f9 31 c0 c3 31 d2 48 c7 c0 f2 ff ff ff c3 90 90 90 48 89 f8 89 d1 c1 e9 03 83 e2 07 <f3> 48 a5 89 d1 f3 a4 c3 66 66 66 66 2e 0f 1f 84 00 00 00 00 00
>>> [ 1396.272759] RIP [<ffffffff803f436b>] memcpy_c+0xb/0x20
>>> [ 1396.272759] RSP <ffff88011e8b7b00>
>>> [ 1396.272759] CR2: ffff880020a15cc0
>>> [ 1396.272759] ---[ end trace 091310ffa51c7f18 ]---
>>> [ 1396.272759] Kernel panic - not syncing: Fatal exception in interrupt
>>> [ 1396.272759] ------------[ cut here ]------------
>>> [ 1396.272759] WARNING: at kernel/smp.c:329 smp_call_function_many+0x231/0x2a0()
>>> [ 1396.272759] Hardware name: System Product Name
>>> [ 1396.272759] Modules linked in: cryptoloop loop kvm_amd netconsole configfs binfmt_misc radeon drm af_packet kvm nfs ftdi_sio usbserial ata_generic pata_jmicron ohci1394 ieee1394 k8temp uvcvideo videodev v4l1_compat v4l2_compat_ioctl32 i2c_nforce2 i2c_core [last unloaded: kvm_amd]
>>> [ 1396.272759] Pid: 0, comm: swapper Tainted: G D 2.6.29.1 #22
>>> [ 1396.272759] Call Trace:
>>> [ 1396.272759] <IRQ> [<ffffffff8024e610>] warn_slowpath+0xd0/0x130
>>> [ 1396.272759] [<ffffffff803f2fa1>] ? vsnprintf+0x351/0xbb0
>>> [ 1396.272759] [<ffffffff803f204f>] ? put_dec+0x11f/0x130
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8048157b>] ? nv_start_xmit_optimized+0x47b/0x5c0
>>> [ 1396.272759] [<ffffffff8021b030>] ? stop_this_cpu+0x0/0x30
>>> [ 1396.272759] [<ffffffff805bf535>] ? netpoll_send_udp+0x205/0x220
>>> [ 1396.272759] [<ffffffff802777f1>] smp_call_function_many+0x231/0x2a0
>>> [ 1396.272759] [<ffffffff8021b030>] ? stop_this_cpu+0x0/0x30
>>> [ 1396.272759] [<ffffffff8022feb9>] ? default_spin_lock_flags+0x9/0x10
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8024eebd>] ? release_console_sem+0x1bd/0x210
>>> [ 1396.272759] [<ffffffff8024f5b0>] ? vprintk+0x3d0/0x450
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8065af15>] ? printk+0x67/0x6a
>>> [ 1396.272759] [<ffffffff8027ef74>] ? crash_kexec+0x74/0x100
>>> [ 1396.272759] [<ffffffff8022feb9>] ? default_spin_lock_flags+0x9/0x10
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8024eebd>] ? release_console_sem+0x1bd/0x210
>>> [ 1396.272759] [<ffffffff8027788f>] smp_call_function+0x2f/0x70
>>> [ 1396.272759] [<ffffffff80227fd3>] native_smp_send_stop+0x23/0x50
>>> [ 1396.272759] [<ffffffff8065ade9>] panic+0xbe/0x183
>>> [ 1396.272759] [<ffffffff8027ef74>] ? crash_kexec+0x74/0x100
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff8024eebd>] ? release_console_sem+0x1bd/0x210
>>> [ 1396.272759] [<ffffffff8024f195>] ? console_unblank+0x75/0x90
>>> [ 1396.272759] [<ffffffff8065ee04>] oops_end+0xe4/0xf0
>>> [ 1396.272759] [<ffffffff806606fa>] do_page_fault+0x22a/0xcd0
>>> [ 1396.272759] [<ffffffff8025be41>] ? complete_signal+0x121/0x210
>>> [ 1396.272759] [<ffffffff8025c0fe>] ? send_signal+0x1ce/0x2d0
>>> [ 1396.272759] [<ffffffff80240aa5>] ? check_preempt_wakeup+0x175/0x190
>>> [ 1396.272759] [<ffffffff80249a0c>] ? try_to_wake_up+0x16c/0x240
>>> [ 1396.272759] [<ffffffff804c484b>] ? nv_swncq_host_interrupt+0x17b/0x760
>>> [ 1396.272759] [<ffffffff802415b8>] ? enqueue_task_fair+0x188/0x1d0
>>> [ 1396.272759] [<ffffffff8065e145>] page_fault+0x25/0x30
>>> [ 1396.272759] [<ffffffff803f436b>] ? memcpy_c+0xb/0x20
>>> [ 1396.272759] [<ffffffff804e6444>] ? mon_copy_to_buff+0x74/0xa0
>>> [ 1396.272759] [<ffffffff804e760e>] mon_dmapeek_vec+0x9e/0x120
>>> [ 1396.272759] [<ffffffff804e67bf>] mon_bin_event+0x34f/0x3d0
>>> [ 1396.272759] [<ffffffff804e6850>] mon_bin_complete+0x10/0x20
>>> [ 1396.272759] [<ffffffff804e4658>] mon_bus_complete+0x48/0x80
>>> [ 1396.272759] [<ffffffff804e46b4>] mon_complete+0x24/0x40
>>> [ 1396.272759] [<ffffffff804d400b>] usb_hcd_giveback_urb+0x9b/0xe0
>>> [ 1396.272759] [<ffffffff804e8416>] ehci_urb_done+0x106/0x130
>>> [ 1396.272759] [<ffffffff804e9d3a>] qh_completions+0x31a/0x680
>>> [ 1396.272759] [<ffffffff8065dc5a>] ? _spin_unlock_irqrestore+0x4a/0x60
>>> [ 1396.272759] [<ffffffff804ea183>] ehci_work+0xe3/0xbf0
>>> [ 1396.272759] [<ffffffff804f1690>] ehci_irq+0x2b0/0x430
>>> [ 1396.272759] [<ffffffff8026e869>] ? getnstimeofday+0x59/0xe0
>>> [ 1396.272759] [<ffffffff80269979>] ? ktime_get_ts+0x59/0x60
>>> [ 1396.272759] [<ffffffff804d399c>] usb_hcd_irq+0x4c/0xb0
>>> [ 1396.272759] [<ffffffff8028e9d3>] handle_IRQ_event+0x43/0x80
>>> [ 1396.272759] [<ffffffff802902f2>] handle_fasteoi_irq+0x82/0x100
>>> [ 1396.272759] [<ffffffff802161a1>] do_IRQ+0x81/0x110
>>> [ 1396.272759] [<ffffffff80214213>] ret_from_intr+0x0/0x29
>>> [ 1396.272759] <EOI> [<ffffffff8022ef76>] ? native_safe_halt+0x6/0x10
>>> [ 1396.272759] [<ffffffff8021ad8d>] ? default_idle+0x4d/0x50
>>> [ 1396.272759] [<ffffffff8021af41>] ? c1e_idle+0x51/0x120
>>> [ 1396.272759] [<ffffffff80661291>] ? atomic_notifier_call_chain+0x11/0x20
>>> [ 1396.272759] [<ffffffff80212679>] ? cpu_idle+0x69/0xd0
>>> [ 1396.272759] [<ffffffff80656b97>] ? start_secondary+0x182/0x1db
>>> [ 1396.272759] ---[ end trace 091310ffa51c7f19 ]---
>>> [ 1396.272759] ------------[ cut here ]------------
>>> [ 1396.272759] WARNING: at kernel/smp.c:226 smp_call_function_single+0xdf/0x170()
>>> [ 1396.272759] Hardware name: System Product Name
>>> [ 1396.272759] Modules linked in: cryptoloop loop kvm_amd netconsole configfs binfmt_misc radeon drm af_packet kvm nfs ftdi_sio usbserial ata_generic pata_jmicron ohci1394
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists