2.5.7x: processes in D state

From: Olivier NICOLAS (olivn@trollprod.org)
Date: Wed Jun 18 2003 - 15:30:03 EST


After some time from a few seconds after boot to a few hours, the system
locks.

Processes seem to be in D state

Kernel 2.5.72

System
        2 x Athlon MP 1800
        512 Mb RAM
        IDE disk (reiserfs and ext3 partions)
        

AltSysRq T ....

.....

konqueror D 00000001 4244652160 1965 1943 (NOTLB)
Call Trace:
  [<c011c3aa>] default_wake_function+0x2a/0x30
  [<c011cb5e>] sleep_on+0x6e/0x130
  [<c011c380>] default_wake_function+0x0/0x30
  [<c01e6768>] do_journal_begin_r+0x88/0x2a0
  [<c01e69d7>] journal_begin+0x27/0x30
  [<c01d5a07>] reiserfs_dirty_inode+0x77/0x140
  [<c0183a16>] __mark_inode_dirty+0x126/0x160
  [<c017c6c2>] update_atime+0xb2/0xd0
  [<c01d0edc>] reiserfs_readdir+0x59c/0x610
  [<c021a072>] tty_default_put_char+0x32/0x40
  [<c014d461>] do_wp_page+0x281/0x410
  [<c014e613>] handle_mm_fault+0x193/0x220
  [<c0172c2e>] vfs_readdir+0x7e/0xa0
  [<c0172f40>] filldir64+0x0/0x120
  [<c01730d4>] sys_getdents64+0x74/0xb5
  [<c0172f40>] filldir64+0x0/0x120
  [<c01097f3>] syscall_call+0x7/0xb
....

SysRq : Show Regs

Pid: 0, comm: swapper
EIP: 0060:[<c010719f>] CPU: 0
EIP is at default_idle+0x2f/0x40
  EFLAGS: 00000246 Not tainted
EAX: 00000000 EBX: c036a000 ECX: 00000000 EDX: c036a000
ESI: c0107170 EDI: ffffe000 EBP: c036bfb0 DS: 007b ES: 007b
CR0: 8005003b CR2: 40018000 CR3: 16b33000 CR4: 000006d0
Call Trace:
  [<c0107235>] cpu_idle+0x45/0x60
  [<c0105000>] _stext+0x0/0x80
  [<c036c93f>] start_kernel+0x16f/0x1a0
  [<c036c4e0>] unknown_bootoption+0x0/0x110

SysRq : Show Regs

Pid: 0, comm: swapper
EIP: 0060:[<c010719f>] CPU: 0
EIP is at default_idle+0x2f/0x40
  EFLAGS: 00000246 Not tainted
EAX: 00000000 EBX: c036a000 ECX: 00000000 EDX: c036a000
ESI: c0107170 EDI: ffffe000 EBP: c036bfb0 DS: 007b ES: 007b
CR0: 8005003b CR2: 40018000 CR3: 16b33000 CR4: 000006d0
Call Trace:
  [<c0107235>] cpu_idle+0x45/0x60
  [<c0105000>] _stext+0x0/0x80
  [<c036c93f>] start_kernel+0x16f/0x1a0
  [<c036c4e0>] unknown_bootoption+0x0/0x110

SysRq : Show Regs

Pid: 0, comm: swapper
EIP: 0060:[<c010719f>] CPU: 0
EIP is at default_idle+0x2f/0x40
  EFLAGS: 00000246 Not tainted
EAX: 00000000 EBX: c036a000 ECX: 00000000 EDX: c036a000
ESI: c0107170 EDI: ffffe000 EBP: c036bfb0 DS: 007b ES: 007b
CR0: 8005003b CR2: 40018000 CR3: 16b33000 CR4: 000006d0
Call Trace:
  [<c0107235>] cpu_idle+0x45/0x60
  [<c0105000>] _stext+0x0/0x80
  [<c036c93f>] start_kernel+0x16f/0x1a0
  [<c036c4e0>] unknown_bootoption+0x0/0x110

SysRq : Terminate All Tasks

Same problem 2.5.70-mm3

bash D 00000010 1464 1349 (NOTLB)
Call Trace:
  [<c011cf8b>] sleep_on+0x7b/0x170
  [<c011c710>] default_wake_function+0x0/0x30
  [<c01ea4a8>] do_journal_begin_r+0x88/0x2a0
  [<c01ea717>] journal_begin+0x27/0x30
  [<c01d95d7>] reiserfs_dirty_inode+0x77/0x140
  [<c013d725>] file_read_actor+0x115/0x120
  [<c01856b6>] __mark_inode_dirty+0x126/0x160
  [<c013d30a>] do_generic_mapping_read+0xfa/0x400
  [<c017e0e2>] update_atime+0xb2/0xd0
  [<c013d8ef>] __generic_file_aio_read+0x1bf/0x1e0
  [<c013d610>] file_read_actor+0x0/0x120
  [<c013da3a>] generic_file_read+0xba/0xe0
  [<c0145f34>] kmem_cache_alloc+0x114/0x190
  [<c0119c0b>] pgd_alloc+0x1b/0x20
  [<c0119c0b>] pgd_alloc+0x1b/0x20
  [<c011f340>] autoremove_wake_function+0x0/0x50
  [<c015e81a>] vfs_read+0xda/0x120
  [<c016baca>] kernel_read+0x4a/0x60
  [<c016caab>] prepare_binprm+0xcb/0xf0
  [<c016d04e>] do_execve+0xfe/0x1e0
  [<c0107cbf>] sys_execve+0x3f/0x80
  [<c01098a3>] syscall_call+0x7/0xb

bash D 00000000 1467 1410 1432 (NOTLB)
Call Trace:
  [<c011cf8b>] sleep_on+0x7b/0x170
  [<c011c710>] default_wake_function+0x0/0x30
  [<c01ea4a8>] do_journal_begin_r+0x88/0x2a0
  [<c01ea717>] journal_begin+0x27/0x30
  [<c01d95d7>] reiserfs_dirty_inode+0x77/0x140
  [<c013d725>] file_read_actor+0x115/0x120
  [<c01856b6>] __mark_inode_dirty+0x126/0x160
  [<c013d30a>] do_generic_mapping_read+0xfa/0x400
  [<c017e0e2>] update_atime+0xb2/0xd0
  [<c013d8ef>] __generic_file_aio_read+0x1bf/0x1e0
  [<c013d610>] file_read_actor+0x0/0x120
  [<c013da3a>] generic_file_read+0xba/0xe0
  [<c0119c0b>] pgd_alloc+0x1b/0x20
  [<c0119c0b>] pgd_alloc+0x1b/0x20
  [<c011f340>] autoremove_wake_function+0x0/0x50
  [<c015e81a>] vfs_read+0xda/0x120
  [<c016baca>] kernel_read+0x4a/0x60
  [<c016caab>] prepare_binprm+0xcb/0xf0
  [<c016d04e>] do_execve+0xfe/0x1e0
  [<c0107cbf>] sys_execve+0x3f/0x80
  [<c01098a3>] syscall_call+0x7/0xb

bash D 00000000 1467 1410 1432 (NOTLB)
Call Trace:
  [<c011cf8b>] sleep_on+0x7b/0x170
  [<c011c710>] default_wake_function+0x0/0x30
  [<c01ea4a8>] do_journal_begin_r+0x88/0x2a0
  [<c01ea717>] journal_begin+0x27/0x30
  [<c01d95d7>] reiserfs_dirty_inode+0x77/0x140
  [<c013d725>] file_read_actor+0x115/0x120
  [<c01856b6>] __mark_inode_dirty+0x126/0x160
  [<c013d30a>] do_generic_mapping_read+0xfa/0x400
  [<c017e0e2>] update_atime+0xb2/0xd0
  [<c013d8ef>] __generic_file_aio_read+0x1bf/0x1e0
  [<c013d610>] file_read_actor+0x0/0x120
  [<c013da3a>] generic_file_read+0xba/0xe0
  [<c0145f34>] kmem_cache_alloc+0x114/0x190
  [<c0119c0b>] pgd_alloc+0x1b/0x20
  [<c0119c0b>] pgd_alloc+0x1b/0x20
  [<c011f340>] autoremove_wake_function+0x0/0x50
  [<c015e81a>] vfs_read+0xda/0x120
  [<c016baca>] kernel_read+0x4a/0x60
  [<c016caab>] prepare_binprm+0xcb/0xf0
  [<c016d04e>] do_execve+0xfe/0x1e0
  [<c0107cbf>] sys_execve+0x3f/0x80
  [<c01098a3>] syscall_call+0x7/0xb

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Mon Jun 23 2003 - 22:00:26 EST