[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <1246912228.2866.51.camel@dhcp235-23.rdu.redhat.com>
Date: Mon, 06 Jul 2009 16:30:28 -0400
From: Eric Paris <eparis@...hat.com>
To: "Mikko C." <mikko.cal@...il.com>
Cc: Kernel development list <linux-kernel@...r.kernel.org>
Subject: Re: kernel BUG at fs/notify/notification.c:93!
On Sat, 2009-07-04 at 16:50 +0200, Mikko C. wrote:
> Eric Paris wrote:
> >
> > This is the first time I've heard about it. I'm looking for the problem
> > but I don't see it right offhand. Is there anything you know of that
> > causes it? I'm looking though....
> >
>
> No, sorry - it seems very random to me. Most of the times the related
> process is krunner.
> But sometimes it can be something else, for example firefox:
Mikko sent a third trace offlist, even more interesting since this one
looks like we are hitting things with LIST_POISON1, which looks friggin
impossible to me as I never call list_del() on the anchor of the list
and the only way we run the list is via the list_for_each_entry() macro
starting at the anchor. So how in the hell can LIST_POISON1 ever be
possible? I'm at a loss, but haven't given up yet. All running,
addition, and removal of the list are done holding a spin_lock declared
in the same struct as the list anchor (struct fsnotify_event -> lock).
Anyone have suggestions on common ways someone can end up with
LIST_POISON1 biting them?
BUG: unable to handle kernel paging request at 0000000000100100
IP: [<ffffffff810dba99>] fsnotify_remove_priv_from_event+0x29/0x70
PGD 68f2b067 PUD 68f2c067 PMD 0
Oops: 0000 [#1] PREEMPT SMP
last sysfs file: 00/device:00/PNP0C0A:00/power_supply/BAT0/charge_full
CPU 1
Modules linked in: radeon drm snd_seq snd_seq_device vfat fat coretemp hwmon cpufreq_ondemand fan iwl3945 usb_storage iwlcore mac80211 led_class snd_hda_codec_idt snd_hda_intel cfg80211 snd_hda_codec snd_pcm snd_timer snd psmouse dell_laptop soundcore evdev uhci_hcd snd_page_alloc rfkill ehci_hcd wmi ac button battery thermal
Pid: 5653, comm: dolphin Not tainted 2.6.31-rc2 #1 MM061
RIP: 0010:[<ffffffff810dba99>] [<ffffffff810dba99>] fsnotify_remove_priv_from_event+0x29/0x70
RSP: 0018:ffff880068ddfe60 EFLAGS: 00010206
RAX: ffff880072ef6ab8 RBX: ffff880072e2e5c0 RCX: 0000000000100100
RDX: 00000000001000f8 RSI: ffff880072e2e600 RDI: ffff88007eee00c0
RBP: 0000000000000020 R08: 0000000002244470 R09: ffff88007b348540
R10: 000000000219b080 R11: 0000000000000246 R12: ffff880072e2e5a8
R13: 00007ffff5ac6970 R14: 0000000000000000 R15: ffff88007eee00c0
FS: 00007f1afd69e750(0000) GS:ffff88000166a000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000100100 CR3: 0000000068f2a000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process dolphin (pid: 5653, threadinfo ffff880068dde000, task ffff88007f8f4140)
Stack:
ffffffff810de304 0000000000000020 00007ffff5ac6970 ffff88007b348540
<0> ffff88007eee0118 ffff88007eee00e8 00007ffff5ac7c9c 0000000000000000
<0> ffff88007f8f4140 ffffffff81051c20 ffff88007eee0120 ffff88007eee0120
Call Trace:
[<ffffffff810de304>] ? inotify_read+0x184/0x310
[<ffffffff81051c20>] ? autoremove_wake_function+0x0/0x30
[<ffffffff810ba80b>] ? do_vfs_ioctl+0x3fb/0x580
[<ffffffff810ac528>] ? vfs_read+0xc8/0x1a0
[<ffffffff810ac703>] ? sys_read+0x53/0xa0
[<ffffffff8100b3eb>] ? system_call_fastpath+0x16/0x1b
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists