This is the first odd entry after some time:
[ 1633.822022] hda-intel: IRQ timing workaround is activated for card #0. 
Suggest a bigger bdl_pos_adj.

Followed by this after a few seconds:
[ 1650.756181] CPU0 attaching NULL sched-domain.
[ 1650.756224] CPU1 attaching NULL sched-domain.
[ 1650.785260] CPU0 attaching sched-domain:
[ 1650.785279]  domain 0: span 0-1 level CPU
[ 1650.785287]   groups: 0 1
[ 1650.785298]   domain 1: span 0-1 level NODE
[ 1650.785304]    groups: 0-1
[ 1650.785316] CPU1 attaching sched-domain:
[ 1650.785320]  domain 0: span 0-1 level CPU
[ 1650.785325]   groups: 1 0
[ 1650.785331]   domain 1: span 0-1 level NODE
[ 1650.785336]    groups: 0-1

The beginning of the bad events. After access to a /proc file, release tries to 
free a strange page. After that point new allocations for the cache seem to 
fail.
[ 7104.061198] ------------[ cut here ]------------
[ 7104.061210] kernel BUG at /build/buildd/linux-2.6.27/mm/slub.c:2742!
<cut>
[ 7104.061581] Call Trace:
[ 7104.061605]  [<ffffffff8030c965>] seq_release+0x25/0x30
[ 7104.061613]  [<ffffffff8030c9e6>] single_release+0x26/0x40
[ 7104.061625]  [<ffffffff80339eb9>] proc_reg_release+0xd9/0x160
[ 7104.061632]  [<ffffffff8030c9c0>] ? single_release+0x0/0x40
[ 7104.061643]  [<ffffffff802ec929>] __fput+0xc9/0x1b0
[ 7104.061651]  [<ffffffff802eca35>] fput+0x25/0x30
[ 7104.061659]  [<ffffffff802e8ddb>] filp_close+0x5b/0x90
[ 7104.061666]  [<ffffffff802e8ecf>] sys_close+0xbf/0x120
[ 7104.061679]  [<ffffffff8021288a>] system_call_fastpath+0x16/0x1b

What is a bit unclear from this report: have you had another kernel
version running without problems or did you start with the Intrepid
kernel? Have you run memtest for a longer period of time (just to rule
out memory since this looks like some sort of memory problem)?

-- 
general protection fault: 0000 [*] SMP in drm_open_helper, seq_open, 
inotify_init, rtnl_dump_ifinfo, call_usermodehelper_setup, get_UCSname, d_alloc
https://bugs.launchpad.net/bugs/272856
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to