|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual a
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=390
------- Additional Comments From dbarrera@xxxxxxxxxx 2005-11-08 19:49 -------
Attempting to untar the ltp-full-20050804.tgz file resulted in another trace:
[...]
ltp-full-20050804/testcases/commands/fileutils/ln/Makefile
Unable to handle kernel paging request at virtual address c1d84010
printing eip:
c01de023
0e324000 -> *pde = 00000000:035fd001
049f6000 -> *pme = 00000000:ee455067
0000a000 -> *pte = 00000000:d5908061
Oops: 0003 [#3]
PREEMPT SMP
Modules linked in:
CPU: 0
EIP: 0061:[<c01de023>] Not tainted VLI
EFLAGS: 00010202 (2.6.12.6-xenU)
EIP is at ext3_delete_entry+0x93/0x120
eax: 0000001c ebx: c1d84018 ecx: 00000000 edx: 00000010
esi: 00000018 edi: c188ce3c ebp: c1d8400c esp: c34edee4
ds: 007b es: 007b ss: 0069
Process tar (pid: 4061, threadinfo=c34ec000 task=c66c5530)
Stack: c83a13f8 c188ce3c c1d84018 c188ce3c 00000018 c83a13f8 cc5cbc7c c188ce3c
c32880c4 c01df0b1 c83a13f8 c32880c4 c1d84018 c188ce3c c32880c4 fffffffb
c1d84018 fffffff0 ce946b90 c32880c4 c34edf68 c017c2e2 c32880c4 ce946b90
Call Trace:
[<c01df0b1>] ext3_unlink+0xc1/0x1b0
[<c017c2e2>] vfs_unlink+0x132/0x1e0
[<c017acbd>] lookup_hash+0x1d/0x30
[<c017c44b>] sys_unlink+0xbb/0x150
[<c01690ac>] sys_open+0x6c/0x90
[<c010a219>] syscall_call+0x7/0xb
Code: 5b 5e 5f 5d c3 89 7c 24 04 8b 44 24 28 89 04 24 e8 13 a7 00 00 85 c0 75 3d
85 ed 0f 84 83 00 00 00 0f b7 45 04 0f b7 53 04 01 d0 <66> 89 45 04 8b 44 24 2c
ff 40 64 89 7c 24 04 8b 44 24 28 89 04
Segmentation fault
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual address c2b02000,
bugzilla-daemon <=
|
|
|
|
|