Hello

System: SMP BP6 2x480 Celeron 192MB  IMB30GB  G400

Oops occured while I'm tunning multithreaded application 
while recreating new thread.

Lately I'm having a lot of complete deadlocks also
(this lock has been the lucky one as I could actually report it)

Usual symptoms - doing heavy disk transfers with caching thread
Before my application was not that fast - but as the speed goes up,
hard-locking in kernel seems to be appearing more and more offten.
I'm using around 7 threads and continuously adding new broadcast,
cond_wait
communication. But during last few days I've got up-to 7 deadlocks in a
day -
this is really becoming borring - I've also tested 2.4.5-ac9 &
2.4.5-ac13
both these kernel also lock with similiar conditions.
For more details just ask me (and it's the hardware fault,
nor the problem of RTL3.0 as -ac9 & -ac13 were both used without this
patch and were locking similary)

Here is an Oops


ksymoops 2.3.7 on i686 2.4.5-pre5-RTL3.0.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.5-pre5-RTL3.0/ (default)
     -m /usr/src/linux/System.map (default)

Warning (compare_maps): ksyms_base symbol
__VERSIONED_SYMBOL(shmem_file_setup) not found in System.map.  Ignoring
c014c9ae
Oops: 0002
CPU:    1
EIP:    0010:[<c014c9ae>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010202
eax: 00000002   ebx: c9705400   ecx: c0248afc   edx: c9df4000
esi: c0248c60   edi: 00000002   ebp: ca9283a0   esp: c56fbe84
ds: 0018   es: 0018   ss: 0018
Process top (pid: 27600, stackpage=c56fb000)
Stack: c01473be c9705400 c9df4000 c133e000 c014dbbd c9705400 00007fdd
c9df4000 
       c133c040 c014e1ae c133e000 c9df4000 00000002 c133c040 ca9283a0
c133c040 
       ca9283a0 ffffffff ca928405 c014cd19 c133c040 ca9283a0 fffffff4
c56fa000 
Call Trace: [<c01473be>] [<c014dbbd>] [<c014e1ae>] [<c014cd19>]
[<c013c78a>] [<c013cc29>] [<c013d92e>] 
       [<c0144ab9>] [<c0131513>] [<c0131844>] [<c0106d2f>] [<c010002b>] 
Code: f0 ff 48 10 8b 42 24 80 48 14 08 52 e8 e1 fe ff ff 83 c4 04 

>>EIP; c014c9ae <proc_delete_inode+32/48>   <=====
Trace; c01473be <iput+ba/16c>
Trace; c014dbbd <proc_pid_make_inode+ad/b8>
Trace; c014e1ae <proc_pid_lookup+17a/1e0>
Trace; c014cd19 <proc_root_lookup+39/48>
Trace; c013c78a <real_lookup+7a/120>
Trace; c013cc29 <path_walk+28d/8a4>
Trace; c013d92e <open_namei+86/608>
Trace; c0144ab9 <dput+19/154>
Trace; c0131513 <filp_open+3b/5c>
Trace; c0131844 <sys_open+3c/f0>
Trace; c0106d2f <system_call+37/3c>
Trace; c010002b <startup_32+2b/cb>
Code;  c014c9ae <proc_delete_inode+32/48>
00000000 <_EIP>:
Code;  c014c9ae <proc_delete_inode+32/48>   <=====
   0:   f0 ff 48 10               lock decl 0x10(%eax)   <=====
Code;  c014c9b2 <proc_delete_inode+36/48>
   4:   8b 42 24                  mov    0x24(%edx),%eax
Code;  c014c9b5 <proc_delete_inode+39/48>
   7:   80 48 14 08               orb    $0x8,0x14(%eax)
Code;  c014c9b9 <proc_delete_inode+3d/48>
   b:   52                        push   %edx
Code;  c014c9ba <proc_delete_inode+3e/48>
   c:   e8 e1 fe ff ff            call   fffffef2 <_EIP+0xfffffef2>
c014c8a0 <de_put+0/dc>
Code;  c014c9bf <proc_delete_inode+43/48>
  11:   83 c4 04                  add    $0x4,%esp

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to