linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* mapped page in prep_new_page()..
@ 2004-02-27  6:46 Linus Torvalds
  2004-02-27  6:58 ` Andrew Morton
  0 siblings, 1 reply; 10+ messages in thread
From: Linus Torvalds @ 2004-02-27  6:46 UTC (permalink / raw)
  To: Andrew Morton, Christoph Hellwig; +Cc: linux-mm

Hmm.. I've never seen this before myself, but I know there have been
similar reports. Earlier today I got

	Bad page state at prep_new_page
	flags:0x00000000 mapping:0000000000000000 mapped:1 count:0
	Backtrace:
	Call Trace:
	[c000000000075fe4] .prep_new_page+0x5c/0x98
	[c000000000076604] .buffered_rmqueue+0x130/0x1e8
	[c0000000000767a4] .__alloc_pages+0xe8/0x420
	[c000000000076b18] .__get_free_pages+0x3c/0xa0
	[c00000000007b020] .cache_grow+0x128/0x644
	[c00000000007b7c8] .cache_alloc_refill+0x28c/0x338
	[c00000000007bc94] .kmem_cache_alloc+0x70/0x74
	[c0000000000f377c] .ext3_alloc_inode+0x24/0x64
	[c0000000000bbab4] .alloc_inode+0x48/0x138
	[c0000000000bcc5c] .get_new_inode_fast+0x38/0x15c
	[c0000000000ef67c] .ext3_lookup+0xb0/0x14c
	[c0000000000ad050] .real_lookup+0x18c/0x1f4
	[c0000000000ad4f4] .do_lookup+0xe8/0x108
	[c0000000000adbfc] .link_path_walk+0x6e8/0xc88
	[c0000000000ae928] .__user_walk+0x78/0x98
	[c0000000000a7a74] .vfs_lstat+0x24/0x74
	[c0000000000cf378] .compat_sys_newlstat+0x1c/0x5c
	[c000000000011964] .ret_from_syscall_1+0x0/0xa4
	Trying to fix it up, but a reboot is needed

which I didn't even notice initially (it happened at 4:04 AM, apparently 
during the nigthly cron run). Now, it claims to try to fix things up, but 
for "page_mapped(page)" that isn't true - it leaves the page pte pointers 
alone (it should probably clear the rmap list).

So once the machine needed memory (12 hours later - the thing has 2GB of
RAM in it, so it was in no hurry) I got another message at
kmem_cache_free:

	Bad page state at free_hot_cold_page
	kernel: flags:0x00000000 mapping:0000000000000000 mapped:1 count:0
	Backtrace:
	Call Trace:
	[c0000000000763f0] .free_hot_cold_page+0xcc/0x1a0
	[c00000000007a130] .slab_destroy+0x1e0/0x2a4
	..

and soon afterwards the same page got re-used for a page cache 
page, and that makes it really unhappy:

	Bad page state at prep_new_page
	flags:0x00000000 mapping:0000000000000000 mapped:1 count:0
	Backtrace:
	Call Trace:
	[c000000000075fe4] .prep_new_page+0x5c/0x98
	[c000000000076604] .buffered_rmqueue+0x130/0x1e8
	[c0000000000767a4] .__alloc_pages+0xe8/0x420
	[c000000000086e04] .do_anonymous_page+0x1a8/0x50c
	[c000000000087204] .do_no_page+0x9c/0x570
	[c0000000000879b0] .handle_mm_fault+0x1b0/0x26c
	[c0000000000431c8] .do_page_fault+0x120/0x3f8
	[c00000000000aa94] stab_bolted_user_return+0x118/0x11c
	Trying to fix it up, but a reboot is needed

	Oops: Kernel access of bad area, sig: 11 [#1]
	SMP NR_CPUS=2 
	NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70
	REGS: c00000007a43b7f0 TRAP: 0300    Not tainted
	MSR: 9000000000009032 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 11
	DAR: 0000005f00000008, DSISR: 0000000040000000
	TASK: c000000059819b20[8510] 'bk' THREAD: c00000007a438000 CPU: 0
	GPR00: 0000000000000000 C00000007A43BA70 C0000000006AD0D0 C000000000FFFFC0 
	GPR04: C00000002CBC30F0 C000000032F2F200 C000000002FD64D0 C0000000004D8050 
	GPR08: 0000000002AFE480 0000000000000000 0000005F00000000 0000000000000004 
	GPR12: 0000000042008488 C0000000004E0000 0000000002000000 0000000011A1E004 
	GPR16: C00000005EC23400 0000000000000050 C000000054447000 4000000000000000 
	GPR20: C0000000005714C8 C0000000006F6B80 0000000000001580 C000000032F2F200 
	GPR24: 0000000000532000 0000000000000532 C00000000072FFB8 C000000000FFFFC0 
	GPR28: CCCCCCCCCCCCCCCD 00000001A88C0397 C000000000586978 C00000002CBC30F0 
	NIP [c00000000008d7c4] .page_add_rmap+0xb4/0x1b4
	LR [c000000000086f70] .do_anonymous_page+0x314/0x50c
	Call Trace:
	[c000000000087204] .do_no_page+0x9c/0x570
	[c0000000000879b0] .handle_mm_fault+0x1b0/0x26c
	[c0000000000431c8] .do_page_fault+0x120/0x3f8
	[c00000000000aa94] stab_bolted_user_return+0x118/0x11c

So I've obviously got two questions:
 - shouldn't we try to clear the rmap list in bad_page() too?
 - does anybody have any idea why the page had been left mapped when 
   free'd, without the test triggering in free_pages_check()? Memory 
   corruption? Has anybody ever seen any pattern to this?

Ideas?

		Linus
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27  6:46 mapped page in prep_new_page() Linus Torvalds
@ 2004-02-27  6:58 ` Andrew Morton
  2004-02-27  7:11   ` Anton Blanchard
  2004-02-27  7:30   ` Linus Torvalds
  0 siblings, 2 replies; 10+ messages in thread
From: Andrew Morton @ 2004-02-27  6:58 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: hch, linux-mm, Anton Blanchard

Linus Torvalds <torvalds@osdl.org> wrote:
>
> Hmm.. I've never seen this before myself, but I know there have been
> similar reports.

There have been a few.  I don't recall seeing any against x86.

> Earlier today I got
> 
> 	Bad page state at prep_new_page
> 	flags:0x00000000 mapping:0000000000000000 mapped:1 count:0

But you did not get a trace for a mapped page being freed up prior to this?

> which I didn't even notice initially (it happened at 4:04 AM, apparently 
> during the nigthly cron run). Now, it claims to try to fix things up, but 
> for "page_mapped(page)" that isn't true - it leaves the page pte pointers 
> alone (it should probably clear the rmap list).

Yes, I don't think we can sanely fix all these conditions.  If we really
want to keep limping along we should just leak the page in
__free_pages_ok(), and leak the page then pick a new one in
__alloc_pages().  This shouldn't be worth the effort, of course.

> 	Oops: Kernel access of bad area, sig: 11 [#1]
> 	SMP NR_CPUS=2 
> 	NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70
> 	REGS: c00000007a43b7f0 TRAP: 0300    Not tainted
> 	MSR: 9000000000009032 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 11
> 	DAR: 0000005f00000008, DSISR: 0000000040000000
> 	TASK: c000000059819b20[8510] 'bk' THREAD: c00000007a438000 CPU: 0
> 	GPR00: 0000000000000000 C00000007A43BA70 C0000000006AD0D0 C000000000FFFFC0 
> 	GPR04: C00000002CBC30F0 C000000032F2F200 C000000002FD64D0 C0000000004D8050 
> 	GPR08: 0000000002AFE480 0000000000000000 0000005F00000000 0000000000000004 
> 	GPR12: 0000000042008488 C0000000004E0000 0000000002000000 0000000011A1E004 
> 	GPR16: C00000005EC23400 0000000000000050 C000000054447000 4000000000000000 
> 	GPR20: C0000000005714C8 C0000000006F6B80 0000000000001580 C000000032F2F200 
> 	GPR24: 0000000000532000 0000000000000532 C00000000072FFB8 C000000000FFFFC0 
> 	GPR28: CCCCCCCCCCCCCCCD 00000001A88C0397 C000000000586978 C00000002CBC30F0 
> 	NIP [c00000000008d7c4] .page_add_rmap+0xb4/0x1b4
> 	LR [c000000000086f70] .do_anonymous_page+0x314/0x50c
> 	Call Trace:
> 	[c000000000087204] .do_no_page+0x9c/0x570
> 	[c0000000000879b0] .handle_mm_fault+0x1b0/0x26c
> 	[c0000000000431c8] .do_page_fault+0x120/0x3f8
> 	[c00000000000aa94] stab_bolted_user_return+0x118/0x11c

So what is the access address here?  That will tell us what value was in
page.pte.chain.


>  - does anybody have any idea why the page had been left mapped when 
>    free'd, without the test triggering in free_pages_check()? Memory 
>    corruption? Has anybody ever seen any pattern to this?

I've seen no pattern to it - there have only been two or three reports I
think.  Probably we should print the entire pageframe, see if that pte
pointer looks like a real address.

It's interesting that the page->flags is zero all the time.  Tends to
indicate that nobody is using it for much.


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27  6:58 ` Andrew Morton
@ 2004-02-27  7:11   ` Anton Blanchard
  2004-02-27  7:21     ` Andrew Morton
  2004-02-27  7:30   ` Linus Torvalds
  1 sibling, 1 reply; 10+ messages in thread
From: Anton Blanchard @ 2004-02-27  7:11 UTC (permalink / raw)
  To: Andrew Morton; +Cc: Linus Torvalds, hch, linux-mm

 
> There have been a few.  I don't recall seeing any against x86.

There was a G5 user that was seeing oopses in buffered_rmqueue (I notice
thats in the backtrace), it turned out to be bad RAM.

> So what is the access address here?  That will tell us what value was in
> page.pte.chain.

We tried to access 0x5f00000008. Doesnt look like much to me.

Anton
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27  7:11   ` Anton Blanchard
@ 2004-02-27  7:21     ` Andrew Morton
  0 siblings, 0 replies; 10+ messages in thread
From: Andrew Morton @ 2004-02-27  7:21 UTC (permalink / raw)
  To: Anton Blanchard; +Cc: torvalds, hch, linux-mm

Anton Blanchard <anton@samba.org> wrote:
>
> > So what is the access address here?  That will tell us what value was in
> > page.pte.chain.
> 
> We tried to access 0x5f00000008. Doesnt look like much to me.
> 

So on a G5 that is neither a valid kernel pointer nor a valid pte_addr_t?

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27  6:58 ` Andrew Morton
  2004-02-27  7:11   ` Anton Blanchard
@ 2004-02-27  7:30   ` Linus Torvalds
  2004-02-27  7:31     ` Anton Blanchard
  2004-02-27 10:38     ` Benjamin Herrenschmidt
  1 sibling, 2 replies; 10+ messages in thread
From: Linus Torvalds @ 2004-02-27  7:30 UTC (permalink / raw)
  To: Andrew Morton; +Cc: hch, linux-mm, Anton Blanchard, Benjamin Herrenschmidt


On Thu, 26 Feb 2004, Andrew Morton wrote:
> Linus Torvalds <torvalds@osdl.org> wrote:
> >
> > Hmm.. I've never seen this before myself, but I know there have been
> > similar reports.
> 
> There have been a few.  I don't recall seeing any against x86.

Yeah, I wouldn't be surprised if it is an architecture bug (possibly 
one that has been common but has long been fixed on x86).

> > Earlier today I got
> > 
> > 	Bad page state at prep_new_page
> > 	flags:0x00000000 mapping:0000000000000000 mapped:1 count:0
> 
> But you did not get a trace for a mapped page being freed up prior to this?

That's correct.

> Yes, I don't think we can sanely fix all these conditions.  If we really
> want to keep limping along we should just leak the page in
> __free_pages_ok(), and leak the page then pick a new one in
> __alloc_pages().  This shouldn't be worth the effort, of course.

I agree - it's only worth doing if it is simple. In this case it would 
have been simple to just refuse to add the bad page back to the free list.

> > 	Oops: Kernel access of bad area, sig: 11 [#1]
> > 	SMP NR_CPUS=2 
> > 	NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70
> > 	REGS: c00000007a43b7f0 TRAP: 0300    Not tainted
> > 	MSR: 9000000000009032 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 11
> > 	DAR: 0000005f00000008, DSISR: 0000000040000000
> > 	TASK: c000000059819b20[8510] 'bk' THREAD: c00000007a438000 CPU: 0
> > 	GPR00: 0000000000000000 C00000007A43BA70 C0000000006AD0D0 C000000000FFFFC0 
> > 	GPR04: C00000002CBC30F0 C000000032F2F200 C000000002FD64D0 C0000000004D8050 
> > 	GPR08: 0000000002AFE480 0000000000000000 0000005F00000000 0000000000000004 
> > 	GPR12: 0000000042008488 C0000000004E0000 0000000002000000 0000000011A1E004 
> > 	GPR16: C00000005EC23400 0000000000000050 C000000054447000 4000000000000000 
> > 	GPR20: C0000000005714C8 C0000000006F6B80 0000000000001580 C000000032F2F200 
> > 	GPR24: 0000000000532000 0000000000000532 C00000000072FFB8 C000000000FFFFC0 
> > 	GPR28: CCCCCCCCCCCCCCCD 00000001A88C0397 C000000000586978 C00000002CBC30F0 
> > 	NIP [c00000000008d7c4] .page_add_rmap+0xb4/0x1b4
> > 	LR [c000000000086f70] .do_anonymous_page+0x314/0x50c
> > 	Call Trace:
> > 	[c000000000087204] .do_no_page+0x9c/0x570
> > 	[c0000000000879b0] .handle_mm_fault+0x1b0/0x26c
> > 	[c0000000000431c8] .do_page_fault+0x120/0x3f8
> > 	[c00000000000aa94] stab_bolted_user_return+0x118/0x11c
> 
> So what is the access address here?  That will tell us what value was in
> page.pte.chain.

Heh. I've had this G5 thing for a couple of weeks, I'm not very good at 
reading the oops dump either ;)

The ppc64 page fault oops thing seems to be braindead, and not even print 
out the address. Stupid. Somebody is too used to debuggers, and as a 
result users aren't helped to make good reports, hint hint..

Anyway, a little digging shows that the thing seems to be the instruction

	.. r3 is "struct page *" ..
	ld      r10,64(r3)	/* r10 is "page->pte.direct" */

	...

	ld      r0,0(r3)	/* r0 is "page->flags */
	rldicl  r0,r0,48,63
	cmpwi   r0,0		/* PageDirect(page) ? */

	... nope, direct bit not set ...

	ld      r0,8(r10)

where r10 (as per above) is 0x0000005F00000000.  So the fault address
would have been 0x0000005F00000008.

The value of r3 is interesting: C000000000FFFFC0. That's _just_ under the 
16MB mark, and the offset of the "page->pte.direct" access is 64 bytes. 
Which means that the corrupted data was at _exactly_ the 16MB mark.

Now, I have no idea why, but it's an interesting - if slightly odd -
detail.

Who would write the value quadword 0x0000005F00000000 to the physical
address 1<<24? And is that a valid "struct page *" in the first place? 
Probably. 

Bad pointer crapola? Or some subtle CPU bug with address arithmetic that
crosses the 16MB border?  Anton, BenH, any ideas?

		Linus
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27  7:30   ` Linus Torvalds
@ 2004-02-27  7:31     ` Anton Blanchard
  2004-02-27 10:38     ` Benjamin Herrenschmidt
  1 sibling, 0 replies; 10+ messages in thread
From: Anton Blanchard @ 2004-02-27  7:31 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: Andrew Morton, hch, linux-mm, Benjamin Herrenschmidt

 
> Yeah, I wouldn't be surprised if it is an architecture bug (possibly 
> one that has been common but has long been fixed on x86).

Its possible, I think Ive seen this before on a pseries box before.
 
> The ppc64 page fault oops thing seems to be braindead, and not even print 
> out the address. Stupid. Somebody is too used to debuggers, and as a 
> result users aren't helped to make good reports, hint hint..

DAR is the address. I should probably make it more obvious, Ive been
somewhat IBMized with my TLAs.

> Who would write the value quadword 0x0000005F00000000 to the physical
> address 1<<24? And is that a valid "struct page *" in the first place? 
> Probably. 
> 
> Bad pointer crapola? Or some subtle CPU bug with address arithmetic that
> crosses the 16MB border?  Anton, BenH, any ideas?

Interesting, but nothing springs to mind yet.

Anton
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27  7:30   ` Linus Torvalds
  2004-02-27  7:31     ` Anton Blanchard
@ 2004-02-27 10:38     ` Benjamin Herrenschmidt
  2004-02-27 15:32       ` Linus Torvalds
  1 sibling, 1 reply; 10+ messages in thread
From: Benjamin Herrenschmidt @ 2004-02-27 10:38 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: Andrew Morton, hch, linux-mm, Anton Blanchard

> > > 	DAR: 0000005f00000008, DSISR: 0000000040000000
> 
> Heh. I've had this G5 thing for a couple of weeks, I'm not very good at 
> reading the oops dump either ;)

DAR is the access address for a 300 trap

> The ppc64 page fault oops thing seems to be braindead, and not even print 
> out the address. Stupid. Somebody is too used to debuggers, and as a 
> result users aren't helped to make good reports, hint hint..

Hehe :)

> Anyway, a little digging shows that the thing seems to be the instruction
> 
> 	.. r3 is "struct page *" ..
> 	ld      r10,64(r3)	/* r10 is "page->pte.direct" */
> 
> 	...
> 
> 	ld      r0,0(r3)	/* r0 is "page->flags */
> 	rldicl  r0,r0,48,63
> 	cmpwi   r0,0		/* PageDirect(page) ? */
> 
> 	... nope, direct bit not set ...
> 
> 	ld      r0,8(r10)
> 
> where r10 (as per above) is 0x0000005F00000000.  So the fault address
> would have been 0x0000005F00000008.
> 
> The value of r3 is interesting: C000000000FFFFC0. That's _just_ under the 
> 16MB mark, and the offset of the "page->pte.direct" access is 64 bytes. 
> Which means that the corrupted data was at _exactly_ the 16MB mark.
> 
> Now, I have no idea why, but it's an interesting - if slightly odd -
> detail.
> 
> Who would write the value quadword 0x0000005F00000000 to the physical
> address 1<<24? And is that a valid "struct page *" in the first place? 
> Probably. 
> 
> Bad pointer crapola? Or some subtle CPU bug with address arithmetic that
> crosses the 16MB border?  Anton, BenH, any ideas?

I don't beleive in a subtle CPU bug... we are chasing a +/- random
corruption bug that happens not just on G5s and we think it may be
related.

Did you have slab poisoning ? I wonder if it could be a use after
free ... That or a subtle ordering issue (missing barrier somewhere)
leading to crap.

The interesting bit is that 16Mb point... If that ever happen again
let me know.

Ben.


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27 10:38     ` Benjamin Herrenschmidt
@ 2004-02-27 15:32       ` Linus Torvalds
  2004-02-27 15:38         ` Anton Blanchard
  2004-02-27 22:06         ` Benjamin Herrenschmidt
  0 siblings, 2 replies; 10+ messages in thread
From: Linus Torvalds @ 2004-02-27 15:32 UTC (permalink / raw)
  To: Benjamin Herrenschmidt; +Cc: Andrew Morton, hch, linux-mm, Anton Blanchard


On Fri, 27 Feb 2004, Benjamin Herrenschmidt wrote:
>
> > Heh. I've had this G5 thing for a couple of weeks, I'm not very good at 
> > reading the oops dump either ;)
> 
> DAR is the access address for a 300 trap

Yeah, that makes complete sense now. "DAR" and "300 trap". I should have 
seen it immediately.

I'm not entirely sure if it's just me being very very used to x86, but
let's see what Linux historically (ie on an x86) prints out on a kernel
page fault:

	Unable to handle kernel paging request at virtual address 41648370
	printing eip:
	c013f6bc 
	...

and here's what ppc64 prints out:

	Oops: Kernel access of bad area, sig: 11 [#1]
	NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70
	REGS: c00000007a43b7f0 TRAP: 0300    Not tainted
	...

And I'm sure it's clear as glass what that's all about.

Can you read your assembly language too? IBM people must just be smarter 
than the rest of us. 

		Linus
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27 15:32       ` Linus Torvalds
@ 2004-02-27 15:38         ` Anton Blanchard
  2004-02-27 22:06         ` Benjamin Herrenschmidt
  1 sibling, 0 replies; 10+ messages in thread
From: Anton Blanchard @ 2004-02-27 15:38 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: Benjamin Herrenschmidt, Andrew Morton, hch, linux-mm

 
> Yeah, that makes complete sense now. "DAR" and "300 trap". I should have 
> seen it immediately.

Glad you see it our way. Want a job at IBM?

...
 
> and here's what ppc64 prints out:
> 
> 	Oops: Kernel access of bad area, sig: 11 [#1]
> 	NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70
> 	REGS: c00000007a43b7f0 TRAP: 0300    Not tainted
> 	...
> 
> And I'm sure it's clear as glass what that's all about.

Yeah it needs to be made clearer. We are also missing a dump of a few
instructions around the fail, especially useful when you dont have the
vmlinux or the fail is in modules somewhere.

Anton
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: mapped page in prep_new_page()..
  2004-02-27 15:32       ` Linus Torvalds
  2004-02-27 15:38         ` Anton Blanchard
@ 2004-02-27 22:06         ` Benjamin Herrenschmidt
  1 sibling, 0 replies; 10+ messages in thread
From: Benjamin Herrenschmidt @ 2004-02-27 22:06 UTC (permalink / raw)
  To: Linus Torvalds; +Cc: Andrew Morton, hch, linux-mm, Anton Blanchard

On Sat, 2004-02-28 at 02:32, Linus Torvalds wrote:
> On Fri, 27 Feb 2004, Benjamin Herrenschmidt wrote:
> >
> > > Heh. I've had this G5 thing for a couple of weeks, I'm not very good at 
> > > reading the oops dump either ;)
> > 
> > DAR is the access address for a 300 trap
> 
> Yeah, that makes complete sense now. "DAR" and "300 trap". I should have 
> seen it immediately.

Heh, well, i didn't say it was good, I told you the info for next time :)

But I agree that is far from explicit. Anton or I will come up with
a patch making it nicer.

Ben.


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a>

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2004-02-27 22:06 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2004-02-27  6:46 mapped page in prep_new_page() Linus Torvalds
2004-02-27  6:58 ` Andrew Morton
2004-02-27  7:11   ` Anton Blanchard
2004-02-27  7:21     ` Andrew Morton
2004-02-27  7:30   ` Linus Torvalds
2004-02-27  7:31     ` Anton Blanchard
2004-02-27 10:38     ` Benjamin Herrenschmidt
2004-02-27 15:32       ` Linus Torvalds
2004-02-27 15:38         ` Anton Blanchard
2004-02-27 22:06         ` Benjamin Herrenschmidt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox