Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755648AbZJSCfT (ORCPT ); Sun, 18 Oct 2009 22:35:19 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754661AbZJSCfT (ORCPT ); Sun, 18 Oct 2009 22:35:19 -0400 Received: from mail-fx0-f218.google.com ([209.85.220.218]:36207 "EHLO mail-fx0-f218.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754615AbZJSCfR convert rfc822-to-8bit (ORCPT ); Sun, 18 Oct 2009 22:35:17 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:sender:in-reply-to:references:date :x-google-sender-auth:message-id:subject:from:to:cc:content-type :content-transfer-encoding; b=l6OZMdXfXbYI2FFmpuVZbP9sOVOJ8nPnpLhiqcAMK6fQHYkTk1Kaf1l5obRFX3JTB0 Mlg8N/t5ZjIYIsRICgphVW/I5H2vwZ2w2axpdVsG/cxAGDfsSXM32Ft0Rc1AcEjSPUAs 9v9RMKBjsgyF1Pvwr5mmBMTxMvijj8iI3U8UA= MIME-Version: 1.0 In-Reply-To: <86802c440910171825j22556a4bofbf0bd6cd134d53c@mail.gmail.com> References: <86802c440910171825j22556a4bofbf0bd6cd134d53c@mail.gmail.com> Date: Mon, 19 Oct 2009 05:35:20 +0300 X-Google-Sender-Auth: f24e248f14c1cd50 Message-ID: <84144f020910181935q4aed9f0dx7a8a149d8b8743c7@mail.gmail.com> Subject: Re: nfs mount fail From: Pekka Enberg To: Yinghai Lu Cc: Ingo Molnar , David Miller , Linux Kernel Mailing List Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5107 Lines: 102 Hi, On Sun, Oct 18, 2009 at 4:25 AM, Yinghai Lu wrote: > mpk12-3214-189-144:~ # cat x > mount -t nfs 10.6.75.100:/data/shared/pxeboot /x > > mpk12-3214-189-144:~ # sh x > > [ ?278.734149] ------------[ cut here ]------------ > [ ?278.739620] kernel BUG at mm/slub.c:2969! So this means that someone is passing a pointer to kfree() that did not come from kmalloc(). Which tree are you testing? > [ ?278.743056] invalid opcode: 0000 [#1] SMP > [ ?278.750365] last sysfs file: /sys/devices/virtual/net/sit0/type > [ ?278.755898] CPU 0 > [ ?278.758637] Modules linked in: > [ ?278.770030] Pid: 2594, comm: rpciod/0 Not tainted > 2.6.32-rc5-tip-01483-ga166936-dirty #651 > [ ?278.788458] RIP: 0010:[] ?[] > kfree+0x96/0x14a > [ ?278.797545] RSP: 0018:ffff88087b9fdc50 ?EFLAGS: 00010246 > [ ?278.810035] RAX: 0a00000000000000 RBX: 0000000000037803 RCX: ffff880854828018 > [ ?278.815372] RDX: ffffea0000000000 RSI: 0000000000000378 RDI: ffff881800706475 > [ ?278.832711] RBP: ffff88087b9fdc90 R08: ffff88084d37ce80 R09: 00000000e3115a3e > [ ?278.848764] R10: 00000000ffffe0be R11: 0000000000000000 R12: ffffea009c02da70 > [ ?278.852385] R13: ffff881800706475 R14: ffff88084439d680 R15: 0000000000000001 > [ ?278.872750] FS: ?0000000000000000(0000) GS:ffff88003fc00000(0000) > knlGS:0000000000000000 > [ ?278.889379] CS: ?0010 DS: 0018 ES: 0018 CR0: 000000008005003b > [ ?278.895226] CR2: 00007fcb2369c000 CR3: 0000000848df0000 CR4: 00000000000026f0 > [ ?278.911157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [ ?278.916692] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > [ ?278.934540] Process rpciod/0 (pid: 2594, threadinfo > ffff88087b9fc000, task ffff88087bdc2370) > [ ?278.950913] Stack: > [ ?278.952455] ?ffff88087913e934 ffff88087747e048 00000000e3115a3e > 0000000000037803 > [ ?278.969335] <0> ffff880854828000 ffff88084d37ce80 ffff88084439d680 > 0000000000000001 > [ ?278.976115] <0> ffff88087b9fdcc0 ffffffff81dae6d8 ffffffff81dbb5d5 > 00000000e3115a3e > [ ?278.995869] Call Trace: > [ ?278.997442] ?[] xs_set_port+0x73/0xa3 > [ ?279.011219] ?[] ? rpcb_dec_getport+0x0/0xc2 > [ ?279.016461] ?[] rpcb_getport_done+0x80/0xdb > [ ?279.030585] ?[] rpc_exit_task+0x3b/0x7f > [ ?279.033790] ?[] __rpc_execute+0x97/0x251 > [ ?279.051120] ?[] rpc_async_schedule+0x28/0x3e > [ ?279.057205] ?[] worker_thread+0x1fa/0x317 > [ ?279.071181] ?[] ? worker_thread+0x1a0/0x317 > [ ?279.075343] ?[] ? rpc_async_schedule+0x0/0x3e > [ ?279.092033] ?[] ? autoremove_wake_function+0x0/0x63 > [ ?279.100028] ?[] ? worker_thread+0x0/0x317 > [ ?279.112094] ?[] kthread+0x9d/0xa5 > [ ?279.116720] ?[] child_rip+0xa/0x20 > [ ?279.133457] ?[] ? restore_args+0x0/0x30 > [ ?279.137271] ?[] ? kthread+0x0/0xa5 > [ ?279.149933] ?[] ? child_rip+0x0/0x20 > [ ?279.154086] Code: 00 00 00 00 00 ea ff ff 48 6b c0 68 4c 8d 24 10 > 66 41 83 3c 24 00 79 05 4d 8b 64 24 10 49 8b 04 24 84 c0 78 17 66 a9 > 00 c0 75 04 <0f> 0b eb fe 4c 89 e7 e8 87 b8 fc ff e9 80 00 00 00 48 8b > 45 08 > [ ?279.198800] RIP ?[] kfree+0x96/0x14a > [ ?279.204063] ?RSP > [ ?279.210307] ---[ end trace 52f0b2ff8e4dec91 ]--- > > Message from syslogd@mpk12-3214-189-144 at Sat Oct 17 18:23:40 2009 ... > mpk12-3214-189-144 kernel: [ ?278.734149] ------------[ cut here ]------------ > > Message from syslogd@mpk12-3214-189-144 at Sat Oct 17 18:23:40 2009 ... > mpk12-3214-189-144 kernel: [ ?278.743056] invalid opcode: 0000 [#1] SMP > > Message from syslogd@mpk12-3214-189-144 at Sat Oct 17 18:23:40 2009 ... > mpk12-3214-189-144 kernel: [ ?278.750365] last sysfs file: > /sys/devices/virtual/net/sit0/type > > Message from syslogd@mpk12-3214-189-144 at Sat Oct 17 18:23:40 2009 ... > mpk12-3214-189-144 kernel: [ ?278.950913] Stack: > > Message from syslogd@mpk12-3214-189-144 at Sat Oct 17 18:23:40 2009 ... > mpk12-3214-189-144 kernel: [ ?278.995869] Call Trace: > > Message from syslogd@mpk12-3214-189-144 at Sat Oct 17 18:23:40 2009 ... > mpk12-3214-189-144 kernel: [ ?279.154086] Code: 00 00 00 00 00 ea ff > ff 48 6b c0 68 4c 8d 24 10 66 41 83 3c 24 00 79 05 4d 8b 64 24 10 49 > 8b 04 24 84 c0 78 17 66 a9 00 c0 75 04 <0f> 0b eb fe 4c 89 e7 e8 87 b8 > fc ff e9 80 00 00 00 48 8b 45 08 > > mount.nfs: mount system call failed > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at ?http://vger.kernel.org/majordomo-info.html > Please read the FAQ at ?http://www.tux.org/lkml/ > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/