Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 148255 Details for
Bug 229100
Kernel 2932 dump and work around
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
dmesg dump txt
k2932dumpdmesg.txt (text/plain), 4.42 KB, created by
Darwin H. Webb
on 2007-02-17 01:03:19 UTC
(
hide
)
Description:
dmesg dump txt
Filename:
MIME Type:
Creator:
Darwin H. Webb
Created:
2007-02-17 01:03:19 UTC
Size:
4.42 KB
patch
obsolete
>#dump from dmesg for kernel 2932 feb 16th. >#DHW > > >SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts >audit(1171644080.420:3): policy loaded auid=4294967295 >sd 0:0:0:0: Attached scsi generic sg0 type 0 >sd 0:0:1:0: Attached scsi generic sg1 type 0 >scsi 1:0:0:0: Attached scsi generic sg2 type 5 >sd 4:0:0:0: Attached scsi generic sg3 type 0 >sd 4:0:0:1: Attached scsi generic sg4 type 0 >sd 4:0:0:2: Attached scsi generic sg5 type 0 >sd 4:0:0:3: Attached scsi generic sg6 type 0 >Floppy drive(s): fd0 is 1.44M >BUG: unable to handle kernel NULL pointer dereference at virtual address 00000000 > printing eip: >bfa70353 >*pde = 3f7da067 >Oops: 0002 [#1] >SMP >last sysfs file: /block/sda/removable >Modules linked in: floppy sg dm_snapshot dm_zero dm_mirror dm_mod usb_storage ata_generic ata_piix libata sd_mod scsi_mod ext3 jbd mbcache ehci_hcd ohci_hcd uhci_hcd >CPU: 1 >EIP: 0060:[<bfa70353>] Not tainted VLI >EFLAGS: 00210282 (2.6.20-1.2932.fc7 #1) >EIP is at 0xbfa70353 >eax: f6dac4dc ebx: 00000000 ecx: 00000000 edx: 00000000 >esi: f6dac4dc edi: f6ced9d4 ebp: c1e12e84 esp: c1e12e64 >ds: 007b es: 007b ss: 0068 >Process udevd (pid: 650, ti=c1e12000 task=c1fa4030 task.ti=c1e12000) >Stack: c05a8f10 f7c81080 f6ced9d4 00000001 f6ced9d4 c1e12e8c c062b120 00000000 > c1e12e8c c05a8f45 c1e12ecc c0607550 c1e12ecc c1e12eb8 c1e12ed8 f6ce3cb8 > 00000021 0000006e f6cedc9c f6dac4dc 7fffffff fffffffe c1e12ecc c062b120 >Call Trace: > [<c04051c9>] show_trace_log_lvl+0x1a/0x2f > [<c0405279>] show_stack_log_lvl+0x9b/0xa3 > [<c0405415>] show_registers+0x194/0x26a > [<c0405618>] die+0x12d/0x242 > [<c06118f7>] do_page_fault+0x3ee/0x4ba > [<c06100f4>] error_code+0x7c/0x84 > [<c05a8f45>] kfree_skb+0x2e/0x30 > [<c0607550>] unix_stream_connect+0x36a/0x38e > [<c05a4aa8>] sys_connect+0x6a/0x89 > [<c05a5185>] sys_socketcall+0xa7/0x241 > [<c0404058>] syscall_call+0x7/0xb > ======================= >Code: Bad EIP value. >EIP: [<bfa70353>] 0xbfa70353 SS:ESP 0068:c1e12e64 >BUG: unable to handle kernel paging request at virtual address fb99f0ee > printing eip: >bfc63263 >*pde = 00000000 >Oops: 0002 [#2] >SMP >last sysfs file: /block/sda/removable >Modules linked in: floppy sg dm_snapshot dm_zero dm_mirror dm_mod usb_storage ata_generic ata_piix libata sd_mod scsi_mod ext3 jbd mbcache ehci_hcd ohci_hcd uhci_hcd >CPU: 0 >EIP: 0060:[<bfc63263>] Not tainted VLI >EFLAGS: 00210203 (2.6.20-1.2932.fc7 #1) >EIP is at 0xbfc63263 >eax: f6da2abc ebx: 00000000 ecx: 00000000 edx: 00000000 >esi: f6da2abc edi: f73e968c ebp: f6fa1e84 esp: f6fa1e64 >ds: 007b es: 007b ss: 0068 >Process vol_id (pid: 661, ti=f6fa1000 task=f6f9cac0 task.ti=f6fa1000) >Stack: c05a8f10 f7c81080 f73e968c 00000001 f73e968c f6fa1e8c c062b120 00000000 > f6fa1e8c c05a8f45 f6fa1ecc c0607550 f6fa1ecc f6fa1eb8 f6fa1ed8 f7e902b8 > 00000017 0000006e f73e9954 f6da2abc 00000000 fffffffe f6fa1ecc c062b120 >Call Trace: > [<c04051c9>] show_trace_log_lvl+0x1a/0x2f > [<c0405279>] show_stack_log_lvl+0x9b/0xa3 > [<c0405415>] show_registers+0x194/0x26a > [<c0405618>] die+0x12d/0x242 > [<c06118f7>] do_page_fault+0x3ee/0x4ba > [<c06100f4>] error_code+0x7c/0x84 > [<c05a8f45>] kfree_skb+0x2e/0x30 > [<c0607550>] unix_stream_connect+0x36a/0x38e > [<c05a4aa8>] sys_connect+0x6a/0x89 > [<c05a5185>] sys_socketcall+0xa7/0x241 > [<c0404058>] syscall_call+0x7/0xb > ======================= >Code: Bad EIP value. >EIP: [<bfc63263>] 0xbfc63263 SS:ESP 0068:f6fa1e64 >BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >in_atomic():0, irqs_disabled():1 >1 lock held by vol_id/661: > #0: (&mm->mmap_sem){----}, at: [<c061165b>] do_page_fault+0x152/0x4ba >irq event stamp: 1201 >hardirqs last enabled at (1201): [<c04040a0>] restore_nocheck+0x12/0x15 >hardirqs last disabled at (1200): [<c0404a30>] common_interrupt+0x24/0x34 >softirqs last enabled at (1198): [<c042c0f3>] __do_softirq+0xdc/0xe2 >softirqs last disabled at (1191): [<c04063b2>] do_softirq+0x61/0xd0 > [<c04051c9>] show_trace_log_lvl+0x1a/0x2f > [<c040576e>] show_trace+0x12/0x14 > [<c04057f2>] dump_stack+0x16/0x18 > [<c0421209>] __might_sleep+0xc9/0xcf > [<c043b445>] down_read+0x18/0x51 > [<c044c53a>] acct_collect+0x3b/0x145 > [<c0429fc9>] do_exit+0x1ca/0x70c > [<c0405707>] die+0x21c/0x242 > [<c06118f7>] do_page_fault+0x3ee/0x4ba > [<c06100f4>] error_code+0x7c/0x84 > [<c05a8f45>] kfree_skb+0x2e/0x30 > [<c0607550>] unix_stream_connect+0x36a/0x38e > [<c05a4aa8>] sys_connect+0x6a/0x89 > [<c05a5185>] sys_socketcall+0xa7/0x241 > [<c0404058>] syscall_call+0x7/0xb > ======================= >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 229100
: 148255 |
148422
|
148423
|
148731