I get the following bug when sending data over tcp/ip from a linux
thread with xenomai apps running:
The reason I ask the list is because the call that triggers this is
irqs_disabled().
What I'm doing is sending data over an RT_PIPE from a realtime task,
while a linux thread wakes up and receives a message from the pipe and
then sends it out over tcp/ip.
Steven
kernel BUG at fs/buffer.c:1245!
invalid opcode: 0000 [#1]
PREEMPT
Modules linked in: nfs lockd sunrpc st_dacsnd(P) eepro100 xeno_native
xeno_nucleus
CPU: 0
EIP: 0060:[<c017e9a2>] Tainted: P VLI
EFLAGS: 00010046 (2.6.23.12-target-xenomai #3)
EIP is at __find_get_block+0x182/0x1a0
eax: 00000000 ebx: 00000000 ecx: 00000400 edx: 00033a01
esi: c10551a0 edi: 00033a01 ebp: 00000000 esp: c187dc08
ds: 007b es: 007b fs: 0000 gs: 0033 ss: 0068
Process rtlogd (pid: 881, ti=c187c000 task=c13b6aa0 task.ti=c187c000)<0>
I-pipe domain Linux
Stack: c1111380 c11114d0 00000000 00000001 00000400 00000000 c017e9d6
c1c69700
00000000 00000001 00000400 00000000 c017e9d6 00000001 c10ee400
00000000
00033a01 c10551a0 00000000 00000001 c1b92090 00000000 c01a124b
00000001
Call Trace:
[<c017e9d6>] __getblk+0x16/0x210
[<c017e9d6>] __getblk+0x16/0x210
[<c01a124b>] ext3_getblk+0xfb/0x230
[<c01a4a79>] dx_probe+0x89/0x2f0
[<c01a5745>] ext3_find_entry+0x235/0x620
[<c017e8c4>] __find_get_block+0xa4/0x1a0
[<c01a008a>] __ext3_get_inode_loc+0xea/0x350
[<c017e9d6>] __getblk+0x16/0x210
[<c0117afc>] do_softirq+0x4c/0x60
[<c01a33f2>] ext3_read_inode+0x1f2/0x320
[<c0159a33>] kmem_cache_alloc+0x53/0xc0
[<c016e3b5>] d_rehash+0x15/0x50
[<c01a718c>] ext3_lookup+0x3c/0x120
[<c016f42c>] d_alloc+0x1c/0x1a0
[<c0164d02>] do_lookup+0x122/0x1a0
[<c0166879>] __link_path_walk+0x7f9/0xeb0
[<c010bdce>] __ipipe_pin_range_globally+0xfe/0x110
[<c0166f73>] link_path_walk+0x43/0xc0
[<c2950b78>] xnarch_trap_fault+0x18/0x20 [xeno_nucleus]
[<c0275e6a>] exception_event+0x2a/0x40
[<c015b72f>] get_unused_fd_flags+0x4f/0xe0
[<c0167225>] do_path_lookup+0x85/0x200
[<c015e6a3>] get_empty_filp+0x33/0x120
[<c0167e81>] __path_lookup_intent_open+0x51/0xa0
[<c0167f60>] path_lookup_open+0x20/0x30
[<c016806f>] open_namei+0x6f/0x640
[<c014b636>] acct_stack_growth+0xa6/0xc0
[<c015baa3>] do_filp_open+0x33/0x60
[<c2950b78>] xnarch_trap_fault+0x18/0x20 [xeno_nucleus]
[<c0275e6a>] exception_event+0x2a/0x40
[<c015b72f>] get_unused_fd_flags+0x4f/0xe0
[<c015bb20>] do_sys_open+0x50/0xf0
[<c015bbfc>] sys_open+0x1c/0x20
[<c0102b81>] syscall_call+0x7/0xb
=======================
Code: ff ff 83 68 14 01 8b 40 08 a8 04 75 2c 85 ed 0f 84 30 ff ff ff 89
e8 e8 7d f6 ff ff e9 24 ff ff ff 89 d8 e8 71 f6 ff ff 90 eb 81 <0f> 0b
eb fe e8 35 36 18 00 e9 08 ff ff ff e8 2b 36 18 00 eb cd
EIP: [<c017e9a2>] __find_get_block+0x182/0x1a0 SS:ESP 0068:c187dc08
/ #
_______________________________________________
Xenomai-help mailing list
[email protected]
https://mail.gna.org/listinfo/xenomai-help