Bug 710747

Summary: [abrt] kernel: BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087: TAINTED Warning Issued
Product: [Fedora] Fedora Reporter: Jacques H. <jhullu>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:3b70aab34fbf72563b4d29045b46d0df23e7b86d
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-08-15 21:34:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Jacques H. 2011-06-04 13:15:10 UTC
abrt version: 2.0.1
architecture:   i686
cmdline:        ro root=/dev/mapper/vg_bsrvpicasso512-lv_root rd_LVM_LV=vg_bsrvpicasso512/lv_root rd_LVM_LV=vg_bsrvpicasso512/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=fr rhgb quiet
component:      kernel
kernel:         2.6.38.6-27.fc15.i686
kernel_tainted: 640
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087
time:           Fri Jun  3 08:59:24 2011

backtrace:
:BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087
:in_atomic(): 0, irqs_disabled(): 1, pid: 24830, name: umount
:Pid: 24830, comm: umount Tainted: G        W   2.6.38.6-27.fc15.i686 #1
:Call Trace:
: [<c07ceb2d>] ? printk+0x2d/0x2f
: [<c042e596>] __might_sleep+0xdd/0xe4
: [<c07d9124>] do_page_fault+0x179/0x30c
: [<c0436b23>] ? load_balance+0x598/0x5a9
: [<c042993e>] ? update_cfs_load+0x14d/0x1e5
: [<c040835a>] ? native_sched_clock+0x41/0x94
: [<c07d8fab>] ? do_page_fault+0x0/0x30c
: [<c07d6d9f>] error_code+0x67/0x6c
: [<c042007b>] ? handle_vm86_fault+0x3a3/0x605
: [<c05db0a9>] ? __percpu_counter_add+0xe/0x6d
: [<c042ebc7>] ? account_system_vtime+0x9b/0xa0
: [<c04b17c3>] __add_bdi_stat+0x33/0x37
: [<c04b1fb9>] account_page_dirtied+0x52/0x70
: [<c0502b2c>] __set_page_dirty+0x56/0x8a
: [<c0502bd7>] mark_buffer_dirty+0x77/0x7a
: [<c057ac17>] jbd2_journal_update_superblock+0x96/0x101
: [<c07d007b>] ? audit_free_context+0x7d/0xc3
: [<c057af91>] jbd2_journal_destroy+0x15d/0x1b4
: [<c04515f5>] ? autoremove_wake_function+0x0/0x39
: [<c055a6b1>] ext4_put_super+0x6b/0x2c4
: [<c04f619d>] ? evict_inodes+0xb1/0xb9
: [<c04e5e07>] generic_shutdown_super+0x58/0xb8
: [<c04e5e89>] kill_block_super+0x22/0x60
: [<c04e609a>] deactivate_locked_super+0x1f/0x40
: [<c04e6a2b>] deactivate_super+0x2e/0x31
: [<c04f85d8>] mntput_no_expire+0xb5/0xb9
: [<c04f8e76>] sys_umount+0x270/0x297
: [<c040b9b1>] ? syscall_trace_leave+0xa9/0xbc
: [<c07d66b4>] syscall_call+0x7/0xb

Comment 1 Dave Jones 2011-08-15 21:34:07 UTC

*** This bug has been marked as a duplicate of bug 708728 ***