2002-07-28 08:22:44

by Federico Sevilla III

[permalink] [raw]
Subject: Kernel BUG at page_alloc.c:91 (2.4.19-rc2-xfs)

Hi everyone,

I apologize for sending this to both the Linux kernel mailing list as
well as the Linux-XFS mailing list. I am sending this to the lkml
because it's a kernel bug report. I'm sending this to the Linux-XFS
mailing list because I do not know if "try_to_free_buffers+130/240" in
the Call Trace has anything to do with changes that the XFS team has
done on the Linux kernel.

I got kernel BUG reports in my system logs[1] and dmesg[2] four times
today. The first time it happened with process kswapd, the second with
process httpd (of Apache), the third and fourth with ssh which I was
firing up through wterm. They happened all within a fairly short period
of time: the first at 16:02:05, the second at the same time, the third
at 16:03:51 and the fourth at 16:03:53.

I am running Linux kernel 2.4.19-rc2-xfs (CVS snapshot 20020718),
compiled using the current gcc-3.1 Debian packages from Sid (gcc version
3.1.1 20020703 (Debian prerelease) according to `gcc-3.1 -v`), on an AMD
Duron/850MHz. This system has been running continuously using this
kernel for 7 days 22:13, according to uptime. I didn't do anything
special this afternoon when all four kernel BUG incidences occured.

Would any of the kernel or XFS developers want me to do anything to
perhaps help debug this situation? I intend to move this system up to
2.4.19-rc3-xfs (CVS snapshot as of today), otherwise.

Thanks a lot in advance.

--> Jijo

[1] Kernel BUG reports from syslog (with timestamps and slightly
different call trace information):

Jul 28 16:02:05 lawin kernel: kernel BUG at page_alloc.c:91!
Jul 28 16:02:05 lawin kernel: invalid operand: 0000
Jul 28 16:02:05 lawin kernel: CPU: 0
Jul 28 16:02:05 lawin kernel: EIP: 0010:[__free_pages_ok+45/608] Tainted: P
Jul 28 16:02:05 lawin kernel: EFLAGS: 00210282
Jul 28 16:02:05 lawin kernel: eax: c11c90fc ebx: c11c73d4 ecx: 00000000 edx: c0333f40
Jul 28 16:02:05 lawin kernel: esi: 00000000 edi: 000011b9 ebp: c0334050 esp: c12f3f08
Jul 28 16:02:05 lawin kernel: ds: 0018 es: 0018 ss: 0018
Jul 28 16:02:05 lawin kernel: Process kswapd (pid: 5, stackpage=c12f3000)
Jul 28 16:02:05 lawin kernel: Stack: 00000001 00200282 00000003 cf0dc8c0 cf0dc8c0 cf0dc8c0 c11c73d4 c013f0e2
Jul 28 16:02:05 lawin kernel: cf0dc8c0 c0333f40 c11c73d4 000011b9 c0334050 c0134852 c11c73d4 000001d0
Jul 28 16:02:05 lawin kernel: c12f2000 000001c7 000001d0 00000002 0000001f 000001d0 00000020 00000006
Jul 28 16:02:05 lawin kernel: Call Trace: [try_to_free_buffers+130/240] [shrink_cache+642/784] [shrink_caches+97/160] [try_to_free_pages+54/96
] [kswapd_balance_pgdat+86/160]
Jul 28 16:02:05 lawin kernel: [kswapd_balance+24/48] [kswapd+157/192] [rest_init+0/64] [kernel_thread+46/64] [kswapd+0/192]
Jul 28 16:02:05 lawin kernel:
Jul 28 16:02:05 lawin kernel: Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69
Jul 28 16:02:05 lawin kernel: kernel BUG at page_alloc.c:91!
Jul 28 16:02:05 lawin kernel: invalid operand: 0000
Jul 28 16:02:05 lawin kernel: CPU: 0
Jul 28 16:02:05 lawin kernel: EIP: 0010:[__free_pages_ok+45/608] Tainted: P
Jul 28 16:02:05 lawin kernel: EFLAGS: 00210282
Jul 28 16:02:05 lawin kernel: eax: c11ee984 ebx: c1261cc4 ecx: 00000000 edx: c0333f40
Jul 28 16:02:05 lawin kernel: esi: 00000000 edi: 00001232 ebp: c0334050 esp: c72bddc0
Jul 28 16:02:05 lawin kernel: ds: 0018 es: 0018 ss: 0018
Jul 28 16:02:05 lawin kernel: Process http (pid: 14620, stackpage=c72bd000)
Jul 28 16:02:05 lawin kernel: Stack: 00000001 00200282 00000003 cf0dc3c0 cf0dc3c0 cf0dc3c0 c1261cc4 c013f0e2
Jul 28 16:02:05 lawin kernel: cf0dc3c0 c0333f40 c1261cc4 00001232 c0334050 c0134852 c1261cc4 000001d2
Jul 28 16:02:05 lawin kernel: c72bc000 000001d1 000001d2 00000020 0000001e 000001d2 00000020 00000006
Jul 28 16:02:05 lawin kernel: Call Trace: [try_to_free_buffers+130/240] [shrink_cache+642/784] [shrink_caches+97/160] [try_to_free_pages+54/96
] [balance_classzone+87/448]
Jul 28 16:02:06 lawin kernel: [__alloc_pages+237/400] [do_generic_file_write+818/1760] [ip_local_deliver+77/112] [xfs_write+591/2144] [ip_r
cv_finish+0/544] [linvfs_write+228/288]
Jul 28 16:02:06 lawin kernel: [sys_write+163/304] [system_call+51/56]
Jul 28 16:02:06 lawin kernel:
Jul 28 16:02:06 lawin kernel: Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69
Jul 28 16:03:51 lawin kernel: kernel BUG at page_alloc.c:91!
Jul 28 16:03:51 lawin kernel: invalid operand: 0000
Jul 28 16:03:51 lawin kernel: CPU: 0
Jul 28 16:03:51 lawin kernel: EIP: 0010:[__free_pages_ok+45/608] Tainted: P
Jul 28 16:03:51 lawin kernel: EFLAGS: 00210282
Jul 28 16:03:51 lawin kernel: eax: c128cef4 ebx: c1209ea8 ecx: 00000000 edx: c0333f40
Jul 28 16:03:51 lawin kernel: esi: 00000000 edi: 00001234 ebp: c0334050 esp: cd2ffdec
Jul 28 16:03:51 lawin kernel: ds: 0018 es: 0018 ss: 0018
Jul 28 16:03:51 lawin kernel: Process ssh (pid: 14631, stackpage=cd2ff000)
Jul 28 16:03:51 lawin kernel: Stack: 00000001 00200282 00000003 cf0dc340 cf0dc340 cf0dc340 c1209ea8 c013f0e2
Jul 28 16:03:51 lawin kernel: cf0dc340 c0333f40 c1209ea8 00001234 c0334050 c0134852 c1209ea8 000001d2
Jul 28 16:03:51 lawin kernel: cd2fe000 000001d2 000001d2 00000020 0000001f 000001d2 00000020 00000006
Jul 28 16:03:51 lawin kernel: Call Trace: [try_to_free_buffers+130/240] [shrink_cache+642/784] [shrink_caches+97/160] [try_to_free_pages+54/96
] [balance_classzone+87/448]
Jul 28 16:03:51 lawin kernel: [__alloc_pages+237/400] [do_anonymous_page+104/240] [handle_mm_fault+119/272] [do_page_fault+350/1257] [via68
6a:__insmod_via686a_O/lib/modules/2.4.19-rc2-xfs/misc/via686a.+-156672/96] [via686a:__insmod_via686a_O/lib/modules/2.4.19-rc2-xfs/misc/via686a
.+-156672/96]
Jul 28 16:03:51 lawin kernel: [via686a:__insmod_via686a_O/lib/modules/2.4.19-rc2-xfs/misc/via686a.+-965242/96] [do_brk+280/528] [sys_brk+26
4/320] [do_page_fault+0/1257] [error_code+52/60]
Jul 28 16:03:51 lawin kernel:
Jul 28 16:03:51 lawin kernel: Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69
Jul 28 16:03:53 lawin kernel: kernel BUG at page_alloc.c:91!
Jul 28 16:03:53 lawin kernel: invalid operand: 0000
Jul 28 16:03:53 lawin kernel: CPU: 0
Jul 28 16:03:53 lawin kernel: EIP: 0010:[__free_pages_ok+45/608] Tainted: P
Jul 28 16:03:53 lawin kernel: EFLAGS: 00210282
Jul 28 16:03:53 lawin kernel: eax: c12987b8 ebx: c10b9ba8 ecx: 00000000 edx: c0333f40
Jul 28 16:03:53 lawin kernel: esi: 00000000 edi: 00001235 ebp: c0334050 esp: cd2ffdd0
Jul 28 16:03:53 lawin kernel: ds: 0018 es: 0018 ss: 0018
Jul 28 16:03:53 lawin kernel: Process ssh (pid: 14633, stackpage=cd2ff000)
Jul 28 16:03:53 lawin kernel: Stack: 00000001 00200282 00000003 cf0dc1c0 cf0dc1c0 cf0dc1c0 c10b9ba8 c013f0e2
Jul 28 16:03:53 lawin kernel: cf0dc1c0 c0333f40 c10b9ba8 00001235 c0334050 c0134852 c10b9ba8 000001d2
Jul 28 16:03:53 lawin kernel: cd2fe000 000001d2 000001d2 0000001f 00000020 000001d2 00000020 00000006
Jul 28 16:03:53 lawin kernel: Call Trace: [try_to_free_buffers+130/240] [shrink_cache+642/784] [shrink_caches+97/160] [try_to_free_pages+54/96
] [balance_classzone+87/448]
Jul 28 16:03:53 lawin kernel: [__alloc_pages+237/400] [do_no_page+257/432] [handle_mm_fault+119/272] [do_page_fault+350/1257] [old_mmap+257
/288] [filp_close+77/128]
Jul 28 16:03:53 lawin kernel: [do_page_fault+0/1257] [error_code+52/60]
Jul 28 16:03:53 lawin kernel:
Jul 28 16:03:53 lawin kernel: Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69


[2] Kernel BUG reports from dmesg (no timestamps):

kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c11c90fc ebx: c11c73d4 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 000011b9 ebp: c0334050 esp: c12f3f08
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 5, stackpage=c12f3000)
Stack: 00000001 00200282 00000003 cf0dc8c0 cf0dc8c0 cf0dc8c0 c11c73d4 c013f0e2
cf0dc8c0 c0333f40 c11c73d4 000011b9 c0334050 c0134852 c11c73d4 000001d0
c12f2000 000001c7 000001d0 00000002 0000001f 000001d0 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0134b36>]
[<c0134b98>] [<c0134ccd>] [<c0105000>] [<c01071fe>] [<c0134c30>]

Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69
kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c11ee984 ebx: c1261cc4 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 00001232 ebp: c0334050 esp: c72bddc0
ds: 0018 es: 0018 ss: 0018
Process http (pid: 14620, stackpage=c72bd000)
Stack: 00000001 00200282 00000003 cf0dc3c0 cf0dc3c0 cf0dc3c0 c1261cc4 c013f0e2
cf0dc3c0 c0333f40 c1261cc4 00001232 c0334050 c0134852 c1261cc4 000001d2
c72bc000 000001d1 000001d2 00000020 0000001e 000001d2 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0135827>]
[<c0135a7d>] [<c01306b2>] [<c029e04d>] [<c01fd88f>] [<c029e420>] [<c01f90c4>]
[<c013ae93>] [<c0108db7>]

Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69
kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c128cef4 ebx: c1209ea8 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 00001234 ebp: c0334050 esp: cd2ffdec
ds: 0018 es: 0018 ss: 0018
Process ssh (pid: 14631, stackpage=cd2ff000)
Stack: 00000001 00200282 00000003 cf0dc340 cf0dc340 cf0dc340 c1209ea8 c013f0e2
cf0dc340 c0333f40 c1209ea8 00001234 c0334050 c0134852 c1209ea8 000001d2
cd2fe000 000001d2 000001d2 00000020 0000001f 000001d2 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0135827>]
[<c0135a7d>] [<c012b638>] [<c012b8e7>] [<c011897e>] [<d0966c00>] [<d0966c00>]
[<d08a1586>] [<c012cfc8>] [<c012be88>] [<c0118820>] [<c0108ea8>]

Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69
kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c12987b8 ebx: c10b9ba8 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 00001235 ebp: c0334050 esp: cd2ffdd0
ds: 0018 es: 0018 ss: 0018
Process ssh (pid: 14633, stackpage=cd2ff000)
Stack: 00000001 00200282 00000003 cf0dc1c0 cf0dc1c0 cf0dc1c0 c10b9ba8 c013f0e2
cf0dc1c0 c0333f40 c10b9ba8 00001235 c0334050 c0134852 c10b9ba8 000001d2
cd2fe000 000001d2 000001d2 0000001f 00000020 000001d2 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0135827>]
[<c0135a7d>] [<c012b7c1>] [<c012b8e7>] [<c011897e>] [<c010e601>] [<c013a3cd>]
[<c0118820>] [<c0108ea8>]

Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69


--
Federico Sevilla III : <http://jijo.free.net.ph/>
Network Administrator : The Leather Collection, Inc.
GnuPG Key ID : 0x93B746BE


2002-07-28 09:00:52

by Federico Sevilla III

[permalink] [raw]
Subject: Re: Kernel BUG at page_alloc.c:91 (2.4.19-rc2-xfs)

On Sun, Jul 28, 2002 at 11:47:19AM +0300, Ville Herva wrote:
> Please run these through ksymoops to get the hexadecimal addresses
> resolved to function names. See
> /usr/src/linux/Documentation/oops-tracing.txt.

Ah, yes, I had forgotten to do that. I hadn't realized that the same
requirement for reporting oopses held for reporting kernel BUGs. My
sincerest apologies. I ran all four through ksymoops at once, and it
worked so I guess this is a valid thing to do. I am still running the
same configuration and haven't even rebooted, so I did not have to
change any of ksymoops's defaults.

The 'decoded' message follows.

Thanks for the help.

--> Jijo

[1] Kernel BUG reports from dmesg passed through ksymoops:

ksymoops 2.4.5 on i686 2.4.19-rc2-xfs. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.19-rc2-xfs/ (default)
-m /boot/System.map-2.4.19-rc2-xfs (default)

Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00210282
eax: c11c90fc ebx: c11c73d4 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 000011b9 ebp: c0334050 esp: c12f3f08
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 5, stackpage=c12f3000)
Stack: 00000001 00200282 00000003 cf0dc8c0 cf0dc8c0 cf0dc8c0 c11c73d4 c013f0e2
cf0dc8c0 c0333f40 c11c73d4 000011b9 c0334050 c0134852 c11c73d4 000001d0
c12f2000 000001c7 000001d0 00000002 0000001f 000001d0 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0134b36>]
[<c0134b98>] [<c0134ccd>] [<c0105000>] [<c01071fe>] [<c0134c30>]
Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69


>>EIP; c013536d <__free_pages_ok+2d/260> <=====

>>eax; c11c90fc <_end+e0baf8/104d29fc>
>>ebx; c11c73d4 <_end+e09dd0/104d29fc>
>>edx; c0333f40 <swapper_space+0/30>
>>edi; 000011b9 Before first symbol
>>ebp; c0334050 <contig_page_data+b0/340>
>>esp; c12f3f08 <_end+f36904/104d29fc>

Trace; c013f0e2 <try_to_free_buffers+82/f0>
Trace; c0134852 <shrink_cache+282/310>
Trace; c0134a11 <shrink_caches+61/a0>
Trace; c0134a86 <try_to_free_pages+36/60>
Trace; c0134b36 <kswapd_balance_pgdat+56/a0>
Trace; c0134b98 <kswapd_balance+18/30>
Trace; c0134ccd <kswapd+9d/c0>
Trace; c0105000 <_stext+0/0>
Trace; c01071fe <kernel_thread+2e/40>
Trace; c0134c30 <kswapd+0/c0>

Code; c013536d <__free_pages_ok+2d/260>
00000000 <_EIP>:
Code; c013536d <__free_pages_ok+2d/260> <=====
0: 0f 0b ud2a <=====
Code; c013536f <__free_pages_ok+2f/260>
2: 5b pop %ebx
Code; c0135370 <__free_pages_ok+30/260>
3: 00 f0 add %dh,%al
Code; c0135372 <__free_pages_ok+32/260>
5: 62 2f bound %ebp,(%edi)
Code; c0135374 <__free_pages_ok+34/260>
7: c0 89 d8 2b 05 d0 b0 rorb $0xb0,0xd0052bd8(%ecx)
Code; c013537b <__free_pages_ok+3b/260>
e: 39 c0 cmp %eax,%eax
Code; c013537d <__free_pages_ok+3d/260>
10: c1 f8 02 sar $0x2,%eax
Code; c0135380 <__free_pages_ok+40/260>
13: 69 00 00 00 00 00 imul $0x0,(%eax),%eax

kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c11ee984 ebx: c1261cc4 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 00001232 ebp: c0334050 esp: c72bddc0
ds: 0018 es: 0018 ss: 0018
Process http (pid: 14620, stackpage=c72bd000)
Stack: 00000001 00200282 00000003 cf0dc3c0 cf0dc3c0 cf0dc3c0 c1261cc4 c013f0e2
cf0dc3c0 c0333f40 c1261cc4 00001232 c0334050 c0134852 c1261cc4 000001d2
c72bc000 000001d1 000001d2 00000020 0000001e 000001d2 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0135827>]
[<c0135a7d>] [<c01306b2>] [<c029e04d>] [<c01fd88f>] [<c029e420>] [<c01f90c4>]
[<c013ae93>] [<c0108db7>]
Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69


>>EIP; c013536d <__free_pages_ok+2d/260> <=====

>>eax; c11ee984 <_end+e31380/104d29fc>
>>ebx; c1261cc4 <_end+ea46c0/104d29fc>
>>edx; c0333f40 <swapper_space+0/30>
>>edi; 00001232 Before first symbol
>>ebp; c0334050 <contig_page_data+b0/340>
>>esp; c72bddc0 <_end+6f007bc/104d29fc>

Trace; c013f0e2 <try_to_free_buffers+82/f0>
Trace; c0134852 <shrink_cache+282/310>
Trace; c0134a11 <shrink_caches+61/a0>
Trace; c0134a86 <try_to_free_pages+36/60>
Trace; c0135827 <balance_classzone+57/1c0>
Trace; c0135a7d <__alloc_pages+ed/190>
Trace; c01306b2 <do_generic_file_write+332/6e0>
Trace; c029e04d <ip_local_deliver+4d/70>
Trace; c01fd88f <xfs_write+24f/860>
Trace; c029e420 <ip_rcv_finish+0/220>
Trace; c01f90c4 <linvfs_write+e4/120>
Trace; c013ae93 <sys_write+a3/130>
Trace; c0108db7 <system_call+33/38>

Code; c013536d <__free_pages_ok+2d/260>
00000000 <_EIP>:
Code; c013536d <__free_pages_ok+2d/260> <=====
0: 0f 0b ud2a <=====
Code; c013536f <__free_pages_ok+2f/260>
2: 5b pop %ebx
Code; c0135370 <__free_pages_ok+30/260>
3: 00 f0 add %dh,%al
Code; c0135372 <__free_pages_ok+32/260>
5: 62 2f bound %ebp,(%edi)
Code; c0135374 <__free_pages_ok+34/260>
7: c0 89 d8 2b 05 d0 b0 rorb $0xb0,0xd0052bd8(%ecx)
Code; c013537b <__free_pages_ok+3b/260>
e: 39 c0 cmp %eax,%eax
Code; c013537d <__free_pages_ok+3d/260>
10: c1 f8 02 sar $0x2,%eax
Code; c0135380 <__free_pages_ok+40/260>
13: 69 00 00 00 00 00 imul $0x0,(%eax),%eax

kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c128cef4 ebx: c1209ea8 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 00001234 ebp: c0334050 esp: cd2ffdec
ds: 0018 es: 0018 ss: 0018
Process ssh (pid: 14631, stackpage=cd2ff000)
Stack: 00000001 00200282 00000003 cf0dc340 cf0dc340 cf0dc340 c1209ea8 c013f0e2
cf0dc340 c0333f40 c1209ea8 00001234 c0334050 c0134852 c1209ea8 000001d2
cd2fe000 000001d2 000001d2 00000020 0000001f 000001d2 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0135827>]
[<c0135a7d>] [<c012b638>] [<c012b8e7>] [<c011897e>] [<d0966c00>] [<d0966c00>]
[<d08a1586>] [<c012cfc8>] [<c012be88>] [<c0118820>] [<c0108ea8>]
Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69


>>EIP; c013536d <__free_pages_ok+2d/260> <=====

>>eax; c128cef4 <_end+ecf8f0/104d29fc>
>>ebx; c1209ea8 <_end+e4c8a4/104d29fc>
>>edx; c0333f40 <swapper_space+0/30>
>>edi; 00001234 Before first symbol
>>ebp; c0334050 <contig_page_data+b0/340>
>>esp; cd2ffdec <_end+cf427e8/104d29fc>

Trace; c013f0e2 <try_to_free_buffers+82/f0>
Trace; c0134852 <shrink_cache+282/310>
Trace; c0134a11 <shrink_caches+61/a0>
Trace; c0134a86 <try_to_free_pages+36/60>
Trace; c0135827 <balance_classzone+57/1c0>
Trace; c0135a7d <__alloc_pages+ed/190>
Trace; c012b638 <do_anonymous_page+68/f0>
Trace; c012b8e7 <handle_mm_fault+77/110>
Trace; c011897e <do_page_fault+15e/4e9>
Trace; d0966c00 <[NVdriver]nv_linux_devices+0/4a0>
Trace; d0966c00 <[NVdriver]nv_linux_devices+0/4a0>
Trace; d08a1586 <[NVdriver]__nvsym00486+82/90>
Trace; c012cfc8 <do_brk+118/210>
Trace; c012be88 <sys_brk+108/140>
Trace; c0118820 <do_page_fault+0/4e9>
Trace; c0108ea8 <error_code+34/3c>

Code; c013536d <__free_pages_ok+2d/260>
00000000 <_EIP>:
Code; c013536d <__free_pages_ok+2d/260> <=====
0: 0f 0b ud2a <=====
Code; c013536f <__free_pages_ok+2f/260>
2: 5b pop %ebx
Code; c0135370 <__free_pages_ok+30/260>
3: 00 f0 add %dh,%al
Code; c0135372 <__free_pages_ok+32/260>
5: 62 2f bound %ebp,(%edi)
Code; c0135374 <__free_pages_ok+34/260>
7: c0 89 d8 2b 05 d0 b0 rorb $0xb0,0xd0052bd8(%ecx)
Code; c013537b <__free_pages_ok+3b/260>
e: 39 c0 cmp %eax,%eax
Code; c013537d <__free_pages_ok+3d/260>
10: c1 f8 02 sar $0x2,%eax
Code; c0135380 <__free_pages_ok+40/260>
13: 69 00 00 00 00 00 imul $0x0,(%eax),%eax

kernel BUG at page_alloc.c:91!
invalid operand: 0000
CPU: 0
EIP: 0010:[<c013536d>] Tainted: P
EFLAGS: 00210282
eax: c12987b8 ebx: c10b9ba8 ecx: 00000000 edx: c0333f40
esi: 00000000 edi: 00001235 ebp: c0334050 esp: cd2ffdd0
ds: 0018 es: 0018 ss: 0018
Process ssh (pid: 14633, stackpage=cd2ff000)
Stack: 00000001 00200282 00000003 cf0dc1c0 cf0dc1c0 cf0dc1c0 c10b9ba8 c013f0e2
cf0dc1c0 c0333f40 c10b9ba8 00001235 c0334050 c0134852 c10b9ba8 000001d2
cd2fe000 000001d2 000001d2 0000001f 00000020 000001d2 00000020 00000006
Call Trace: [<c013f0e2>] [<c0134852>] [<c0134a11>] [<c0134a86>] [<c0135827>]
[<c0135a7d>] [<c012b7c1>] [<c012b8e7>] [<c011897e>] [<c010e601>] [<c013a3cd>]
[<c0118820>] [<c0108ea8>]
Code: 0f 0b 5b 00 f0 62 2f c0 89 d8 2b 05 d0 b0 39 c0 c1 f8 02 69


>>EIP; c013536d <__free_pages_ok+2d/260> <=====

>>eax; c12987b8 <_end+edb1b4/104d29fc>
>>ebx; c10b9ba8 <_end+cfc5a4/104d29fc>
>>edx; c0333f40 <swapper_space+0/30>
>>edi; 00001235 Before first symbol
>>ebp; c0334050 <contig_page_data+b0/340>
>>esp; cd2ffdd0 <_end+cf427cc/104d29fc>

Trace; c013f0e2 <try_to_free_buffers+82/f0>
Trace; c0134852 <shrink_cache+282/310>
Trace; c0134a11 <shrink_caches+61/a0>
Trace; c0134a86 <try_to_free_pages+36/60>
Trace; c0135827 <balance_classzone+57/1c0>
Trace; c0135a7d <__alloc_pages+ed/190>
Trace; c012b7c1 <do_no_page+101/1b0>
Trace; c012b8e7 <handle_mm_fault+77/110>
Trace; c011897e <do_page_fault+15e/4e9>
Trace; c010e601 <old_mmap+101/120>
Trace; c013a3cd <filp_close+4d/80>
Trace; c0118820 <do_page_fault+0/4e9>
Trace; c0108ea8 <error_code+34/3c>

Code; c013536d <__free_pages_ok+2d/260>
00000000 <_EIP>:
Code; c013536d <__free_pages_ok+2d/260> <=====
0: 0f 0b ud2a <=====
Code; c013536f <__free_pages_ok+2f/260>
2: 5b pop %ebx
Code; c0135370 <__free_pages_ok+30/260>
3: 00 f0 add %dh,%al
Code; c0135372 <__free_pages_ok+32/260>
5: 62 2f bound %ebp,(%edi)
Code; c0135374 <__free_pages_ok+34/260>
7: c0 89 d8 2b 05 d0 b0 rorb $0xb0,0xd0052bd8(%ecx)
Code; c013537b <__free_pages_ok+3b/260>
e: 39 c0 cmp %eax,%eax
Code; c013537d <__free_pages_ok+3d/260>
10: c1 f8 02 sar $0x2,%eax
Code; c0135380 <__free_pages_ok+40/260>
13: 69 00 00 00 00 00 imul $0x0,(%eax),%eax


1 warning issued. Results may not be reliable.



--
Federico Sevilla III : <http://jijo.free.net.ph/>
Network Administrator : The Leather Collection, Inc.
GnuPG Key ID : 0x93B746BE

2002-07-28 09:56:06

by Christoph Hellwig

[permalink] [raw]
Subject: Re: Kernel BUG at page_alloc.c:91 (2.4.19-rc2-xfs)

On Sun, Jul 28, 2002 at 04:25:42PM +0800, Federico Sevilla III wrote:
> Hi everyone,
>
> I apologize for sending this to both the Linux kernel mailing list as
> well as the Linux-XFS mailing list. I am sending this to the lkml
> because it's a kernel bug report. I'm sending this to the Linux-XFS
> mailing list because I do not know if "try_to_free_buffers+130/240" in
> the Call Trace has anything to do with changes that the XFS team has
> done on the Linux kernel.

Let me guess: you're using nvidia's binary only module? if so please go
and complain to them, this oops is characteristic for their buggy driver.

2002-07-28 09:59:19

by Federico Sevilla III

[permalink] [raw]
Subject: Re: Kernel BUG at page_alloc.c:91 (2.4.19-rc2-xfs)

On Sun, Jul 28, 2002 at 05:03:36PM +0800, Federico Sevilla III wrote:
> Ah, yes, I had forgotten to do that. I hadn't realized that the same
> requirement for reporting oopses held for reporting kernel BUGs.

I had further forgotten to mention that I have the NVidia 2960 binary
module loaded, and that D. Stimits just posted a message on the
Linux-XFS mailing list about a kernel BUG report also on page_alloc.c:91
on a similar 2.4.19-rc2-xfs CVS snapshot, also with the NVdriver module
loaded.

Kjell Randa noted that an upgrade to version 2960 fixed things for him,
and Kjell Randa added that removing "agpgart" support fixes things. I
have agpgart support for my VIA chipset, and it's possible that this is
clashing with the NVdriver.

I realize that I may have wasted people's time, since the NVidia driver
is closed-source binary-only, and my system is tainted. I apologize for
this but hope that my messages will at least help some other people who
may run into this problem and will search the archives.

I am upgrading to 2.4.19-rc3-xfs now, and will remove agpgart support
from the kernel. I am keeping my fingers crossed.

--> Jijo


--
Federico Sevilla III : <http://jijo.free.net.ph/>
Network Administrator : The Leather Collection, Inc.
GnuPG Key ID : 0x93B746BE