Hi guys,
When running SPEC SFS tests against 2.4.0-test10-pre4 on a 4-way SMP
machine with 6G RAM (highmem+PAE enabled) I got
__alloc_pages: 0-order allocation failed.
(probably coming from nfsd, why don't we print eip of the caller there?)
and the machine locked up (but pingable). So I entered kdb and got stack
traces of all running proceeses:
Entering kdb (current=0xc766a000, pid 0) on processor 1 due to Keyboard Entry
[1]kdb> ps
Task Addr Pid Parent [*] cpu State Thread Command
0xc7678000 00000001 00000000 0 000 stop 0xc7678350 init
0xc76e2000 00000002 00000001 0 003 stop 0xc76e2350 kswapd
0xc76e0000 00000003 00000001 0 002 stop 0xc76e0350 kreclaimd
0xc76de000 00000004 00000001 1 002 run 0xc76de350 kflushd
0xc76dc000 00000005 00000001 1 000 run 0xc76dc350 kupdate
0xf73b4000 00000137 00000001 0 001 stop 0xf73b4350 vxrelocd
0xf751e000 00000142 00000137 0 000 stop 0xf751e350 vxnotify
0xf7388000 00000143 00000137 0 000 stop 0xf7388350 vxrelocd
0xf72fc000 00000444 00000001 1 003 run 0xf72fc350 syslogd
0xf72f6000 00000454 00000001 0 001 stop 0xf72f6350 klogd
0xf72c8000 00000469 00000001 0 003 stop 0xf72c8350 portmap
0xf72d0000 00000487 00000001 0 003 stop 0xf72d0350 rpc.rquotad
0xf72cc000 00000497 00000001 0 000 stop 0xf72cc350 rpc.mountd
0xf728a000 00000507 00000001 0 001 stop 0xf728a350 nfsd
0xf7288000 00000508 00000001 0 003 stop 0xf7288350 nfsd
0xf725e000 00000509 00000001 0 003 stop 0xf725e350 nfsd
0xf725c000 00000510 00000001 0 002 stop 0xf725c350 nfsd
0xf7254000 00000511 00000001 0 003 stop 0xf7254350 nfsd
0xf724a000 00000512 00000001 0 002 stop 0xf724a350 nfsd
0xf7248000 00000513 00000001 0 002 stop 0xf7248350 nfsd
0xf723a000 00000514 00000001 0 000 stop 0xf723a350 nfsd
[1]more>
0xf72b8000 00000515 00000507 0 000 stop 0xf72b8350 lockd
0xf72a8000 00000516 00000515 0 001 stop 0xf72a8350 rpciod
0xf7234000 00000531 00000001 0 000 stop 0xf7234350 rpc.statd
0xf71f0000 00000557 00000001 0 001 stop 0xf71f0350 xinetd
0xf71da000 00000598 00000001 0 003 stop 0xf71da350 gpm
0xf71c6000 00000613 00000001 0 003 stop 0xf71c6350 crond
0xf7382000 00000636 00000001 0 002 stop 0xf7382350 mingetty
0xf71d0000 00000637 00000001 0 002 stop 0xf71d0350 mingetty
0xf7158000 00000638 00000001 0 000 stop 0xf7158350 mingetty
0xf754a000 00000695 00000001 0 003 stop 0xf754a350 mingetty
0xed9fc000 00000739 00000557 0 001 stop 0xed9fc350 in.telnetd
0xee320000 00000740 00000739 0 002 stop 0xee320350 login
0xed208000 00000741 00000740 0 002 stop 0xed208350 bash
[1]kdb>
[1]kdb> btp 4
EBP EIP Function(args)
0xc206f9a8 0xc013ba41 try_to_free_buffers+0x3d (0xc206f9a8, 0x0)
kernel .text 0xc0100000 0xc013ba04 0xc013bbb4
0xc76dfe6c 0xc0131b69 page_launder+0x2a9 (0x3, 0x1, 0xc76de000)
kernel .text 0xc0100000 0xc01318c0 0xc0132004
0xc76dfe88 0xc0132424 do_try_to_free_pages+0x34 (0x3, 0x1, 0x0)
kernel .text 0xc0100000 0xc01323f0 0xc0132478
0xc76dfe9c 0xc01326d0 try_to_free_pages+0x24 (0x3, 0xe9cbf900)
kernel .text 0xc0100000 0xc01326ac 0xc01326dc
0xc76dfec8 0xc0133357 __alloc_pages+0x23b
kernel .text 0xc0100000 0xc013311c 0xc01333e8
0xc76dff14 0xc0135d5c create_bounce+0x64 (0x1, 0xc04a28a0)
kernel .text 0xc0100000 0xc0135cf8 0xc0135f90
0xc76dff60 0xc018bbba __make_request+0xb6 (0xc76c0ab8, 0x1, 0xc04a28a0)
kernel .text 0xc0100000 0xc018bb04 0xc018c10c
0xc76dff88 0xc018c1c2 generic_make_request+0xb6 (0x1, 0xc04a28a0)
kernel .text 0xc0100000 0xc018c10c 0xc018c224
0xc76dffac 0xc018c393 ll_rw_block+0x16f (0x1, 0x1, 0xc76dffd0, 0xc76de000)
kernel .text 0xc0100000 0xc018c224 0xc018c408
0xc76dffd4 0xc013be47 flush_dirty_buffers+0x97 (0x0, 0x10f00)
kernel .text 0xc0100000 0xc013bdb0 0xc013be94
0xc76dffec 0xc013c115 bdflush+0x91
[1]more>
kernel .text 0xc0100000 0xc013c084 0xc013c1c4
0xc010a75b kernel_thread+0x23
kernel .text 0xc0100000 0xc010a738 0xc010a770
[1]kdb> btp 5
EBP EIP Function(args)
0xc023bcd1 stext_lock+0x171d
kernel .text.lock 0xc023a5b4 0xc023a5b4 0xc0240f80
0xc76dc000 0xc0131b6c page_launder+0x2ac (0x3, 0x1, 0xc76dc000)
kernel .text 0xc0100000 0xc01318c0 0xc0132004
0xc76dde74 0xc0132424 do_try_to_free_pages+0x34 (0x3, 0x1, 0x0)
kernel .text 0xc0100000 0xc01323f0 0xc0132478
0xc76dde88 0xc01326d0 try_to_free_pages+0x24 (0x3, 0xe9d3ec80)
kernel .text 0xc0100000 0xc01326ac 0xc01326dc
0xc76ddeb4 0xc0133357 __alloc_pages+0x23b
kernel .text 0xc0100000 0xc013311c 0xc01333e8
0xc76ddf00 0xc0135d5c create_bounce+0x64 (0x1, 0xc04a27e0)
kernel .text 0xc0100000 0xc0135cf8 0xc0135f90
0xc76ddf4c 0xc018bbba __make_request+0xb6 (0xc76c0ab8, 0x1, 0xc04a27e0)
kernel .text 0xc0100000 0xc018bb04 0xc018c10c
0xc76ddf74 0xc018c1c2 generic_make_request+0xb6 (0x1, 0xc04a27e0)
kernel .text 0xc0100000 0xc018c10c 0xc018c224
0xc76ddf98 0xc018c393 ll_rw_block+0x16f (0x1, 0x1, 0xc76ddfbc, 0xc76dc000)
kernel .text 0xc0100000 0xc018c224 0xc018c408
0xc76ddfc0 0xc013be47 flush_dirty_buffers+0x97 (0x1)
kernel .text 0xc0100000 0xc013bdb0 0xc013be94
0xc76ddfd4 0xc013bf0a sync_old_buffers+0x76 (0x10f00)
[1]more>
kernel .text 0xc0100000 0xc013be94 0xc013bf70
0xc76ddfec 0xc013c2d5 kupdate+0x111
kernel .text 0xc0100000 0xc013c1c4 0xc013c2e0
0xc010a75b kernel_thread+0x23
kernel .text 0xc0100000 0xc010a738 0xc010a770
[1]kdb> btp 3
EBP EIP Function(args)
0xc76e1fa8 0xc0119d68 schedule+0x42c (0xc030bd60)
kernel .text 0xc0100000 0xc011993c 0xc011a010
0xc76e1fc8 0xc011a382 interruptible_sleep_on+0x46 (0x10f00, 0xc7679f94, 0xc0105000)
kernel .text 0xc0100000 0xc011a33c 0xc011a3a8
0xc76e1fec 0xc013273a kreclaimd+0x5e
kernel .text 0xc0100000 0xc01326dc 0xc01327d0
0xc010a75b kernel_thread+0x23
kernel .text 0xc0100000 0xc010a738 0xc010a770
[1]kdb>
[1]kdb> btp 444
EBP EIP Function(args)
0xc023bcd1 stext_lock+0x171d
kernel .text.lock 0xc023a5b4 0xc023a5b4 0xc0240f80
0xf72fc000 0xc0131b6c page_launder+0x2ac (0x3, 0x1, 0xf72fc000)
kernel .text 0xc0100000 0xc01318c0 0xc0132004
0xf72fdcf0 0xc0132424 do_try_to_free_pages+0x34 (0x3, 0x1, 0x0)
kernel .text 0xc0100000 0xc01323f0 0xc0132478
0xf72fdd04 0xc01326d0 try_to_free_pages+0x24 (0x3, 0x0)
kernel .text 0xc0100000 0xc01326ac 0xc01326dc
0xf72fdd30 0xc0133357 __alloc_pages+0x23b
kernel .text 0xc0100000 0xc013311c 0xc01333e8
0xf72fdd44 0xc013b89f grow_buffers+0x37 (0x1000)
kernel .text 0xc0100000 0xc013b868 0xc013b9a8
0xf72fdd50 0xc01394c8 refill_freelist+0xc (0x1000)
kernel .text 0xc0100000 0xc01394bc 0xc01394f0
0xf72fdd74 0xc01397ef getblk+0x163 (0x807, 0x90a9e, 0x1000)
kernel .text 0xc0100000 0xc013968c 0xc0139804
0xf72fdd8c 0xc0139a24 bread+0x18 (0x807, 0x90a9e, 0x1000, 0xc0158dfc)
kernel .text 0xc0100000 0xc0139a0c 0xc0139a70
0xf72fde34 0xc0158ee7 ext2_get_block+0xeb (0xf735fb60, 0xa5, 0xeeb025a0, 0x1, 0xf8)
kernel .text 0xc0100000 0xc0158dfc 0xc0159324
0xf72fde84 0xc013a391 __block_prepare_write+0x125 (0xf735fb60, 0xc5d0e7ec, 0xf8, 0x107, 0xc0158dfc)
[1]more>
kernel .text 0xc0100000 0xc013a26c 0xc013a4d0
0xf72fdea8 0xc013ab79 block_prepare_write+0x21 (0xc5d0e7ec, 0xf8, 0x107, 0xc0158dfc)
kernel .text 0xc0100000 0xc013ab58 0xc013abdc
0xf72fdec0 0xc0159539 ext2_prepare_write+0x19 (0xf7505a20, 0xc5d0e7ec, 0xf8, 0x107, 0xf)
kernel .text 0xc0100000 0xc0159520 0xc0159540
0xf72fdf28 0xc012c731 generic_file_write+0x2b9 (0xf7505a20, 0x8052348, 0xf, 0xf7505a40, 0xf7505a20)
kernel .text 0xc0100000 0xc012c478 0xc012c8a0
0xf72fdf9c 0xc0137c55 do_readv_writev+0x1d5 (0x0, 0xf7505a20, 0xbfffef60, 0x5, 0xf72fc000)
kernel .text 0xc0100000 0xc0137a80 0xc0137cd4
0xf72fdfbc 0xc0137d6d sys_writev+0x41 (0x1, 0xbfffef60, 0x6, 0x6, 0x1)
kernel .text 0xc0100000 0xc0137d2c 0xc0137d84
0xc010c2ab system_call+0x33
kernel .text 0xc0100000 0xc010c278 0xc010c2b0
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Tue Oct 31 2000 - 21:00:16 EST