Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 151653 Details for
Bug 235188
2370 xen0 kernel unstable
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
syslog of crashes from FC5 2307 xen0 kernel
bug (text/plain), 18.53 KB, created by
Robert Story
on 2007-04-04 12:39:22 UTC
(
hide
)
Description:
syslog of crashes from FC5 2307 xen0 kernel
Filename:
MIME Type:
Creator:
Robert Story
Created:
2007-04-04 12:39:22 UTC
Size:
18.53 KB
patch
obsolete
>Apr 3 23:10:21 localhost kernel: iret exception: 0000 [#1] >Apr 3 23:10:21 localhost kernel: SMP >Apr 3 23:10:21 localhost kernel: last sysfs file: /class/net/xenbr0/bridge/topology_change_detected >Apr 3 23:10:21 localhost kernel: Modules linked in: iptable_filter ip_tables xt_physdev bridge blktap nfsd exportfs lockd nfs_acl autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns ipt_REJECT ipt_LOG xt_pkttype nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink xt_tcpudp x_tables nls_utf8 loop dm_multipath raid1 video sbs i2c_ec dock button battery asus_acpi backlight ac lp parport_pc parport ehci_hcd uhci_hcd floppy snd_cmipci gameport snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss snd_mixer_oss snd_pcm via_ircc irda snd_page_alloc snd_opl3_lib 8139too crc_ccitt snd_timer 8139cp snd_hwdep snd_mpu401_uart mii e1000 i2c_viapro snd_rawmidi i2c_core ide_cd snd_seq_device snd cdrom soundcore pcspkr dm_snapshot dm_zero dm_mirror dm_mod ext3 jbd ohci1394 ieee1394 >Apr 3 23:10:21 localhost kernel: CPU: 0 >Apr 3 23:10:21 localhost kernel: EIP: 0000:[<00000000>] Not tainted VLI >Apr 3 23:10:21 localhost kernel: EFLAGS: 00000000 (2.6.20-1.2307.fc5xen0 #1) >Apr 3 23:10:21 localhost kernel: EIP is at _stext+0x3effe000/0x14 >Apr 3 23:10:21 localhost kernel: eax: 00000000 ebx: 00fe9402 ecx: 00000073 edx: 00000246 >Apr 3 23:10:21 localhost kernel: esi: bfb267e0 edi: 0000007b ebp: 00000000 esp: ef9a001c >Apr 3 23:10:21 localhost kernel: ds: 0000 es: 0000 ss: 0069 >Apr 3 23:10:21 localhost kernel: Process block (pid: 6744, ti=ef99f000 task=c6fc19f0 task.ti=ef99f000) >Apr 3 23:10:21 localhost kernel: Stack: 00000000 00000000 04000200 0a000000 00000000 00000000 00000000 00000000 >Apr 3 23:10:21 localhost udevd-event[6738]: run_program: '/etc/xen/scripts/block' abnormal exit >Apr 3 23:10:21 localhost kernel: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 >Apr 3 23:10:21 localhost kernel: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 >Apr 3 23:10:22 localhost kernel: Call Trace: >Apr 3 23:10:22 localhost kernel: ======================= >Apr 3 23:10:22 localhost kernel: Code: Bad EIP value. >Apr 3 23:10:22 localhost kernel: EIP: [<00000000>] _stext+0x3effe000/0x14 SS:ESP 0069:ef9a001c >Apr 3 23:10:22 localhost kernel: <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >Apr 3 23:10:22 localhost kernel: in_atomic():0, irqs_disabled():1 >Apr 3 23:10:23 localhost kernel: [<c10339aa>] down_read+0x12/0x28 >Apr 3 23:10:23 localhost kernel: [<c103c052>] acct_collect+0x38/0x13e >Apr 3 23:10:23 localhost kernel: [<c10227e4>] do_exit+0x1b2/0x719 >Apr 3 23:10:23 localhost kernel: [<c1020663>] printk+0x1f/0xa1 >Apr 3 23:10:23 localhost kernel: [<c1005acf>] die+0x20a/0x22f >Apr 3 23:10:23 localhost kernel: [<c10062ab>] do_iret_error+0xa7/0xb1 >Apr 3 23:10:23 localhost kernel: [<c1019e3a>] __might_sleep+0x21/0xc1 >Apr 3 23:10:23 localhost kernel: [<c1004e2a>] restore_nocheck_notrace+0x7/0xf >Apr 3 23:10:23 localhost kernel: [<c1004e2c>] restore_nocheck_notrace+0x9/0xf >Apr 3 23:10:24 localhost kernel: [<c1004e31>] restore_nocheck_notrace+0xe/0xf >Apr 3 23:10:24 localhost kernel: [<c102f487>] search_exception_tables+0x14/0x25 >Apr 3 23:10:24 localhost kernel: [<c101739f>] fixup_exception+0xb/0x20 >Apr 3 23:10:24 localhost kernel: [<c12158e5>] do_general_protection+0x11c/0x16f >Apr 3 23:10:25 localhost kernel: [<c1006879>] do_IRQ+0xc6/0xdd >Apr 3 23:10:25 localhost kernel: [<c12157c9>] do_general_protection+0x0/0x16f >Apr 3 23:10:25 localhost kernel: [<c1006204>] do_iret_error+0x0/0xb1 >Apr 3 23:10:25 localhost kernel: [<c12153cd>] error_code+0x35/0x3c >Apr 3 23:10:25 localhost kernel: ======================= >Apr 3 23:10:25 localhost kernel: BUG: unable to handle kernel paging request at virtual address cc1ad00c >Apr 3 23:10:25 localhost kernel: printing eip: >Apr 3 23:10:25 localhost kernel: c1146397 >Apr 3 23:10:25 localhost kernel: *pde = ma 06029067 pa 00029067 >Apr 3 23:10:25 localhost kernel: *pte = ma 51d4d061 pa 0c1ad061 >Apr 3 23:10:25 localhost kernel: Oops: 0003 [#2] >Apr 3 23:10:25 localhost kernel: SMP >Apr 3 23:10:25 localhost kernel: last sysfs file: /class/net/xenbr0/bridge/topology_change_detected >Apr 3 23:10:25 localhost kernel: Modules linked in: iptable_filter ip_tables xt_physdev bridge blktap nfsd exportfs lockd nfs_acl autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns ipt_REJECT ipt_LOG xt_pkttype nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink xt_tcpudp x_tables nls_utf8 loop dm_multipath raid1 video sbs i2c_ec dock button battery asus_acpi backlight ac lp parport_pc parport ehci_hcd uhci_hcd floppy snd_cmipci gameport snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss snd_mixer_oss snd_pcm via_ircc irda snd_page_alloc snd_opl3_lib 8139too crc_ccitt snd_timer 8139cp snd_hwdep snd_mpu401_uart mii e1000 i2c_viapro snd_rawmidi i2c_core ide_cd snd_seq_device snd cdrom soundcore pcspkr dm_snapshot dm_zero dm_mirror dm_mod ext3 jbd ohci1394 ieee1394 >Apr 3 23:10:25 localhost kernel: CPU: 0 >Apr 3 23:10:25 localhost kernel: EIP: 0061:[<c1146397>] Not tainted VLI >Apr 3 23:10:25 localhost kernel: EFLAGS: 00210017 (2.6.20-1.2307.fc5xen0 #1) >Apr 3 23:10:25 localhost kernel: EIP is at evtchn_do_upcall+0x55/0x97 >Apr 3 23:10:25 localhost kernel: eax: 00000009 ebx: 00000000 ecx: cc1acfe4 edx: ffffffee >Apr 3 23:10:25 localhost kernel: esi: 00000001 edi: fbc16000 ebp: fffffffe esp: cc1acfc4 >Apr 3 23:10:25 localhost kernel: ds: 007b es: 007b ss: 0069 >Apr 3 23:10:25 localhost kernel: Process knotify (pid: 6206, ti=cc1ac000 task=ccd6c0b0 task.ti=cc1ac000) >Apr 3 23:10:25 localhost kernel: Stack: 00000000 00000000 0000000f cc1acfac cc1acfe4 cc1ac000 c1004f92 cc1acfe4 >Apr 3 23:10:25 localhost kernel: 00478402 00000073 00200246 bfe7ff8c 0000007b 00000000 00000000 >Apr 3 23:10:25 localhost kernel: Call Trace: >Apr 3 23:10:25 localhost kernel: [<c1004f92>] hypervisor_callback+0x46/0x50 >Apr 3 23:10:25 localhost kernel: ======================= >Apr 3 23:10:26 localhost kernel: Code: bd fe ff ff ff 88 d9 89 d8 c1 e0 05 d3 c5 89 04 24 eb 29 0f bc c0 03 04 24 8b 14 85 00 a6 2c c1 83 fa ff 74 12 8b 4c 24 1c f7 d2 <89> 51 28 89 c8 e8 12 04 ec ff eb 05 e8 a2 2d 00 00 8b 44 24 04 >Apr 3 23:10:26 localhost kernel: EIP: [<c1146397>] evtchn_do_upcall+0x55/0x97 SS:ESP 0069:cc1acfc4 >Apr 3 23:10:26 localhost kernel: <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >Apr 3 23:10:26 localhost kernel: in_atomic():0, irqs_disabled():1 >Apr 3 23:10:26 localhost kernel: [<c10339aa>] down_read+0x12/0x28 >Apr 3 23:10:27 localhost kernel: [<c103c052>] acct_collect+0x38/0x13e >Apr 3 23:10:27 localhost kernel: [<c10227e4>] do_exit+0x1b2/0x719 >Apr 3 23:10:27 localhost kernel: [<c1020663>] printk+0x1f/0xa1 >Apr 3 23:10:27 localhost kernel: [<c1005acf>] die+0x20a/0x22f >Apr 3 23:10:27 localhost kernel: [<c1216c38>] do_page_fault+0x6da/0x845 >Apr 3 23:10:28 localhost kernel: [<c1042ccf>] audit_syscall_exit+0x294/0x2b0 >Apr 3 23:10:28 localhost kernel: [<c121655e>] do_page_fault+0x0/0x845 >Apr 3 23:10:28 localhost kernel: [<c12153cd>] error_code+0x35/0x3c >Apr 3 23:10:28 localhost kernel: [<c1146397>] evtchn_do_upcall+0x55/0x97 >Apr 3 23:10:28 localhost kernel: [<c1004f92>] hypervisor_callback+0x46/0x50 >Apr 3 23:10:28 localhost kernel: ======================= >Apr 3 23:10:30 localhost kernel: no vm86_info: BAD >Apr 3 23:11:46 localhost kernel: BUG: unable to handle kernel paging request at virtual address f0df000c >Apr 3 23:11:46 localhost kernel: printing eip: >Apr 3 23:11:46 localhost kernel: c1146397 >Apr 3 23:11:46 localhost kernel: *pde = ma 060bc067 pa 000bc067 >Apr 3 23:11:46 localhost kernel: *pte = ma 7690a061 pa 30df0061 >Apr 3 23:11:46 localhost kernel: Oops: 0003 [#3] >Apr 3 23:11:46 localhost kernel: SMP >Apr 3 23:11:46 localhost kernel: last sysfs file: /class/net/xenbr0/bridge/topology_change_detected >Apr 3 23:11:46 localhost kernel: Modules linked in: iptable_filter ip_tables xt_physdev bridge blktap nfsd exportfs lockd nfs_acl autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns ipt_REJECT ipt_LOG xt_pkttype nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink xt_tcpudp x_tables nls_utf8 loop dm_multipath raid1 video sbs i2c_ec dock button battery asus_acpi backlight ac lp parport_pc parport ehci_hcd uhci_hcd floppy snd_cmipci gameport snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss snd_mixer_oss snd_pcm via_ircc irda snd_page_alloc snd_opl3_lib 8139too crc_ccitt snd_timer 8139cp snd_hwdep snd_mpu401_uart mii e1000 i2c_viapro snd_rawmidi i2c_core ide_cd snd_seq_device snd cdrom soundcore pcspkr dm_snapshot dm_zero dm_mirror dm_mod ext3 jbd ohci1394 ieee1394 >Apr 3 23:11:46 localhost kernel: CPU: 0 >Apr 3 23:11:46 localhost kernel: EIP: 0061:[<c1146397>] Not tainted VLI >Apr 3 23:11:46 localhost kernel: EFLAGS: 00190013 (2.6.20-1.2307.fc5xen0 #1) >Apr 3 23:11:46 localhost kernel: EIP is at evtchn_do_upcall+0x55/0x97 >Apr 3 23:11:46 localhost kernel: eax: 00000018 ebx: 00000000 ecx: f0deffe4 edx: ffffffed >Apr 3 23:11:46 localhost kernel: esi: 00000001 edi: fbc16000 ebp: fffffffe esp: f0deffc4 >Apr 3 23:11:46 localhost kernel: ds: 007b es: 007b ss: 0069 >Apr 3 23:11:46 localhost kernel: Process rsync (pid: 6877, ti=f0def000 task=f011f220 task.ti=f0def000) >Apr 3 23:11:46 localhost kernel: Stack: 00000000 00000000 00000003 f0deffac f0deffe4 f0def000 c1004f92 f0deffe4 >Apr 3 23:11:47 localhost kernel: 009b5402 00000073 00180246 bf9c85d4 0000007b 00000000 00000000 >Apr 3 23:11:47 localhost kernel: Call Trace: >Apr 3 23:11:47 localhost kernel: [<c1004f92>] hypervisor_callback+0x46/0x50 >Apr 3 23:11:47 localhost kernel: ======================= >Apr 3 23:11:47 localhost kernel: Code: bd fe ff ff ff 88 d9 89 d8 c1 e0 05 d3 c5 89 04 24 eb 29 0f bc c0 03 04 24 8b 14 85 00 a6 2c c1 83 fa ff 74 12 8b 4c 24 1c f7 d2 <89> 51 28 89 c8 e8 12 04 ec ff eb 05 e8 a2 2d 00 00 8b 44 24 04 >Apr 3 23:11:47 localhost kernel: EIP: [<c1146397>] evtchn_do_upcall+0x55/0x97 SS:ESP 0069:f0deffc4 >Apr 3 23:11:47 localhost kernel: <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >Apr 3 23:11:47 localhost kernel: in_atomic():0, irqs_disabled():1 >Apr 3 23:11:47 localhost kernel: [<c10339aa>] down_read+0x12/0x28 >Apr 3 23:11:47 localhost kernel: [<c103c052>] acct_collect+0x38/0x13e >Apr 3 23:11:48 localhost kernel: [<c10227e4>] do_exit+0x1b2/0x719 >Apr 3 23:11:48 localhost kernel: [<c1020663>] printk+0x1f/0xa1 >Apr 3 23:11:48 localhost kernel: [<c1005acf>] die+0x20a/0x22f >Apr 3 23:11:48 localhost kernel: [<c1216c38>] do_page_fault+0x6da/0x845 >Apr 3 23:11:48 localhost kernel: [<c1042ccf>] audit_syscall_exit+0x294/0x2b0 >Apr 3 23:11:48 localhost kernel: [<c121655e>] do_page_fault+0x0/0x845 >Apr 3 23:11:48 localhost kernel: [<c12153cd>] error_code+0x35/0x3c >Apr 3 23:11:48 localhost kernel: [<c1146397>] evtchn_do_upcall+0x55/0x97 >Apr 3 23:11:48 localhost kernel: [<c1004f92>] hypervisor_callback+0x46/0x50 >Apr 3 23:11:48 localhost kernel: ======================= > > >Apr 3 23:42:04 localhost kernel: iret exception: 0000 [#1] >Apr 3 23:42:04 localhost kernel: SMP >Apr 3 23:42:04 localhost kernel: last sysfs file: /class/xen/blktap0/dev >Apr 3 23:42:04 localhost kernel: Modules linked in: bridge blktap nfsd exportfs lockd nfs_acl autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns ipt_REJECT ipt_LOG xt_pkttype nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink xt_tcpudp iptable_filter ip_tables x_tables nls_utf8 loop dm_multipath raid1 video sbs i2c_ec dock button battery asus_acpi backlight ac lp parport_pc parport uhci_hcd ehci_hcd floppy snd_cmipci gameport snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss snd_mixer_oss snd_pcm 8139too e1000 8139cp ide_cd cdrom via_ircc pcspkr mii irda crc_ccitt i2c_viapro snd_page_alloc i2c_core snd_opl3_lib snd_timer snd_hwdep snd_mpu401_uart snd_rawmidi snd_seq_device snd soundcore dm_snapshot dm_zero dm_mirror dm_mod ext3 jbd ohci1394 ieee1394 >Apr 3 23:42:04 localhost kernel: CPU: 0 >Apr 3 23:42:04 localhost kernel: EIP: 0000:[<00000000>] Not tainted VLI >Apr 3 23:42:04 localhost kernel: EFLAGS: 00000000 (2.6.20-1.2307.fc5xen0 #1) >Apr 3 23:42:04 localhost kernel: EIP is at _stext+0x3effe000/0x14 >Apr 3 23:42:04 localhost kernel: eax: 00000000 ebx: 002b7402 ecx: 00000073 edx: 00200246 >Apr 3 23:42:04 localhost kernel: esi: bfef43c4 edi: 0000007b ebp: 00000000 esp: efa0801c >Apr 3 23:42:04 localhost kernel: ds: 0000 es: 0000 ss: 0069 >Apr 3 23:42:04 localhost kernel: Process kicker (pid: 4074, ti=efa07000 task=e58ea270 task.ti=efa07000) >Apr 3 23:42:04 localhost kernel: Stack: 00000000 e5c70000 f3ffd548 00000060 efa08060 00000003 ffffffff 00000000 >Apr 3 23:42:04 localhost kernel: 00000001 00000002 ffffffff 00000000 00000000 00000000 00000000 00000000 >Apr 3 23:42:04 localhost kernel: 00000000 00000001 00000000 00000000 00000000 00000000 00000000 05a14e80 >Apr 3 23:42:04 localhost kernel: Call Trace: >Apr 3 23:42:04 localhost kernel: general protection fault: 0000 [#2] >Apr 3 23:42:04 localhost kernel: SMP >Apr 3 23:42:04 localhost kernel: last sysfs file: /class/xen/blktap0/dev >Apr 3 23:42:04 localhost kernel: Modules linked in: bridge blktap nfsd exportfs lockd nfs_acl autofs4 hidp rfcomm l2cap bluetooth sunrpc nf_conntrack_netbios_ns ipt_REJECT ipt_LOG xt_pkttype nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink xt_tcpudp iptable_filter ip_tables x_tables nls_utf8 loop dm_multipath raid1 video sbs i2c_ec dock button battery asus_acpi backlight ac lp parport_pc parport uhci_hcd ehci_hcd floppy snd_cmipci gameport snd_seq_dummy snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss snd_mixer_oss snd_pcm 8139too e1000 8139cp ide_cd cdrom via_ircc pcspkr mii irda crc_ccitt i2c_viapro snd_page_alloc i2c_core snd_opl3_lib snd_timer snd_hwdep snd_mpu401_uart snd_rawmidi snd_seq_device snd soundcore dm_snapshot dm_zero dm_mirror dm_mod ext3 jbd ohci1394 ieee1394 >Apr 3 23:42:04 localhost kernel: CPU: 0 >Apr 3 23:42:04 localhost kernel: EIP: 0061:[<c1005571>] Not tainted VLI >Apr 3 23:42:04 localhost kernel: EFLAGS: 00210046 (2.6.20-1.2307.fc5xen0 #1) >Apr 3 23:42:04 localhost kernel: EIP is at dump_trace+0x6b/0x93 >Apr 3 23:42:04 localhost kernel: eax: 00000000 ebx: ffffffff ecx: c12af4e0 edx: c1282f5b >Apr 3 23:42:04 localhost kernel: esi: 00000000 edi: fffff000 ebp: c125b39e esp: efa07e7c >Apr 3 23:42:04 localhost kernel: ds: 007b es: 007b ss: 0069 >Apr 3 23:42:04 localhost kernel: Process kicker (pid: 4074, ti=efa07000 task=e58ea270 task.ti=efa07000) >Apr 3 23:42:04 localhost kernel: Stack: c125b25e c125b39e 00000018 00000000 c125b39e c10055b1 c12af4e0 c125b39e >Apr 3 23:42:04 localhost kernel: efa0807f c1005660 c125b39e c125b39e efa07fe4 efa0801c 00000002 00000000 >Apr 3 23:42:04 localhost kernel: efa07fe4 efa0801c c10057f6 c125b39e 00000010 e58ea41c 00000fea efa07000 >Apr 3 23:42:04 localhost kernel: Call Trace: >Apr 3 23:42:04 localhost kernel: [<c10055b1>] show_trace_log_lvl+0x18/0x2c >Apr 3 23:42:04 localhost kernel: [<c1005660>] show_stack_log_lvl+0x9b/0xa3 >Apr 3 23:42:04 localhost kernel: [<c10057f6>] show_registers+0x18e/0x25d >Apr 3 23:42:04 localhost kernel: [<c1216dbc>] notifier_call_chain+0x19/0x29 >Apr 3 23:42:04 localhost kernel: [<c10059f8>] die+0x133/0x22f >Apr 3 23:42:04 localhost kernel: [<c10062ab>] do_iret_error+0xa7/0xb1 >Apr 3 23:42:04 localhost kernel: [<c100670c>] do_softirq+0x1f/0xc6 >Apr 3 23:42:04 localhost kernel: [<c1004e31>] restore_nocheck_notrace+0xe/0xf >Apr 3 23:42:04 localhost kernel: [<c102f487>] search_exception_tables+0x14/0x25 >Apr 3 23:42:04 localhost kernel: [<c101739f>] fixup_exception+0xb/0x20 >Apr 3 23:42:04 localhost kernel: [<c12158e5>] do_general_protection+0x11c/0x16f >Apr 3 23:42:04 localhost kernel: [<c1006879>] do_IRQ+0xc6/0xdd >Apr 3 23:42:04 localhost kernel: [<c11463a1>] evtchn_do_upcall+0x5f/0x97 >Apr 3 23:42:04 localhost kernel: [<c12157c9>] do_general_protection+0x0/0x16f >Apr 3 23:42:04 localhost kernel: [<c1006204>] do_iret_error+0x0/0xb1 >Apr 3 23:42:04 localhost kernel: [<c12153cd>] error_code+0x35/0x3c >Apr 3 23:42:04 localhost kernel: ======================= >Apr 3 23:42:04 localhost kernel: Code: 8b 4c 24 18 89 f2 89 e8 ff 51 08 83 c3 04 39 fb 76 29 8d 87 fd 0f 00 00 39 c3 73 1f 8b 33 89 f0 e8 e5 9e 02 00 85 c0 74 e2 eb d5 <8b> 4f 34 85 c9 74 1b 89 cb e8 22 db 00 00 eb bb 8b 4c 24 18 ba >Apr 3 23:42:04 localhost kernel: EIP: [<c1005571>] dump_trace+0x6b/0x93 SS:ESP 0069:efa07e7c >Apr 3 23:42:04 localhost kernel: <3>BUG: sleeping function called from invalid context at kernel/rwsem.c:20 >Apr 3 23:42:04 localhost kernel: in_atomic():0, irqs_disabled():1 >Apr 3 23:42:04 localhost kernel: [<c10339aa>] down_read+0x12/0x28 >Apr 3 23:42:04 localhost kernel: [<c103c052>] acct_collect+0x38/0x13e >Apr 3 23:42:04 localhost kernel: [<c10227e4>] do_exit+0x1b2/0x719 >Apr 3 23:42:04 localhost kernel: [<c1020663>] printk+0x1f/0xa1 >Apr 3 23:42:04 localhost kernel: [<c1005acf>] die+0x20a/0x22f >Apr 3 23:42:04 localhost kernel: [<c1215931>] do_general_protection+0x168/0x16f >Apr 3 23:42:04 localhost kernel: [<c102063a>] vprintk+0x2de/0x2e8 >Apr 3 23:42:04 localhost kernel: [<c12157c9>] do_general_protection+0x0/0x16f >Apr 3 23:42:04 localhost kernel: [<c12153cd>] error_code+0x35/0x3c >Apr 3 23:42:04 localhost kernel: [<c1005571>] dump_trace+0x6b/0x93 >Apr 3 23:42:04 localhost kernel: [<c10055b1>] show_trace_log_lvl+0x18/0x2c >Apr 3 23:42:04 localhost kernel: [<c1005660>] show_stack_log_lvl+0x9b/0xa3 >Apr 3 23:42:04 localhost kernel: [<c10057f6>] show_registers+0x18e/0x25d >Apr 3 23:42:04 localhost kernel: [<c1216dbc>] notifier_call_chain+0x19/0x29 >Apr 3 23:42:04 localhost kernel: [<c10059f8>] die+0x133/0x22f >Apr 3 23:42:04 localhost kernel: [<c10062ab>] do_iret_error+0xa7/0xb1 >Apr 3 23:42:04 localhost kernel: [<c100670c>] do_softirq+0x1f/0xc6 >Apr 3 23:42:04 localhost kernel: [<c1004e31>] restore_nocheck_notrace+0xe/0xf >Apr 3 23:42:04 localhost kernel: [<c102f487>] search_exception_tables+0x14/0x25 >Apr 3 23:42:04 localhost kernel: [<c101739f>] fixup_exception+0xb/0x20 >Apr 3 23:42:04 localhost kernel: [<c12158e5>] do_general_protection+0x11c/0x16f >Apr 3 23:42:04 localhost kernel: [<c1006879>] do_IRQ+0xc6/0xdd >Apr 3 23:42:04 localhost kernel: [<c11463a1>] evtchn_do_upcall+0x5f/0x97 >Apr 3 23:42:04 localhost kernel: [<c12157c9>] do_general_protection+0x0/0x16f >Apr 3 23:42:04 localhost kernel: [<c1006204>] do_iret_error+0x0/0xb1 >Apr 3 23:42:04 localhost kernel: [<c12153cd>] error_code+0x35/0x3c >Apr 3 23:42:04 localhost kernel: =======================
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 235188
: 151653