Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 154599 Details for
Bug 188140
Hard lockup using both USB and/or FireWire external HDs w/haldaemon on
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
syslog record of crash of 2.6.20-1.2944.fc6xen
20070811.crash (text/plain), 6.00 KB, created by
Mike Pope
on 2007-05-13 03:47:55 UTC
(
hide
)
Description:
syslog record of crash of 2.6.20-1.2944.fc6xen
Filename:
MIME Type:
Creator:
Mike Pope
Created:
2007-05-13 03:47:55 UTC
Size:
6.00 KB
patch
obsolete
>May 11 08:25:02 malbec kernel: iret exception: 0000 [#1] >May 11 08:25:02 malbec kernel: SMP >May 11 08:25:02 malbec kernel: last sysfs file: /devices/pci0000:00/0000:00:00.0 >/irq >May 11 08:25:02 malbec kernel: Modules linked in: loop vfat fat snd_seq_midi bri >dge netloop netbk blktap blkbk nfsd exportfs lockd nfs_acl autofs4 sunrpc ipt_LO >G nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink iptable_filter ip_tables ip6 >t_LOG xt_tcpudp xt_limit ip6table_filter ip6_tables x_tables ipv6 dm_multipath p >arport_pc lp parport zl10353 mt352 floppy sg snd_emu10k1_synth snd_emux_synth sn >d_seq_virmidi snd_seq_midi_emul snd_emu10k1 snd_ac97_codec ac97_bus snd_seq_dumm >y pcspkr snd_usb_audio snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss ohci13 >94 ieee1394 snd_mixer_oss snd_pcm i2c_piix4 snd_usb_lib e100 mii emu10k1_gp snd_ >rawmidi snd_timer snd_page_alloc snd_util_mem snd_seq_device snd_hwdep snd sound >core gameport serio_raw dvb_usb_cxusb dvb_usb dvb_core dvb_pll ide_cd cdrom i2c_ >core dm_snapshot dm_zero dm_mirror dm_mod usb_storage aic7xxx scsi_transport_spi > ata_piix libata sd_mod scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd >May 11 08:25:02 malbec kernel: CPU: 0 >May 11 08:25:02 malbec kernel: EIP: 0000:[<00000000>] Not tainted VLI >May 11 08:25:02 malbec kernel: EFLAGS: 00000050 (2.6.20-1.2944.fc6xen #1) >May 11 08:25:02 malbec kernel: EIP is at 0x0 >May 11 08:25:02 malbec kernel: eax: 00000000 ebx: 41fd1a87 ecx: 00000073 e >dx: 00210202 >May 11 08:25:02 malbec kernel: esi: bfec53c0 edi: 0000007b ebp: 00000000 e >sp: c862f01c >May 11 08:25:02 malbec kernel: ds: 0000 es: 0000 ss: 0069 >May 11 08:25:02 malbec kernel: Process amarokapp (pid: 28202, ti=c862e000 task=d >59196f0 task.ti=c862e000) >May 11 08:25:02 malbec kernel: Stack: 00000020 08ec50d0 00000000 08ec50d8 000000 >01 08ec4fd0 08ef9768 00000070 >May 11 08:25:02 malbec kernel: 00000020 08ec50f0 08ec50f8 08ec51b0 000000 >01 4368d2c8 08ef9b00 000025c8 >May 11 08:25:03 malbec kernel: 00000028 08e8ecc8 00640000 00000000 000000 >00 00000000 ffffffff 00000000 >May 11 08:25:03 malbec kernel: Call Trace: >May 11 08:25:03 malbec kernel: BUG: unable to handle kernel paging request at vi >rtual address 08ef9768 >May 11 08:25:03 malbec kernel: printing eip: >May 11 08:25:03 malbec kernel: c04055c2 >May 11 08:25:03 malbec kernel: 16d65000 -> *pde = 00000000:23313001 >May 11 08:25:03 malbec kernel: 07913000 -> *pme = 00000000:040a1067 >May 11 08:25:03 malbec kernel: 06aa1000 -> *pte = 00000000:00000000 >May 11 08:25:03 malbec kernel: Oops: 0000 [#2] >May 11 08:25:03 malbec kernel: SMP >May 11 08:25:03 malbec kernel: last sysfs file: /devices/pci0000:00/0000:00:00.0 >/irq >May 11 08:25:03 malbec kernel: Modules linked in: loop vfat fat snd_seq_midi bri >dge netloop netbk blktap blkbk nfsd exportfs lockd nfs_acl autofs4 sunrpc ipt_LO >G nf_conntrack_ipv4 xt_state nf_conntrack nfnetlink iptable_filter ip_tables ip6 >t_LOG xt_tcpudp xt_limit ip6table_filter ip6_tables x_tables ipv6 dm_multipath p >arport_pc lp parport zl10353 mt352 floppy sg snd_emu10k1_synth snd_emux_synth sn >d_seq_virmidi snd_seq_midi_emul snd_emu10k1 snd_ac97_codec ac97_bus snd_seq_dumm >y pcspkr snd_usb_audio snd_seq_oss snd_seq_midi_event snd_seq snd_pcm_oss ohci13 >94 ieee1394 snd_mixer_oss snd_pcm i2c_piix4 snd_usb_lib e100 mii emu10k1_gp snd_ >rawmidi snd_timer snd_page_alloc snd_util_mem snd_seq_device snd_hwdep snd sound >core gameport serio_raw dvb_usb_cxusb dvb_usb dvb_core dvb_pll ide_cd cdrom i2c_ >core dm_snapshot dm_zero dm_mirror dm_mod usb_storage aic7xxx scsi_transport_spi > ata_piix libata sd_mod scsi_mod ext3 jbd ehci_hcd ohci_hcd uhci_hcd >May 11 08:25:03 malbec kernel: CPU: 0 >May 11 08:25:03 malbec kernel: EIP: 0061:[<c04055c2>] Not tainted VLI >May 11 08:25:03 malbec kernel: EFLAGS: 00210093 (2.6.20-1.2944.fc6xen #1) >May 11 08:25:03 malbec kernel: EIP is at dump_trace+0x5c/0x93 >May 11 08:25:03 malbec kernel: eax: 08ef9ffd ebx: 08ef9768 ecx: 084da8ec e >dx: 00cd1700 >May 11 08:25:03 malbec kernel: esi: 00000000 edi: 08ef9000 ebp: c0693e66 e >sp: c862ee7c >May 11 08:25:03 malbec kernel: ds: 007b es: 007b ss: 0069 >May 11 08:25:03 malbec kernel: Process amarokapp (pid: 28202, ti=c862e000 task=d >59196f0 task.ti=c862e000) >May 11 08:25:03 malbec kernel: Stack: c0693d26 c0693e66 00000018 00000000 c0693e >66 c0405611 c06e44e0 c0693e66 >May 11 08:25:03 malbec kernel: c862f07f c04056c0 c0693e66 c0693e66 c862ef >e4 c862f01c 00000002 00000050 >May 11 08:25:03 malbec kernel: c862efe4 c862f01c c0405856 c0693e66 000000 >10 d5919884 00006e2a c862e000 >May 11 08:25:03 malbec kernel: Call Trace: >May 11 08:25:03 malbec kernel: [<c0405611>] show_trace_log_lvl+0x18/0x2c >May 11 08:25:03 malbec kernel: [<c04056c0>] show_stack_log_lvl+0x9b/0xa3 >May 11 08:25:03 malbec kernel: [<c0405856>] show_registers+0x18e/0x25d >May 11 08:25:03 malbec kernel: [<c0613b05>] notifier_call_chain+0x19/0x29 >May 11 08:25:03 malbec kernel: [<c0405a58>] die+0x133/0x22f >May 11 08:25:03 malbec kernel: [<c0406302>] do_iret_error+0xa7/0xb1 >May 11 08:25:03 malbec kernel: [<c040670e>] do_softirq+0x1f/0xc6 >May 11 08:25:03 malbec kernel: [<c0404e99>] restore_nocheck_notrace+0xe/0xf >May 11 08:25:03 malbec kernel: [<c042beaf>] search_exception_tables+0x14/0x25 >May 11 08:25:03 malbec kernel: [<c041444f>] fixup_exception+0xb/0x20 >May 11 08:25:03 malbec kernel: [<c0612245>] do_general_protection+0x11c/0x16f >May 11 08:25:03 malbec kernel: [<c040687b>] do_IRQ+0xc6/0xdb >May 11 08:25:03 malbec kernel: [<c0549375>] evtchn_do_upcall+0x5f/0x97 >May 11 08:25:03 malbec kernel: [<c0612129>] do_general_protection+0x0/0x16f >May 11 08:25:03 malbec kernel: [<c040625b>] do_iret_error+0x0/0xb1 >May 11 08:25:03 malbec kernel: [<c0611d2d>] error_code+0x35/0x3c >May 11 08:25:03 malbec kernel: ======================= >May 11 08:25:03 malbec kernel: Code: 9a d4 01 00 00 89 df 81 e7 00 f0 ff ff eb 0 >e 8b 4c 24 18 89 f2 89 e8 ff 51 08 83 c3 04 39 fb 76 29 8d 87 fd 0f 00 00 39 c3 >73 1f <8b> 33 89 f0 e8 ad 68 02 00 85 c0 74 e2 eb d5 8b 4f 34 85 c9 74 >May 11 08:25:03 malbec kernel: EIP: [<c04055c2>] dump_trace+0x5c/0x93 SS:ESP 006 >9:c862ee7c
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 188140
:
127906
|
127911
|
129296
|
139112
|
151425
| 154599