WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual a

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual address c2b02000
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Tue, 08 Nov 2005 19:49:56 +0000
Delivery-date: Tue, 08 Nov 2005 19:50:00 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=390





------- Additional Comments From dbarrera@xxxxxxxxxx  2005-11-08 19:49 -------
Attempting to untar the ltp-full-20050804.tgz file resulted in another trace:
[...]
ltp-full-20050804/testcases/commands/fileutils/ln/Makefile
Unable to handle kernel paging request at virtual address c1d84010
 printing eip:
c01de023
0e324000 -> *pde = 00000000:035fd001
049f6000 -> *pme = 00000000:ee455067
0000a000 -> *pte = 00000000:d5908061
Oops: 0003 [#3]
PREEMPT SMP
Modules linked in:
CPU:    0
EIP:    0061:[<c01de023>]    Not tainted VLI
EFLAGS: 00010202   (2.6.12.6-xenU)
EIP is at ext3_delete_entry+0x93/0x120
eax: 0000001c   ebx: c1d84018   ecx: 00000000   edx: 00000010
esi: 00000018   edi: c188ce3c   ebp: c1d8400c   esp: c34edee4
ds: 007b   es: 007b   ss: 0069
Process tar (pid: 4061, threadinfo=c34ec000 task=c66c5530)
Stack: c83a13f8 c188ce3c c1d84018 c188ce3c 00000018 c83a13f8 cc5cbc7c c188ce3c
       c32880c4 c01df0b1 c83a13f8 c32880c4 c1d84018 c188ce3c c32880c4 fffffffb
       c1d84018 fffffff0 ce946b90 c32880c4 c34edf68 c017c2e2 c32880c4 ce946b90
Call Trace:
 [<c01df0b1>] ext3_unlink+0xc1/0x1b0
 [<c017c2e2>] vfs_unlink+0x132/0x1e0
 [<c017acbd>] lookup_hash+0x1d/0x30
 [<c017c44b>] sys_unlink+0xbb/0x150
 [<c01690ac>] sys_open+0x6c/0x90
 [<c010a219>] syscall_call+0x7/0xb
Code: 5b 5e 5f 5d c3 89 7c 24 04 8b 44 24 28 89 04 24 e8 13 a7 00 00 85 c0 75 3d
85 ed 0f 84 83 00 00 00 0f b7 45 04 0f b7 53 04 01 d0 <66> 89 45 04 8b 44 24 2c
ff 40 64 89 7c 24 04 8b 44 24 28 89 04
 Segmentation fault


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs