From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail172.messagelabs.com (mail172.messagelabs.com [216.82.254.3]) by kanga.kvack.org (Postfix) with SMTP id 1601F6B003D for ; Fri, 6 Feb 2009 12:25:15 -0500 (EST) Received: by rv-out-0708.google.com with SMTP id f25so826947rvb.26 for ; Fri, 06 Feb 2009 09:25:13 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: Date: Sat, 7 Feb 2009 01:25:13 +0800 Message-ID: <3d0408630902060925i1efd7aaal830c38969b73c7e8@mail.gmail.com> Subject: Re: next-20090206: kernel BUG at mm/slub.c:1132 From: Yan Zheng Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org To: Alexander Beregalov Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-btrfs@vger.kernel.org, "linux-next@vger.kernel.org" List-ID: 2009/2/6 Alexander Beregalov : > Hi > > I run dbench on btrfs, which is on file on xfs > > btrfs: disabling barriers on dev /dev/loop/0 > ------------[ cut here ]------------ > kernel BUG at mm/slub.c:1132! > invalid opcode: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC > last sysfs file: /sys/kernel/uevent_seqnum > CPU 1 > Modules linked in: > Pid: 2078, comm: loop0 Not tainted 2.6.29-rc3-next-20090206 #1 > RIP: 0010:[] [] __slab_alloc+0x41e/0x610 > RSP: 0018:ffff88007b17d620 EFLAGS: 00010202 > RAX: 0000000000000000 RBX: 0000000000120012 RCX: 0000000000000010 > RDX: 0000000000000000 RSI: ffffffff802c2301 RDI: ffffffff8026c12d > RBP: ffff88007b17d670 R08: 0000000000000001 R09: 0000000000000000 > R10: ffff88007dbbce40 R11: 0000000000000000 R12: 0000000000000000 > R13: ffff88007db82ed8 R14: ffff88007d2554a8 R15: ffff88007d255488 > FS: 0000000000000000(0000) GS:ffff880004dd6000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b > CR2: 00007ff50c1bb000 CR3: 000000006c19d000 CR4: 00000000000006e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > Process loop0 (pid: 2078, threadinfo ffff88007b17c000, task ffff88007dbbce40) > Stack: > ffffffff802c27d9 ffffffff804379f7 ffffffff7d255488 0000001000120012 > ffff88007b17d660 0000000000000000 0000000000000202 0000000000120012 > ffff88007d255488 ffffffff804379f7 ffff88007b17d6b0 ffffffff802c2896 > Call Trace: > [] ? kmem_cache_alloc+0x39/0x100 > [] ? alloc_extent_state+0x17/0xa0 > [] ? alloc_extent_state+0x17/0xa0 > [] kmem_cache_alloc+0xf6/0x100 > [] alloc_extent_state+0x17/0xa0 > [] clear_extent_bit+0x1a6/0x2e0 > [] try_release_extent_state+0x7e/0xa0 > [] try_release_extent_mapping+0x152/0x180 > [] ? __remove_mapping+0xd0/0x100 > [] __btrfs_releasepage+0x36/0x70 > [] btrfs_releasepage+0x25/0x30 > [] try_to_release_page+0x2e/0x60 > [] shrink_page_list+0x572/0x860 > [] ? _spin_unlock_irq+0x2b/0x60 > [] ? shrink_list+0x2b1/0x680 > [] shrink_list+0x2cd/0x680 > [] ? sub_preempt_count+0xc0/0x130 > [] ? _spin_unlock_irqrestore+0x42/0x80 > [] ? __up_write+0x70/0x120 > [] shrink_zone+0x26b/0x380 > [] try_to_free_pages+0x255/0x3d0 > [] ? isolate_pages_global+0x0/0x270 > [] __alloc_pages_internal+0x237/0x590 > [] grab_cache_page_write_begin+0x85/0xd0 > [] ? __mutex_lock_common+0x37c/0x4d0 > [] ? do_lo_send_aops+0x43/0x190 > [] block_write_begin+0x87/0xf0 > [] xfs_vm_write_begin+0x25/0x30 > [] ? xfs_get_blocks+0x0/0x20 > [] pagecache_write_begin+0x1b/0x20 > [] do_lo_send_aops+0xb3/0x190 > [] ? _spin_unlock_irq+0x2b/0x60 > [] ? sub_preempt_count+0xc0/0x130 > [] loop_thread+0x445/0x4e0 > [] ? do_lo_send_aops+0x0/0x190 > [] ? autoremove_wake_function+0x0/0x40 > [] ? loop_thread+0x0/0x4e0 > [] kthread+0x56/0x90 > [] child_rip+0xa/0x20 > [] ? finish_task_switch+0x89/0x110 > [] ? _spin_unlock_irq+0x36/0x60 > [] ? restore_args+0x0/0x30 > [] ? kthread+0x0/0x90 > [] ? child_rip+0x0/0x20 > > Code: e8 18 69 1b 00 e9 48 ff ff ff 31 c9 48 c7 c2 00 4f 81 80 89 c6 > e8 93 7f fd ff 48 89 c3 48 85 c0 0f 85 73 fe ff ff e9 91 fd ff ff <0f> > 0b eb fe 49 83 7f 60 00 90 0f 84 2d fd ff ff 4c 89 f7 e8 aa > RIP [] __slab_alloc+0x41e/0x610 > RSP > -- In the call stack, the flags parameter for kmem_cache_alloc is same as the gfp_flags parameter btrfs_releasepage gets. I guess the oops is due to __GFP_HIGHMEM is passed to kmem_cache_alloc. Regards Yan Zheng -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org