Re: [ANNOUNCE] 3.6.11.4-rt36 - Kernel Bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Steven,

with 3.6.11.4-rt36 I got on a x86 machine with a long time test very sporadical the following kernel oops. I cannot reproduce it reliable, but it occurs about once a week. Do you have any ideas?

Stack:
 c014c56d 00000001 f3df5c04 f3df5c08 c014c56d 00000001 f3df5c14 c004fc6e
 f6ff7030 f3df5c20 00200046 f6ff7030 f3df5c34 c018844a f6ff7030 f3df5c38
 00000000 00000001 f3df5c01 f6ff87b4 f63c2490 f3df07fc f3df5c50 c044d1c0
Call Trace:
 [<c014c56d>] ? get_parent_ip+0xb/0x31
 [<c014c56d>] ? get_parent_ip+0xb/0x31
 [<c044fc6e>] ? add_preempt_count+0x90/0xa0
 [<c018844a>] ? __call_rcu_core+0x45/0xed
 [<c044d1c0>] __rt_spin_lock+0x1e/0x20
 [<c0147ef9>] lg_local_lock+0x20/0x23
 [<c01eb5e8>] mntput_no_expire+0x15/0xfb
 [<c01eb6ec>] mntput+0x1e/0x20
 [<c01dd2e0>] path_put+0x15/0x18
 [<c01f6fdf>] free_fs_struct+0xe/0x25
 [<c01f7062>] exit_fs+0x6c/0x72
 [<c012aa9b>] do_exit+0x26d/0x352
 [<c044e13f>] oops_end+0x94/09c
 [<c043f909>] no_context+0x15e/0x168
 [<c043fa34>] __bad_area_nosemaphore+0x121/0x12b
 [<c044f689>] ? spurious_fault+0xa0/0xa0
 [<c043fa83>] bad_area+0x35/0x3b
 [<c044f933>] do_page_fault+0x2aa/0x429
 [<c044d395>] ? _raw_spin_unlock_irq+0x12/0x30
 [<c014ab12>] ? finish_task_switch0x45/0xb4
 [<c044c333>] ? __schedule+0x642/0x679
 [<c044f689>] ? spurious_fault+0xa0/0xa0
 [<c044db4a>] error_code+0x5a/0x60
 [<c044f689>] ? spurious_fault+0xa0/0xa0
 [<c02ba5b2>] ? selinux_inode_permission+0xb1/0x131
 [<c044c7d3>] ? preempt_schedule_irq+0x34/0x4d
 [<c044d608>] ? resume_kernel+0x38/0x50
 [<c02b7069>] security_inode_permission+0x1b/0x1d
 [<c01de2e4>] __inode_permission+0x91/0x96
 [<c01de329>] inode_permission+0x40/0x42
 [<c01de36e>] link_path_walk+0x43/0x67f
 [<c01e0a2b>] path_openat+0x75/0x34d
 [<c01e0f0a>] do_filp_open+0x21/0x5d
 [<c014d77a>] ? migrate_enable+0x133/0x174
 [<c014d77a>] ? migrate_enable+0x133/0x174
 [<c01ea5d2>] ? alloc_fd+0xc0/0xcb
 [<c01d4c81>] do_sys_open+0xed/x16c
 [<c01d4d21>] sys_open+0x21/0x29
 [<c0452210>] sysenter_do_call+0x12/0x22
Code: 75 09 8d 43 04 89 43 04 89 4308 31 c9 89 f2 6a 01 89 d8 e8 8f 58 d1 ff 5f 85 c0 0f 85 73 01 00 00 8b 43 0c 83 e0 fe 39 c6
 75 02 <0f> 0b 8d be a4 04 00 00 89 f8 e8 6d 07 00 00 8b 06 89 46 04 64
 EIP: [<c044ccc9>] rt_spin_lock_slowlock+0x51/0x1ec SS:ESP 0068:f3df5bf0

Maybe there are typos in the call stack, because I have only a "real" screenshot.

Andreas
------------------------------------------------------------------------------------------------------
Registergericht: Traunstein / Registry Court: HRB 275 - Sitz / Head Office: Traunreut
Aufsichtsratsvorsitzender / Chairman of Supervisory Board: Rainer Burkhard
Geschäftsführung / Management Board: Thomas Sesselmann (Vorsitzender / Chairman),
Michael Grimm, Matthias Fauser, Sebastian Tondorf

E-Mail Haftungsausschluss / E-Mail Disclaimer: http://www.heidenhain.de/disclaimer
��.n��������+%������w��{.n�����{�����ǫ���ܨ}���Ơz�j:+v�����w����ޙ��&�)ߡ�a����z�ޗ���ݢj��w�f





[Index of Archives]     [RT Stable]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux