[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.01.0912142025200.3483@bogon.housecafe.de>
Date: Mon, 14 Dec 2009 20:32:36 -0800 (PST)
From: Christian Kujau <lists@...dbynature.de>
To: Tim Blechmann <tim@...ngt.org>
cc: LKML <linux-kernel@...r.kernel.org>, dieb13 <dieb13@...ngt.org>,
eparis@...hat.com
Subject: Re: WARNING: at fs/notify/inotify/inotify_fsnotify.c:129
On Thu, 10 Dec 2009 at 21:39, Tim Blechmann wrote:
> Dec 9 00:37:37 es kernel: WARNING: at fs/notify/inotify/inotify_fsnotify.c:129 idr_callback+0x2a/0x4b()
I've got a similar message here too, with 2.6.32-rc8. However, I'm not
sure how to reproduce this one...
@Eric, should we reopen #14090 or create a new bug?
Thanks,
Christian.
[0] http://bugzilla.kernel.org/show_bug.cgi?id=14090
------------[ cut here ]------------
WARNING: at /data/Scratch/scm/linux-2.6-git/fs/notify/inotify/inotify_fsnotify.c:129 idr_callback+0x36/0x60()
inotify closing but id=0 for entry=ffff88004f8a59a0 in group=ffff880003be0200 still in idr. Probably leaking memory
Modules linked in: sit tunnel4 xfs sha256_generic aes_x86_64 aes_generic nfsd lockd auth_rpcgss sunrpc exportfs ipv6 tun jfs nls_base reiserfs fuse twofish_x86_64 twofish_common
Pid: 9740, comm: imap Not tainted 2.6.32-rc8 #4
Call Trace:
[<ffffffff810ce906>] ? idr_callback+0x36/0x60
[<ffffffff810ce906>] ? idr_callback+0x36/0x60
[<ffffffff810352c9>] ? warn_slowpath_common+0x79/0xd0
[<ffffffff81035381>] ? warn_slowpath_fmt+0x51/0x60
[<ffffffff8120326c>] ? _spin_lock_irq+0xc/0x10
[<ffffffff81200bcf>] ? wait_for_common+0x15f/0x1a0
[<ffffffff8100e4b2>] ? check_events+0x12/0x20
[<ffffffff810cd627>] ? fsnotify_flush_notify+0x97/0xc0
[<ffffffff8100dd99>] ? xen_force_evtchn_callback+0x9/0x10
[<ffffffff8100e4b2>] ? check_events+0x12/0x20
[<ffffffff810ce906>] ? idr_callback+0x36/0x60
[<ffffffff81138d04>] ? idr_for_each+0x84/0xe0
[<ffffffff810ce8d0>] ? idr_callback+0x0/0x60
[<ffffffff8100e49f>] ? xen_restore_fl_direct_end+0x0/0x1
[<ffffffff81096a77>] ? kmem_cache_free+0x87/0xc0
[<ffffffff810ce8ba>] ? inotify_free_group_priv+0x1a/0x30
[<ffffffff810cd6cb>] ? fsnotify_final_destroy_group+0x1b/0x30
[<ffffffff810ceb4c>] ? inotify_release+0x2c/0x50
[<ffffffff8109e450>] ? __fput+0xc0/0x1f0
[<ffffffff8109a9cb>] ? filp_close+0x5b/0x90
[<ffffffff8109aab3>] ? sys_close+0xb3/0x120
[<ffffffff81010d42>] ? system_call_fastpath+0x16/0x1b
---[ end trace 50bb54b8ed08a018 ]---
entry->group=(null) inode=(null) wd=4096
--
BOFH excuse #119:
evil hackers from Serbia.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists