* Karsten Wiese <[EMAIL PROTECTED]> wrote: > Call Trace: > [<c02d320f>] do_page_fault+0x2b9/0x552 > [<c0102f22>] work_resched+0x6/0x20
> The [<c0102f22>] work_resched+0x6/0x20 corresponds to > mov $0xfffff000,%ebp > 0x000001c1 <work_resched+1>: call 0x1c2 <work_resched+2> > 0x000001c6 <work_resched+6>: mov $0xfffff000,%ebp no, it's the call's return address that is work_resched+6. to get a more usable snapshot of what this task is doing you'd need something like SysRq-P output. (that works on PREEMPT_RT only if you enable /proc/sys/kernel/debug_direct_keyboard - but careful, it might break if you generate too many interrupts - i usually only to do the SysRq-P and hope that it doesnt break then.) Ingo - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/