From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757284AbYGCIWa (ORCPT ); Thu, 3 Jul 2008 04:22:30 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752527AbYGCIQe (ORCPT ); Thu, 3 Jul 2008 04:16:34 -0400 Received: from smtp1.linux-foundation.org ([140.211.169.13]:39993 "EHLO smtp1.linux-foundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759166AbYGCHFj (ORCPT ); Thu, 3 Jul 2008 03:05:39 -0400 Date: Thu, 3 Jul 2008 00:04:44 -0700 From: Andrew Morton To: Li Zefan Cc: LKML , "linux-mm@kvack.org" , npiggin@suse.de, Lee Schermerhorn , Rik Van Riel , KOSAKI Motohiro Subject: Re: [-mm] BUG: sleeping function called from invalid context at include/linux/pagemap.h:290 Message-Id: <20080703000444.2463eee9.akpm@linux-foundation.org> In-Reply-To: <486C74B1.3000007@cn.fujitsu.com> References: <486C74B1.3000007@cn.fujitsu.com> X-Mailer: Sylpheed 2.4.8 (GTK+ 2.12.5; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 03 Jul 2008 14:41:53 +0800 Li Zefan wrote: > Seems the problematic patch is : > mmap-handle-mlocked-pages-during-map-remap-unmap.patch > > I'm using mmotm uploaded yesterday by Andrew, so I guess this bug > has not been fixed ? Not as far as I know. And I can't immediately spot the bug there. > BUG: sleeping function called from invalid context at include/linux/pagemap.h:290 > in_atomic():1, irqs_disabled():0 > no locks held by gpg-agent/2134. > Pid: 2134, comm: gpg-agent Not tainted 2.6.26-rc8-mm1 #11 > [] __might_sleep+0xbe/0xc5 > [] __munlock_pte_handler+0x3c/0x9e > [] walk_page_range+0x15b/0x1b4 > [] __munlock_vma_pages_range+0x4e/0x5b > [] ? __munlock_pmd_handler+0x0/0x10 > [] ? __munlock_pte_handler+0x0/0x9e > [] munlock_vma_pages_range+0xf/0x11 > [] exit_mmap+0x32/0xf2 > [] ? exit_mm+0xc7/0xda > [] mmput+0x3a/0x8b > [] exit_mm+0xd5/0xda > [] do_exit+0x1fb/0x5d5 > [] ? audit_syscall_exit+0x2aa/0x2c5 > [] do_group_exit+0x5f/0x88 > [] sys_exit_group+0xf/0x11 > [] syscall_call+0x7/0xb > =======================