[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1284473273.2275.514.camel@laptop>
Date: Tue, 14 Sep 2010 16:07:53 +0200
From: Peter Zijlstra <peterz@...radead.org>
To: Michael Cree <mcree@...on.net.nz>
Cc: mingo@...hat.com, dengcheng.zhu@...il.com,
yanmin_zhang@...ux.intel.com, gorcunov@...il.com,
fweisbec@...il.com, robert.richter@....com, ming.m.lin@...el.com,
tglx@...utronix.de, hpa@...or.com, paulus@...ba.org,
linux-kernel@...r.kernel.org, eranian@...glemail.com,
will.deacon@....com, lethal@...ux-sh.org, davem@...emloft.net,
mingo@...e.hu, linux-alpha@...r.kernel.org
Subject: Re: [tip:perf/core] perf: Rework the PMU methods
On Tue, 2010-09-14 at 22:11 +1200, Michael Cree wrote:
>
> [ 818.575752] Unable to handle kernel paging request at virtual address
> 0000000000000060
> [ 818.575752] perf(4935): Oops 0
> [ 818.575752] pc = [<fffffc000036b8b8>] ra = [<fffffc000036ba3c>] ps
> = 0000 Not tainted
> [ 818.575752] pc is at put_ctx+0x18/0xb0
> [ 818.575752] ra is at free_event+0xec/0x220
> [ 818.575752] v0 = 0000000000000000 t0 = 0000000000000000 t1 =
> 0000000000000002
> [ 818.575752] t2 = 0000000000000000 t3 = 0000000000000000 t4 =
> fffffc000063e4b0
> [ 818.575752] t5 = fffffc0034837000 t6 = fffffc0034837000 t7 =
> fffffc003abe0000
> [ 818.575752] s0 = 0000000000000000 s1 = 0000000000000000 s2 =
> 0000000000000000
> [ 818.575752] s3 = ffffffffffffffff s4 = 0000000000000000 s5 =
> 0000000000000053
> [ 818.575752] s6 = fffffc0034836c00
> [ 818.575752] a0 = 0000000000000000 a1 = fffffc00311a6980 a2 =
> 0000000000000000
> [ 818.575752] a3 = 0000000000000001 a4 = fffffc0000797110 a5 =
> 00000001200055f8
> [ 818.575752] t8 = 0000000000000001 t9 = 00000001200396f4 t10=
> 0000000000000000
> [ 818.575752] t11= 000000000000000a pv = fffffc000031d650 at =
> fffffc000036f8bc
> [ 818.575752] gp = fffffc00007d6e40 sp = fffffc003abe3e18
> [ 818.575752] Disabling lock debugging due to kernel taint
> [ 818.575752] Trace:
> [ 818.575752] [<fffffc000036ba3c>] free_event+0xec/0x220
> [ 818.575752] [<fffffc000036fa24>] SyS_perf_event_open+0x2a4/0x6f0
> [ 818.575752] [<fffffc0000310c24>] entSys+0xa4/0xc0
> [ 818.575752]
> [ 818.575752] Code: 27bb0047 23bdb5a0 23defff0 b53e0008 b75e0000
> 47f00409 <a8500060> 40403121
Does the below cure that?
---
commit 0c67b40872326a5340cab51d79a192a5fbaeb484
Author: Peter Zijlstra <a.p.zijlstra@...llo.nl>
Date: Mon Sep 13 11:15:58 2010 +0200
perf: Fix free_event()
With the context rework stuff we can actually end up freeing an event
before it gets attached to a context.
Reported-by: Cyrill Gorcunov <gorcunov@...il.com>
Signed-off-by: Peter Zijlstra <a.p.zijlstra@...llo.nl>
LKML-Reference: <new-submission>
Signed-off-by: Ingo Molnar <mingo@...e.hu>
diff --git a/kernel/perf_event.c b/kernel/perf_event.c
index bc46bff..440f9ca 100644
--- a/kernel/perf_event.c
+++ b/kernel/perf_event.c
@@ -2150,7 +2150,9 @@ static void free_event(struct perf_event *event)
if (event->destroy)
event->destroy(event);
- put_ctx(event->ctx);
+ if (event->ctx)
+ put_ctx(event->ctx);
+
call_rcu(&event->rcu_head, free_event_rcu);
}
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists