Teresa Noviello wrote:
> ...
> (at this time i do "rtnet stop")
> 
> [353109.925669] Unable to handle kernel paging request at virtual address
> 6b6b6b6b
> [353109.926145]  printing eip:
> [353109.926336] e0855c31
> [353109.926338] *pde = 00000000
> [353109.926531] Oops: 0000 [#1]
> [353109.926846] PREEMPT
> [353109.927138] Modules linked in: tdma rtmac rtcfg rtcap rt_loopback
> rt_eepro100 rtpacket rtipv4 rtnet rtai_rtdm rtai_sem rtai_lxrt rtai_up
> rtai_hal ide_scsi
> [353109.929170] CPU:    0
> [353109.929171] EIP:    0060:[<e0855c31>]    Not tainted VLI
> [353109.929198] EFLAGS: 00010246   (2.6.15-rtai)
> [353109.929807] EIP is at tdma_detach+0x91/0x200 [tdma]
> [353109.930029] eax: 6b6b6b6b   ebx: 6b6b6b6b   ecx: d445e910   edx:
> c040e180

Ok, crash confirmed here (when I switch on CONFIG_DEBUG_SLAB in the
kernel), but with slightly different location. Looks like some race
during cleanup, a buffer is used after release. Digging deeper, patch
should follow soon.

Jan

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to