Re: 5.1, Data Corruption, Intel, Oh my! [patch]

From: Kevin Oberman <oberman_at_es.net>
Date: Mon, 11 Aug 2003 17:14:14 -0700
Bosko,

I am seeing a very similar thing on my CURRENT system after applying
your patch It's also when probing APM. I suspect it's not an issue with
ACPI.

It is also at least very similar to the crash I see when I add
DISABLE_PSE to my kernel.

Here is mine, as transcribed by hand from my IBM T30 with P4-M
uniprocessor:

Fatal trap 12: page fault while in kernel mode
fault virtual address   = 0x1c
fault code              = supervisor write, page not present
instruction pointer     = 0x8:0xc06492a0
stack pointer           = 0x10:0xc0c219a2
frame pointer           = 0x10:0xc0c21b0e
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, def32 1, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 0 (swapper)
kernel: type 12 trap, code=0
Stopped at      vm_fault+0x240: cmpxchgl	#edx,0x1c(%ecx)
db> trace
vm_fault(c102f000,c0000000,2,0,c07470a0) at vm_fault+240
trap_pfault(c0c21b9e,0,c00004d8,100000,c00004d8) at trap_pfault+0x1e3
trap(1bc40018,10,6fe40060,1c,0) at trap+0x2cd
calltrap() at calltrap+0x5
--- trap 0xc, eip = 0x58de, esp = 0xc0c21bde, epb = 0xc0c21be4 ---
(null)(1bf80058,0,530e0102,80202,5059f6) at 0x58de
db>

The kernel was cvsuped this afternoon and patched only with your
patch. I had to panic twice to get a core dump and I have doubts about
its validity.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman_at_es.net			Phone: +1 510 486-8634
Received on Mon Aug 11 2003 - 15:14:17 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:37:18 UTC