Bug 708716

Summary: [abrt] kernel: BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087: TAINTED Die
Product: [Fedora] Fedora Reporter: Rod Johnson <hr.johnsry2>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:e0c680c5f48c61339342a229393e5b54f4e46548
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-07 18:37:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Rod Johnson 2011-05-29 03:23:18 UTC
abrt version: 2.0.1
architecture:   x86_64
cmdline:        ro root=/dev/mapper/vg_b6230-lv_root rd_LVM_LV=vg_b6230/lv_root rd_LVM_LV=vg_b6230/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=us rhgb quiet
component:      kernel
kernel:         2.6.38.6-27.fc15.x86_64
kernel_tainted: 128
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087
time:           Sat May 28 17:15:15 2011

backtrace:
:BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087
:in_atomic(): 0, irqs_disabled(): 1, pid: 16326, name: umount
:Pid: 16326, comm: umount Not tainted 2.6.38.6-27.fc15.x86_64 #1
:Call Trace:
: [<ffffffff81047d33>] __might_sleep+0xeb/0xf0
: [<ffffffff81478c83>] do_page_fault+0x1eb/0x37a
: [<ffffffff81144ec2>] ? __find_get_block+0x17c/0x18c
: [<ffffffff8104127e>] ? should_resched+0xe/0x2d
: [<ffffffff814742d0>] ? _cond_resched+0xe/0x22
: [<ffffffff81144f11>] ? __getblk+0x3f/0x23a
: [<ffffffff811ae93c>] ? str2hashbuf_signed+0x0/0x7d
: [<ffffffff81476095>] page_fault+0x25/0x30
: [<ffffffff812115fb>] ? elv_may_queue+0x1d/0x1f
: [<ffffffff81215cc9>] get_request+0x33/0x262
: [<ffffffff81216891>] get_request_wait+0x35/0x193
: [<ffffffff811ea188>] ? avc_has_perm+0x51/0x63
: [<ffffffff81216a2e>] blk_get_request+0x3f/0x6e
: [<ffffffff812fc965>] scsi_execute+0x41/0x146
: [<ffffffff812fcb06>] scsi_execute_req+0x9c/0xce
: [<ffffffff812f8ba0>] ioctl_internal_command.constprop.1+0x6b/0x163
: [<ffffffff8146f977>] ? __slab_free+0x27/0xeb
: [<ffffffff812f8cf1>] scsi_set_medium_removal+0x59/0x94
: [<ffffffff8130b41d>] sr_lock_door+0x20/0x22
: [<ffffffff8132c634>] cdrom_release+0x195/0x205
: [<ffffffff8104127e>] ? should_resched+0xe/0x2d
: [<ffffffff814742d0>] ? _cond_resched+0xe/0x22
: [<ffffffff8130a3b1>] sr_block_release+0x30/0x4d
: [<ffffffff81149c0e>] __blkdev_put+0xc6/0x179
: [<ffffffff81149dc5>] blkdev_put+0x104/0x10c
: [<ffffffff811230d1>] kill_block_super+0x65/0x6a
: [<ffffffff8112330d>] deactivate_locked_super+0x26/0x4b
: [<ffffffff81123e76>] deactivate_super+0x37/0x3b
: [<ffffffff811387a8>] mntput_no_expire+0xcc/0xd1
: [<ffffffff811391df>] sys_umount+0x2ac/0x2da
: [<ffffffff81009bc2>] system_call_fastpath+0x16/0x1b

Comment 1 Dave Jones 2011-06-07 18:37:24 UTC

*** This bug has been marked as a duplicate of bug 708717 ***