From mboxrd@z Thu Jan 1 00:00:00 1970 From: Trond Myklebust Subject: Re: [Bugme-new] [Bug 15709] New: swapper page allocation failure Date: Thu, 13 May 2010 17:13:54 -0400 Message-ID: <1273785234.22932.14.camel@localhost.localdomain> References: <4BC43097.3060000@tauceti.net> <4BCC52B9.8070200@tauceti.net> <20100419131718.GB16918@redhat.com> <20100421094249.GC30855@redhat.com> <20100422100304.GC30532@redhat.com> <4BD12F9C.30802@tauceti.net> <20100425091759.GA9993@redhat.com> <4BD4A917.70702@tauceti.net> <20100425204916.GA12686@redhat.com> <1272284154.4252.34.camel@localhost.localdomain> <4BD5F6C5.8080605@tauceti.net> <1272315854.8984.125.camel@localhost.localdomain> <4BD61147.40709@tauceti.net> <1272324536.16814.45.camel@localhost.localdomain> <4BD76B81.2070606@tauceti.net> <4BE33259.3000609@tauceti.net> <1273181438.22155.26.camel@localhost.localdomain> <4BEC6A5D.5070304@tauceti.net> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Cc: mst@redhat.com, Avi Kivity , Andrew Morton , linux-mm@kvack.org, bugzilla-daemon-590EEB7GvNiWaY/ihj7yzEB+6BGkLq7r@public.gmane.org, Rusty Russell , Mel Gorman , linux-nfs@vger.kernel.org, linux-kernel@vger.kernel.org To: Robert Wimmer Return-path: Received: from mx2.netapp.com ([216.240.18.37]:60738 "EHLO mx2.netapp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752929Ab0EMVN5 convert rfc822-to-8bit (ORCPT ); Thu, 13 May 2010 17:13:57 -0400 In-Reply-To: <4BEC6A5D.5070304-PAwl83ecUlHR7s880joybQ@public.gmane.org> Sender: linux-nfs-owner@vger.kernel.org List-ID: On Thu, 2010-05-13 at 23:08 +0200, Robert Wimmer wrote: > Finally I've had some time to do the next test. > Here is a wireshark dump (~750 MByte): > http://213.252.12.93/2.6.34-rc5.cap.gz > > dmesg output after page allocation failure: > https://bugzilla.kernel.org/attachment.cgi?id=26371 > > stack trace before page allocation failure: > https://bugzilla.kernel.org/attachment.cgi?id=26369 > > stack trace after page allocation failure: > https://bugzilla.kernel.org/attachment.cgi?id=26370 > > I hope the wireshark dump is not to big to download. > It was created with > tshark -f "tcp port 2049" -i eth0 -w 2.6.34-rc5.cap > > Thanks! > Robert Hi Robert, I tried the above wireshark dump URL, but it appears to point to an empty file. Cheers Trond