Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 139632 Details for
Bug 207002
crash - mmput()/unmap_vmas() - gdb testsuite
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
kernel-2.6.18-1.2798.rm3.fc6.ia64 oops log
kernel-2.6.18-1.2798.rm3.fc6.ia64.crash (text/plain), 9.50 KB, created by
Jan Kratochvil
on 2006-10-28 10:58:40 UTC
(
hide
)
Description:
kernel-2.6.18-1.2798.rm3.fc6.ia64 oops log
Filename:
MIME Type:
Creator:
Jan Kratochvil
Created:
2006-10-28 10:58:40 UTC
Size:
9.50 KB
patch
obsolete
>kernel BUG at mm/slab.c:607! >checkpoint[6473]: bugcheck! 0 [1] >Modules linked in: autofs4 hidp rfcomm l2cap bluetooth sunrpc ipv6 vfat fat dm_multipath button parport_pc lp parport sg ide_cd cdrom tg3 dm_snapshot dm_zero dm_mirror dm_mod qla2xxx scsi_transport_fc mptspi mptscsih scsi_transport_spi mptbase qla1280 sd_mod scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd > >Pid: 6473, CPU 30, comm: checkpoint >psr : 0000101008022018 ifs : 800000000000058e ip : [<a000000100144900>] Not tainted >ip is at free_block+0x100/0x300 >unat: 0000000000000000 pfs : 000000000000058e rsc : 0000000000000003 >rnat: 9999999996900000 bsps: 000000000000fffe pr : 160a669a69959567 >ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f >csd : 0000000000000000 ssd : 0000000000000000 >b0 : a000000100144900 b6 : a0000001004d1600 b7 : a0000001003c2c00 >f6 : 1003e00000000000000a0 f7 : 1003e20c49ba5e353f7cf >f8 : 1003e00000000000004e2 f9 : 1003e000000000fa00000 >f10 : 1003e000000003b9aca00 f11 : 1003e431bde82d7b634db >r1 : a000000100c03c90 r2 : a000000100a1c260 r3 : e00007307bbf1084 >r8 : 0000000000000020 r9 : a000000100a071d8 r10 : a000000100a1c290 >r11 : a000000100a1c290 r12 : e00007307bbf7960 r13 : e00007307bbf0000 >r14 : a000000100a1c260 r15 : 0000000000000000 r16 : ffffffffdead4ead >r17 : 00000000dead4ead r18 : a000000100949afc r19 : a000000100a071d0 >r20 : 0000000000000000 r21 : a000000100a04310 r22 : e00007b003100000 >r23 : a000000100855180 r24 : a000000100a04310 r25 : a000000100a1c268 >r26 : a000000100a1c268 r27 : 0000000000000018 r28 : 0000000000000026 >r29 : 80000001fdc00180 r30 : 0000000000000000 r31 : 0000000000000180 > >Call Trace: > [<a000000100013ea0>] show_stack+0x40/0xa0 > sp=e00007307bbf74f0 bsp=e00007307bbf1928 > [<a0000001000147a0>] show_regs+0x840/0x880 > sp=e00007307bbf76c0 bsp=e00007307bbf18d0 > [<a000000100037b40>] die+0x1c0/0x2a0 > sp=e00007307bbf76c0 bsp=e00007307bbf1888 > [<a000000100037c70>] die_if_kernel+0x50/0x80 > sp=e00007307bbf76e0 bsp=e00007307bbf1858 > [<a00000010061d510>] ia64_bad_break+0x270/0x4a0 > sp=e00007307bbf76e0 bsp=e00007307bbf1830 > [<a00000010000c720>] __ia64_leave_kernel+0x0/0x280 > sp=e00007307bbf7790 bsp=e00007307bbf1830 > [<a000000100144900>] free_block+0x100/0x300 > sp=e00007307bbf7960 bsp=e00007307bbf17b8 > [<a000000100145040>] __drain_alien_cache+0xc0/0x100 > sp=e00007307bbf7960 bsp=e00007307bbf1778 > [<a0000001001443d0>] kmem_cache_free+0x390/0x580 > sp=e00007307bbf7960 bsp=e00007307bbf1738 > [<a000000100196250>] free_fdtable_rcu+0xb0/0x2a0 > sp=e00007307bbf7970 bsp=e00007307bbf1708 > [<a0000001000a7f10>] __rcu_process_callbacks+0x370/0x5a0 > sp=e00007307bbf7970 bsp=e00007307bbf16d0 > [<a0000001000a8180>] rcu_process_callbacks+0x40/0xa0 > sp=e00007307bbf7970 bsp=e00007307bbf16b0 > [<a0000001000875b0>] tasklet_action+0x1d0/0x340 > sp=e00007307bbf7970 bsp=e00007307bbf1688 > [<a000000100086790>] __do_softirq+0xf0/0x240 > sp=e00007307bbf7970 bsp=e00007307bbf1610 > [<a000000100086950>] do_softirq+0x70/0xc0 > sp=e00007307bbf7970 bsp=e00007307bbf15a8 > [<a000000100086a20>] irq_exit+0x80/0xa0 > sp=e00007307bbf7970 bsp=e00007307bbf1590 > [<a000000100011a30>] ia64_handle_irq+0x170/0x1a0 > sp=e00007307bbf7970 bsp=e00007307bbf1560 > [<a00000010000c720>] __ia64_leave_kernel+0x0/0x280 > sp=e00007307bbf7970 bsp=e00007307bbf1560 > [<a000000100114310>] unmap_vmas+0x4b0/0x1120 > sp=e00007307bbf7b40 bsp=e00007307bbf1448 > [<a00000010011ca70>] exit_mmap+0xf0/0x4a0 > sp=e00007307bbf7ca0 bsp=e00007307bbf1400 > [<a000000100073040>] mmput+0x80/0x160 > sp=e00007307bbf7d60 bsp=e00007307bbf13d0 > [<a00000010007ccb0>] exit_mm+0x1f0/0x220 > sp=e00007307bbf7d60 bsp=e00007307bbf1398 > [<a0000001000807f0>] do_exit+0x5b0/0x1460 > sp=e00007307bbf7d60 bsp=e00007307bbf1340 > [<a0000001000817e0>] do_group_exit+0x140/0x160 > sp=e00007307bbf7d80 bsp=e00007307bbf1308 > [<a00000010009c970>] get_signal_to_deliver+0x6f0/0x740 > sp=e00007307bbf7d80 bsp=e00007307bbf12b8 > [<a000000100034610>] ia64_do_signal+0x90/0xde0 > sp=e00007307bbf7d80 bsp=e00007307bbf11d0 > [<a000000100013d20>] do_notify_resume_user+0x100/0x160 > sp=e00007307bbf7e20 bsp=e00007307bbf11a0 > [<a00000010000cc00>] notify_resume_user+0x40/0x60 > sp=e00007307bbf7e20 bsp=e00007307bbf1150 > [<a00000010000cb30>] skip_rbs_switch+0xe0/0x110 > sp=e00007307bbf7e30 bsp=e00007307bbf1150 > [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400 > sp=e00007307bbf8000 bsp=e00007307bbf1150 > <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >in_atomic():1, irqs_disabled():0 > >Call Trace: > [<a000000100013ea0>] show_stack+0x40/0xa0 > sp=e00007307bbf74d0 bsp=e00007307bbf19e0 > [<a000000100013f30>] dump_stack+0x30/0x60 > sp=e00007307bbf76a0 bsp=e00007307bbf19c8 > [<a000000100065ad0>] __might_sleep+0x1b0/0x1e0 > sp=e00007307bbf76a0 bsp=e00007307bbf19a0 > [<a0000001000b5a40>] down_read+0x20/0x60 > sp=e00007307bbf76a0 bsp=e00007307bbf1980 > [<a00000010009f5a0>] blocking_notifier_call_chain+0x20/0x80 > sp=e00007307bbf76a0 bsp=e00007307bbf1948 > [<a00000010007bf10>] profile_task_exit+0x30/0x60 > sp=e00007307bbf76a0 bsp=e00007307bbf1928 > [<a000000100080280>] do_exit+0x40/0x1460 > sp=e00007307bbf76a0 bsp=e00007307bbf18d0 > [<a000000100037c00>] die+0x280/0x2a0 > sp=e00007307bbf76c0 bsp=e00007307bbf1888 > [<a000000100037c70>] die_if_kernel+0x50/0x80 > sp=e00007307bbf76e0 bsp=e00007307bbf1858 > [<a00000010061d510>] ia64_bad_break+0x270/0x4a0 > sp=e00007307bbf76e0 bsp=e00007307bbf1830 > [<a00000010000c720>] __ia64_leave_kernel+0x0/0x280 > sp=e00007307bbf7790 bsp=e00007307bbf1830 > [<a000000100144900>] free_block+0x100/0x300 > sp=e00007307bbf7960 bsp=e00007307bbf17b8 > [<a000000100145040>] __drain_alien_cache+0xc0/0x100 > sp=e00007307bbf7960 bsp=e00007307bbf1778 > [<a0000001001443d0>] kmem_cache_free+0x390/0x580 > sp=e00007307bbf7960 bsp=e00007307bbf1738 > [<a000000100196250>] free_fdtable_rcu+0xb0/0x2a0 > sp=e00007307bbf7970 bsp=e00007307bbf1708 > [<a0000001000a7f10>] __rcu_process_callbacks+0x370/0x5a0 > sp=e00007307bbf7970 bsp=e00007307bbf16d0 > [<a0000001000a8180>] rcu_process_callbacks+0x40/0xa0 > sp=e00007307bbf7970 bsp=e00007307bbf16b0 > [<a0000001000875b0>] tasklet_action+0x1d0/0x340 > sp=e00007307bbf7970 bsp=e00007307bbf1688 > [<a000000100086790>] __do_softirq+0xf0/0x240 > sp=e00007307bbf7970 bsp=e00007307bbf1610 > [<a000000100086950>] do_softirq+0x70/0xc0 > sp=e00007307bbf7970 bsp=e00007307bbf15a8 > [<a000000100086a20>] irq_exit+0x80/0xa0 > sp=e00007307bbf7970 bsp=e00007307bbf1590 > [<a000000100011a30>] ia64_handle_irq+0x170/0x1a0 > sp=e00007307bbf7970 bsp=e00007307bbf1560 > [<a00000010000c720>] __ia64_leave_kernel+0x0/0x280 > sp=e00007307bbf7970 bsp=e00007307bbf1560 > [<a000000100114310>] unmap_vmas+0x4b0/0x1120 > sp=e00007307bbf7b40 bsp=e00007307bbf1448 > [<a00000010011ca70>] exit_mmap+0xf0/0x4a0 > sp=e00007307bbf7ca0 bsp=e00007307bbf1400 > [<a000000100073040>] mmput+0x80/0x160 > sp=e00007307bbf7d60 bsp=e00007307bbf13d0 > [<a00000010007ccb0>] exit_mm+0x1f0/0x220 > sp=e00007307bbf7d60 bsp=e00007307bbf1398 > [<a0000001000807f0>] do_exit+0x5b0/0x1460 > sp=e00007307bbf7d60 bsp=e00007307bbf1340 > [<a0000001000817e0>] do_group_exit+0x140/0x160 > sp=e00007307bbf7d80 bsp=e00007307bbf1308 > [<a00000010009c970>] get_signal_to_deliver+0x6f0/0x740 > sp=e00007307bbf7d80 bsp=e00007307bbf12b8 > [<a000000100034610>] ia64_do_signal+0x90/0xde0 > sp=e00007307bbf7d80 bsp=e00007307bbf11d0 > [<a000000100013d20>] do_notify_resume_user+0x100/0x160 > sp=e00007307bbf7e20 bsp=e00007307bbf11a0 > [<a00000010000cc00>] notify_resume_user+0x40/0x60 > sp=e00007307bbf7e20 bsp=e00007307bbf1150 > [<a00000010000cb30>] skip_rbs_switch+0xe0/0x110 > sp=e00007307bbf7e30 bsp=e00007307bbf1150 > [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400 > sp=e00007307bbf8000 bsp=e00007307bbf1150 >Kernel panic - not syncing: Aiee, killing interrupt handler!
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 207002
:
136560
|
136561
| 139632 |
159845