From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161269AbWALVDF (ORCPT ); Thu, 12 Jan 2006 16:03:05 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1161271AbWALVDE (ORCPT ); Thu, 12 Jan 2006 16:03:04 -0500 Received: from anf141.internetdsl.tpnet.pl ([83.17.87.141]:34998 "EHLO anf141.internetdsl.tpnet.pl") by vger.kernel.org with ESMTP id S1161269AbWALVDC (ORCPT ); Thu, 12 Jan 2006 16:03:02 -0500 From: "Rafael J. Wysocki" To: Andrew Morton Subject: Re: 2.6.15-mm3 Date: Thu, 12 Jan 2006 22:05:04 +0100 User-Agent: KMail/1.9 Cc: linux-kernel@vger.kernel.org References: <20060111042135.24faf878.akpm@osdl.org> In-Reply-To: <20060111042135.24faf878.akpm@osdl.org> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200601122205.04714.rjw@sisk.pl> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Wednesday, 11 January 2006 13:21, Andrew Morton wrote: > > ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.15/2.6.15-mm3/ I got that on system shutdown (x86-64, 1 CPU): Unable to handle kernel NULL pointer dereference at 00000000000001b4 RIP: {:ipv6:ip6_xmit+593} PGD 2441f067 PUD 231b1067 PMD 0 Oops: 0000 [1] PREEMPT CPU 0 Modules linked in: ipt_LOG ipt_limit ipt_pkttype ipt_state ipt_REJECT iptable_mangle iptable_nat iptable_filter ip6table_mangle ip_nat_ftp ip_nat ip_conntrack_ftp ip_conntrack ip_tables ip6table_filter ip6_tables ipv6 usbserial thermal processor fan button battery ac snd_pcm_os s snd_mixer_oss snd_intel8x0 snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd soundcore snd_page_alloc af_packet pcmcia firmware_class yen ta_socket rsrc_nonstatic pcmcia_core usbhid ehci_hcd ohci_hcd sk98lin evdev joydev sg st sr_mod sd_mod scsi_mod ide_cd cdrom dm_mod parport _pc lp parport Pid: 18912, comm: kcminit Not tainted 2.6.15-mm3 #25 RIP: 0010:[] {:ipv6:ip6_xmit+593} RSP: 0018:ffffffff80489cc8 EFLAGS: 00010246 RAX: ffff810029a47658 RBX: ffff810029a47658 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff80489d50 RDI: ffff810001f33e00 RBP: ffffffff80489d28 R08: 0000000000000000 R09: 0000000000000080 R10: ffff8100201a9f5c R11: ffffffff80489d40 R12: ffff810001f33dd8 R13: 0000000000000000 R14: ffffffff80489d38 R15: 0000000000000014 FS: 00002aaaae769de0(0000) GS:ffffffff80515000(0000) knlGS:000000005617d560 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 00000000000001b4 CR3: 00000000249eb000 CR4: 00000000000006e0 Process kcminit (pid: 18912, threadinfo ffff8100233ca000, task ffff810028afa090) Stack: ffff810029a476a0 ffff8100201a9e60 0000000000000000 00000000881cb324 ffff810029a47658 ffffffff80489d40 0600000180489d48 ffff810029a476a0 ffffffff80489d40 ffff810001f33e00 Call Trace: {:ipv6:tcp_v6_send_reset+525} {inet6_lookup_listener+264} {:ipv6:tcp_v6_rcv+1842} {:ipv6:ip6_input+568} {:ipv6:ipv6_rcv+527} {netif_receive_skb+635} {process_backlog+153} {net_rx_action+179} {__do_softirq+80} {call_softirq+30} {do_softirq+53} {local_bh_enable+114} {dev_queue_xmit+583} {neigh_resolve_output+639} {:ipv6:ip6_output2+562} {:ipv6:dst_output+0} {:ipv6:ip6_output+2045} {:ipv6:ip6_xmit+747} {:ipv6:inet6_csk_xmit+769} {tcp_transmit_skb+1743} {__alloc_skb+127} {tcp_connect+723} {:ipv6:tcp_v6_connect+1529} {__mutex_init+83} {_spin_unlock_bh+24} {inet_stream_connect+207} {_spin_unlock_bh+24} {lock_sock+201} {_spin_unlock_bh+24} {fget+170} {sys_connect+140} {sys_setsockopt+162} {system_call+126} Code: 41 8b 95 b4 01 00 00 89 90 98 00 00 00 48 8b 45 a8 8b 58 40 RIP {:ipv6:ip6_xmit+593} RSP CR2: 00000000000001b4 <0>Kernel panic - not syncing: Aiee, killing interrupt handler! <4>atkbd.c: Spurious ACK on isa0060/serio0. Some program, like XFree86, might be trying access hardware directly. atkbd.c: Spurious ACK on isa0060/serio0. Some program, like XFree86, might be trying access hardware directly. atkbd.c: Spurious ACK on isa0060/serio0. Some program, like XFree86, might be trying access hardware directly. atkbd.c: Spurious ACK on isa0060/serio0. Some program, like XFree86, might be trying access hardware directly. and so on forever. Greetings, Rafael