2.6.26-rc4: RIP __call_for_each_cic+0x20/0x50

From: Alexey Dobriyan
Date: Tue May 27 2008 - 01:32:18 EST


On Sat, May 10, 2008 at 02:37:19PM +0400, Alexey Dobriyan wrote:
> > > > > @@ -41,8 +41,8 @@ int put_io_context(struct io_context *ioc)
> > > > > rcu_read_lock();
> > > > > if (ioc->aic && ioc->aic->dtor)
> > > > > ioc->aic->dtor(ioc->aic);
> > > > > - rcu_read_unlock();
> > > > > cfq_dtor(ioc);
> > > > > + rcu_read_unlock();
> > > > >
> > > > > kmem_cache_free(iocontext_cachep, ioc);
> > > > > return 1;
> > > >
> > > > This helps in sense that 3 times bulk cross-compiles finish to the end.
> > > > You'll hear me if another such oops will resurface.
> > >
> > > Still looking good?
> >
> > Yup!
>
> And this with patch in mainline, again with PREEMPT_RCU.

Ping, this happened again with 2.6.26-rc4 and PREEMPT_RCU.

> general protection fault: 0000 [1] PREEMPT SMP DEBUG_PAGEALLOC
> CPU 0
> Modules linked in: ext2 nls_utf8 cifs nf_conntrack_irc ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 xt_state nf_conntrack iptable_filter ip_tables x_tables usblp ehci_hcd uhci_hcd usbcore sr_mod cdrom
> Pid: 26971, comm: fixdep Not tainted 2.6.26-rc1-28a4acb48586dc21d2d14a75a7aab7be78b7c83b #4
> RIP: 0010:[<ffffffff80304b30>] [<ffffffff80304b30>] __call_for_each_cic+0x20/0x50
> RSP: 0018:ffff810104335e58 EFLAGS: 00010202
> RAX: 6b6b6b6b6b6b6b6b RBX: 6b6b6b6b6b6b6b6b RCX: 0000000000000000
> RDX: 0000000000002827 RSI: 0000000000000000 RDI: ffff810105a62280
> RBP: ffff810104335e78 R08: 0000000000000000 R09: 0000000000000000
> R10: 0000000000000000 R11: 0000000000000001 R12: ffff8101715bde40
> R13: ffffffff80304ba0 R14: ffff81017fcc0000 R15: ffff810105a623e8
> FS: 00002b50c7e566f0(0000) GS:ffffffff805c6000(0000) knlGS:0000000000000000
> CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> CR2: 00002b4d7f8b9b80 CR3: 0000000000201000 CR4: 0000000000000660
> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> Process fixdep (pid: 26971, threadinfo ffff810104334000, task ffff810105a62280)
> Stack: ffff810104335e88 ffff8101715bde40 0000000000000010 ffff810105a62380
> ffff810104335e88 ffffffff80304b70 ffff810104335ea8 ffffffff8030000b
> ffff810105a62380 ffff8101715bde40 ffff810104335ec8 ffffffff803000df
> Call Trace:
> [<ffffffff80304b70>] cfq_free_io_context+0x10/0x20
> [<ffffffff8030000b>] put_io_context+0x7b/0x90
> [<ffffffff803000df>] exit_io_context+0x8f/0xb0
> [<ffffffff80236533>] do_exit+0x543/0x770
> [<ffffffff802367a1>] do_group_exit+0x41/0xb0
> [<ffffffff80236822>] sys_exit_group+0x12/0x20
> [<ffffffff8020b60b>] system_call_after_swapgs+0x7b/0x80
>
>
> Code: 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 55 49 89 f5 41 54 49 89 fc 53 48 83 ec 08 48 8b 47 68 48 85 c0 74 1f 48 89 c3 90 <48> 8b 03 48 8d 73 88 4c 89 e7 0f 18 08 41 ff d5 48 8b 03 48 85
> RIP [<ffffffff80304b30>] __call_for_each_cic+0x20/0x50
> RSP <ffff810104335e58>
> ---[ end trace ff773ec56ab2930e ]---
> Fixing recursive fault but reboot is needed!

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/