[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20071023103452.GA6267@localhost.sw.ru>
Date: Tue, 23 Oct 2007 14:34:52 +0400
From: Alexey Dobriyan <adobriyan@...ru>
To: linux-scsi@...r.kernel.org, akpm@...l.org, axboe@...nel.dk
Cc: linux-kernel@...r.kernel.org
Subject: Re: sr_mod oops (elv_next_request involved)
On Mon, Oct 22, 2007 at 04:12:06PM +0400, Alexey Dobriyan wrote:
> Steps to reproduce:
>
> modprobe sr_mod
To clarify: this is done during boot sequence.
> rmmod sr_mod
> modprobe sr_mod
This -- by hand.
> BUG: unable to handle kernel paging request at virtual address f881b9f3
> printing eip: f881b9f3 *pdpt = 0000000000003001 <1>*pde = 000000000480a067 *pte = 0000000000000000
> Oops: 0010 [#1] PREEMPT SMP DEBUG_PAGEALLOC
> Modules linked in: sr_mod af_packet ipv6 nf_conntrack_netbios_ns nf_conntrack_ipv4 xt_state nf_conntrack xt_tcpudp ipt_REJECT iptable_filter ip_tables x_tables cpufreq_ondemand loop serio_raw k8temp hwmon amd_rng cdrom
>
> Pid: 1981, comm: modprobe Not tainted (2.6.23-55b70a0300b873c0ec7ea6e33752af56f41250ce #4)
> EIP: 0060:[<f881b9f3>] EFLAGS: 00010086 CPU: 1
> EIP is at 0xf881b9f3
> EAX: c570b380 EBX: c56b6700 ECX: f881b9f3 EDX: c56b6700
> ESI: c570b380 EDI: c5767920 EBP: c570b380 ESP: c4b5ec0c
> DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
> Process modprobe (pid: 1981, ti=c4b5e000 task=c4b60000 task.ti=c4b5e000)
> Stack: c10ab9ea c570b380 c4b5ecec c528c5c8 c56b6700 c570b380 c528c430 c11251fd
> c570b380 c56b6700 c10ae49a 00000001 c570b380 c56b6700 c570b380 c4b5ecec
> c10ae4c3 00000001 c10ae540 00000001 00000000 c4b5ecf0 c56b6700 c4b5ed18
> Call Trace:
> [<c10ab9ea>] elv_next_request+0x83/0xfe
> CONFIG_HWMON=m
> CONFIG_SENSORS_K8TEMP=m
Strange...
If I make CONFIG_HWMON=y, oops goes away.
If I load hwmon.ko after sr_mod.ko, oops goes away.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists