<br><br><div class="gmail_quote">2009/4/16 Carl Worth <span dir="ltr"><<a href="mailto:cworth@cworth.org">cworth@cworth.org</a>></span><br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div class="im">On Thu, 2009-04-16 at 14:35 +0300, Vasily Khoruzhick wrote:<br>
> With latest xf86-video-intel, latest kernel (with patch to enable tiling on<br>
> a17-affected machines), without kms enabled, I've got following message in<br>
> dmesg:<br>
><br>
> BUG: scheduling while atomic: X/8090/0x10000002<br>
<br>
</div>That one sounds like it could be my fault.<br>
<br>
Could you try the following patch to see if it helps:<br>
<br>
<a href="http://lists.freedesktop.org/archives/intel-gfx/2009-April/002008.html" target="_blank">http://lists.freedesktop.org/archives/intel-gfx/2009-April/002008.html</a><br>
<br>
Eric, where are we on getting that patch (or similar fix) pushed out?<br>
<font color="#888888"><br>
-Carl<br>
<br>
</font></blockquote></div>It seems this one helps, but I got following warning on dmesg:<br><br>------------[ cut here ]------------<br>WARNING: at security/security.c:217 security_vm_enough_memory+0x4e/0x50()<br>Hardware name: 0768B9G<br>
Modules linked in: fuse nfs lockd sunrpc jfs scsi_wait_scan ohci1394 ieee1394 usbhid ohci_hcd uhci_hcd usb_storage hid ehci_hcd usbcore sr_mod cdrom sata_via<br>Pid: 3876, comm: khelper Tainted: G       AW  2.6.30-rc1-git7-anarsoul #2<br>
Call Trace:<br> [<c012d187>] ? warn_slowpath+0x87/0xe0<br> [<c0173bfa>] ? get_page_from_freelist+0x2da/0x4f0<br> [<c017410d>] ? __alloc_pages_internal+0xbd/0x480<br> [<c0246d8e>] ? security_vm_enough_memory+0x4e/0x50<br>
 [<c01868b9>] ? expand_downwards+0x119/0x160<br> [<c0186965>] ? find_extend_vma+0x55/0x80<br> [<c01837ef>] ? __get_user_pages+0x6f/0x370<br> [<c019e4bb>] ? get_arg_page+0x4b/0xb0<br> [<c019e5f3>] ? copy_strings+0xd3/0x1a0<br>
 [<c019fd7f>] ? do_execve+0x34f/0x440<br> [<c01017b6>] ? sys_execve+0x46/0x70<br> [<c0102fe1>] ? syscall_call+0x7/0xb<br> [<c010704c>] ? kernel_execve+0x1c/0x30<br> [<c013d7d0>] ? ____call_usermodehelper+0x0/0x130<br>
 [<c013d8e4>] ? ____call_usermodehelper+0x114/0x130<br> [<c013d7d0>] ? ____call_usermodehelper+0x0/0x130<br> [<c010398f>] ? kernel_thread_helper+0x7/0x18<br>---[ end trace f8c12e97bee23748 ]---<br><br>Regards<br>
Vasily<br>