[Gluster-users] [Gluster-devel] glusterfsd crash due to page allocation failure
Niels de Vos
ndevos at redhat.com
Tue Dec 22 16:38:53 UTC 2015
On Mon, Dec 21, 2015 at 03:55:08PM -0500, Glomski, Patrick wrote:
> Hello,
>
> We've recently upgraded from gluster 3.6.6 to 3.7.6 and have started
> encountering dmesg page allocation errors (stack trace is appended).
>
> It appears that glusterfsd now sometimes fills up the cache completely and
> crashes with a page allocation failure. I *believe* it mainly happens when
> copying lots of new data to the system, running a 'find', or similar. Hosts
> are all Scientific Linux 6.6 and these errors occur consistently on two
> separate gluster pools.
>
> Has anyone else seen this issue and are there any known fixes for it via
> sysctl kernel parameters or other means?
>
> Please let me know of any other diagnostic information that would help.
Could you explain a little more about this? The below is a message from
the kernel telling you that the mlx4_ib (Mellanox Infiniband?) driver is
requesting more continuous memory than is immediately available.
So, the questions I have regarding this:
1. how is infiniband involved/configured in this environment?
2. was there a change/update of the driver (kernel update maybe?)
3. do you get a coredump of the glusterfsd process when this happens?
4. is this a fuse mount process, or a brick process? (check by PID?)
Thanks,
Niels
>
> Thanks,
> Patrick
>
>
> [1458118.134697] glusterfsd: page allocation failure. order:5, mode:0x20
> > [1458118.134701] Pid: 6010, comm: glusterfsd Not tainted
> > 2.6.32-573.3.1.el6.x86_64 #1
> > [1458118.134702] Call Trace:
> > [1458118.134714] [<ffffffff8113770c>] ? __alloc_pages_nodemask+0x7dc/0x950
> > [1458118.134728] [<ffffffffa0321800>] ? mlx4_ib_post_send+0x680/0x1f90
> > [mlx4_ib]
> > [1458118.134733] [<ffffffff81176e92>] ? kmem_getpages+0x62/0x170
> > [1458118.134735] [<ffffffff81177aaa>] ? fallback_alloc+0x1ba/0x270
> > [1458118.134736] [<ffffffff811774ff>] ? cache_grow+0x2cf/0x320
> > [1458118.134738] [<ffffffff81177829>] ? ____cache_alloc_node+0x99/0x160
> > [1458118.134743] [<ffffffff8145f732>] ? pskb_expand_head+0x62/0x280
> > [1458118.134744] [<ffffffff81178479>] ? __kmalloc+0x199/0x230
> > [1458118.134746] [<ffffffff8145f732>] ? pskb_expand_head+0x62/0x280
> > [1458118.134748] [<ffffffff8146001a>] ? __pskb_pull_tail+0x2aa/0x360
> > [1458118.134751] [<ffffffff8146f389>] ? harmonize_features+0x29/0x70
> > [1458118.134753] [<ffffffff8146f9f4>] ? dev_hard_start_xmit+0x1c4/0x490
> > [1458118.134758] [<ffffffff8148cf8a>] ? sch_direct_xmit+0x15a/0x1c0
> > [1458118.134759] [<ffffffff8146ff68>] ? dev_queue_xmit+0x228/0x320
> > [1458118.134762] [<ffffffff8147665d>] ? neigh_connected_output+0xbd/0x100
> > [1458118.134766] [<ffffffff814abc67>] ? ip_finish_output+0x287/0x360
> > [1458118.134767] [<ffffffff814abdf8>] ? ip_output+0xb8/0xc0
> > [1458118.134769] [<ffffffff814ab04f>] ? __ip_local_out+0x9f/0xb0
> > [1458118.134770] [<ffffffff814ab085>] ? ip_local_out+0x25/0x30
> > [1458118.134772] [<ffffffff814ab580>] ? ip_queue_xmit+0x190/0x420
> > [1458118.134773] [<ffffffff81137059>] ? __alloc_pages_nodemask+0x129/0x950
> > [1458118.134776] [<ffffffff814c0c54>] ? tcp_transmit_skb+0x4b4/0x8b0
> > [1458118.134778] [<ffffffff814c319a>] ? tcp_write_xmit+0x1da/0xa90
> > [1458118.134779] [<ffffffff81178cbd>] ? __kmalloc_node+0x4d/0x60
> > [1458118.134780] [<ffffffff814c3a80>] ? tcp_push_one+0x30/0x40
> > [1458118.134782] [<ffffffff814b410c>] ? tcp_sendmsg+0x9cc/0xa20
> > [1458118.134786] [<ffffffff8145836b>] ? sock_aio_write+0x19b/0x1c0
> > [1458118.134788] [<ffffffff814581d0>] ? sock_aio_write+0x0/0x1c0
> > [1458118.134791] [<ffffffff8119169b>] ? do_sync_readv_writev+0xfb/0x140
> > [1458118.134797] [<ffffffff810a14b0>] ? autoremove_wake_function+0x0/0x40
> > [1458118.134801] [<ffffffff8123e92f>] ? selinux_file_permission+0xbf/0x150
> > [1458118.134804] [<ffffffff812316d6>] ? security_file_permission+0x16/0x20
> > [1458118.134806] [<ffffffff81192746>] ? do_readv_writev+0xd6/0x1f0
> > [1458118.134807] [<ffffffff811928a6>] ? vfs_writev+0x46/0x60
> > [1458118.134809] [<ffffffff811929d1>] ? sys_writev+0x51/0xd0
> > [1458118.134812] [<ffffffff810e88ae>] ? __audit_syscall_exit+0x25e/0x290
> > [1458118.134816] [<ffffffff8100b0d2>] ? system_call_fastpath+0x16/0x1b
> >
> _______________________________________________
> Gluster-devel mailing list
> Gluster-devel at gluster.org
> http://www.gluster.org/mailman/listinfo/gluster-devel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <http://www.gluster.org/pipermail/gluster-users/attachments/20151222/9b7f17dd/attachment.sig>
More information about the Gluster-users
mailing list