netstat generate this: 
Debug: sleeping function called from illegal context at
include/linux/rwsem.h:43
Call Trace:
 [<c0117fe0>] do_page_fault+0x0/0x4c7
 [<c011b9bb>] __might_sleep+0x5b/0x5d
 [<c017a85b>] proc_get_inode+0x12b/0x150
 [<c0118061>] do_page_fault+0x81/0x4c7
 [<c015d950>] real_lookup+0xe0/0x110
 [<c0117fe0>] do_page_fault+0x0/0x4c7
 [<c0109dad>] error_code+0x2d/0x38
 [<c0117fe0>] do_page_fault+0x0/0x4c7
 [<c0109dad>] error_code+0x2d/0x38
 [<c013d4a9>] kfree+0x39/0x70
 [<c016e1a3>] seq_release_private+0x23/0x3f
 [<c015186e>] __fput+0xfe/0x110
 [<c014ffeb>] filp_close+0x4b/0x80
 [<c015007f>] sys_close+0x5f/0x70
 [<c0109343>] syscall_call+0x7/0xb
Unable to handle kernel paging request at virtual address 01000000
 printing eip:
c013d4a9
*pde = 00000000
Oops: 0000 [#1]
CPU:    0
EIP:    0060:[<c013d4a9>]    Not tainted
EFLAGS: 00010086
EIP is at kfree+0x39/0x70
eax: 00000000   ebx: f701e540   ecx: c0d033c0   edx: 01000000
esi: 00000100   edi: 00000206   ebp: f68b1f50   esp: f68b1f3c
ds: 007b   es: 007b   ss: 0068
Process netstat (pid: 1253, threadinfo=f68b0000 task=cd410d00)
Stack: f55c6664 f55c6658 f701e540 c0d033c0 ccbbd090 f68b1f6c c016e1a3 00000100 
       00000000 c0d033c0 f7fe7a00 ccbbd090 f68b1f8c c015186e ccbbd090 c0d033c0 
       e5ac3500 c0d033c0 c0dfa740 00000000 f68b1fa8 c014ffeb c0d033c0 c0dfa740 
Call Trace:
 [<c016e1a3>] seq_release_private+0x23/0x3f
 [<c015186e>] __fput+0xfe/0x110
 [<c014ffeb>] filp_close+0x4b/0x80
 [<c015007f>] sys_close+0x5f/0x70
 [<c0109343>] syscall_call+0x7/0xb
Code: 8b 1c 82 8b 03 3b 43 04 73 13 89 74 83 10 ff 03 57 9d 8b 5d 
-- Jarosław Bekas PolCard S.A. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/