On Thu, Mar 29, 2007 at 08:47:18PM +0200, Philipp Reisner ([EMAIL PROTECTED]) 
wrote:
> RIP: 0010:[<ffffffff8024f904>]  [<ffffffff8024f904>] 
> netlink_broadcast+0x123/0x2de
> RSP: 0018:ffff8100379bddc0  EFLAGS: 00010297
> RAX: 656b736968772d31 RBX: ffff810079d7f800 RCX: 0000000000000004
> RDX: ffff81007e113000 RSI: ffff810079d68280 RDI: ffffffff804c6a80
> RBP: ffff810079d68280 R08: 00000000000000d0 R09: ffff810079d68280
> R10: 0000000000000002 R11: ffff81007fd6fac0 R12: 0000000000000020
> R13: 0000000000000000 R14: ffff810079d7f818 R15: 0000000000000003
> FS:  0000000000000000(0000) GS:ffffffff804d6000(0000) knlGS:0000000000000000
> CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
> CR2: 00002b2acc1ecb40 CR3: 0000000079ac1000 CR4: 00000000000026e0
> Process cqueue/0 (pid: 1948, threadinfo ffff8100379bc000, task 
> ffff810037fd8040)
> Stack:  ffff810079d7f400 00000000000000d0 ffff81007e113000 000000007e069a24
>  0000000000000000 0000000000000100 ffff810079d7f400 ffff81007e069a10
>  ffff81007e069a24 ffffffff881e9d00 ffff81007cf07800 ffffffff881d5c23

...

> Code;  ffffffff8024f904 <netlink_broadcast+123/2de>   <=====
>    0:   44 0f a3 38               bt     %r15d,(%rax)   <=====

%rax contains 0x656b736968772d31
In my x86_64 it is obtained from %rbx, which seems to be correct, so I'm
a bit stuck, something has rewritten internals of the socket structure,
and it does not look like free poisoning.

0xffffffff8024ea14 <netlink_broadcast+289>:     mov    0x268(%rbx),%rax
0xffffffff8024ea1b <netlink_broadcast+296>:     bt     %r15d,(%rax)

Can you describe your load? Is it too high to put a debug printk there?
Can you enable as much debug options as possible?

-- 
        Evgeniy Polyakov
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to