Re: 2.6.18-rc6-mm1

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sunday 10 September 2006 07:35, Andrew Morton wrote:
> On Sun, 10 Sep 2006 02:37:51 +0200
> Magnus Määttä <[email protected]> wrote:
> 
> > > > EIP:    0060:[<c04ad300>]    Tainted: P      VLI
> > >
> > > What caused the taint?
> > 
> > I was pretty sure it was listed somewhere, but I guess it wasn't.
> > nvidia graphics module, I can try without it tomorrow if needed.
> > 
> 
> That would be appreciated thanks.
> 
> But first you'd need to ensure that it's a repeatable oops.  If
> it's not, the removing the nvidia driver won't tell us if the nvidia
> driver caused it.  (It almost certainly didn't).

Forgot to mention that I had this (well, I'm not 100% it was exactly the
same) oops with 2.6.18-rc5-mm1.

Here is the oops with an untainted kernel:

[  161.078154] BUG: unable to handle kernel NULL pointer dereference at virtual address 00000000
[  161.104908]  printing eip:
[  161.133157] c04ad300
[  161.158755] *pde = 00000000
[  161.186042] Oops: 0000 [#2]
[  161.212933] 4K_STACKS PREEMPT
[  161.240791] last sysfs file: /class/input/input1/name
[  161.274954] Modules linked in: snd_seq_midi snd_seq_oss ipaq usbserial eeprom snd_seq_dummy snd_pcm_oss snd_mixer_oss snd_emu10k1_synth snd_emux_synth snd_seq_virmidi snd_seq_midi_event snd_seq_midi_emul snd_seq snd_emu10k1 snd_rawmidi snd_ac97_codec snd_ac97_bus snd_pcm snd_seq_device snd_page_alloc snd_util_mem snd_hwdep psmouse
[  161.428307] CPU:    0
[  161.428308] EIP:    0060:[<c04ad300>]    Not tainted VLI
[  161.428310] EFLAGS: 00010216   (2.6.18-rc6-mm1 #1)
[  161.531660] EIP is at svc_process+0x40/0x6a0
[  161.566957] eax: 00000000   ebx: eaf8c000   ecx: 00000000   edx: ead74d40
[  161.610544] esi: eaf8c070   edi: ffff5225   ebp: eaf93fb0   esp: eaf93f70
[  161.654260] ds: 007b   es: 007b   ss: 0068
[  161.689932] Process nfsd (pid: 4655, ti=eaf93000 task=eaf9caa0 task.ti=eaf93000)
[  161.712308] Stack: 00000046 eeedefe0 00000001 eeedefc4 00000000 eaf93f9c c04eaa1b eeedefc4
[  161.762411]        00000001 ead74d40 eaf8c04c eaf93fb0 c012d70b 00000000 ffff5226 ffff5225
[  161.812643]        eaf93fe0 c02784ba eaf8c000 eaf93fc4 00000000 fffffeff ffffffff fffffef8
[  161.862772] Call Trace:
[  161.917732]  [<c01041bf>] show_trace_log_lvl+0x2f/0x50
[  161.956879]  [<c01042a7>] show_stack_log_lvl+0x97/0xc0
[  161.995482]  [<c0104532>] show_registers+0x1f2/0x2a0
[  162.033228]  [<c01047dd>] die+0x12d/0x240
[  162.067860]  [<c011735c>] do_page_fault+0x3ac/0x650
[  162.104983]  [<c04eaeef>] error_code+0x3f/0x44
[  162.140705]  [<c02784ba>] nfsd+0x18a/0x2b0
[  162.175232]  [<c0103fb7>] kernel_thread_helper+0x7/0x10
[  162.213210]  =======================
[  162.246050] Code: 89 45 e8 8b 52 28 83 c6 70 89 55 e4 8b 40 04 83 f8 17 0f 86 6d 04 00 00 8b 5d 08 8b 83 9c 04 00 00 c7 83 a0 04 00 00 01 00 00 00 <8b> 00 89 04 24 e8 06 d4 ca ff c7 46 04 00 00 00 00 89 c1 89 43
[  162.354045] EIP: [<c04ad300>] svc_process+0x40/0x6a0 SS:ESP 0068:eaf93f70


And oops #1 just in case it's not unrelated (and the BUG just after it):
[  105.928488] BUG: unable to handle kernel paging request at virtual address b79505a0
[  105.928503]  printing eip:
[  105.928506] c013d14c
[  105.928509] *pde = 2d268067
[  105.928511] *pte = 00000000
[  105.928518] Oops: 0000 [#1]
[  105.952628] 4K_STACKS PREEMPT
[  105.977498] last sysfs file: /class/input/input1/name
[  106.008548] Modules linked in: snd_seq_midi snd_seq_oss ipaq usbserial eeprom snd_seq_dummy snd_pcm_oss snd_mixer_oss snd_emu10k1_synth snd_emux_synth snd_seq_virmidi snd_seq_midi_event snd_seq_midi_emul snd_seq snd_emu10k1 snd_rawmidi snd_ac97_codec snd_ac97_bus snd_pcm snd_seq_device snd_page_alloc snd_util_mem snd_hwdep psmouse
[  106.150657] CPU:    0
[  106.150658] EIP:    0060:[<c013d14c>]    Not tainted VLI
[  106.150660] EFLAGS: 00010002   (2.6.18-rc6-mm1 #1)
[  106.241322] EIP is at trace_hardirqs_on+0x1c/0x150
[  106.273081] eax: 00000001   ebx: b794fba0   ecx: b794f2e0   edx: b7f61410
[  106.310907] esi: 00000008   edi: b7c08ff4   ebp: eee0dfa4   esp: eee0df8c
[  106.348781] ds: 007b   es: 007b   ss: 0068
[  106.378378] Process icecast (pid: 4446, ti=eee0d000 task=ee9d0050 task.ti=eee0d000)
[  106.401560] Stack: eee0df9c 00000046 00000000 00000000 00000000 00000008 00000000 c01033ba
[  106.445119]        b7f61410 b794f2e0 00000000 00000000 b794f3b0 00000000 00000008 b7c08ff4
[  106.489043]        b794f388 00000000 0000007b 0000007b 00000033 000000af b7f61410 00000073
[  106.533124] Call Trace:
[  106.576870]  [<c01041bf>] show_trace_log_lvl+0x2f/0x50
[  106.610486]  [<c01042a7>] show_stack_log_lvl+0x97/0xc0
[  106.643976]  [<c0104532>] show_registers+0x1f2/0x2a0
[  106.676895]  [<c01047dd>] die+0x12d/0x240
[  106.707110]  [<c011735c>] do_page_fault+0x3ac/0x650
[  106.740133]  [<c04eaeef>] error_code+0x3f/0x44
[  106.771908]  [<c01033ba>] sysenter_past_esp+0x93/0x99
[  106.805629]  =======================
[  106.834887] Code: c7 05 94 9a 8b c0 01 00 00 00 89 e5 c9 c3 90 55 89 e5 56 53 83 ec 10 a1 a0 29 63 c0 65 8b 1d 00 00 00 00 85 c0 0f 84 89 00 00 00 <8b> b3 00 0a 00 00 85 f6 75 7f 8b 0d 94 9a 8b c0 85 c9 0f 84 96

[  106.978502]  <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20
[  107.023854] in_atomic():0, irqs_disabled():1
[  107.058071]  [<c01041bf>] show_trace_log_lvl+0x2f/0x50
[  107.095140]  [<c0104207>] show_trace+0x27/0x30
[  107.129851]  [<c0104334>] dump_stack+0x24/0x30
[  107.164377]  [<c011d442>] __might_sleep+0xa2/0xc0
[  107.199995]  [<c013949e>] down_read+0x1e/0x60
[  107.234807]  [<c012e9b7>] blocking_notifier_call_chain+0x17/0x50
[  107.275150]  [<c0121881>] profile_task_exit+0x21/0x30
[  107.312713]  [<c012327b>] do_exit+0x1b/0x520
[  107.348071]  [<c01048e5>] die+0x235/0x240
[  107.382754]  [<c011735c>] do_page_fault+0x3ac/0x650
[  107.419931]  [<c04eaeef>] error_code+0x3f/0x44
[  107.455575]  [<c01033ba>] sysenter_past_esp+0x93/0x99
[  107.492825]  =======================
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux