Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 136560 Details for
Bug 207002
crash - mmput()/unmap_vmas() - gdb testsuite
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
oops log - Unable to handle kernel paging request at virtual address 6b6b6b6b6b6b6b6b
ia64-crash.bug (text/plain), 8.72 KB, created by
Jan Kratochvil
on 2006-09-18 18:00:00 UTC
(
hide
)
Description:
oops log - Unable to handle kernel paging request at virtual address 6b6b6b6b6b6b6b6b
Filename:
MIME Type:
Creator:
Jan Kratochvil
Created:
2006-09-18 18:00:00 UTC
Size:
8.72 KB
patch
obsolete
>audit(1158593422.052:52): avc: denied { execstack } for pid=8703 comm="gdb" scontext=root:system_r:unconfined_t:s0-s0:c0.c255 tcontext=root:system_r:unconfined_t:s0-s0:c0.c255 tclass=process >Unable to handle kernel paging request at virtual address 6b6b6b6b6b6b6b6b >checkpoint[9100]: Oops 11012296146944 [1] >Modules linked in: autofs4 hidp nfs lockd fscache nfs_acl rfcomm l2cap bluetooth sunrpc ip_conntrack_netbios_ns ipt_REJECT iptable_filter ip_tables xt_state ip_conntrack nfnetlink xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 vfat fat button parport_pc lp parport sg ide_cd cdrom tg3 dm_snapshot dm_zero dm_mirror dm_mod qla2xxx scsi_transport_fc mptspi mptscsih scsi_transport_spi mptbase qla1280 sd_mod scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd > >Pid: 9100, CPU 58, comm: checkpoint >psr : 0000121008026018 ifs : 8000000000000389 ip : [<a0000001000a7771>] Not tainted >ip is at __rcu_process_callbacks+0x351/0x560 >unat: 0000000000000000 pfs : 0000000000000389 rsc : 0000000000000003 >rnat: 0000000000000000 bsps: 0000000000000000 pr : 160a669a699595a7 >ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f >csd : 0000000000000000 ssd : 0000000000000000 >b0 : a0000001000a7620 b6 : a0000001000a7980 b7 : a000000100011a60 >f6 : 1003e0000000000080000 f7 : 1003e0000000000000080 >f8 : 10007fb80000000000000 f9 : 100018000000000000000 >f10 : 10005fb7ffffff0480000 f11 : 1003e000000000000007d >r1 : a000000100bb15b0 r2 : 000000000000003a r3 : e0000e3070bd9034 >r8 : e0000e3070bd8000 r9 : a0000001009c5d58 r10 : 0000000000000001 >r11 : a0000001009c5d80 r12 : e0000e3070bdf970 r13 : e0000e3070bd8000 >r14 : e0000e3070dd20f8 r15 : e0000eb0031d6680 r16 : e0000eb0031d664c >r17 : 6b6b6b6b6b6b6b6b r18 : a000000100852104 r19 : a0000001009c5d50 >r20 : 000000000000649f r21 : e0000eb0031d6678 r22 : e0000e3070a860a8 >r23 : e0000eb0031d6670 r24 : e0000e30716c56e0 r25 : e0000eb0031d6658 >r26 : e0000eb0031d6660 r27 : 0000000000000001 r28 : 000000000000649f >r29 : 000000000000649e r30 : 000000000000649f r31 : e0000eb0031d6648 > >Call Trace: > [<a000000100013e80>] show_stack+0x40/0xa0 > sp=e0000e3070bdf500 bsp=e0000e3070bd97b8 > [<a000000100014780>] show_regs+0x840/0x880 > sp=e0000e3070bdf6d0 bsp=e0000e3070bd9760 > [<a000000100037b80>] die+0x1c0/0x2a0 > sp=e0000e3070bdf6d0 bsp=e0000e3070bd9718 > [<a0000001006248e0>] ia64_do_page_fault+0x8a0/0x9e0 > sp=e0000e3070bdf6f0 bsp=e0000e3070bd96c8 > [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280 > sp=e0000e3070bdf7a0 bsp=e0000e3070bd96c8 > [<a0000001000a7770>] __rcu_process_callbacks+0x350/0x560 > sp=e0000e3070bdf970 bsp=e0000e3070bd9680 > [<a0000001000a79c0>] rcu_process_callbacks+0x40/0xa0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9660 > [<a000000100086ff0>] tasklet_action+0x1d0/0x340 > sp=e0000e3070bdf970 bsp=e0000e3070bd9638 > [<a0000001000861d0>] __do_softirq+0xf0/0x240 > sp=e0000e3070bdf970 bsp=e0000e3070bd95b8 > [<a000000100086390>] do_softirq+0x70/0xc0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9558 > [<a000000100086460>] irq_exit+0x80/0xa0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9540 > [<a000000100011a10>] ia64_handle_irq+0x170/0x1a0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9510 > [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280 > sp=e0000e3070bdf970 bsp=e0000e3070bd9510 > [<a000000100113a90>] unmap_vmas+0x4b0/0x1120 > sp=e0000e3070bdfb40 bsp=e0000e3070bd93f0 > [<a00000010011c1f0>] exit_mmap+0xf0/0x4a0 > sp=e0000e3070bdfca0 bsp=e0000e3070bd93a8 > [<a000000100072a00>] mmput+0x80/0x160 > sp=e0000e3070bdfd60 bsp=e0000e3070bd9380 > [<a00000010007c6f0>] exit_mm+0x1f0/0x220 > sp=e0000e3070bdfd60 bsp=e0000e3070bd9348 > [<a000000100080230>] do_exit+0x5b0/0x1460 > sp=e0000e3070bdfd60 bsp=e0000e3070bd92f0 > [<a000000100081220>] do_group_exit+0x140/0x160 > sp=e0000e3070bdfd80 bsp=e0000e3070bd92b8 > [<a00000010009c1d0>] get_signal_to_deliver+0x6f0/0x740 > sp=e0000e3070bdfd80 bsp=e0000e3070bd9268 > [<a000000100034630>] ia64_do_signal+0x90/0xde0 > sp=e0000e3070bdfd80 bsp=e0000e3070bd9180 > [<a000000100013d00>] do_notify_resume_user+0x100/0x160 > sp=e0000e3070bdfe20 bsp=e0000e3070bd9150 > [<a00000010000cbe0>] notify_resume_user+0x40/0x60 > sp=e0000e3070bdfe20 bsp=e0000e3070bd9100 > [<a00000010000cb10>] skip_rbs_switch+0xe0/0x110 > sp=e0000e3070bdfe30 bsp=e0000e3070bd9100 > [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400 > sp=e0000e3070be0000 bsp=e0000e3070bd9100 > <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >in_atomic():1, irqs_disabled():0 > >Call Trace: > [<a000000100013e80>] show_stack+0x40/0xa0 > sp=e0000e3070bdf4e0 bsp=e0000e3070bd9878 > [<a000000100013f10>] dump_stack+0x30/0x60 > sp=e0000e3070bdf6b0 bsp=e0000e3070bd9860 > [<a000000100065650>] __might_sleep+0x1b0/0x1e0 > sp=e0000e3070bdf6b0 bsp=e0000e3070bd9838 > [<a0000001000b5100>] down_read+0x20/0x60 > sp=e0000e3070bdf6b0 bsp=e0000e3070bd9818 > [<a00000010009ee00>] blocking_notifier_call_chain+0x20/0x80 > sp=e0000e3070bdf6b0 bsp=e0000e3070bd97d8 > [<a00000010007b950>] profile_task_exit+0x30/0x60 > sp=e0000e3070bdf6b0 bsp=e0000e3070bd97b8 > [<a00000010007fcc0>] do_exit+0x40/0x1460 > sp=e0000e3070bdf6b0 bsp=e0000e3070bd9760 > [<a000000100037c40>] die+0x280/0x2a0 > sp=e0000e3070bdf6d0 bsp=e0000e3070bd9718 > [<a0000001006248e0>] ia64_do_page_fault+0x8a0/0x9e0 > sp=e0000e3070bdf6f0 bsp=e0000e3070bd96c8 > [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280 > sp=e0000e3070bdf7a0 bsp=e0000e3070bd96c8 > [<a0000001000a7770>] __rcu_process_callbacks+0x350/0x560 > sp=e0000e3070bdf970 bsp=e0000e3070bd9680 > [<a0000001000a79c0>] rcu_process_callbacks+0x40/0xa0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9660 > [<a000000100086ff0>] tasklet_action+0x1d0/0x340 > sp=e0000e3070bdf970 bsp=e0000e3070bd9638 > [<a0000001000861d0>] __do_softirq+0xf0/0x240 > sp=e0000e3070bdf970 bsp=e0000e3070bd95b8 > [<a000000100086390>] do_softirq+0x70/0xc0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9558 > [<a000000100086460>] irq_exit+0x80/0xa0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9540 > [<a000000100011a10>] ia64_handle_irq+0x170/0x1a0 > sp=e0000e3070bdf970 bsp=e0000e3070bd9510 > [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280 > sp=e0000e3070bdf970 bsp=e0000e3070bd9510 > [<a000000100113a90>] unmap_vmas+0x4b0/0x1120 > sp=e0000e3070bdfb40 bsp=e0000e3070bd93f0 > [<a00000010011c1f0>] exit_mmap+0xf0/0x4a0 > sp=e0000e3070bdfca0 bsp=e0000e3070bd93a8 > [<a000000100072a00>] mmput+0x80/0x160 > sp=e0000e3070bdfd60 bsp=e0000e3070bd9380 > [<a00000010007c6f0>] exit_mm+0x1f0/0x220 > sp=e0000e3070bdfd60 bsp=e0000e3070bd9348 > [<a000000100080230>] do_exit+0x5b0/0x1460 > sp=e0000e3070bdfd60 bsp=e0000e3070bd92f0 > [<a000000100081220>] do_group_exit+0x140/0x160 > sp=e0000e3070bdfd80 bsp=e0000e3070bd92b8 > [<a00000010009c1d0>] get_signal_to_deliver+0x6f0/0x740 > sp=e0000e3070bdfd80 bsp=e0000e3070bd9268 > [<a000000100034630>] ia64_do_signal+0x90/0xde0 > sp=e0000e3070bdfd80 bsp=e0000e3070bd9180 > [<a000000100013d00>] do_notify_resume_user+0x100/0x160 > sp=e0000e3070bdfe20 bsp=e0000e3070bd9150 > [<a00000010000cbe0>] notify_resume_user+0x40/0x60 > sp=e0000e3070bdfe20 bsp=e0000e3070bd9100 > [<a00000010000cb10>] skip_rbs_switch+0xe0/0x110 > sp=e0000e3070bdfe30 bsp=e0000e3070bd9100 > [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400 > sp=e0000e3070be0000 bsp=e0000e3070bd9100 >Kernel panic - not syncing: Aiee, killing interrupt handler!
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 207002
: 136560 |
136561
|
139632
|
159845