[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 254] New: Oops in NFS
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=254 Summary: Oops in NFS Product: Xen Version: unstable Platform: All OS/Version: Linux-2.6 Status: NEW Severity: normal Priority: P2 Component: Guest-OS AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: kip.macy@xxxxxxxxx I don't know if this is tied to my lockups or not. Vanilla supermicro dual dual-core opteron 8GB RAM, dom0_mem=1GB. I wasn't doing much besides looking through some files. Unable to handle kernel paging request at virtual address 736e7970 printing eip: c0461b59 *pde = ma 00000000 pa 55555000 Oops: 0002 [#1] PREEMPT Modules linked in: video thermal processor fan button battery ac CPU: 0 EIP: 0061:[<c0461b59>] Not tainted VLI EFLAGS: 00010202 (2.6.12-xen0) EIP is at put_rpccred+0x9/0x30 eax: 000626fa ebx: f2a80e18 ecx: f2a80ea8 edx: 736e7964 esi: f2a80e64 edi: ee80fe88 ebp: 00000004 esp: ee80fe64 ds: 007b es: 007b ss: 0069 Process zcat (pid: 27366, threadinfo=ee80e000 task=f350e510) Stack: c01fe7d8 736e7964 f2a80e64 ee80fe88 c0701700 c01fe858 f2a80e64 ee80fe88 ee80fe88 000626fa c0701700 00000007 00000000 c0701700 c0701700 f2a80e64 00000004 c01fe953 f2a80e64 c0701700 00000004 f2a80e64 c01fe890 ee80ff58 Call Trace: [<c01fe7d8>] nfs_access_add_cache+0x58/0x60 [<c01fe858>] nfs_do_access+0x78/0xb0 [<c01fe953>] nfs_permission+0xc3/0x190 [<c01fe890>] nfs_permission+0x0/0x190 [<c01763a2>] permission+0xa2/0xb0 [<c0178355>] may_open+0x65/0x230 [<c0178644>] open_namei+0x124/0x650 [<c0165c8b>] filp_open+0x3b/0x70 [<c0165f6c>] get_unused_fd+0x2c/0xd0 [<c0166119>] sys_open+0x49/0x90 [<c0108fa5>] syscall_call+0x7/0xb Code: 40 0c 8b 40 08 89 44 24 08 0f b7 83 b0 00 00 00 c7 04 24 e2 66 4d c0 89 44 24 04 e8 72 d6 cb ff eb c1 8b 54 24 04 a1 c0 f1 4e c0 <89> 42 0c ff 4a 10 0f 94 c0 84 c0 75 01 c3 8b 42 08 89 54 24 04 -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |