linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* 2.6.0-test1: illegal context call in slab.c
@ 2003-07-21 15:28 Douglas J Hunley
  2003-07-21 22:16 ` Roger Luethi
  0 siblings, 1 reply; 3+ messages in thread
From: Douglas J Hunley @ 2003-07-21 15:28 UTC (permalink / raw)
  To: linux-kernel

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Went downstairs this morning to find that X had to be completely restarted 
(everything I tried to do was giving a sig 11). These entries were in the 
system logs:
Jul 21 11:09:04 doug kernel: Debug: sleeping function called from illegal 
context at mm/slab.c:1811
Jul 21 11:09:04 doug kernel:  [<c011abc0>] __ioremap+0xc0/0x120
Jul 21 11:09:04 doug kernel:  [<c011ac4f>] ioremap_nocache+0x2f/0xd0
Jul 21 11:09:04 doug kernel:  [<c011f57f>] __might_sleep+0x5f/0x70
Jul 21 11:09:04 doug kernel:  [<c0144fe7>] kmem_cache_alloc+0x77/0x80
Jul 21 11:09:04 doug kernel:  [<c015666c>] get_vm_area+0x2c/0x160
Jul 21 11:09:04 doug kernel:  [<c015da05>] get_empty_filp+0x75/0x100
Jul 21 11:09:04 doug kernel:  [<c0166ff0>] chrdev_open+0x0/0x290
Jul 21 11:09:04 doug kernel:  [<c0167110>] chrdev_open+0x120/0x290
Jul 21 11:09:04 doug kernel:  [<c017980f>] iget_locked+0xaf/0xf0
Jul 21 11:09:04 doug kernel:  [<c018c701>] proc_get_inode+0x121/0x150
Jul 21 11:09:04 doug kernel:  [<c018c851>] proc_root_lookup+0x31/0x80
Jul 21 11:09:04 doug kernel:  [<f8a27e70>] nv_kern_open+0x16f/0x28b [nvidia]
Jul 21 11:09:04 doug kernel:  [<f8a2b138>] os_map_kernel_space+0x68/0x6c 
[nvidia]
Jul 21 11:09:04 doug kernel:  [<f8a3cfa7>] __nvsym00517+0x1f/0x2c [nvidia]
Jul 21 11:09:04 doug kernel:  [<f8a3ee7e>] __nvsym00711+0x6e/0xdc [nvidia]
Jul 21 11:09:04 doug kernel:  [<f8a3ef0a>] __nvsym00718+0x1e/0x184 [nvidia]
Jul 21 11:09:04 doug kernel:  [<f8a3ff38>] rm_init_adapter+0xc/0x10 [nvidia]
Jul 21 11:09:04 doug kernel: Call Trace:
Jul 21 11:09:05 doug kernel: 
Jul 21 11:09:05 doug kernel:  [<c010946b>] syscall_call+0x7/0xb
Jul 21 11:09:05 doug kernel:  [<c011f57f>] __might_sleep+0x5f/0x70
Jul 21 11:09:05 doug kernel:  [<c0145081>] __kmalloc+0x91/0xa0
Jul 21 11:09:05 doug kernel:  [<c015bb37>] filp_open+0x67/0x70
Jul 21 11:09:05 doug kernel:  [<c015bc95>] dentry_open+0x155/0x230
Jul 21 11:09:05 doug kernel:  [<c015c0ab>] sys_open+0x5b/0x90
Jul 21 11:09:05 doug kernel:  [<c015da05>] get_empty_filp+0x75/0x100
Jul 21 11:09:05 doug kernel:  [<c0166ff0>] chrdev_open+0x0/0x290
Jul 21 11:09:05 doug kernel:  [<c0167110>] chrdev_open+0x120/0x290
Jul 21 11:09:05 doug kernel:  [<f8a27e70>] nv_kern_open+0x16f/0x28b [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8a2a8bc>] os_alloc_mem+0x5c/0x87 [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8a3d0b4>] __nvsym00041+0x10/0x24 [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8a3ea88>] __nvsym00709+0x1c/0x60 [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8a3effd>] __nvsym00718+0x111/0x184 [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8a3ff38>] rm_init_adapter+0xc/0x10 [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8add34f>] __nvsym03752+0x1af/0x250 [nvidia]
Jul 21 11:09:05 doug kernel:  [<f8b3e72d>] __nvsym00717+0x11d/0x224 [nvidia]
Jul 21 11:09:05 doug kernel: Call Trace:
Jul 21 11:09:07 doug kernel: 
Jul 21 11:09:07 doug kernel:  [<c010946b>] syscall_call+0x7/0xb
Jul 21 11:09:07 doug kernel:  [<c011abc0>] __ioremap+0xc0/0x120
Jul 21 11:09:07 doug kernel:  [<c011ac4f>] ioremap_nocache+0x2f/0xd0
Jul 21 11:09:07 doug kernel:  [<c011f57f>] __might_sleep+0x5f/0x70
Jul 21 11:09:07 doug kernel:  [<c0144fe7>] kmem_cache_alloc+0x77/0x80
Jul 21 11:09:07 doug kernel:  [<c0145081>] __kmalloc+0x91/0xa0
Jul 21 11:09:07 doug kernel:  [<c015666c>] get_vm_area+0x2c/0x160
Jul 21 11:09:07 doug kernel:  [<c015bb37>] filp_open+0x67/0x70
Jul 21 11:09:07 doug kernel:  [<c015bc95>] dentry_open+0x155/0x230
Jul 21 11:09:07 doug kernel:  [<c015c0ab>] sys_open+0x5b/0x90
Jul 21 11:09:07 doug kernel:  [<c015da05>] get_empty_filp+0x75/0x100
Jul 21 11:09:07 doug kernel:  [<c0166ff0>] chrdev_open+0x0/0x290
Jul 21 11:09:07 doug kernel:  [<c0167110>] chrdev_open+0x120/0x290
Jul 21 11:09:07 doug kernel:  [<f8a27e70>] nv_kern_open+0x16f/0x28b [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a2a8bc>] os_alloc_mem+0x5c/0x87 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a2b138>] os_map_kernel_space+0x68/0x6c 
[nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3cfa7>] __nvsym00517+0x1f/0x2c [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3d0b4>] __nvsym00041+0x10/0x24 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3ea88>] __nvsym00709+0x1c/0x60 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3ee7e>] __nvsym00711+0x6e/0xdc [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3ef0a>] __nvsym00718+0x1e/0x184 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3effd>] __nvsym00718+0x111/0x184 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8a3ff38>] rm_init_adapter+0xc/0x10 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8add34f>] __nvsym03752+0x1af/0x250 [nvidia]
Jul 21 11:09:07 doug kernel:  [<f8b3e72d>] __nvsym00717+0x11d/0x224 [nvidia]

Issues with the kernel? Or is it the nvidia module? Thanks.
- -- 
Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778
http://doug.hunley.homeip.net && http://www.linux-sxs.org

How do you know when you're out of invisible ink?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/HAa62MO5UukaubkRAhJQAJ4tLGRoPQOQzdZ564E8k59ltTD3fACeK6Vu
F9hKVINoteFpI49U2g9b31Y=
=SNqA
-----END PGP SIGNATURE-----


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: 2.6.0-test1: illegal context call in slab.c
  2003-07-21 15:28 2.6.0-test1: illegal context call in slab.c Douglas J Hunley
@ 2003-07-21 22:16 ` Roger Luethi
  2003-07-22  6:55   ` Nicolas
  0 siblings, 1 reply; 3+ messages in thread
From: Roger Luethi @ 2003-07-21 22:16 UTC (permalink / raw)
  To: Douglas J Hunley; +Cc: linux-kernel

On Mon, 21 Jul 2003 11:28:55 -0400, Douglas J Hunley wrote:
> Issues with the kernel? Or is it the nvidia module? Thanks.

Not nvidia this time. It seems to be the kernel proper. My vanilla kernel
gave me the same warning:

Debug: sleeping function called from illegal context at mm/slab.c:1811
Call Trace:
 [<c011e85c>] __might_sleep+0x5c/0x60
 [<c0151204>] kmem_cache_alloc+0x184/0x190
 [<c026e098>] alloc_skb+0x48/0xf0
 [<c026e073>] alloc_skb+0x23/0xf0
 [<c026d596>] sock_alloc_send_pskb+0xd6/0x200
 [<c026d6ee>] sock_alloc_send_skb+0x2e/0x30
 [<fa8bcf20>] unix_dgram_sendmsg+0x160/0x5c0 [unix]
 [<c026a24d>] sock_aio_write+0xbd/0xe0
 [<c016ef59>] do_sync_write+0x89/0xc0
 [<c0238ea7>] taskfile_output_data+0x77/0x90
 [<c0239f81>] task_out_intr+0x181/0x260
 [<c0239e00>] task_out_intr+0x0/0x260
 [<c016f077>] vfs_write+0xe7/0x120
 [<c016f14f>] sys_write+0x3f/0x60
 [<c0109eff>] syscall_call+0x7/0xb

bad: scheduling while atomic!
Call Trace:
 [<c011c510>] schedule+0x500/0x510
 [<c016f14f>] sys_write+0x3f/0x60
 [<c0109f26>] work_resched+0x5/0x16

Unable to handle kernel paging request at virtual address 491f3b50
 printing eip:
491f3b50
*pde = 37455067
*pte = 00000000
Oops: 0004 [#1]
CPU:    0
EIP:    0073:[<491f3b50>]    Not tainted
EFLAGS: 00010246
EIP is at 0x491f3b50
eax: 0804d2a6   ebx: 0000005b   ecx: 000003d8   edx: 00000008
esi: 0000031b   edi: 0804d708   ebp: 00000383   esp: bfff756c
ds: 007b   es: 007b   ss: 007b
Process klogd (pid: 3138, threadinfo=f7452000 task=f7be0740)
 <6>note: klogd[3138] exited with preempt_count 1
bad: scheduling while atomic!
Call Trace:
 [<c011c510>] schedule+0x500/0x510
 [<c0159a61>] unmap_page_range+0x41/0x70
 [<c0159c70>] unmap_vmas+0x1e0/0x340
 [<c015f259>] exit_mmap+0xc9/0x2a0
 [<c011f5c4>] mmput+0xa4/0x130
 [<c0125655>] do_exit+0x265/0x990
 [<c010a82c>] die+0x1fc/0x200
 [<c011a204>] do_page_fault+0x2c4/0x4aa
 [<c016f056>] vfs_write+0xc6/0x120
 [<c011c1fe>] schedule+0x1ee/0x510
 [<c016f14f>] sys_write+0x3f/0x60
 [<c0119f40>] do_page_fault+0x0/0x4aa
 [<c010a0a9>] error_code+0x2d/0x38

Linux 2.6.0-test1, gcc 3.2.3

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: 2.6.0-test1: illegal context call in slab.c
  2003-07-21 22:16 ` Roger Luethi
@ 2003-07-22  6:55   ` Nicolas
  0 siblings, 0 replies; 3+ messages in thread
From: Nicolas @ 2003-07-22  6:55 UTC (permalink / raw)
  To: Roger Luethi, Douglas J Hunley; +Cc: linux-kernel


I had very similar oops, maybe experts are interrested in, but
it was in 2.5.74 or 2.5.75 (11 Jul)
Some points I am suspicious about my oops :
	I have Highmem,
	snmpd running,
	reiserfs, 
	gcc  3.2.2,
	acpi,
	IO-APIC on sis648,
	Mandrake 9.1 crontabs
	sis900 and epro100

Regards.

Nicolas.


Jul 11 21:14:12 hal9003 kernel:  printing eip:
Jul 11 21:14:12 hal9003 kernel: c0135754
Jul 11 21:14:12 hal9003 kernel: Oops: 0000 [#1]
Jul 11 21:14:12 hal9003 kernel: CPU:    0
Jul 11 21:14:12 hal9003 kernel: EIP:    0060:[__kmalloc+94/414]    Not tainted
Jul 11 21:14:12 hal9003 kernel: EIP:    0060:[<c0135754>]    Not tainted
Jul 11 21:14:12 hal9003 kernel: EFLAGS: 00010046
Jul 11 21:14:12 hal9003 kernel: EIP is at __kmalloc+0x5e/0x19e
Jul 11 21:14:12 hal9003 kernel: eax: f7b7fbc0   ebx: f7b7fbc0   ecx: 00003fa0   
edx: 00000000
Jul 11 21:14:12 hal9003 kernel: esi: 00003f00   edi: 00000246   ebp: e6387d18   
esp: e6387cf8
Jul 11 21:14:12 hal9003 kernel: ds: 007b   es: 007b   ss: 0068
Jul 11 21:14:12 hal9003 kernel: Process kdeinit (pid: 3984, 
threadinfo=e6386000 task=f092f380)
Jul 11 21:14:12 hal9003 kernel: Stack: f7b7fbc0 000000d0 0000005a c023a1b1 
f725c570 f725c570 00003f00 f3fe61e4
Jul 11 21:14:12 hal9003 kernel:        e6387d38 c023a1d6 00003fa0 000000d0 
00000000 ffffffe0 00000000 f3fe61e4
Jul 11 21:14:12 hal9003 kernel:        e6387d64 c0239aa9 00003f00 000000d0 
e6386000 e6387d68 00000282 f11acaac
Jul 11 21:14:12 hal9003 kernel: Call Trace:
Jul 11 21:14:12 hal9003 kernel:  [alloc_skb+35/225] alloc_skb+0x23/0xe1
Jul 11 21:14:12 hal9003 kernel:  [<c023a1b1>] alloc_skb+0x23/0xe1
Jul 11 21:14:12 hal9003 kernel:  [alloc_skb+72/225] alloc_skb+0x48/0xe1
Jul 11 21:14:12 hal9003 kernel:  [<c023a1d6>] alloc_skb+0x48/0xe1
Jul 11 21:14:12 hal9003 kernel:  [sock_alloc_send_pskb+198/489] 
sock_alloc_send_pskb+0xc6/0x1e9
Jul 11 21:14:12 hal9003 kernel:  [<c0239aa9>] sock_alloc_send_pskb+0xc6/0x1e9
Jul 11 21:14:12 hal9003 kernel:  [sock_alloc_send_skb+46/50] 
sock_alloc_send_skb+0x2e/0x32
Jul 11 21:14:12 hal9003 kernel:  [<c0239bfa>] sock_alloc_send_skb+0x2e/0x32
Jul 11 21:14:12 hal9003 kernel:  [unix_stream_sendmsg+394/926] 
unix_stream_sendmsg+0x18a/0x39e
Jul 11 21:14:12 hal9003 kernel:  [<c028dafd>] unix_stream_sendmsg+0x18a/0x39e
Jul 11 21:14:12 hal9003 kernel:  [sock_sendmsg+146/175] sock_sendmsg+0x92/0xaf
Jul 11 21:14:12 hal9003 kernel:  [<c0236dd0>] sock_sendmsg+0x92/0xaf
Jul 11 21:14:12 hal9003 kernel:  [__rmqueue+207/288] __rmqueue+0xcf/0x120
Jul 11 21:14:12 hal9003 kernel:  [<c0131c31>] __rmqueue+0xcf/0x120
Jul 11 21:14:12 hal9003 kernel:  [buffered_rmqueue+160/265] 
buffered_rmqueue+0xa0/0x109
Jul 11 21:14:12 hal9003 kernel:  [<c0131e75>] buffered_rmqueue+0xa0/0x109
Jul 11 21:14:12 hal9003 kernel:  [__alloc_pages+131/770] 
__alloc_pages+0x83/0x302
Jul 11 21:14:12 hal9003 kernel:  [<c0131f61>] __alloc_pages+0x83/0x302
Jul 11 21:14:12 hal9003 kernel:  [sock_readv_writev+113/156] 
sock_readv_writev+0x71/0x9c
Jul 11 21:14:12 hal9003 kernel:  [<c023712b>] sock_readv_writev+0x71/0x9c
Jul 11 21:14:12 hal9003 kernel:  [sock_writev+74/81] sock_writev+0x4a/0x51
Jul 11 21:14:12 hal9003 kernel:  [<c02371f1>] sock_writev+0x4a/0x51
Jul 11 21:14:12 hal9003 kernel:  [do_readv_writev+348/648] 
do_readv_writev+0x15c/0x288
Jul 11 21:14:12 hal9003 kernel:  [<c0147d56>] do_readv_writev+0x15c/0x288
Jul 11 21:14:12 hal9003 kernel:  [update_wall_time+15/58] 
update_wall_time+0xf/0x3a
Jul 11 21:14:12 hal9003 kernel:  [<c01207f3>] update_wall_time+0xf/0x3a
Jul 11 21:14:12 hal9003 kernel:  [do_timer+223/228] do_timer+0xdf/0xe4
Jul 11 21:14:12 hal9003 kernel:  [<c0120beb>] do_timer+0xdf/0xe4
Jul 11 21:14:12 hal9003 kernel:  [vfs_writev+95/99] vfs_writev+0x5f/0x63
Jul 11 21:14:12 hal9003 kernel:  [<c0147f44>] vfs_writev+0x5f/0x63
Jul 11 21:14:12 hal9003 kernel:  [sys_writev+63/93] sys_writev+0x3f/0x5d
Jul 11 21:14:12 hal9003 kernel:  [<c0147fe4>] sys_writev+0x3f/0x5d
Jul 11 21:14:12 hal9003 kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Jul 11 21:14:12 hal9003 kernel:  [<c0108fe3>] syscall_call+0x7/0xb
Jul 11 21:14:12 hal9003 kernel:
Jul 11 21:14:12 hal9003 kernel: Code: 8b 02 85 c0 0f 84 0d 01 00 00 ff 83 90 
00 00 00 8b 02 c7 42
Jul 12 07:45:01 hal9003 kernel: general protection fault: 5c3c [#2]
Jul 12 07:45:01 hal9003 kernel: CPU:    0
Jul 12 07:45:01 hal9003 kernel: EIP:    0060:[dentry_open+134/440]    Not 
tainted
Jul 12 07:45:01 hal9003 kernel: EIP:    0060:[<c0146d1a>]    Not tainted
Jul 12 07:45:01 hal9003 kernel: EFLAGS: 00010286
Jul 12 07:45:01 hal9003 kernel: EIP is at dentry_open+0x86/0x1b8
Jul 12 07:45:01 hal9003 kernel: eax: c02e9960   ebx: f62b5bf4   ecx: 00000000   
edx: f62b5c3c
Jul 12 07:45:01 hal9003 kernel: esi: dff3ce60   edi: f7ff66a4   ebp: d7eb9f50   
esp: d7eb9f38
Jul 12 07:45:01 hal9003 kernel: ds: 007b   es: 007b   ss: 0068
Jul 12 07:45:01 hal9003 kernel: Process mrtg (pid: 32339, threadinfo=d7eb8000 
task=f6041880)
Jul 12 07:45:01 hal9003 kernel: Stack: f62b5c3c dff3ceec ffffffe9 00008000 
00008000 d4639000 d7eb9f9c c0146c92
Jul 12 07:45:01 hal9003 kernel:        dd971e20 f7ff66a4 00008000 d7eb9f68 
dd971e20 f7ff66a4 00001000 fffffff4
Jul 12 07:45:01 hal9003 kernel:        00000006 00000101 00000001 00008001 
00000000 00000006 d4639000 00008000
Jul 12 07:45:01 hal9003 kernel: Call Trace:
Jul 12 07:45:01 hal9003 kernel:  [filp_open+98/100] filp_open+0x62/0x64
Jul 12 07:45:01 hal9003 kernel:  [<c0146c92>] filp_open+0x62/0x64
Jul 12 07:45:01 hal9003 kernel:  [sys_open+85/133] sys_open+0x55/0x85
Jul 12 07:45:01 hal9003 kernel:  [<c014704f>] sys_open+0x55/0x85
Jul 12 07:45:01 hal9003 kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Jul 12 07:45:01 hal9003 kernel:  [<c0108fe3>] syscall_call+0x7/0xb
Jul 12 07:45:01 hal9003 kernel:
Jul 12 07:45:01 hal9003 kernel: Code: 07 84 1e 01 00 00 8b 00 ba 01 00 00 00 
85 c0 74 0f 83 38 02
Jul 12 10:18:22 hal9003 kernel: Emergency Sync complete
Jul 12 10:19:15 hal9003 kernel:  printing eip:
Jul 12 10:19:15 hal9003 kernel: 78116ef1
Jul 12 10:19:15 hal9003 kernel: Oops: 0000 [#3]
Jul 12 10:19:15 hal9003 kernel: CPU:    0
Jul 12 10:19:15 hal9003 kernel: EIP:    0060:[<78116ef1>]    Not tainted
Jul 12 10:19:15 hal9003 kernel: EFLAGS: 00010047
Jul 12 10:19:15 hal9003 kernel: EIP is at 0x78116ef1
Jul 12 10:19:15 hal9003 kernel: eax: 00000088   ebx: e39441dc   ecx: c02e00c0   
edx: 00000027
Jul 12 10:19:15 hal9003 kernel: esi: f7d38780   edi: c02de788   ebp: e0ba7fbc   
esp: e0ba7f9c
Jul 12 10:19:15 hal9003 kernel: ds: 007b   es: 007b   ss: 0068
Jul 12 10:19:15 hal9003 kernel: Process kdeinit (pid: 4219, 
threadinfo=e0ba6000 task=f626f300)
Jul 12 10:19:15 hal9003 kernel: Stack: c0147abc f2721f3c 08067520 00000134 
f626f300 00000003 08067520 08066fe0
Jul 12 10:19:15 hal9003 kernel:        e0ba6000 c010900a 00000003 08067520 
00000134 08067520 08066fe0 bfffec38
Jul 12 10:19:15 hal9003 kernel:        00000134 c010007b 0000007b 00000004 
40f15728 00000073 00000246 bfffec18
Jul 12 10:19:15 hal9003 kernel: Call Trace:
Jul 12 10:19:15 hal9003 kernel:  [sys_write+63/93] sys_write+0x3f/0x5d
Jul 12 10:19:15 hal9003 kernel:  [<c0147abc>] sys_write+0x3f/0x5d
Jul 12 10:19:15 hal9003 kernel:  [work_resched+5/22] work_resched+0x5/0x16
Jul 12 10:19:15 hal9003 kernel:  [<c010900a>] work_resched+0x5/0x16
Jul 12 10:19:15 hal9003 kernel:
Jul 12 10:19:15 hal9003 kernel: Code:  Bad EIP value.




Le Mardi 22 Juillet 2003 00:16, Roger Luethi a écrit :
> On Mon, 21 Jul 2003 11:28:55 -0400, Douglas J Hunley wrote:
> > Issues with the kernel? Or is it the nvidia module? Thanks.
>
> Not nvidia this time. It seems to be the kernel proper. My vanilla kernel
> gave me the same warning:
>
> Debug: sleeping function called from illegal context at mm/slab.c:1811
> Call Trace:
>  [<c011e85c>] __might_sleep+0x5c/0x60
>  [<c0151204>] kmem_cache_alloc+0x184/0x190
>  [<c026e098>] alloc_skb+0x48/0xf0
>  [<c026e073>] alloc_skb+0x23/0xf0
>  [<c026d596>] sock_alloc_send_pskb+0xd6/0x200
>  [<c026d6ee>] sock_alloc_send_skb+0x2e/0x30
>  [<fa8bcf20>] unix_dgram_sendmsg+0x160/0x5c0 [unix]
>  [<c026a24d>] sock_aio_write+0xbd/0xe0
>  [<c016ef59>] do_sync_write+0x89/0xc0
>  [<c0238ea7>] taskfile_output_data+0x77/0x90
>  [<c0239f81>] task_out_intr+0x181/0x260
>  [<c0239e00>] task_out_intr+0x0/0x260
>  [<c016f077>] vfs_write+0xe7/0x120
>  [<c016f14f>] sys_write+0x3f/0x60
>  [<c0109eff>] syscall_call+0x7/0xb
>
> bad: scheduling while atomic!
> Call Trace:
>  [<c011c510>] schedule+0x500/0x510
>  [<c016f14f>] sys_write+0x3f/0x60
>  [<c0109f26>] work_resched+0x5/0x16
>
> Unable to handle kernel paging request at virtual address 491f3b50
>  printing eip:
> 491f3b50
> *pde = 37455067
> *pte = 00000000
> Oops: 0004 [#1]
> CPU:    0
> EIP:    0073:[<491f3b50>]    Not tainted
> EFLAGS: 00010246
> EIP is at 0x491f3b50
> eax: 0804d2a6   ebx: 0000005b   ecx: 000003d8   edx: 00000008
> esi: 0000031b   edi: 0804d708   ebp: 00000383   esp: bfff756c
> ds: 007b   es: 007b   ss: 007b
> Process klogd (pid: 3138, threadinfo=f7452000 task=f7be0740)
>  <6>note: klogd[3138] exited with preempt_count 1
> bad: scheduling while atomic!
> Call Trace:
>  [<c011c510>] schedule+0x500/0x510
>  [<c0159a61>] unmap_page_range+0x41/0x70
>  [<c0159c70>] unmap_vmas+0x1e0/0x340
>  [<c015f259>] exit_mmap+0xc9/0x2a0
>  [<c011f5c4>] mmput+0xa4/0x130
>  [<c0125655>] do_exit+0x265/0x990
>  [<c010a82c>] die+0x1fc/0x200
>  [<c011a204>] do_page_fault+0x2c4/0x4aa
>  [<c016f056>] vfs_write+0xc6/0x120
>  [<c011c1fe>] schedule+0x1ee/0x510
>  [<c016f14f>] sys_write+0x3f/0x60
>  [<c0119f40>] do_page_fault+0x0/0x4aa
>  [<c010a0a9>] error_code+0x2d/0x38
>
> Linux 2.6.0-test1, gcc 3.2.3
> -
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2003-07-22  6:40 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2003-07-21 15:28 2.6.0-test1: illegal context call in slab.c Douglas J Hunley
2003-07-21 22:16 ` Roger Luethi
2003-07-22  6:55   ` Nicolas

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).