Bug 712532

Summary: [abrt] kernel: BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087: TAINTED Warning Issued
Product: [Fedora] Fedora Reporter: Ronald Canete <ronaldcanete>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: aquini, gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda, spam42
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:03b7185d18f95a9b8739b52ac8bf5004168be006
Fixed In Version: kernel-2.6.40.3-0.fc15 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-08-02 01:59:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Ronald Canete 2011-06-10 21:30:40 UTC
abrt version: 2.0.1
architecture:   i686
cmdline:        ro root=/dev/mapper/VolGroup-lv_root rd_LVM_LV=VolGroup/lv_root rd_LVM_LV=VolGroup/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=us rhgb quiet
component:      kernel
kernel:         2.6.38.6-27.fc15.i686.PAE
kernel_tainted: 640
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087
reported_to:    kerneloops: URL=http://submit.kerneloops.org/submitoops.php
time:           Sat May 28 18:09:40 2011

backtrace:
:BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1087
:in_atomic(): 0, irqs_disabled(): 1, pid: 6222, name: umount
:Pid: 6222, comm: umount Tainted: G        W   2.6.38.6-27.fc15.i686.PAE #1
:Call Trace:
: [<c07e15f2>] ? printk+0x2d/0x2f
: [<c0435b8a>] __might_sleep+0xdd/0xe4
: [<c07ebeda>] do_page_fault+0x179/0x30c
: [<c05d82b5>] ? format_decode+0xca/0x29f
: [<c05d92fb>] ? vsnprintf+0x7f/0x269
: [<c0469b90>] ? arch_local_irq_save+0x12/0x17
: [<c07e8ffb>] ? _raw_spin_unlock_irqrestore+0x13/0x15
: [<c07e8ffb>] ? _raw_spin_unlock_irqrestore+0x13/0x15
: [<c07ebd61>] ? do_page_fault+0x0/0x30c
: [<c07e9ae7>] error_code+0x67/0x6c
: [<c069690c>] ? scsi_prep_fn+0x0/0x37
: [<c0695f58>] ? scsi_prep_state_check+0xc/0x7a
: [<c069683e>] scsi_setup_blk_pc_cmnd+0x14/0xe2
: [<c0696933>] scsi_prep_fn+0x27/0x37
: [<c05c31c6>] blk_peek_request+0xbd/0x17e
: [<c069617d>] scsi_request_fn+0x36/0x3b0
: [<c07e8ffb>] ? _raw_spin_unlock_irqrestore+0x13/0x15
: [<c044c6fd>] ? del_timer+0x59/0x61
: [<c05c2dc7>] __generic_unplug_device+0x30/0x33
: [<c05c5896>] blk_execute_rq_nowait+0x65/0x84
: [<c05c5941>] blk_execute_rq+0x8c/0xbf
: [<c05c5804>] ? blk_end_sync_rq+0x0/0x2d
: [<c05c25b5>] ? get_request+0x216/0x21c
: [<c05c2df5>] ? get_request_wait+0x2b/0x132
: [<c0435ad6>] ? __might_sleep+0x29/0xe4
: [<c05c2f36>] ? blk_get_request+0x3a/0x63
: [<c06953cd>] scsi_execute+0xcb/0x110
: [<c0695446>] ? scsi_execute_req+0x34/0xad
: [<c0695497>] scsi_execute_req+0x85/0xad
: [<c0691b93>] ioctl_internal_command.constprop.1+0x6f/0x15f
: [<c0691cd3>] scsi_set_medium_removal+0x50/0x87
: [<c04bbbab>] ? truncate_inode_pages_range+0x18c/0x209
: [<c06a2c5b>] sr_lock_door+0x1b/0x1d
: [<c06c17c5>] cdrom_release+0x180/0x1e2
: [<c0469710>] ? smp_call_function_many+0xdd/0x1b4
: [<c0435ad6>] ? __might_sleep+0x29/0xe4
: [<c050cc88>] ? brelse+0x11/0x13
: [<c042f603>] ? should_resched+0xd/0x27
: [<c07e7d71>] ? _cond_resched+0xd/0x21
: [<c06a1d52>] sr_block_release+0x28/0x3f
: [<c05111b4>] __blkdev_put+0xa7/0x135
: [<c0511324>] blkdev_put+0xe2/0xe7
: [<c04ef373>] kill_block_super+0x5c/0x60
: [<c04ef54a>] deactivate_locked_super+0x1f/0x40
: [<c04efedb>] deactivate_super+0x2e/0x31
: [<c0501a88>] mntput_no_expire+0xb5/0xb9
: [<c0502326>] sys_umount+0x270/0x297
: [<c04f538e>] ? path_put+0x1a/0x1d
: [<c040969f>] sysenter_do_call+0x12/0x28

event_log:
:2011-06-11-00:30:26> Submitting oops report to http://submit.kerneloops.org/submitoops.php
:2011-06-11-00:30:30  Kernel oops report was uploaded

Comment 1 Dave Jones 2011-07-11 19:38:15 UTC
*** Bug 716740 has been marked as a duplicate of this bug. ***

Comment 2 Dave Jones 2011-07-11 19:39:01 UTC
Please test this build.
http://koji.fedoraproject.org/koji/buildinfo?buildID=251810

Comment 3 Dave Jones 2011-07-11 19:39:39 UTC
*** Bug 719695 has been marked as a duplicate of this bug. ***

Comment 4 Dave Jones 2011-07-29 15:54:36 UTC
This bug should be fixed with 2.6.40-3 and higher (available in updates-testing. Please try that kernel, and leave feedback.

Thanks.

Comment 5 Fedora Update System 2011-07-29 16:00:50 UTC
kernel-2.6.40-3.fc15 has been submitted as an update for Fedora 15.
https://admin.fedoraproject.org/updates/kernel-2.6.40-3.fc15

Comment 6 Fedora Update System 2011-07-29 20:40:01 UTC
kernel-2.6.40-4.fc15 has been submitted as an update for Fedora 15.
https://admin.fedoraproject.org/updates/kernel-2.6.40-4.fc15

Comment 7 Fedora Update System 2011-07-31 03:33:09 UTC
Package kernel-2.6.40-4.fc15:
* should fix your issue,
* was pushed to the Fedora 15 testing repository,
* should be available at your local mirror within two days.
Update it with:
# su -c 'yum update --enablerepo=updates-testing kernel-2.6.40-4.fc15'
as soon as you are able to, then reboot.
Please go to the following url:
https://admin.fedoraproject.org/updates/kernel-2.6.40-4.fc15
then log in and leave karma (feedback).

Comment 8 Fedora Update System 2011-08-02 01:57:48 UTC
kernel-2.6.40-4.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2011-08-16 12:48:03 UTC
kernel-2.6.40.3-0.fc15 has been submitted as an update for Fedora 15.
https://admin.fedoraproject.org/updates/kernel-2.6.40.3-0.fc15

Comment 10 Fedora Update System 2011-08-18 02:30:53 UTC
kernel-2.6.40.3-0.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.