Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261816AbVBIM4s (ORCPT ); Wed, 9 Feb 2005 07:56:48 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261817AbVBIM4r (ORCPT ); Wed, 9 Feb 2005 07:56:47 -0500 Received: from mummy.ncsc.mil ([144.51.88.129]:10401 "EHLO jazzhorn.ncsc.mil") by vger.kernel.org with ESMTP id S261816AbVBIM4o (ORCPT ); Wed, 9 Feb 2005 07:56:44 -0500 Subject: Re: [patch] Real-Time Preemption, -RT-2.6.11-rc3-V0.7.38-01 From: Stephen Smalley To: William Weston Cc: Ingo Molnar , lkml , James Morris In-Reply-To: References: <20050204100347.GA13186@elte.hu> Content-Type: text/plain Organization: National Security Agency Message-Id: <1107953301.17568.6.camel@moss-spartans.epoch.ncsc.mil> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.6 (1.4.6-2) Date: Wed, 09 Feb 2005 07:48:21 -0500 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2196 Lines: 56 On Tue, 2005-02-08 at 16:58, William Weston wrote: > Hi Ingo, > > Great work on the -RT kernel! Here's a status report from my Athlon box > w/ kernel -RT-2.6.11-rc3-V0.7.38-03, realtime-lsm-0.8.5, jack-0.99.48, > alsa-1.0.8, and latencytest-0.5.5: > A couple BUGs are being logged (see below), but without any ill effect > other than taking up space on my /var. > Network interface (via rhine) startup triggers these two BUGs: > > BUG: sleeping function called from invalid context ksoftirqd/0(2) at > kernel/rt.c:1448 > in_atomic():1 [00000001], irqs_disabled():0 > [] dump_stack+0x17/0x20 (12) > [] __might_sleep+0xd9/0xf0 (40) > [] __spin_lock+0x36/0x50 (24) > [] kmem_cache_alloc+0x34/0x120 (44) > [] sel_netif_lookup+0x63/0x150 (28) > [] sel_netif_sids+0x2d/0xb0 (28) > [] selinux_socket_sock_rcv_skb+0xac/0x230 (144) I'm not sure I understand, as sel_netif_lookup passes GFP_ATOMIC to kmalloc. > [] udp_queue_rcv_skb+0xb8/0x280 (28) > [] udp_rcv+0x192/0x3e0 (100) > [] ip_local_deliver+0x64/0x1c0 (32) > [] ip_rcv+0x215/0x3f0 (56) > [] netif_receive_skb+0x12c/0x160 (40) > [] process_backlog+0x7e/0x110 (32) > [] net_rx_action+0x72/0x130 (24) > [] ___do_softirq+0x48/0xd0 (40) > [] _do_softirq+0x1b/0x30 (8) > [] ksoftirqd+0xa0/0xf0 (28) > [] kthread+0x8b/0xc0 (36) > [] kernel_thread_helper+0x5/0x10 (537116692) > --------------------------- > | preempt count: 00000002 ] > | 2-level deep critical section nesting: > ---------------------------------------- > .. [] .... __do_IRQ+0xef/0x180 > .....[] .. ( <= do_IRQ+0x56/0xa0) > .. [] .... print_traces+0x10/0x40 > .....[] .. ( <= dump_stack+0x17/0x20) -- Stephen Smalley National Security Agency - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/