Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757412AbYFLIW5 (ORCPT ); Thu, 12 Jun 2008 04:22:57 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753442AbYFLIWl (ORCPT ); Thu, 12 Jun 2008 04:22:41 -0400 Received: from smtp1.linux-foundation.org ([140.211.169.13]:38871 "EHLO smtp1.linux-foundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752952AbYFLIWi (ORCPT ); Thu, 12 Jun 2008 04:22:38 -0400 Date: Thu, 12 Jun 2008 01:22:05 -0700 From: Andrew Morton To: Alexey Dobriyan Cc: linux-kernel@vger.kernel.org, kernel-testers@vger.kernel.org, linux-mm@kvack.org, riel@redhat.com, npiggin@suse.de, Lee Schermerhorn Subject: Re: 2.6.26-rc5-mm3: kernel BUG at mm/vmscan.c:510 Message-Id: <20080612012205.95eb10e9.akpm@linux-foundation.org> In-Reply-To: <20080612075858.GA4874@martell.zuzino.mipt.ru> References: <20080611225945.4da7bb7f.akpm@linux-foundation.org> <20080612075858.GA4874@martell.zuzino.mipt.ru> X-Mailer: Sylpheed 2.4.8 (GTK+ 2.12.5; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4232 Lines: 77 On Thu, 12 Jun 2008 11:58:58 +0400 Alexey Dobriyan wrote: > [ 254.217776] ------------[ cut here ]------------ > [ 254.217776] kernel BUG at mm/vmscan.c:510! > [ 254.217776] invalid opcode: 0000 [1] PREEMPT SMP DEBUG_PAGEALLOC > [ 254.217776] last sysfs file: /sys/kernel/uevent_seqnum > [ 254.217776] CPU 1 > [ 254.217776] Modules linked in: ext2 nf_conntrack_irc xt_state iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack ip_tables x_tables usblp ehci_hcd uhci_hcd usbcore sr_mod cdrom > [ 254.217776] Pid: 12044, comm: madvise02 Not tainted 2.6.26-rc5-mm3 #4 > [ 254.217776] RIP: 0010:[] [] putback_lru_page+0x152/0x160 > [ 254.217776] RSP: 0018:ffff81012edd1cd8 EFLAGS: 00010202 > [ 254.217776] RAX: ffffe20003f344b8 RBX: 0000000000000000 RCX: 0000000000000001 > [ 254.217776] RDX: 0000000000005d5c RSI: 0000000000000000 RDI: ffffe20003f344b8 > [ 254.217776] RBP: ffff81012edd1cf8 R08: 0000000000000000 R09: 0000000000000000 > [ 254.217776] R10: ffffffff80275152 R11: 0000000000000001 R12: ffffe20003f344b8 > [ 254.217776] R13: 00000000ffffffff R14: ffff810124801080 R15: ffffffffffffffff > [ 254.217776] FS: 00007fb3ad83c6f0(0000) GS:ffff81017f845320(0000) knlGS:0000000000000000 > [ 254.217776] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 254.217776] CR2: 00007fffb5846d38 CR3: 0000000117de9000 CR4: 00000000000006e0 > [ 254.217776] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ 254.217776] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > [ 254.217776] Process madvise02 (pid: 12044, threadinfo ffff81012edd0000, task ffff81017db6b3c0) > [ 254.217776] Stack: ffffe20003f344b8 ffffe20003f344b8 ffffffff80629300 0000000000000001 > [ 254.217776] ffff81012edd1d18 ffffffff8027d268 ffffe20003f344b8 0000000000000000 > [ 254.217776] ffff81012edd1d38 ffffffff80271783 0000000000000246 ffffe20003f344b8 > [ 254.217776] Call Trace: > [ 254.217776] [] __clear_page_mlock+0xe8/0x100 > [ 254.217776] [] truncate_complete_page+0x73/0x80 > [ 254.217776] [] truncate_inode_pages_range+0xe1/0x3c0 > [ 254.217776] [] truncate_inode_pages+0x10/0x20 > [ 254.217776] [] ext3_delete_inode+0x18/0xf0 > [ 254.217776] [] ? ext3_delete_inode+0x0/0xf0 > [ 254.217776] [] generic_delete_inode+0x7b/0x100 > [ 254.217776] [] generic_drop_inode+0x13c/0x180 > [ 254.217776] [] iput+0x5d/0x70 > [ 254.217776] [] do_unlinkat+0x13e/0x1e0 > [ 254.217776] [] ? trace_hardirqs_on_thunk+0x3a/0x3f > [ 254.217776] [] ? trace_hardirqs_on_caller+0xc9/0x150 > [ 254.217776] [] ? trace_hardirqs_on_thunk+0x3a/0x3f > [ 254.217776] [] sys_unlink+0x11/0x20 > [ 254.217776] [] system_call_after_swapgs+0x7b/0x80 > [ 254.217776] > [ 254.217776] > [ 254.217776] Code: 0f 0b eb fe 0f 1f 44 00 00 f6 47 01 40 48 89 f8 75 1d 83 78 08 01 75 13 4c 89 e7 31 db e8 97 44 ff ff e9 2b ff ff ff 0f 0b eb fe <0f> 0b eb fe 48 8b 47 10 eb dd 0f 1f 40 00 55 48 89 e5 41 57 45 > [ 254.217776] RIP [] putback_lru_page+0x152/0x160 > [ 254.217776] RSP > [ 254.234540] ---[ end trace a1dd07b571590cc8 ]--- int putback_lru_page(struct page *page) { int lru; int ret = 1; int was_unevictable; VM_BUG_ON(!PageLocked(page)); VM_BUG_ON(PageLRU(page)); lru = !!TestClearPageActive(page); was_unevictable = TestClearPageUnevictable(page); /* for page_evictable() */ if (unlikely(!page->mapping)) { /* * page truncated. drop lock as put_page() will * free the page. */ VM_BUG_ON(page_count(page) != 1); added by unevictable-lru-infrastructure.patch. How does one reproduce this? Looks like LTP madvise2. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/