On (25/09/07 13:53), Hendrik P. didst pronounce: > Maybe you know what bringt this box down: > > regards, > Hendrik P. >
Nick, this is a random stab in the dark but you were around mark_buffer_dirty() a few months ago. Does this error look familiar? Hendrik, what is going on when you trigger this? Is it easily reproducible? Does it only occur with DEBUG_PAGEALLOC? Thanks > [263322.356816] BUG: unable to handle kernel NULL pointer dereference at > virtual address 00000008 > [263322.459908] printing eip: > [263322.493267] c014e09c > [263322.520391] *pde = 00000000 > [263322.554795] Oops: 0000 [#1] > [263322.589188] DEBUG_PAGEALLOC > [263322.623796] Modules linked in: lirc_dev jfs xfs reiserfs ntfs vfat > fat isofs udf > [263322.714319] CPU: 0 > [263322.714322] EIP: 0060:[<c014e09c>] Not tainted VLI > [263322.714327] EFLAGS: 00010046 (2.6.21.5_VIA_EPIA_MII_12000 #1) > [263322.878840] EIP is at __set_page_dirty_nobuffers+0x6c/0x110 > [263322.946480] eax: 00000000 ebx: f6fe9ea0 ecx: f6fe9ea0 edx: > c101cba0 > [263323.028685] esi: c330e3c8 edi: 00000000 ebp: f71f1e98 esp: > f71f1e94 > [263323.110886] ds: 007b es: 007b fs: 00d8 gs: 0000 ss: 0068 > [263323.181661] Process kjournald (pid: 1362, ti=f71f0000 task=f7c87350 > task.ti=f71f0000) > [263323.274252] Stack: c5bbe504 f71f1ea0 c018391f f71f1ec4 c01c7d0f > c01cd4d7 f7c87350 00000000 > [263323.376097] f71f1ed8 c01cd7d6 e14a7c9c c330e3c8 f71f1ed0 > c01c802b e14a7c9c f71f1ef8 > [263323.477943] c01c809d f71f1ef8 c01cd87e c01cf4d6 00001000 > 00002ff5 c5bbe4e0 e14a7c9c > [263323.579789] Call Trace: > [263323.612215] [<c01055ba>] show_trace_log_lvl+0x1a/0x30 > [263323.674774] [<c0105679>] show_stack_log_lvl+0xa9/0xd0 > [263323.737337] [<c0105889>] show_registers+0x1e9/0x2f0 > [263323.797821] [<c0105aab>] die+0x11b/0x230 > [263323.846872] [<c01155e6>] do_page_fault+0x2c6/0x5d0 > [263323.906318] [<c0564994>] error_code+0x74/0x80 > [263323.960566] [<c018391f>] mark_buffer_dirty+0x1f/0x30 > [263324.022089] [<c01c7d0f>] __journal_temp_unlink_buffer+0x5f/0x160 > [263324.096081] [<c01c802b>] __journal_unfile_buffer+0xb/0x20 > [263324.162801] [<c01c809d>] __journal_refile_buffer+0x5d/0xa0 > [263324.230558] [<c01caa10>] journal_commit_transaction+0xb10/0x1220 > [263324.304553] [<c01cee8c>] kjournald+0x12c/0x340 > [263324.359841] [<c012d063>] kthread+0xa3/0xd0 > [263324.410971] [<c01051c7>] kernel_thread_helper+0x7/0x10 > [263324.474573] ======================= > [263324.518323] Code: 00 00 00 90 8b 02 8b 4a 10 25 00 80 00 00 66 85 c0 > 0f 85 a7 00 00 00 f6 c1 01 75 2e 85 c9 74 2a 39 cb 0f 85 81 00 00 00 8b > 43 38 <f6> 40 08 01 74 3d 8b 02 25 00 80 00 00 66 85 c0 75 72 8b 52 14 > [263324.751737] EIP: [<c014e09c>] __set_page_dirty_nobuffers+0x6c/0x110 > SS:ESP 0068:f71f1e94 > > > config can be found at http://zankt.net/~d-tick/kernel-2.6.21.5-config > lspci, cmdline, mount at http://zankt.net/~d-tick/voltkraft-sysinfo > > > older oops: > > [190861.885741] BUG: unable to handle kernel paging request at virtual > address 01190024 > [190861.978686] printing eip: > [190862.012138] c0176026 > [190862.039274] *pde = 00000000 > [190862.073778] Oops: 0000 [#1] > [190862.108250] DEBUG_PAGEALLOC > [190862.142857] Modules linked in: ntfs vfat fat isofs udf > [190862.205945] CPU: 0 > [190862.205948] EIP: 0060:[<c0176026>] Not tainted VLI > [190862.205953] EFLAGS: 00010206 (2.6.21.5_VIA_EPIA_MII_12000 #1) > [190862.370464] EIP is at __d_lookup+0x66/0xf0 > [190862.420439] eax: 0000d309 ebx: 01190024 ecx: 42ff6ccb edx: > c0e5da0c > [190862.502644] esi: 01190024 edi: eb49bef4 ebp: eb49bdc4 esp: > eb49bd98 > [190862.584847] ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 > [190862.655619] Process du (pid: 18106, ti=eb49a000 task=e2b33770 > task.ti=eb49a000) > [190862.741975] Stack: c0e5da0c ea407c60 eb49be20 e19f9134 c0121e7b > 00000019 42ff6ccb df8a9000 > [190862.843822] df8a9019 eb49be20 eb49bef4 eb49bdec c016cb34 > eb49be2c eb49be20 c1894120 > [190862.945665] c016cddd df8a9000 df8a9019 eb49be20 eb49bef4 > eb49be40 c016e62d eb49bef4 > [190863.047511] Call Trace: > [190863.079939] [<c01055ba>] show_trace_log_lvl+0x1a/0x30 > [190863.142498] [<c0105679>] show_stack_log_lvl+0xa9/0xd0 > [190863.205060] [<c0105889>] show_registers+0x1e9/0x2f0 > [190863.265545] [<c0105aab>] die+0x11b/0x230 > [190863.314596] [<c01155e6>] do_page_fault+0x2c6/0x5d0 > [190863.374040] [<c0564994>] error_code+0x74/0x80 > [190863.428289] [<c016cb34>] do_lookup+0x24/0x170 > [190863.482538] [<c016e62d>] __link_path_walk+0x6ed/0xb90 > [190863.545098] [<c016eb14>] link_path_walk+0x44/0xc0 > [190863.603505] [<c016ed46>] do_path_lookup+0x76/0x1d0 > [190863.662949] [<c016f728>] __user_walk_fd+0x38/0x50 > [190863.721354] [<c016918e>] vfs_lstat_fd+0x1e/0x50 > [190863.777681] [<c0169201>] vfs_lstat+0x11/0x20 > [190863.830889] [<c0169224>] sys_lstat64+0x14/0x30 > [190863.886177] [<c0104030>] syscall_call+0x7/0xb > [190863.940424] ======================= > [190863.984175] Code: 87 6d c0 d3 ea 31 d0 8b 15 94 87 6d c0 21 d0 8b 15 > 9c 87 6d c0 8b 34 82 85 f6 75 0f eb 57 8d b4 26 00 00 00 00 85 db 89 de > 74 4a <8b> 1e 0f 18 03 90 8d 56 f4 8b 4d ec 89 55 d4 3b 4a 18 75 e6 8b > [190864.217589] EIP: [<c0176026>] __d_lookup+0x66/0xf0 SS:ESP > 0068:eb49bd98 > [190993.430258] BUG: unable to handle kernel paging request at virtual > address 011a0024 > [190993.523079] printing eip: > [190993.556532] c0176026 > [190993.583673] *pde = 00000000 > [190993.618173] Oops: 0000 [#2] > [190993.652643] DEBUG_PAGEALLOC > [190993.687250] Modules linked in: ntfs vfat fat isofs udf > [190993.750340] CPU: 0 > [190993.750343] EIP: 0060:[<c0176026>] Not tainted VLI > [190993.750348] EFLAGS: 00010206 (2.6.21.5_VIA_EPIA_MII_12000 #1) > [190993.914860] EIP is at __d_lookup+0x66/0xf0 > [190993.964835] eax: 00019758 ebx: 011a0024 ecx: 8a0a7369 edx: > c0e5d0d8 > [190994.047038] esi: 011a0024 edi: da74fef4 ebp: da74fdc4 esp: > da74fd98 > [190994.129240] ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 > [190994.200013] Process du (pid: 18156, ti=da74e000 task=e2b32750 > task.ti=da74e000) > [190994.286370] Stack: c0e5d0d8 ea407c60 da74fe20 e9a3eb04 c0121e7b > 0000001f 8a0a7369 d9215000 > [190994.388216] d921501f da74fe20 da74fef4 da74fdec c016cb34 > da74fe2c da74fe20 c1894120 > [190994.490061] c016cddd d9215000 d921501f da74fe20 da74fef4 > da74fe40 c016e62d da74fef4 > [190994.591906] Call Trace: > [190994.624333] [<c01055ba>] show_trace_log_lvl+0x1a/0x30 > [190994.686892] [<c0105679>] show_stack_log_lvl+0xa9/0xd0 > [190994.749454] [<c0105889>] show_registers+0x1e9/0x2f0 > [190994.809939] [<c0105aab>] die+0x11b/0x230 > [190994.858990] [<c01155e6>] do_page_fault+0x2c6/0x5d0 > [190994.918435] [<c0564994>] error_code+0x74/0x80 > [190994.972682] [<c016cb34>] do_lookup+0x24/0x170 > [190995.026931] [<c016e62d>] __link_path_walk+0x6ed/0xb90 > [190995.089492] [<c016eb14>] link_path_walk+0x44/0xc0 > [190995.147899] [<c016ed46>] do_path_lookup+0x76/0x1d0 > [190995.207343] [<c016f728>] __user_walk_fd+0x38/0x50 > [190995.265747] [<c016918e>] vfs_lstat_fd+0x1e/0x50 > [190995.322074] [<c0169201>] vfs_lstat+0x11/0x20 > [190995.375283] [<c0169224>] sys_lstat64+0x14/0x30 > [190995.430571] [<c0104030>] syscall_call+0x7/0xb > [190995.484818] ======================= > [190995.528569] Code: 87 6d c0 d3 ea 31 d0 8b 15 94 87 6d c0 21 d0 8b 15 > 9c 87 6d c0 8b 34 82 85 f6 75 0f eb 57 8d b4 26 00 00 00 00 85 db 89 de > 74 4a <8b> 1e 0f 18 03 90 8d 56 f4 8b 4d ec 89 55 d4 3b 4a 18 75 e6 8b > [190995.761982] EIP: [<c0176026>] __d_lookup+0x66/0xf0 SS:ESP > 0068:da74fd98 > > older oopses: > > > [2055678.634084] BUG: unable to handle kernel NULL pointer dereference > at virtual address 0000008c > [2055678.738361] printing eip: > [2055678.772771] c01cd356 > [2055678.801037] *pde = 00000000 > [2055678.836707] Oops: 0000 [#1] > [2055678.872196] DEBUG_PAGEALLOC > [2055678.907844] Modules linked in: jfs xfs reiserfs ntfs vfat fat isofs > udf > [2055678.989950] CPU: 0 > [2055678.989954] EIP: 0060:[<c01cd356>] Not tainted VLI > [2055678.989959] EFLAGS: 00210286 (2.6.21.5_VIA_EPIA_MII_12000 #1) > [2055679.157595] EIP is at journal_blocks_per_page+0x6/0x20 > [2055679.221174] eax: 00000000 ebx: 00000000 ecx: 0000000c edx: > c101cba0 > [2055679.304418] esi: 00000000 edi: c101cba0 ebp: d971fd0c esp: > d971fd00 > [2055679.387661] ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068 > [2055679.459474] Process newsbeuter (pid: 13443, ti=d971e000 > task=cfc64870 task.ti=d971e000) > [2055679.555183] Stack: d971fd0c c01a243b c01a4810 d971fd40 c01a482a > d971fd40 c06990a8 00000000 > [2055679.658067] 00000400 e9f5fbe8 d971fd40 c0148cd7 e9f5fbec > c01a4810 0000035e c056f420 > [2055679.760952] d971fdf0 c014a240 00000800 00000000 c101cba0 > 00000001 d971fedc 00000001 > [2055679.863835] Call Trace: > [2055679.897301] [<c01055ba>] show_trace_log_lvl+0x1a/0x30 > [2055679.960901] [<c0105679>] show_stack_log_lvl+0xa9/0xd0 > [2055680.024502] [<c0105889>] show_registers+0x1e9/0x2f0 > [2055680.086025] [<c0105aab>] die+0x11b/0x230 > [2055680.136117] [<c01155e6>] do_page_fault+0x2c6/0x5d0 > [2055680.196600] [<c0564994>] error_code+0x74/0x80 > [2055680.251888] [<c01a482a>] ext3_prepare_write+0x1a/0x180 > [2055680.316528] [<c014a240>] generic_file_buffered_write+0x2b0/0x690 > [2055680.391561] [<c014a8aa>] > __generic_file_aio_write_nolock+0x28a/0x570 > [2055680.470751] [<c014abe4>] generic_file_aio_write+0x54/0xc0 > [2055680.538510] [<c01a07dd>] ext3_file_write+0x2d/0xc0 > [2055680.598992] [<c01660fd>] do_sync_write+0xcd/0x110 > [2055680.658436] [<c0166905>] vfs_write+0x95/0x110 > [2055680.713725] [<c0166e8d>] sys_write+0x3d/0x70 > [2055680.767974] [<c0104030>] syscall_call+0x7/0xb > [2055680.823260] ======================= > [2055680.868050] Code: 75 09 c7 40 04 00 00 00 00 31 d2 5d 89 d0 c3 8d > b6 00 00 00 00 8b 50 04 55 89 e5 85 d2 74 03 83 08 04 5d c3 > [2055681.102502] EIP: [<c01cd356>] journal_blocks_per_page+0x6/0x20 > SS:ESP 0068:d971fd00 > -- Mel Gorman Part-time Phd Student Linux Technology Center University of Limerick IBM Dublin Software Lab - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/