[Bug 65542] Re: kernel BUG() triggered under high load

Per Buer perbu at linpro.no
Wed Oct 11 20:53:56 UTC 2006


I can now reproduce this bug quite easy. Got the same error again. This
time with httperf as a client and apache2 (worker) as server. Preceding
the BUG where to asserts() which might indicate the same or other
errors:

[   15.699226] KERNEL: assertion (!sk->sk_forward_alloc) failed at net/core/stream.c (279)
[   16.392399] KERNEL: assertion (!sk->sk_forward_alloc) failed at net/ipv4/af_inet.c (148)
[   11.779294] kernel BUG at include/linux/skbuff.h:466!
[   11.779316]               \|/ ____ \|/
[   11.779322]               "@'/ .. \`@"
[   11.779328]               /_| \__/ |_\
[   11.779334]                  \__U_/
[   11.779348] apache2(14266): Kernel bad sw trap 5 [#1]
[   11.779365] TSTATE: 0000000011001600 TPC: 0000000000639694 TNPC: 0000000000639698 Y: 00000000    Not tainted
[   11.779399] TPC: <tso_fragment+0x214/0x220>
[   11.779413] g0: 00000000007c1118 g1: 00000000006c8000 g2: 0000000000000001 g3: 0000000000000000
[   11.779435] g4: fffff801ee1ac0e0 g5: fffff80003d0a0c0 g6: fffff801e7634000 g7: 0000000000000000
[   11.779453] o0: 0000000000000039 o1: 0000000000680410 o2: 00000000000001d2 o3: 0000000000000018
[   11.779476] o4: 000000002873e07f o5: ffffffffcfffffff sp: fffff801e7636c61 ret_pc: 000000000063968c
[   11.779498] RPC: <tso_fragment+0x20c/0x220>
[   11.779514] l0: 00000000000005a8 l1: fffff801ed25edc0 l2: fffff801eefa80a0 l3: 0000000000000000
[   11.779534] l4: 0000000000007530 l5: 00000000c0a800ae l6: 0000000000721800 l7: 00000000bdae0050
[   11.779554] i0: 0000000000000100 i1: fffff801fd23aae0 i2: 0000000000006028 i3: 00000000000005a8
[   11.779575] i4: 0000000000000017 i5: 0000000000000047 i6: fffff801e7636d21 i7: 0000000000639e74
[   11.779601] I7: <__tcp_push_pending_frames+0x2d4/0x4e0>
[   11.779613] Caller[0000000000639e74]: __tcp_push_pending_frames+0x2d4/0x4e0
[   11.779637] Caller[0000000000636440]: tcp_rcv_established+0x500/0x9e0
[   11.779660] Caller[000000000063e938]: tcp_v4_do_rcv+0xf8/0x400
[   11.779679] Caller[0000000000640328]: tcp_v4_rcv+0xbe8/0xc20
[   11.779696] Caller[000000000061fa78]: ip_local_deliver+0x178/0x380
[   11.779717] Caller[0000000000620050]: ip_rcv+0x3d0/0x660
[   11.779734] Caller[00000000005ff4d0]: netif_receive_skb+0x310/0x420
[   11.779756] Caller[00000000100ed024]: e1000_clean_rx_irq_ps+0xc4/0xbe0 [e1000]
[   11.779833] Caller[00000000100ecde8]: e1000_clean+0xa8/0x220 [e1000]
[   11.779880] Caller[00000000005fd9f4]: net_rx_action+0xb4/0x1c0
[   11.779899] Caller[000000000045e47c]: __do_softirq+0x7c/0x120
[   11.779918] Caller[000000000045e568]: do_softirq+0x48/0x60
[   11.779935] Caller[00000000004108d4]: tl0_irq5+0x34/0x40
[   11.779954] Caller[00000000f7b25744]: 0xf7b25744
[   11.779984] Instruction DUMP: 921021d2  7ff77e1d  90122010 <91d02005> 01000000  01000000  9de3bf40  94102000  92100019 
[   11.780028] Kernel panic - not syncing: Aiee, killing interrupt handler!
[   13.458275]  <0>Press Stop-A (L1-A) to return to the boot prom

-- 
kernel BUG() triggered under high load
https://launchpad.net/bugs/65542




More information about the kernel-bugs mailing list