> Yep, I've seen a similar oops during a high stress test on a UP system
> (two make -j10 in different kernel trees). The only problem was that
> the oops in the kernel message wasn't fully readable for ksysmoops
> (bit garbage). After running fsck by hand to recover /dev/sda10 aka
> /usr/src/ the system is up again.
The oops is caused by this code in kmem_cache_free:
#if 1
/* FORCE A KERNEL DUMP WHEN THIS HAPPENS. SPEAK IN ALL CAPS. GET THE CALL CHAIN. */
*(int *) 0 = 0;
#endif
There should be kmem_alloc: ... message directly in front of the oops
in the kernel log. what does it say?
As far as I can see the problem can only happen when a process in the
process list carries a bogus pointer in tsk->mm. The new locking in
array.c has the side effect of noticing it in mmput.
-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/