search for: show_stack

Displaying 20 results from an estimated 72 matches for "show_stack".

2017 Mar 08
3
[PATCH] virtio-pci: Remove affinity hint before freeing the interrupt
...0 PID: 2823 at kernel/irq/manage.c:1503 __free_irq+0x2c4/0x2c8 [ 31.114689] Modules linked in: [ 31.116101] CPU: 0 PID: 2823 Comm: kexec Not tainted 4.10.0+ #6941 [ 31.118911] Hardware name: Generic DT based system [ 31.121319] [<c022fb78>] (unwind_backtrace) from [<c0229d8c>] (show_stack+0x18/0x1c) [ 31.125017] [<c0229d8c>] (show_stack) from [<c05192f4>] (dump_stack+0x84/0x98) [ 31.128427] [<c05192f4>] (dump_stack) from [<c023d940>] (__warn+0xf4/0x10c) [ 31.131910] [<c023d940>] (__warn) from [<c023da20>] (warn_slowpath_null+0x28/0x30) [ 3...
2017 Mar 08
3
[PATCH] virtio-pci: Remove affinity hint before freeing the interrupt
...0 PID: 2823 at kernel/irq/manage.c:1503 __free_irq+0x2c4/0x2c8 [ 31.114689] Modules linked in: [ 31.116101] CPU: 0 PID: 2823 Comm: kexec Not tainted 4.10.0+ #6941 [ 31.118911] Hardware name: Generic DT based system [ 31.121319] [<c022fb78>] (unwind_backtrace) from [<c0229d8c>] (show_stack+0x18/0x1c) [ 31.125017] [<c0229d8c>] (show_stack) from [<c05192f4>] (dump_stack+0x84/0x98) [ 31.128427] [<c05192f4>] (dump_stack) from [<c023d940>] (__warn+0xf4/0x10c) [ 31.131910] [<c023d940>] (__warn) from [<c023da20>] (warn_slowpath_null+0x28/0x30) [ 3...
2020 Feb 14
0
vhost changes (batched) in linux-next after 12/13 trigger random crashes in KVM guests after reboot
...-f ... ; reboot twice The ping after the first reboot showed .......E this was on the host console [ 55.951885] CPU: 34 PID: 1908 Comm: CPU 0/KVM Not tainted 5.5.0+ #21 [ 55.951891] Hardware name: IBM 3906 M04 704 (LPAR) [ 55.951892] Call Trace: [ 55.951902] [<0000001ede114132>] show_stack+0x8a/0xd0 [ 55.951906] [<0000001edeb0672a>] dump_stack+0x8a/0xb8 [ 55.951915] [<000003ff803736a6>] vhost_vring_ioctl+0x6fe/0x858 [vhost] [ 55.951919] [<000003ff8042a608>] vhost_net_ioctl+0x510/0x570 [vhost_net] [ 55.951924] [<0000001ede3c4dd8>] do_vfs_ioctl+0...
2020 Feb 14
0
vhost changes (batched) in linux-next after 12/13 trigger random crashes in KVM guests after reboot
...ed .......E >> >> this was on the host console >> >> [ 55.951885] CPU: 34 PID: 1908 Comm: CPU 0/KVM Not tainted 5.5.0+ #21 >> [ 55.951891] Hardware name: IBM 3906 M04 704 (LPAR) >> [ 55.951892] Call Trace: >> [ 55.951902] [<0000001ede114132>] show_stack+0x8a/0xd0 >> [ 55.951906] [<0000001edeb0672a>] dump_stack+0x8a/0xb8 >> [ 55.951915] [<000003ff803736a6>] vhost_vring_ioctl+0x6fe/0x858 [vhost] >> [ 55.951919] [<000003ff8042a608>] vhost_net_ioctl+0x510/0x570 [vhost_net] >> [ 55.951924] [<0000...
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...<000000002bf2a216>] hctx_lock+0x1c/0xe8 [ 162.414630] [ 162.414630] stack backtrace: [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1 [ 162.429624] Hardware name: linux,dummy-virt (DT) [ 162.430631] Call trace: [ 162.431196] dump_backtrace+0x0/0x1c8 [ 162.432005] show_stack+0x14/0x20 [ 162.432747] dump_stack+0xac/0xe4 [ 162.433507] print_usage_bug.part.28+0x258/0x270 [ 162.434510] mark_lock+0x744/0x750 [ 162.435208] __lock_acquire+0xab8/0x18c0 [ 162.435982] lock_acquire+0x48/0x68 [ 162.436678] _raw_read_lock+0x3c/0x50 [ 162.449520] jbd2_trans_will_send_d...
2018 Feb 23
2
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...<000000002bf2a216>] hctx_lock+0x1c/0xe8 [ 162.414630] [ 162.414630] stack backtrace: [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1 [ 162.429624] Hardware name: linux,dummy-virt (DT) [ 162.430631] Call trace: [ 162.431196] dump_backtrace+0x0/0x1c8 [ 162.432005] show_stack+0x14/0x20 [ 162.432747] dump_stack+0xac/0xe4 [ 162.433507] print_usage_bug.part.28+0x258/0x270 [ 162.434510] mark_lock+0x744/0x750 [ 162.435208] __lock_acquire+0xab8/0x18c0 [ 162.435982] lock_acquire+0x48/0x68 [ 162.436678] _raw_read_lock+0x3c/0x50 [ 162.449520] jbd2_trans_will_send_d...
2016 Oct 11
2
[PATCH] virtio: console: Unlock vqs while freeing buffers
...abled, it calls dma_free_coherent() directly, requiring interrupts to be enabled. Currently a WARNING is triggered due to the spin locking around free_buf, with a call stack like this: WARNING: CPU: 3 PID: 121 at ./include/linux/dma-mapping.h:433 free_buf+0x1a8/0x288 Call Trace: [<8040c538>] show_stack+0x74/0xc0 [<80757240>] dump_stack+0xd0/0x110 [<80430d98>] __warn+0xfc/0x130 [<80430ee0>] warn_slowpath_null+0x2c/0x3c [<807e7c6c>] free_buf+0x1a8/0x288 [<807ea590>] remove_port_data+0x50/0xac [<807ea6a0>] unplug_port+0xb4/0x1bc [<807ea858>] virtcons_remove+...
2016 Oct 11
2
[PATCH] virtio: console: Unlock vqs while freeing buffers
...abled, it calls dma_free_coherent() directly, requiring interrupts to be enabled. Currently a WARNING is triggered due to the spin locking around free_buf, with a call stack like this: WARNING: CPU: 3 PID: 121 at ./include/linux/dma-mapping.h:433 free_buf+0x1a8/0x288 Call Trace: [<8040c538>] show_stack+0x74/0xc0 [<80757240>] dump_stack+0xd0/0x110 [<80430d98>] __warn+0xfc/0x130 [<80430ee0>] warn_slowpath_null+0x2c/0x3c [<807e7c6c>] free_buf+0x1a8/0x288 [<807ea590>] remove_port_data+0x50/0xac [<807ea6a0>] unplug_port+0xb4/0x1bc [<807ea858>] virtcons_remove+...
2020 Nov 12
0
[patch V3 10/37] ARM: highmem: Switch to generic kmap atomic
...-------- WARNING: CPU: 3 PID: 120 at mm/highmem.c:502 kunmap_local_indexed+0x194/0x1d0 Modules linked in: CPU: 3 PID: 120 Comm: init Not tainted 5.10.0-rc2-00010-g2a15ba82fa6c #1924 Hardware name: Samsung Exynos (Flattened Device Tree) [<c0111514>] (unwind_backtrace) from [<c010ceb8>] (show_stack+0x10/0x14) [<c010ceb8>] (show_stack) from [<c0b1b408>] (dump_stack+0xb4/0xd4) [<c0b1b408>] (dump_stack) from [<c0126988>] (__warn+0x98/0x104) [<c0126988>] (__warn) from [<c0126aa4>] (warn_slowpath_fmt+0xb0/0xb8) [<c0126aa4>] (warn_slowpath_fmt) from [<c0...
2017 Mar 08
0
[PATCH] virtio-pci: Remove affinity hint before freeing the interrupt
...el/irq/manage.c:1503 __free_irq+0x2c4/0x2c8 > [ 31.114689] Modules linked in: > [ 31.116101] CPU: 0 PID: 2823 Comm: kexec Not tainted 4.10.0+ #6941 > [ 31.118911] Hardware name: Generic DT based system > [ 31.121319] [<c022fb78>] (unwind_backtrace) from [<c0229d8c>] (show_stack+0x18/0x1c) > [ 31.125017] [<c0229d8c>] (show_stack) from [<c05192f4>] (dump_stack+0x84/0x98) > [ 31.128427] [<c05192f4>] (dump_stack) from [<c023d940>] (__warn+0xf4/0x10c) > [ 31.131910] [<c023d940>] (__warn) from [<c023da20>] (warn_slowpath_null+0...
2018 Feb 26
0
v4.16-rc2: virtio-block + ext4 lockdep splats / sleeping from invalid context
...+0x1c/0xe8 > [ 162.414630] > [ 162.414630] stack backtrace: > [ 162.415492] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.16.0-rc2 #1 > [ 162.429624] Hardware name: linux,dummy-virt (DT) > [ 162.430631] Call trace: > [ 162.431196] dump_backtrace+0x0/0x1c8 > [ 162.432005] show_stack+0x14/0x20 > [ 162.432747] dump_stack+0xac/0xe4 > [ 162.433507] print_usage_bug.part.28+0x258/0x270 > [ 162.434510] mark_lock+0x744/0x750 > [ 162.435208] __lock_acquire+0xab8/0x18c0 > [ 162.435982] lock_acquire+0x48/0x68 > [ 162.436678] _raw_read_lock+0x3c/0x50 > [...
2016 Dec 06
1
Kernel panic after kernel update
...0.664652] ffffffff8118e3fa ffff9a5300000010 ffff9a5349957e70 ffff9a5349957e08 [ 0.668124] ffffffff8118e715 ffff9a5349957e78 0000000000000001 0000000000000000 [ 0.671457] Call Trace: [ 0.672460] [<ffffffff8102eefe>] dump_trace+0x5e/0x310 [ 0.674389] [<ffffffff8102f2cb>] show_stack_log_lvl+0x11b/0x1a0 [ 0.676570] [<ffffffff81030001>] show_stack+0x21/0x40 [ 0.678480] [<ffffffff813a4252>] dump_stack+0x5c/0x7a [ 0.680369] [<ffffffff8118e3fa>] panic+0xd5/0x217 [ 0.682169] [<ffffffff81f56419>] mount_block_root+0x1fe/0x2c0 [ 0.684285] [&l...
2013 Dec 04
5
[PATCH] arm: xen: foreign mapping PTEs are special.
These mappings are in fact special and require special handling in privcmd, which already exists. Failure to mark the PTE as special on arm64 causes all sorts of bad PTE fun. x86 already gets this correct. Signed-off-by: Ian Campbell <ian.campbell@citrix.com> Cc: Stefano Stabellini <stefano.stabellini@eu.citrix.com> Cc: xen-devel@lists.xenproject.org --- arch/arm/xen/enlighten.c |
2017 Dec 13
2
[PATCHv2] virtio_mmio: fix devm cleanup
...c_on_warn set ... > > [ 3.475898] > > [ 3.493933] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.15.0-rc3 #1 > > [ 3.513109] Hardware name: linux,dummy-virt (DT) > > [ 3.525382] Call trace: > > [ 3.531683] dump_backtrace+0x0/0x368 > > [ 3.543921] show_stack+0x20/0x30 > > [ 3.547767] dump_stack+0x108/0x164 > > [ 3.559584] panic+0x25c/0x51c > > [ 3.569184] __warn+0x29c/0x31c > > [ 3.576023] report_bug+0x1d4/0x290 > > [ 3.586069] bug_handler.part.2+0x40/0x100 > > [ 3.597820] bug_handler+0x4c/0x8...
2017 Dec 13
2
[PATCHv2] virtio_mmio: fix devm cleanup
...c_on_warn set ... > > [ 3.475898] > > [ 3.493933] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.15.0-rc3 #1 > > [ 3.513109] Hardware name: linux,dummy-virt (DT) > > [ 3.525382] Call trace: > > [ 3.531683] dump_backtrace+0x0/0x368 > > [ 3.543921] show_stack+0x20/0x30 > > [ 3.547767] dump_stack+0x108/0x164 > > [ 3.559584] panic+0x25c/0x51c > > [ 3.569184] __warn+0x29c/0x31c > > [ 3.576023] report_bug+0x1d4/0x290 > > [ 3.586069] bug_handler.part.2+0x40/0x100 > > [ 3.597820] bug_handler+0x4c/0x8...
2018 Nov 05
1
[Bug 108658] New: gt215 scheduling while atomic warning
..._platform libahci_platform drm_kms_helper libahci libata drm usbcore amd_xgbe scsi_mod libphy CPU: 0 PID: 12 Comm: kworker/0:1 Not tainted 4.20.0-rc1+ #5 Hardware name: AMD Seattle/Seattle, BIOS 20:07:19 Oct 2 2018 Workqueue: events nvkm_pstate_work [nouveau] Call trace: dump_backtrace+0x0/0x1d0 show_stack+0x24/0x30 dump_stack+0x98/0xbc __schedule_bug+0x64/0x80 __schedule+0x818/0x9b8 schedule+0x40/0xa8 gt215_pmu_send+0x274/0x2a8 [nouveau] nvkm_pmu_send+0x60/0x80 [nouveau] nvkm_memx_init+0x5c/0x120 [nouveau] gt215_ram_calc+0x12f8/0x4d58 [nouveau] gt215_ram_calc+0x2a0/0x4d58 [nouveau] nvkm_ps...
2017 Dec 12
2
[PATCH] virtio_mmio: fix devm cleanup
...+0x1b8/0x220 [ 3.475898] Kernel panic - not syncing: panic_on_warn set ... [ 3.475898] [ 3.493933] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.15.0-rc3 #1 [ 3.513109] Hardware name: linux,dummy-virt (DT) [ 3.525382] Call trace: [ 3.531683] dump_backtrace+0x0/0x368 [ 3.543921] show_stack+0x20/0x30 [ 3.547767] dump_stack+0x108/0x164 [ 3.559584] panic+0x25c/0x51c [ 3.569184] __warn+0x29c/0x31c [ 3.576023] report_bug+0x1d4/0x290 [ 3.586069] bug_handler.part.2+0x40/0x100 [ 3.597820] bug_handler+0x4c/0x88 [ 3.608400] brk_handler+0x11c/0x218 [ 3.613430] do...
2017 Dec 12
2
[PATCH] virtio_mmio: fix devm cleanup
...+0x1b8/0x220 [ 3.475898] Kernel panic - not syncing: panic_on_warn set ... [ 3.475898] [ 3.493933] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 4.15.0-rc3 #1 [ 3.513109] Hardware name: linux,dummy-virt (DT) [ 3.525382] Call trace: [ 3.531683] dump_backtrace+0x0/0x368 [ 3.543921] show_stack+0x20/0x30 [ 3.547767] dump_stack+0x108/0x164 [ 3.559584] panic+0x25c/0x51c [ 3.569184] __warn+0x29c/0x31c [ 3.576023] report_bug+0x1d4/0x290 [ 3.586069] bug_handler.part.2+0x40/0x100 [ 3.597820] bug_handler+0x4c/0x88 [ 3.608400] brk_handler+0x11c/0x218 [ 3.613430] do...
2015 Jul 07
2
I can read/write in virtio BLK Device, but I can't run a hello world program in it
...2 ISA Thumb Segment user [ 23.036225] Control: 10c5387d Table: 916f4059 DAC: 00000015 [ 23.040885] CPU: 0 PID: 491 Comm: helloworld_stat Not tainted 3.19.1+ #101 [ 23.043224] Hardware name: ARM-Versatile Express [ 23.045168] [<80012c68>] (unwind_backtrace) from [<80010dc8>] (show_stack+0x10/0x14) [ 23.050392] [<80010dc8>] (show_stack) from [<8030c9d0>] (__do_user_fault.isra.10+0x98/0xa8) [ 23.052687] [<8030c9d0>] (__do_user_fault.isra.10) from [<80017c6c>] (do_page_fault+0x35c/0x3b8) [ 23.055358] [<80017c6c>] (do_page_fault) from [<80008488&...
2015 Jul 07
2
I can read/write in virtio BLK Device, but I can't run a hello world program in it
...2 ISA Thumb Segment user [ 23.036225] Control: 10c5387d Table: 916f4059 DAC: 00000015 [ 23.040885] CPU: 0 PID: 491 Comm: helloworld_stat Not tainted 3.19.1+ #101 [ 23.043224] Hardware name: ARM-Versatile Express [ 23.045168] [<80012c68>] (unwind_backtrace) from [<80010dc8>] (show_stack+0x10/0x14) [ 23.050392] [<80010dc8>] (show_stack) from [<8030c9d0>] (__do_user_fault.isra.10+0x98/0xa8) [ 23.052687] [<8030c9d0>] (__do_user_fault.isra.10) from [<80017c6c>] (do_page_fault+0x35c/0x3b8) [ 23.055358] [<80017c6c>] (do_page_fault) from [<80008488&...