[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080806121650.GA3119@alice>
Date: Wed, 6 Aug 2008 14:16:50 +0200
From: Eric Sesterhenn <snakebyte@....de>
To: linux-kernel@...r.kernel.org
Cc: peterz@...radead.org, mingo@...hat.com
Subject: Oops when accessing /proc/lockdep_chains
hi,
with current -git (aka -rc2) i sometime get the following oops
when doing a cat /proc/lockdep_chains
The other /proc/lockdep* files dont cause any errors
I dont get it after a fresh reboot :| But was able to reproduce it when
running my testscripts, I'll try to narrow it down.
[ 584.458673] BUG: unable to handle kernel paging request at d1a27580
[ 584.459010] IP: [<c049403e>] strnlen+0xe/0x20
[ 584.459340] Oops: 0000 [#1] DEBUG_PAGEALLOC
[ 584.459596] Modules linked in: [last unloaded: rcutorture]
[ 584.459923]
[ 584.460038] Pid: 9047, comm: cat Not tainted (2.6.27-rc2 #26)
[ 584.460245] EIP: 0060:[<c049403e>] EFLAGS: 00010297 CPU: 0
[ 584.460394] EIP is at strnlen+0xe/0x20
[ 584.460532] EAX: d1a27580 EBX: c86efca8 ECX: d1a27580 EDX: fffffffe
[ 584.460682] ESI: 00000000 EDI: c86f0000 EBP: c87fdce8 ESP: c87fdce8
[ 584.460890] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068
[ 584.461035] Process cat (pid: 9047, ti=c87fd000 task=c87d2420 task.ti=c87fd000)
[ 584.461193] Stack: c87fdd04 c0493036 c010317c d1a27580 c86efca8 00000000 c87fde5c c87fde34
[ 584.462138] c0493457 ffffffff ffffffff 00000000 ffffffff ffffffff 00000000 00000358
[ 584.463021] c86efca8 ffffffff c86f0000 ffffffff ffffffff ffffffff 0000000f c0a3b725
[ 584.463964] Call Trace:
[ 584.464173] [<c0493036>] ? string+0x26/0xa0
[ 584.464510] [<c010317c>] ? restore_nocheck_notrace+0x0/0xe
[ 584.464859] [<c0493457>] ? vsnprintf+0x3a7/0x6a0
[ 584.465141] [<c04940ac>] ? trace_hardirqs_on_thunk+0xc/0x10
[ 584.465219] [<c01059de>] ? do_softirq+0x3e/0xb0
[ 584.465219] [<c010317c>] ? restore_nocheck_notrace+0x0/0xe
[ 584.465219] [<c04934c4>] ? vsnprintf+0x414/0x6a0
[ 584.465219] [<c0149837>] ? __lock_acquire+0x257/0xe50
[ 584.465219] [<c01b46c2>] ? seq_printf+0x32/0x60
[ 584.465219] [<c014aa81>] ? print_name+0x31/0xb0
[ 584.465219] [<c0149260>] ? mark_held_locks+0x40/0x80
[ 584.465219] [<c01494ab>] ? trace_hardirqs_on+0xb/0x10
[ 584.465219] [<c0149409>] ? trace_hardirqs_on_caller+0xc9/0x160
[ 584.465219] [<c0830f64>] ? __mutex_lock_common+0x1e4/0x2e0
[ 584.465219] [<c01b4c1a>] ? seq_read+0x2a/0x2a0
[ 584.465219] [<c01b46c2>] ? seq_printf+0x32/0x60
[ 584.465219] [<c014ab6f>] ? lc_show+0x6f/0xc0
[ 584.465219] [<c01b4d5f>] ? seq_read+0x16f/0x2a0
[ 584.465219] [<c01b4bf0>] ? seq_read+0x0/0x2a0
[ 584.465219] [<c01d58f2>] ? proc_reg_read+0x62/0x90
[ 584.465219] [<c0199269>] ? vfs_read+0x99/0x160
[ 584.465219] [<c01d5890>] ? proc_reg_read+0x0/0x90
[ 584.465219] [<c0199842>] ? sys_read+0x42/0x70
[ 584.465219] [<c0103059>] ? sysenter_do_call+0x12/0x31
[ 584.465219] =======================
[ 584.465219] Code: 57 0f 1f 44 00 00 85 c9 89 c7 89 d0 74 05 f2 ae 75 01 4f 89 f8 5f 5d c3 90 8d 74 26 00 55 89 e5 0f 1f 44 00 00 89 c1 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 5d c3 90 90 55 89 e5
[ 584.465219] EIP: [<c049403e>] strnlen+0xe/0x20 SS:ESP 0068:c87fdce8
[ 584.465219] ---[ end trace 560310b80b6f2ef3 ]---
[ 657.508210] BUG: unable to handle kernel paging request at d1a27580
[ 657.508546] IP: [<c049403e>] strnlen+0xe/0x20
[ 657.508827] *pde = 0ef53067 *pte = 00000000
[ 657.509067] Oops: 0000 [#2] DEBUG_PAGEALLOC
[ 657.509364] Modules linked in: [last unloaded: rcutorture]
[ 657.509382]
[ 657.509382] Pid: 14555, comm: cat Tainted: G D (2.6.27-rc2 #26)
[ 657.509382] EIP: 0060:[<c049403e>] EFLAGS: 00010297 CPU: 0
[ 657.509382] EIP is at strnlen+0xe/0x20
[ 657.509382] EAX: d1a27580 EBX: c86ef36c ECX: d1a27580 EDX: fffffffe
[ 657.509382] ESI: 00000000 EDI: c86f0000 EBP: c867fce8 ESP: c867fce8
[ 657.509382] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068
[ 657.509382] Process cat (pid: 14555, ti=c867f000 task=c86a4420 task.ti=c867f000)
[ 657.509382] Stack: c867fd04 c0493036 00000000 d1a27580 c86ef36c 00000000 c867fe5c c867fe34
[ 657.509382] c0493457 ffffffff ffffffff 00000000 00000000 c867fd44 00000046 00000c94
[ 657.509382] c86ef36c ffffffff c86f0000 ffffffff ffffffff ffffffff 0000000f c0a3b725
[ 657.509382] Call Trace:
[ 657.509382] [<c0493036>] ? string+0x26/0xa0
[ 657.509382] [<c0493457>] ? vsnprintf+0x3a7/0x6a0
[ 657.509382] [<c012417b>] ? try_to_wake_up+0x6b/0xf0
[ 657.509382] [<c04934c4>] ? vsnprintf+0x414/0x6a0
[ 657.509382] [<c0514aed>] ? n_tty_receive_buf+0x63d/0x1230
[ 657.509382] [<c01189ff>] ? __change_page_attr_set_clr+0xcf/0x4e0
[ 657.509382] [<c0164ef0>] ? handle_level_irq+0x0/0xd0
[ 657.509382] [<c0146d84>] ? trace_hardirqs_off_caller+0x14/0xa0
[ 657.509382] [<c01b46c2>] ? seq_printf+0x32/0x60
[ 657.509382] [<c014aa81>] ? print_name+0x31/0xb0
[ 657.509382] [<c0146d84>] ? trace_hardirqs_off_caller+0x14/0xa0
[ 657.509382] [<c0149355>] ? trace_hardirqs_on_caller+0x15/0x160
[ 657.509382] [<c0830f64>] ? __mutex_lock_common+0x1e4/0x2e0
[ 657.509382] [<c01b4c1a>] ? seq_read+0x2a/0x2a0
[ 657.509382] [<c01b46c2>] ? seq_printf+0x32/0x60
[ 657.509382] [<c014ab6f>] ? lc_show+0x6f/0xc0
[ 657.509382] [<c01b4d5f>] ? seq_read+0x16f/0x2a0
[ 657.509382] [<c01b4bf0>] ? seq_read+0x0/0x2a0
[ 657.509382] [<c01d58f2>] ? proc_reg_read+0x62/0x90
[ 657.509382] [<c0199269>] ? vfs_read+0x99/0x160
[ 657.509382] [<c01d5890>] ? proc_reg_read+0x0/0x90
[ 657.509382] [<c0199842>] ? sys_read+0x42/0x70
[ 657.509382] [<c0103059>] ? sysenter_do_call+0x12/0x31
[ 657.509382] [<c0124abf>] ? __cleanup_sighand+0x1f/0x30
[ 657.509382] =======================
[ 657.509382] Code: 57 0f 1f 44 00 00 85 c9 89 c7 89 d0 74 05 f2 ae 75 01 4f 89 f8 5f 5d c3 90 8d 74 26 00 55 89 e5 0f 1f 44 00 00 89 c1 89 c8 eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 5d c3 90 90 55 89 e5
[ 657.509382] EIP: [<c049403e>] strnlen+0xe/0x20 SS:ESP 0068:c867fce8
[ 657.510433] ---[ end trace 560310b80b6f2ef3 ]---
Greetings, Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists