2011-06-24 17:24:30

by [email protected]

[permalink] [raw]
Subject: Kernel 2.6.39.2 - incorrect calling of sleeping function and lockdep problem found

When the new 2.6.39.2 kernel was published, I tried to compile it for my poor HT machine,
which is not able to run any kernel above 2.6.38 :-(.

When booting the 2.6.39.2 I've found following problems:

[ 185.866381] usb 2-1.2: new full speed USB device number 4 using uhci_hcd
[ 188.501954] BUG: sleeping function called from invalid context at include/linux/pagemap.h:350
[ 188.503335] in_atomic(): 0, irqs_disabled(): 1, pid: 1204, name: blkid
[ 188.503335] 1 lock held by blkid/1204:
[ 188.503335] #0: (&mm->mmap_sem){++++++}, at: [<c0122c42>] do_page_fault+0xc2/0x440
[ 188.503335] irq event stamp: 38360
[ 188.503335] hardirqs last enabled at (38359): [<c0462638>] restore_all_notrace+0x0/0x18
[ 188.503335] hardirqs last disabled at (38360): [<c0462b5f>] error_code+0x5b/0x64
[ 188.503335] softirqs last enabled at (37150): [<c0141e3c>] __do_softirq+0xdc/0x130
[ 188.503335] softirqs last disabled at (37133): [<c0104c07>] do_softirq+0x87/0xd0
[ 188.503335] Pid: 1204, comm: blkid Tainted: G W 2.6.39.2 #1
[ 188.503335] Call Trace:
[ 188.503335] [<c0104c07>] ? do_softirq+0x87/0xd0
[ 188.503335] [<c04564c6>] __might_sleep.part.127+0x8f/0x95
[ 188.503335] [<c012fb11>] __might_sleep+0x71/0x90
[ 188.503335] [<c0196fc5>] filemap_fault+0xf5/0x3b0
[ 188.503335] [<c0462556>] ? ret_from_exception+0x6/0x6
[ 188.503335] [<c01ab809>] __do_fault+0x39/0x410
[ 188.503335] [<c028d1b0>] ? trace_hardirqs_off_thunk+0xc/0x1c
[ 188.503335] [<c0462556>] ? ret_from_exception+0x6/0x6
[ 188.503335] [<c0135dfb>] ? sub_preempt_count.part.142+0x3b/0x80
[ 188.503335] [<c01ae7f8>] handle_pte_fault+0x88/0x1e0
[ 188.503335] [<c01ae9d1>] handle_mm_fault+0x81/0xb0
[ 188.503335] [<c0122ca1>] do_page_fault+0x121/0x440
[ 188.503335] [<c028d1a0>] ? trace_hardirqs_on_thunk+0xc/0x10
[ 188.503335] [<c01b007b>] ? sys_mlockall+0x3b/0xf0
[ 188.503335] [<c0462638>] ? restore_all+0xf/0xf
[ 188.503335] [<c0122b80>] ? vmalloc_sync_all+0x100/0x100
[ 188.503335] [<c0462b63>] error_code+0x5f/0x64
[ 188.503335] [<c0122b80>] ? vmalloc_sync_all+0x100/0x100
[ 188.503335] ------------[ cut here ]------------
[ 188.503335] WARNING: at kernel/lockdep.c:2465 __lockdep_trace_alloc+0x6a/0x70()
[ 188.503335] Hardware name:
[ 188.503335] Modules linked in: ir_jvc_decoder snd_timer snd_seq_device bttv(+) ir_rc6_decoder i915(+) ir_rc5_decoder firmware_class snd videobuf_dma_sg ir_nec_decoder videobuf_core pcspkr
uhci_hcd(+) btcx_risc ehci_hcd rc_core tveeprom usbcore v4l2_common e1000 videodev 8139too parport_serial 8139cp soundcore 8250_pci mii snd_page_alloc i2c_i801 shpchp drm_kms_helper pci_hotplug
intel_agp intel_gtt parport_pc floppy parport 8250_pnp evdev processor unix
[ 188.503335] Pid: 1204, comm: blkid Tainted: G W 2.6.39.2 #1
[ 188.503335] Call Trace:
[ 188.503335] [<c0456a7c>] ? printk+0x18/0x1a
[ 188.503335] [<c013be9d>] warn_slowpath_common+0x6d/0xa0
[ 188.503335] [<c016d30a>] ? __lockdep_trace_alloc+0x6a/0x70
[ 188.503335] [<c016d30a>] ? __lockdep_trace_alloc+0x6a/0x70
[ 188.503335] [<c013beed>] warn_slowpath_null+0x1d/0x20
[ 188.503335] [<c016d30a>] __lockdep_trace_alloc+0x6a/0x70
[ 188.503335] [<c016d98f>] lockdep_trace_alloc+0x3f/0x60
[ 188.503335] [<c01be78a>] kmem_cache_alloc+0x1a/0x110
[ 188.503335] [<c01b5573>] anon_vma_prepare+0x53/0x150
[ 188.503335] [<c01aba47>] __do_fault+0x277/0x410
[ 188.503335] [<c028d1b0>] ? trace_hardirqs_off_thunk+0xc/0x1c
[ 188.503335] [<c01ae7f8>] handle_pte_fault+0x88/0x1e0
[ 188.503335] [<c01ae9d1>] handle_mm_fault+0x81/0xb0
[ 188.503335] [<c0122ca1>] do_page_fault+0x121/0x440
[ 188.503335] [<c028d1a0>] ? trace_hardirqs_on_thunk+0xc/0x10
[ 188.503335] [<c01b007b>] ? sys_mlockall+0x3b/0xf0
[ 188.503335] [<c0462638>] ? restore_all+0xf/0xf
[ 188.503335] [<c0122b80>] ? vmalloc_sync_all+0x100/0x100
[ 188.503335] [<c0462b63>] error_code+0x5f/0x64
[ 188.503335] [<c0122b80>] ? vmalloc_sync_all+0x100/0x100
[ 188.503335] ---[ end trace 93d72a36b9146f24 ]---
[ 188.847213] kobject: 'ptyc8' (f481a808): kobject_uevent_env

I attach the .config file of the affected machine.

--
Regards,
WZab


Attachments:
.config (100.06 kB)

2011-06-24 17:29:30

by [email protected]

[permalink] [raw]
Subject: Re: Kernel 2.6.39.2 - incorrect calling of sleeping function and lockdep problem found

Yet another problems recorded in different boots:

From the booting reported in the previous message:

[ 368.921715] kobject: 'snd_hwdep' (f83f20c8): fill_kobj_path: path = '/module/snd_hwdep'
[ 370.295518] BUG: sleeping function called from invalid context at mm/slab.c:3102
[ 370.296646] in_atomic(): 0, irqs_disabled(): 1, pid: 1082, name: udevd
[ 370.296646] INFO: lockdep is turned off.
[ 370.296646] irq event stamp: 1111674
[ 370.296646] hardirqs last enabled at (1111673): [<c01839c6>] rcu_preempt_note_context_switch+0x66/0x150
[ 370.296646] hardirqs last disabled at (1111674): [<c0461960>] _raw_spin_lock_irq+0x10/0x80
[ 370.296646] softirqs last enabled at (1111670): [<c0141e3c>] __do_softirq+0xdc/0x130
[ 370.296646] softirqs last disabled at (1111653): [<c0104c07>] do_softirq+0x87/0xd0
[ 370.296646] Pid: 1082, comm: udevd Tainted: G W 2.6.39.2 #1
[ 370.296646] Call Trace:
[ 370.296646] [<c0104c07>] ? do_softirq+0x87/0xd0
[ 370.296646] [<c04564c6>] __might_sleep.part.127+0x8f/0x95
[ 370.296646] [<c012fb11>] __might_sleep+0x71/0x90
[ 370.296646] [<c01be851>] kmem_cache_alloc+0xe1/0x110
[ 370.296646] [<c0462556>] ? ret_from_exception+0x6/0x6
[ 370.296646] [<c01c48b4>] get_empty_filp+0x54/0x210
[ 370.296646] [<c013007b>] ? scale_rt_power+0x5b/0xd0
[ 370.296646] [<c01c4a8b>] alloc_file+0x1b/0xd0
[ 370.296646] [<c01cc6cf>] create_write_pipe+0x6f/0xe0
[ 370.296646] [<c01cc808>] do_pipe_flags+0x28/0xd0
[ 370.296646] [<c01cc8c2>] sys_pipe2+0x12/0x60
[ 370.296646] [<c028d1a0>] ? trace_hardirqs_on_thunk+0xc/0x10
[ 370.296646] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 370.424622] ERROR: kmemcheck: Fatal error
[ 370.428702]
[ 370.430262] Pid: 1082, comm: udevd Tainted: G W 2.6.39.2 #1 /D865GBF
[ 370.441208] EIP: 0060:[<c01d6557>] EFLAGS: 00010146 CPU: 0
[ 370.446768] EIP is at d_set_d_op+0x17/0xb0
[ 370.450933] EAX: 00000000 EBX: f3e70788 ECX: c0d7a869 EDX: c0471b80
[ 370.457261] ESI: c0471b80 EDI: 00000002 EBP: f4a8ff44 ESP: c083430c
[ 370.463588] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 370.469050] CR0: 80050033 CR2: f5c32dd8 CR3: 34a1d000 CR4: 000006d0
[ 370.475386] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 370.481722] DR6: ffff4ff0 DR7: 00000400
[ 370.485623] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 370.491438] [<c0127294>] kmemcheck_show+0x64/0x70
[ 370.496319] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 370.501346] [<c0122df0>] do_page_fault+0x270/0x440
[ 370.506304] [<c0462b63>] error_code+0x5f/0x64
[ 370.510896] [<c01d8229>] d_alloc_pseudo+0x29/0x40
[ 370.515770] [<c01cc69f>] create_write_pipe+0x3f/0xe0
[ 370.520969] [<c01cc808>] do_pipe_flags+0x28/0xd0
[ 370.525754] [<c01cc8c2>] sys_pipe2+0x12/0x60
[ 370.530264] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 370.535308] [<ffffffff>] 0xffffffff
[ 371.110773] kobject: 'snd_pcm' (f8427568): kobject_add_internal: parent: 'module', set: 'module'

Another booting - now with kmemcheck errors:

[ 339.361602] hub 5-0:1.0: 2 ports detected
[ 370.530048] ERROR: kmemcheck: Fatal error
[ 370.534146]
[ 370.535640] Pid: 1593, comm: net.agent Tainted: G W 2.6.39.2 #1 /D865GBF
[ 370.546969] EIP: 0060:[<c01970d0>] EFLAGS: 00010102 CPU: 0
[ 370.552539] EIP is at filemap_fault+0x200/0x3b0
[ 370.557145] EAX: 8002006d EBX: f587610c ECX: 00000008 EDX: f5876278
[ 370.563487] ESI: f77f67a8 EDI: 00000008 EBP: f3a3de80 ESP: c083430c
[ 370.569832] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 370.575309] CR0: 8005003b CR2: f5c32dc0 CR3: 3391e000 CR4: 000006d0
[ 370.581656] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 370.588001] DR6: ffff4ff0 DR7: 00000400
[ 370.591919] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 370.597759] [<c0127294>] kmemcheck_show+0x64/0x70
[ 370.602648] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 370.607699] [<c0122df0>] do_page_fault+0x270/0x440
[ 370.612676] [<c0462b63>] error_code+0x5f/0x64
[ 370.617302] [<c01ab809>] __do_fault+0x39/0x410
[ 370.621931] [<c01ae7f8>] handle_pte_fault+0x88/0x1e0
[ 370.627159] [<c01ae9d1>] handle_mm_fault+0x81/0xb0
[ 370.632132] [<c0122ca1>] do_page_fault+0x121/0x440
[ 370.637187] [<c0462b63>] error_code+0x5f/0x64
[ 370.641726] [<ffffffff>] 0xffffffff
[ 457.433569] BUG: sleeping function called from invalid context at mm/memory.c:780
[ 457.436638] in_atomic(): 0, irqs_disabled(): 1, pid: 1866, name: net.agent
[ 457.436638] 2 locks held by net.agent/1866:
[ 457.436638] #0: (&mm->mmap_sem){++++++}, at: [<c0139c5c>] dup_mmap+0x1c/0x280
[ 457.436638] #1: (&mm->mmap_sem/1){+.+.+.}, at: [<c0139c6f>] dup_mmap+0x2f/0x280
[ 457.436638] irq event stamp: 26954
[ 457.436638] hardirqs last enabled at (26953): [<c0462638>] restore_all_notrace+0x0/0x18
[ 457.436638] hardirqs last disabled at (26954): [<c0462b5f>] error_code+0x5b/0x64
[ 457.436638] softirqs last enabled at (25006): [<c0141e3c>] __do_softirq+0xdc/0x130
[ 457.436638] softirqs last disabled at (24989): [<c0104c07>] do_softirq+0x87/0xd0
[ 457.436638] Pid: 1866, comm: net.agent Tainted: G W 2.6.39.2 #1
[ 457.436638] Call Trace:
[ 457.436638] [<c0104c07>] ? do_softirq+0x87/0xd0
[ 457.436638] [<c04564c6>] __might_sleep.part.127+0x8f/0x95
[ 457.436638] [<c012fb11>] __might_sleep+0x71/0x90
[ 457.436638] [<c01ad798>] copy_pte_range+0x238/0x350
[ 457.436638] [<c01ad969>] copy_page_range+0xb9/0x180
[ 457.436638] [<c0139de5>] dup_mmap+0x1a5/0x280
[ 457.436638] [<c013a5bd>] dup_mm+0x9d/0x170
[ 457.436638] [<c0456809>] copy_mm+0x76/0xc3
[ 457.436638] [<c013abd8>] copy_process.part.47+0x528/0xb00
[ 457.436638] [<c0122d23>] ? do_page_fault+0x1a3/0x440
[ 457.436638] [<c013b229>] copy_process+0x79/0x80
[ 457.436638] [<c013b2fa>] do_fork+0xaa/0x270
[ 457.436638] [<c01abe60>] ? might_fault+0x90/0xa0
[ 457.436638] [<c010aa0f>] sys_clone+0x2f/0x40
[ 457.436638] [<c0462ef1>] ptregs_clone+0x15/0x24
[ 457.436638] [<c0462e10>] ? sysenter_do_call+0x12/0x36
[ 741.399946] BUG: sleeping function called from invalid context at mm/mmap.c:234
[ 741.399946] in_atomic(): 0, irqs_disabled(): 1, pid: 3061, name: sleep
[ 741.399946] no locks held by sleep/3061.
[ 741.399946] irq event stamp: 43048
[ 741.399946] hardirqs last enabled at (43047): [<c0462638>] restore_all_notrace+0x0/0x18
[ 741.399946] hardirqs last disabled at (43048): [<c0462b5f>] error_code+0x5b/0x64
[ 741.399946] softirqs last enabled at (42356): [<c0141e3c>] __do_softirq+0xdc/0x130
[ 741.399946] softirqs last disabled at (42339): [<c0104c07>] do_softirq+0x87/0xd0
[ 741.399946] Pid: 3061, comm: sleep Tainted: G W 2.6.39.2 #1
[ 741.399946] Call Trace:
[ 741.399946] [<c0104c07>] ? do_softirq+0x87/0xd0
[ 741.399946] [<c04564c6>] __might_sleep.part.127+0x8f/0x95
[ 741.399946] [<c012fb11>] __might_sleep+0x71/0x90
[ 741.399946] [<c01b062b>] remove_vma+0x1b/0x70
[ 741.399946] [<c01b2aaf>] exit_mmap+0x11f/0x180
[ 741.399946] [<c013a129>] mmput.part.45+0x19/0x90
[ 741.399946] [<c013a1c9>] mmput+0x29/0x30
[ 741.399946] [<c013de4a>] exit_mm+0xea/0x120
[ 741.399946] [<c017e3e7>] ? acct_collect+0x127/0x170
[ 741.399946] [<c013fef2>] do_exit+0x212/0x310
[ 741.399946] [<c01c5577>] ? fput+0x7/0x20
[ 741.399946] [<c01c163f>] ? filp_close+0x4f/0x70
[ 741.399946] [<c0140133>] do_group_exit+0x33/0x90
[ 741.399946] [<c01401a3>] sys_exit_group+0x13/0x20
[ 741.399946] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 741.531841] ERROR: kmemcheck: Fatal error
[ 741.535933]
[ 741.537510] Pid: 3061, comm: sleep Tainted: G W 2.6.39.2 #1 /D865GBF
[ 741.548411] EIP: 0060:[<c01ad4a5>] EFLAGS: 00010187 CPU: 0
[ 741.553979] EIP is at unmap_page_range+0x35/0xf0
[ 741.558674] EAX: b7707000 EBX: f3afbeec ECX: b7707000 EDX: f4ba864c
[ 741.565019] ESI: f4ba864c EDI: 00000000 EBP: f3afbeb8 ESP: c0834430
[ 741.571362] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[ 741.576862] CR0: 8005003b CR2: f5c32dc0 CR3: 0082a000 CR4: 000006d0
[ 741.583202] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 741.589545] DR6: ffff4ff0 DR7: 00000400
[ 741.593463] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 741.599227] [<c0127294>] kmemcheck_show+0x64/0x70
[ 741.604203] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 741.609186] [<c0122df0>] do_page_fault+0x270/0x440
[ 741.614240] [<c0462b63>] error_code+0x5f/0x64
[ 741.618790] [<c01adb17>] unmap_vmas+0xe7/0x290
[ 741.623503] [<c01b2a56>] exit_mmap+0xc6/0x180
[ 741.628036] [<c013a129>] mmput.part.45+0x19/0x90
[ 741.632837] [<c013a1c9>] mmput+0x29/0x30
[ 741.637023] [<c013de4a>] exit_mm+0xea/0x120
[ 741.641382] [<c013fef2>] do_exit+0x212/0x310
[ 741.645836] [<c0140133>] do_group_exit+0x33/0x90
[ 741.650717] [<c01401a3>] sys_exit_group+0x13/0x20
[ 741.655604] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 741.660744] [<ffffffff>] 0xffffffff

The above error was the last one displayed in the console. The machine got frozen afterwards.

--
Regards,
WZab

2011-06-24 17:33:53

by [email protected]

[permalink] [raw]
Subject: Re: Kernel 2.6.39.2 - incorrect calling of sleeping function and lockdep problem found

And yet another attempt to boot the afffected machine:

[ 356.830062] IR NEC protocol handler initialized
[ 367.507094] IR RC5(x) protocol handler initialized
[ 377.053379] ERROR: kmemcheck: Fatal error
[ 377.057471]
[ 377.058967] Pid: 1194, comm: udevd Tainted: G W 2.6.39.2 #1 /D865GBF
[ 377.069867] EIP: 0060:[<c01be039>] EFLAGS: 00000186 CPU: 0
[ 377.075437] EIP is at kmem_cache_free+0x49/0xc0
[ 377.080044] EAX: 0000002f EBX: f5c06a80 ECX: 00000038 EDX: c01b4250
[ 377.086387] ESI: f5c94c00 EDI: f036ae10 EBP: efc41de8 ESP: c083430c
[ 377.092733] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
[ 377.098211] CR0: 8005003b CR2: f5c342c8 CR3: 2fe53000 CR4: 000006d0
[ 377.104557] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 377.110900] DR6: ffff4ff0 DR7: 00000400
[ 377.114820] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 377.120582] [<c012735b>] kmemcheck_hide+0xbb/0xe0
[ 377.125463] [<c0127568>] kmemcheck_trap+0x18/0x30
[ 377.130437] [<c01037ec>] do_debug+0x11c/0x1a0
[ 377.134972] [<c0462bb6>] debug_stack_correct+0x2e/0x34
[ 377.140303] [<c01b551b>] __put_anon_vma+0x3b/0x40
[ 377.145200] [<c01b5701>] unlink_anon_vmas+0x91/0xa0
[ 377.150270] [<c01ac0f4>] free_pgtables+0x64/0xc0
[ 377.155081] [<c01b2a85>] exit_mmap+0xf5/0x180
[ 377.159614] [<c013a129>] mmput.part.45+0x19/0x90
[ 377.164504] [<c013a1c9>] mmput+0x29/0x30
[ 377.168611] [<c01c94ba>] exec_mmap+0x12a/0x380
[ 377.173241] [<c01ca275>] flush_old_exec+0x55/0xa0
[ 377.178216] [<c02016b4>] load_elf_binary+0x214/0x9f0
[ 377.183374] [<c01c8e51>] search_binary_handler+0xd1/0x2b0
[ 377.188955] [<c01cab47>] do_execve+0x1d7/0x250
[ 377.193662] [<c010aa52>] sys_execve+0x32/0x70
[ 377.198205] [<c0462e86>] ptregs_execve+0x12/0x18
[ 377.203000] [<ffffffff>] 0xffffffff
[ 381.643766] bttv: driver version 0.9.18 loaded
[...]
[ 463.006917] INFO: task udevd:1087 blocked for more than 120 seconds.
[ 463.070046] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 463.180300] udevd D 00000000 0 1087 1066 0x00000000
[ 463.229429] f2943d94
[ 463.296974] 00000046 0000004f 00000000 c0823a80 f6146a80 c05f14a0 c06dd000
[ 463.380057] f2914a80 0000004f f6146480 f2940d10 f1341210 00000086 f2943d48 f2941180
[ 463.483632] f2941180 f2943d54 f2940d10 00000006 00000000 f2940d10 00000006 f2943d7c
[ 463.547713] Call Trace:
[ 463.617235] [<c016d273>] ? mark_held_locks+0x53/0x80
[ 463.691036] [<c0135d8b>] ? get_parent_ip+0xb/0x40
[ 463.750599] [<c0135dfb>] ? sub_preempt_count.part.142+0x3b/0x80
[ 463.823394] [<c04608f7>] mutex_lock_nested+0x157/0x340
[ 463.904144] [<c02fbcce>] ? tty_open+0x4e/0x400
[ 463.940375] [<c02fbcce>] ? tty_open+0x4e/0x400
[ 464.013398] [<c02fbcce>] tty_open+0x4e/0x400
[ 464.060061] [<c01c763a>] chrdev_open+0xea/0x1e0
[ 464.126782] [<c01c13a6>] __dentry_open+0x176/0x320
[ 464.184828] [<c0462187>] ? _raw_spin_unlock+0x27/0x50
[ 464.263390] [<c01c2656>] nameidata_to_filp+0x66/0x80
[ 464.323422] [<c01c7550>] ? cdev_put+0x20/0x20
[ 464.377192] [<c01d07a5>] do_last.isra.34+0x255/0x600
[ 464.436805] [<c01d10ad>] path_openat+0x8d/0x350
[ 464.496728] [<c0135e5f>] ? sub_preempt_count+0x1f/0x50
[ 464.570441] [<c01d139c>] do_filp_open+0x2c/0x80
[ 464.633406] [<c0462187>] ? _raw_spin_unlock+0x27/0x50
[ 464.706777] [<c01dd747>] ? alloc_fd+0x157/0x1a0
[ 464.754254] [<c01c2751>] do_sys_open+0xe1/0x1b0
[ 464.816927] [<c01c2849>] sys_open+0x29/0x40
[ 464.874339] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 464.956993] 1 lock held by udevd/1087:
[ 465.010113] #0: (tty_mutex){+.+.+.}, at: [<c02fbcce>] tty_open+0x4e/0x400
[ 465.103384] Kernel panic - not syncing: hung_task: blocked tasks
[ 465.109476] Pid: 351, comm: khungtaskd Tainted: G W 2.6.39.2 #1
[ 465.116265] Call Trace:
[ 465.118808] [<c0456a7c>] ? printk+0x18/0x1a
[ 465.123162] [<c04568b7>] panic+0x61/0x156
[ 465.127356] [<c017f5df>] ? touch_nmi_watchdog+0x4f/0x90
[ 465.132748] [<c017edc1>] check_hung_task+0xa1/0xb0
[ 465.137707] [<c017efb4>] check_hung_uninterruptible_tasks+0x134/0x180
[ 465.144325] [<c017eeb8>] ? check_hung_uninterruptible_tasks+0x38/0x180
[ 465.151020] [<c017f000>] ? check_hung_uninterruptible_tasks+0x180/0x180
[ 465.157802] [<c017f039>] watchdog+0x39/0x40
[ 465.162158] [<c0156938>] kthread+0x68/0x70
[ 465.166430] [<c01568d0>] ? __init_kthread_worker+0x60/0x60
[ 465.172122] [<c046333a>] kernel_thread_helper+0x6/0xd

Configuration of kernel still the same as reported in the first message.
--
Regards,
WZab

2011-06-25 08:42:05

by [email protected]

[permalink] [raw]
Subject: Re: Kernel 2.6.39.2 - incorrect calling of sleeping function and lockdep problem found

I've experienced yet another bunch of errors when trying to boot
2.6.39.1 on the affected machine:
[ 128.020070] ERROR: kmemcheck: Fatal error
[ 128.024158]
[ 128.025654] Pid: 1100, comm: modprobe Tainted: G W 2.6.39.2
#1 /D865GBF
[ 128.036901] EIP: 0060:[<c0460871>] EFLAGS: 00010186 CPU: 0
[ 128.042468] EIP is at mutex_lock_nested+0xd1/0x340
[ 128.047332] EAX: f4b38230 EBX: f49d0214 ECX: f4b3c000 EDX: 0000403f
[ 128.053673] ESI: f49d0218 EDI: 00000246 EBP: f4b3ddf4 ESP: c083430c
[ 128.060092] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 128.065568] CR0: 8005003b CR2: f5c347d8 CR3: 34b31000 CR4: 000006d0
[ 128.071912] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 128.078253] DR6: ffff4ff0 DR7: 00000400
[ 128.082168] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 128.088007] [<c0127294>] kmemcheck_show+0x64/0x70
[ 128.092894] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 128.097954] [<c0122df0>] do_page_fault+0x270/0x440
[ 128.102927] [<c0462b63>] error_code+0x5f/0x64
[ 128.107554] [<c0249578>] reiserfs_write_lock+0x28/0x40
[ 128.112882] [<c022f1d9>] reiserfs_readdir_dentry+0x2f9/0x580
[ 128.118801] [<c022f477>] reiserfs_readdir+0x17/0x20
[ 128.123947] [<c01d463e>] vfs_readdir+0x9e/0xc0
[ 128.128581] [<c01d4720>] sys_getdents+0x60/0xc0
[ 128.133286] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 128.138432] [<ffffffff>] 0xffffffff
udevd[1093]: '/sbin/modprobe -b acpi:PNP0100:' [1100] terminated by
signal 5 (Trace/breakpoint trap)
[...]
[ 361.899981] kobject: 'vtcon0' (f5ceba08): fill_kobj_path: path =
'/devices/virtual/vtconsole/vtcon0'
[ 370.646704] ERROR: kmemcheck: Fatal error
[ 370.650782]
[ 370.652272] Pid: 1606, comm: path_id Tainted: G W 2.6.39.2
#1 /D865GBF
[ 370.663388] EIP: 0060:[<c021ceb2>] EFLAGS: 00010246 CPU: 0
[ 370.668946] EIP is at sysfs_refresh_inode+0x82/0xa0
[ 370.673887] EAX: f5c572e8 EBX: f58ae0b0 ECX: 00000000 EDX: 00000000
[ 370.680212] ESI: f5c574e0 EDI: f5c574e0 EBP: f3a55e10 ESP: c0834430
[ 370.686537] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 370.692003] CR0: 80050033 CR2: f5c347d8 CR3: 34a44000 CR4: 000006d0
[ 370.698328] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 370.704660] DR6: ffff4ff0 DR7: 00000400
[ 370.708558] [<c0126c38>] kmemcheck_error_save_bug+0x58/0x90
[ 370.714302] [<c0127294>] kmemcheck_show+0x64/0x70
[ 370.719181] [<c01274fd>] kmemcheck_fault+0x6d/0xc0
[ 370.724206] [<c0122df0>] do_page_fault+0x270/0x440
[ 370.729161] [<c0462b63>] error_code+0x5f/0x64
[ 370.733762] [<c021cf0b>] sysfs_permission+0x3b/0x70
[ 370.738813] [<c01cecc6>] link_path_walk+0x1c6/0x8d0
[ 370.743935] [<c01cf4f0>] path_lookupat+0x50/0x740
[ 370.748804] [<c01d0b75>] do_path_lookup+0x25/0x70
[ 370.753750] [<c01d0f3e>] user_path_at+0x3e/0x80
[ 370.758455] [<c01c80c1>] sys_readlinkat+0x31/0xa0
[ 370.763400] [<c01c8157>] sys_readlink+0x27/0x30
[ 370.768099] [<c0462e10>] sysenter_do_call+0x12/0x36
[ 370.773141] [<ffffffff>] 0xffffffff

I attach gzipped messages from the whole booting (from serial console)
--
Regards,
WZab


Attachments:
2.6.39.2.panic.gz (17.51 kB)