[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200803261142.07422.m.kozlowski@tuxland.pl>
Date: Wed, 26 Mar 2008 11:42:07 +0100
From: Mariusz Kozlowski <m.kozlowski@...land.pl>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
David Miller <davem@...emloft.net>, sparclinux@...r.kernel.org
Subject: sparc64 BUG: using smp_processor_id() in preemptible
Hello,
I see lots of these messages on my ultra 60 box.
Mariusz
$ uname -a
Linux sparc64 2.6.25-rc7 #2 SMP PREEMPT Wed Mar 26 11:25:23 CET 2008 sparc64 sun4u TI UltraSparc II (BlackBird) GNU/Linux
BUG: using smp_processor_id() in preemptible [00000000] code: init/1
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004cc4b4] setup_arg_pages+0x9c/0x320
[0000000000505498] load_elf_binary+0x620/0x13a0
[00000000004cb770] search_binary_handler+0xd8/0x300
[00000000004cca88] do_execve+0x150/0x180
[000000000042739c] sparc_execve+0x44/0xa0
[0000000000406354] linux_sparc_syscall+0x3c/0x44
[00000000004d381c] sys_dup+0x24/0x40
[0000000000426fe0] init_post+0xa8/0x100
[0000000000794418] kernel_init+0x260/0x360
[0000000000427290] kernel_thread+0x38/0x60
[000000000067f390] rest_init+0x18/0x80
BUG: using smp_processor_id() in preemptible [00000000] code: init/1
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004b359c] sys_mprotect+0x124/0x1e0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000f7f44bcc] 0xf7f44bd4
BUG: using smp_processor_id() in preemptible [00000000] code: init/1
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004b359c] sys_mprotect+0x124/0x1e0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000f7f492ec] 0xf7f492f4
BUG: using smp_processor_id() in preemptible [00000000] code: init/1
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004b359c] sys_mprotect+0x124/0x1e0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000f7f492ec] 0xf7f492f4
BUG: using smp_processor_id() in preemptible [00000000] code: init/1
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000001] 0x9
BUG: using smp_processor_id() in preemptible [00000000] code: init/444
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000000001bc] 0x1c4
BUG: using smp_processor_id() in preemptible [00000000] code: rc/447
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004cc4b4] setup_arg_pages+0x9c/0x320
[0000000000505498] load_elf_binary+0x620/0x13a0
[00000000004cb770] search_binary_handler+0xd8/0x300
[0000000000500e4c] load_script+0x2f4/0x340
[00000000004cb770] search_binary_handler+0xd8/0x300
[00000000004fc998] compat_do_execve+0x140/0x180
[0000000000444e7c] sparc32_execve+0x44/0xa0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000000] 0x8
BUG: using smp_processor_id() in preemptible [00000000] code: rc/447
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004b359c] sys_mprotect+0x124/0x1e0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000f7f14bcc] 0xf7f14bd4
BUG: using smp_processor_id() in preemptible [00000000] code: rc/447
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004b359c] sys_mprotect+0x124/0x1e0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000f7f14bcc] 0xf7f14bd4
BUG: using smp_processor_id() in preemptible [00000000] code: rc/447
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[00000000004b33b8] mprotect_fixup+0x3c0/0x480
[00000000004b359c] sys_mprotect+0x124/0x1e0
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000f7f192ec] 0xf7f192f4
Driver 'sr' needs updating - please use bus_type methods
sr0: scsi3-mmc drive: 24x/24x writer cd/rw xa/form2 cdda tray
Uniform CD-ROM driver Revision: 3.20
sr 0:0:6:0: Attached scsi CD-ROM sr0
sd 0:0:0:0: Attached scsi generic sg0 type 0
sr 0:0:6:0: Attached scsi generic sg1 type 5
printk: 1455 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: bash/950
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000000003b6] 0x3be
EXT3 FS on sda3, internal journal
Adding 497992k swap on /dev/sda2. Priority:-1 extents:1 across:497992k
printk: 1020 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: bash/1142
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000476] 0x47e
printk: 1009 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: runscript.sh/1520
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000000005f0] 0x5f8
printk: 1635 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: runscript.sh/1937
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000791] 0x799
printk: 982 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: bash/2212
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000000008a4] 0x8ac
printk: 728 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: runscript.sh/2541
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[00000000000009ed] 0x9f5
eth0: Link is up using internal transceiver at 100Mb/s, Full Duplex.
printk: 544 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: depscan.sh/2916
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000b64] 0xb6c
printk: 774 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: depscan.sh/3036
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000bdc] 0xbe4
printk: 664 messages suppressed.
BUG: using smp_processor_id() in preemptible [00000000] code: bash/3137
caller is flush_tlb_pending+0xc/0xc0
Call Trace:
[000000000044ad44] flush_tlb_pending+0xc/0xc0
[0000000000469318] copy_process+0x740/0x1080
[0000000000469ca0] do_fork+0x48/0x280
[0000000000406314] linux_sparc_syscall32+0x3c/0x40
[0000000000000c41] 0xc49
and so on ...
View attachment "config-sparc64-2.6.25-rc7" of type "text/plain" (23408 bytes)
Powered by blists - more mailing lists