Re: BUG on 2.6.20-rc1 when using gdb

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/20/06, Dave Airlie <[email protected]> wrote:
On 12/20/06, Andrew Morton <[email protected]> wrote:
> > When I was using gdb to debug xchat-gnome, I got a kernel BUG and stack
> > trace as the program was running (e.g. I had typed 'run' in gdb):
> >
> > WARNING at kernel/softirq.c:137 local_bh_enable()
> >  [<c0103cd6>] dump_trace+0x68/0x1d9
> >  [<c0103e5f>] show_trace_log_lvl+0x18/0x2c
> >  [<c01044d3>] show_trace+0xf/0x11
> >  [<c010455e>] dump_stack+0x12/0x14
> >  [<c011cc7d>] local_bh_enable+0x44/0x94
> >  [<c02871b9>] unix_release_sock+0x6e/0x1fe
> >  [<c02887eb>] unix_stream_connect+0x3b4/0x3cf
> >  [<c0232dee>] sys_connect+0x82/0xad
> >  [<c0233641>] sys_socketcall+0xac/0x261
> >  [<c0102d38>] syscall_call+0x7/0xb
> >  [<b7f70822>] 0xb7f70822
> >  =======================
> > ------------[ cut here ]------------
> > kernel BUG at fs/buffer.c:1235!
> > invalid opcode: 0000 [#1]
> > PREEMPT
> > Modules linked in: binfmt_misc rfcomm l2cap i915 drm bluetooth nfs nfsd
> > exportfs lockd nfs_acl sunrpc nvram uinput ipv6 ppdev lp button ac
> > battery dm_crypt dm_snapshot dm_mirror dm_mod fuse cpufreq_conservative
> > cpufreq_ondemand cpufreq_performance cpufreq_powersave
> > speedstep_centrino freq_table ibm_acpi loop snd_intel8x0m snd_pcm_oss
> > snd_mixer_oss snd_intel8x0 snd_ac97_codec pcmcia ac97_bus irtty_sir
> > sir_dev ipw2200 snd_pcm snd_timer irda ieee80211 ieee80211_crypt
> > crc_ccitt rtc parport_pc parport 8250_pnp snd soundcore 8250_pci 8250
> > serial_core firmware_class i2c_i801 yenta_socket rsrc_nonstatic
> > pcmcia_core snd_page_alloc i2c_core intel_agp agpgart evdev tsdev joydev
> > ext3 jbd mbcache ide_cd cdrom ide_disk ide_generic e100 mii generic piix
> > ide_core ehci_hcd uhci_hcd usbcore
> > CPU:    0
> > EIP:    0060:[<c0179266>]    Not tainted VLI
> > EFLAGS: 00010046   (2.6.20-rc1 #1)
> > EIP is at __find_get_block+0x1c/0x16f
> > eax: 00000086   ebx: 00000000   ecx: 00000000   edx: 0088a800
> > esi: 0088a800   edi: 00000000   ebp: dfffd040   esp: cad2dd30
> > ds: 007b   es: 007b   ss: 0068
> > Process xchat-gnome (pid: 4322, ti=cad2c000 task=d0cd3ab0
> > task.ti=cad2c000)
> > Stack: cad2dd58 c02caa0b 00000002 0000000e 0000000b 00000001 e8836580
> > 0088a800
> >        00000000 00000000 e8836610 00000000 c01793dc 00001000 c03ab3e0
> > f3cadd80
> >        00000086 c90d41b0 0088a800 00000000 dfffd040 00008000 00000000
> > 00000002
> > Call Trace:
> >  [<c01793dc>] __getblk+0x23/0x268
> >  [<f040d4c6>] ext3_getblk+0x10b/0x244 [ext3]
> >  [<f040e364>] ext3_bread+0x19/0x70 [ext3]
> >  [<f04106f3>] dx_probe+0x43/0x2c9 [ext3]
> >  [<f04119b3>] ext3_htree_fill_tree+0x99/0x1ba [ext3]
> >  [<f040ab77>] ext3_readdir+0x1d4/0x5ed [ext3]
> >  [<c0167b29>] vfs_readdir+0x63/0x8d
> >  [<c0167bb6>] sys_getdents64+0x63/0xa5
> >  [<c0102d38>] syscall_call+0x7/0xb
> >  [<b7f70822>] 0xb7f70822
> >  =======================
> > Code: 8b 40 08 a8 08 74 05 e8 02 2f 11 00 5b 5e c3 55 89 c5 57 89 cf 56
> > 89 d6 53 83 ec 20 9c 58 90 8d b4 26 00 00 00 00 f6 c4 02 75 04 <0f> 0b
> > eb fe 89 e0 25 00 e0 ff ff ff 40 14 31 c9 8b 1c 8d a0 74
> > EIP: [<c0179266>] __find_get_block+0x1c/0x16f SS:ESP 0068:cad2dd30
> >
> > This happens on 2.6.20-rc1 but not 2.6.19.
> >
>
> And it's repeatable, yes?
>
> And you're sure that use of gdb triggers it?
>
> Something is forgetting to reenable local interrupts.

I've managed to get nearly the same thing on a test system I built
yesterday, my app when running under gdb would also blow up in
__find_get_block.

I was using close to Linus's git head...

And of course it was on a fresh 32-bit x86 with FC6 on it.

Dave.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux