search for: 8005003b

Displaying 20 results from an estimated 56 matches for "8005003b".

2005 Oct 06
0
smp issues changeset: 7234:bd37123974b2
...si c0107130: 8b 7c 24 08 mov 0x8(%esp),%edi c0107134: c9 leave (XEN) EFLAGS: 00000282 CONTEXT: guest (XEN) eax: 00000000 ebx: 00000001 ecx: 00000000 edx: 00000000 (XEN) esi: 00000001 edi: 00000000 ebp: c1261f88 esp: c1261f7c (XEN) cr0: 8005003b cr3: 6ac39000 (XEN) ds: 007b es: 007b fs: 0000 gs: 0069 ss: 0069 cs: 0061 (XEN) Guest stack trace from esp=c1261f7c: (XEN) c1260000 ffffffff c1260000 c1261fb8 c01072b0 20000000 00000006 c1260000 (XEN) c1260000 c033f500 c033f500 00000001 00000000 00000000 00000000 c1261fb4 (XEN)...
2006 Sep 01
11
BUG: soft lockup detected on CPU#0! on 3.0.2-2
...0! Pid: 2213, comm: smbiod EIP: 0061:[<f4990f2e>] CPU: 0 EIP is at smbiod+0x116/0x16d [smbfs] EFLAGS: 00000246 Tainted: GF (2.6.16-xen-automount #1) EAX: 00000000 EBX: f4996400 ECX: f2c99f68 EDX: f2c98000 ESI: f2c98000 EDI: c06f5780 EBP: f2c99fb8 DS: 007b ES: 007b CR0: 8005003b CR2: b7f77000 CR3: 326e2000 CR4: 00000640 [<c0131bb3>] autoremove_wake_function+0x0/0x4b [<c0104b5e>] ret_from_fork+0x6/0x10 [<c0131bb3>] autoremove_wake_function+0x0/0x4b [<f4990e18>] smbiod+0x0/0x16d [smbfs] [<c0102e6d>] kernel_thread_helper+0x5/0xb smb_add...
2006 Jun 12
3
panic in buf_hash_remove
.....] panic[cpu1]/thread=fffffe80005c3c80: BAD TRAP: type=e (#pf Page fault) rp=fffffe80005c3980 addr=30 occurred in module "zfs" due to a NULL pointer dereference sched: #pf Page fault Bad kernel fault at addr=0x30 pid=0, pc=0xfffffffff3ee322e, sp=0xfffffe80005c3a70, eflags=0x10206 cr0: 8005003b<pg,wp,ne,et,ts,mp,pe> cr4: 6f0<xmme,fxsr,pge,mce,pae,pse> cr2: 30 cr3: a49a000 cr8: c rdi: fffffe80f0aa2b40 rsi: ffffffff89c3a050 rdx: 6352 rcx: 2f r8: 0 r9: 30 rax: 64f2 rbx: 2000...
2006 Oct 03
1
a domain VTx with the VNIF does hang.
...the domain U with ping command. Then, the domain VTx does hang. And, it outputs as follows. The domain U and a domain 0 doesn''t do hang. EAX: c03c7000 EBX: 00000286 ECX: 00000286 EDX: da676000 ESI: 000004e2 EDI: 0000000a EBP: c03c7fb8 DS: 007b ES: 007b CR0: 8005003b CR2: b7ee2044 CR3: 1a6af000 CR4: 000006d0 [<c0118f92>] __printk_ratelimit+0x8f/0x95 [<e08a6316>] xennet_get_responses+0xca/0x31c [xen_vnif] [<c0103dc2>] do_IRQ+0x70/0x7a [<e08a6851>] netif_poll+0x1c/0x60v [xen_vnif] [<c0103dc2>] net_rx_act...
2010 Apr 26
2
trouble with xenserver and xfs (soft lockup - CPU#0 stuck for 61s!)
...: 00000287 CPU: 0 [212521.428003] EIP is at __write_lock_failed+0x9/0x1c [212521.428003] EAX: e1875cbc EBX: c1351e1a ECX: e2407880 EDX: dd004c50 [212521.428003] ESI: 00000000 EDI: c536fd40 EBP: e1875cbc ESP: c1351dac [212521.428003] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0069 [212521.428003] CR0: 8005003b CR2: b806e348 CR3: 20d99000 CR4: 00002620 [212521.428003] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [212521.428003] DR6: ffff0ff0 DR7: 00000400 [212521.428003] Call Trace: [212521.428003] [<c02f23a3>] ? _write_lock+0xe/0xf [212521.428003] [<e33f7409>] ? xfs_iget+0x328/0x...
2012 Mar 24
2
Bug#665433: xen hypervisor FATAL PAGE FAULT after linux kernel BUG: unable to handle kernel paging request
...-[ Xen-4.0.1 x86_32p debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) EIP: e008:[<0fff0000>] ??? (XEN) EFLAGS: 00010092 CONTEXT: hypervisor (XEN) eax: ffb80280 ebx: 00000004 ecx: 00000000 edx: 00000004 (XEN) esi: ff32bf8c edi: ff32bfb8 ebp: ff32bf88 esp: ff32becc (XEN) cr0: 8005003b cr4: 000006f0 cr3: d1480000 cr2: 0fff0000 (XEN) ds: e010 es: e010 fs: 00d8 gs: 00e0 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ff32becc: (XEN) ff15004d 00000004 00000004 00000000 ffbd8000 00000000 feda8970 00000000 (XEN) 0000000b ffb80280 ff32bfb4 ff32bfb4 ffb80280 ff14e...
2008 Jul 26
5
BUG: soft lockup - CPU#1 stuck for 61s!
...0x15 Jul 25 02:15:02 vega2008 kernel: EAX: c079349c EBX: f79ec580 ECX: ffffffff EDX: 00008381 Jul 25 02:15:02 vega2008 kernel: ESI: ffffffff EDI: f79ec580 EBP: f68a6580 ESP: f1824e50 Jul 25 02:15:02 vega2008 kernel: DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 Jul 25 02:15:02 vega2008 kernel: CR0: 8005003b CR2: b7ebf978 CR3: 32996000 CR4: 000006f0 Jul 25 02:15:02 vega2008 kernel: DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 Jul 25 02:15:02 vega2008 kernel: DR6: ffff0ff0 DR7: 00000400 Jul 25 02:15:02 vega2008 kernel: [<c04119c7>] ? native_flush_tlb_others+0x49/0x9b Jul 25 02:15:02 ve...
2014 Aug 24
1
Kernel crash in 3.17-rc1 when loading nouveau on (non-POSTed) NV1A
...: 00010046 CPU: 0 [ 155.100004] EIP is at nvkm_event_get+0x3/0x10 [nouveau] [ 155.100004] EAX: dcd4c484 EBX: 00000286 ECX: 00000000 EDX: 00000001 [ 155.100004] ESI: 00000000 EDI: ffffffff EBP: dd5c9ea8 ESP: dd5c9ea8 [ 155.100004] DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068 [ 155.100004] CR0: 8005003b CR2: b77d9000 CR3: 1ce83000 CR4: 000007d0 [ 155.100004] Stack: [ 155.100004] dd5c9eb4 dea1cc92 dd694d34 dd5c9f04 dea2e3b6 00000000 00000005 deae3e69 [ 155.100004] ffffffff 00000001 ffffffff ffffffff ffffffff 00000000 00000000 dd451c70 [ 155.100004] c05bc820 ffffffff 00000000 dd694c60 dd694d3...
2006 Apr 05
5
BUG: soft lockup detected on CPU#0!
...d on CPU#0! Pid: 17178, comm: xvd 275 fd:86 EIP: 0061:[<c0133b65>] CPU: 1 EIP is at kthread_should_stop+0x15/0x20 EFLAGS: 00000246 Not tainted (2.6.16-xen0 #1) EAX: 00000001 EBX: 00000000 ECX: c05431b4 EDX: 00000000 ESI: 00000000 EDI: cc7b143c EBP: c5f11f98 DS: 007b ES: 007b CR0: 8005003b CR2: 090a8928 CR3: 0635f000 CR4: 00000660 [<c0387bd5>] blkif_schedule+0x25/0x4a0 [<c0133e90>] autoremove_wake_function+0x0/0x60 [<c0133c6f>] kthread+0xff/0x110 [<c0387bb0>] blkif_schedule+0x0/0x4a0 [<c0133b70>] kthread+0x0/0x110 [<c0102ca5>] kernel_th...
2010 Jan 25
1
Bug#566012: xen-hypervisor-3.2-1-i386: Another crash. Is this a hypervisor-problem, or is this the kernel?
...(XEN) ----[ Xen-3.2-1 x86_32p debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) EIP: 0061:[<c01013a7>] (XEN) EFLAGS: 00000246 CONTEXT: guest (XEN) eax: 00000000 ebx: 00000001 ecx: 00000000 edx: c0389fc8 (XEN) esi: 00000000 edi: 00000000 ebp: 00000000 esp: c0389fbc (XEN) cr0: 8005003b cr4: 000006f0 cr3: 00be0ca0 cr2: b7f1fd10 (XEN) ds: 007b es: 007b fs: 00d8 gs: 0000 ss: 0069 cs: 0061 (XEN) Guest stack trace from esp=c0389fbc: (XEN) c0105f52 ffffffff 00000000 c04ea8c2 00002270 00000000 00000020 ffffffff (XEN) c01028ab c0102810 00000020 c14b5000 00000000 c03...
2007 Oct 10
6
server-reboot
...ern.notice] #pf Page fault Oct 10 17:24:04 zetta unix: [ID 532287 kern.notice] Bad kernel fault at addr=0xfffffffecd873000 Oct 10 17:24:04 zetta unix: [ID 243837 kern.notice] pid=0, pc=0xfffffffffbbc1a9f, sp=0xffffff0007f1b730, eflags=0x10286 Oct 10 17:24:04 zetta unix: [ID 211416 kern.notice] cr0: 8005003b<pg,wp,ne,et,ts,mp,pe> cr4: 6b8<xmme,fxsr,pge,pae,pse,de> Oct 10 17:24:04 zetta unix: [ID 354241 kern.notice] cr2: fffffffecd873000 cr3: 3000000 cr8: c Oct 10 17:24:04 zetta unix: [ID 592667 kern.notice] rdi: fffffffecd872f80 rsi: a rdx: ffffff0007f1bc80 Oct 10 17:24:0...
2006 Sep 22
0
boot crash 2.6.16-18 xen kernel
...s, which is working fine having used the same how-to. Now we are installing another X2100 using the 2.6.16-18 kernel, which is giving some major problems. During the boot procedure it crashes, saying: (XEN) Scrubbing free RAM (XEN) esi: 00000359 edi: b104b000 ebp: 00359000 esp: b0327eec (XEN) cr0: 8005003b cr3: 073a000 (XEN) ds: e021 es: e021 fs: 0000 gs: 0000 ss: e021 cs: e019 (XEN) Guest stack trace from esp=b0327eec ... (XEN) Domain 0 crashed: rebooting machine in 5 seconds. It is difficult to give more detailed information since this failure isn't logged anywhere. However, if you need more i...
2006 May 18
0
Node crashed after remove a path
...l_thread_helper+0x5/0xb a8 ff Pid: 6, comm: events/0 EIP: 0060:[<c0121b26>] CPU: 0 EIP is at panic+0x47/0x147 EFLAGS: 00010286 Not tainted (2.6.9-22.ELsmp) EAX: 0000005a EBX: f8c00a68 ECX: f7c7cf58 EDX: c02e29cb ESI: f8c00a6c EDI: 00000206 EBP: c1e26000 DS: 007b ES: 007b CR0: 8005003b CR2: 0036c570 CR3: 37f87f00 CR4: 000006f0 [<f8bee6fb>] o2quo_disk_timeout+0x0/0x2 [ocfs2_nodemanager] [<c013044f>] worker_thread+0x168/0x1d5 [<f8bee6fd>] o2quo_make_decision+0x0/0x247 [ocfs2_nodemanager] [<c011e52f>] default_wake_function+0x0/0xc [<c011e52f>] defa...
2005 May 18
6
zaphfc troubles
...p: c2c8fe2c esp: c2c8fe14 ds: 0018 es: 0018 ss: 0018 Process sshd (pid: 146, stackpage=c2c8f000) Stack: 00000001 00000086 00000001 c24803a0 c24803a0 c270c940 c2480000 c3819545 00000010 00000010 c2c8ff24 00000046 00001140 00000003 c2c8ffc4 00000086 c01cb6b1 c02f8bc4 c24803a0 8005003b c2c8feb4 00000002 00000008 c270c800 Call Trace: [<c3819545>] [<c01cb6b1>] [<c381aae6>] [<c381aad7>] [<c383cd78>] [<c01cae16>] [<c383ce95>] [<c01c5416>] [<c01cad01>] [<c0109ddd>] [<c0109f78>] [<c010c328>] Code: 8b 4b fc...
2010 Jan 20
0
Bug#566012: xen-hypervisor-3.2-1-i386: Hypervisor crash
...(XEN) ----[ Xen-3.2-1 x86_32p debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) EIP: 0061:[<c01013a7>] (XEN) EFLAGS: 00000246 CONTEXT: guest (XEN) eax: 00000000 ebx: 00000001 ecx: 00000000 edx: c0389fc8 (XEN) esi: 00000000 edi: 00000000 ebp: 00000000 esp: c0389fbc (XEN) cr0: 8005003b cr4: 000006f0 cr3: 00be0ca0 cr2: b7fb6dbd (XEN) ds: 007b es: 007b fs: 00d8 gs: 0000 ss: 0069 cs: 0061 (XEN) Guest stack trace from esp=c0389fbc: (XEN) c0105f52 ffffffff 00000000 01864180 000127cf 00000000 00000020 ffffffff (XEN) c01028ab c0102810 00000020 c1bb3000 00000000 c03...
2007 Apr 18
2
Xen i386 paravirtualization support
...n cpu#0: (XEN) ----[ Xen-3.0-unstable Not tainted ]---- (XEN) CPU: 0 (XEN) EIP: e019:[<c02ce06a>] (XEN) EFLAGS: 00010287 CONTEXT: guest (XEN) eax: 002f7000 ebx: 00000000 ecx: c02f7fb8 edx: c02f7fbc (XEN) esi: 00000000 edi: c02f9eec ebp: c02c3ff8 esp: c02c3fc0 (XEN) cr0: 8005003b cr3: 001a0000 (XEN) ds: e021 es: e021 fs: 0000 gs: 0000 ss: e021 cs: e019 (XEN) Guest stack trace from esp=c02c3fc0: (XEN) Fault while accessing guest memory. (XEN) Domain 0 crashed: rebooting machine in 5 seconds. Thanks. ======= 2006-07-18 17:20:03 You wrote?======= >Unlik...
2006 Feb 14
3
Daily Xen-HVM Builds
...88>]CPU: 9 (XEN) EIP: e008:[<ff111584>]CPU: 4 (XEN) EIP: e008:[<ff111584>] timer_softirq_action+0x64/0x140 (XEN) EFLAGS: 00010006 CONTEXT: hypervisor (XEN) eax: 0dee319b ebx: ffff4d85 ecx: 00000000 edx: 000000c0 (XEN) esi: ff1e9a00 edi: 00000480 ebp: ffbd2080 esp: ffbd1f68 (XEN) cr0: 8005003b cr3: 00178000 (XEN) ds: e010 es: e010 fs: e010 gs: e010 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ffbd1f68: (XEN) idle_loop+0x38/0x80 (XEN) EFLAGS: 00010246 (XEN) CR3: 00000000 (XEN) eax: 00000600 ebx: ffbc5fb4 ecx: 00000000 edx: 00000600 (XEN) esi: 00000600 edi: 00000600 ebp: 00000000 esp:...
2008 Jun 16
3
[Bug 2247] New: tests/functional/cli_root/zpool_upgrade/ zpool_upgrade_007_pos panics - zfs snapshot
...uss at opensolaris.org Estimated Hours: 0.0 panic[cpu2]/thread=ffffff02d870f4e0: BAD TRAP: type=d (#gp General protection) rp=ffffff000fc4c7b0 addr=ffffff000fc4ca98 zfs: #gp General protection addr=0xffffff000fc4ca98 pid=16809, pc=0xfffffffff7e3eb0e, sp=0xffffff000fc4c8a0, eflags=0x10213 cr0: 8005003b<pg,wp,ne,et,ts,mp,pe> cr4: 6f8<xmme,fxsr,pge,mce,pae,pse,de> cr2: 8144000cr3: 7d22c000cr8: c rdi: ffffff02e30ab010 rsi: 0 rdx: 0 rcx: e2325cc3 r8: 1dcda338 r9: ffffff000fc4c928 rax: 7 rbx:...
2008 Apr 24
0
panic on zfs scrub on builds 79 & 86
...kern.notice] unix: [ID 839527 kern.notice] sched: unix: [ID 753105 kern.notice] #pf Page fault unix: [ID 532287 kern.notice] Bad kernel fault at addr=0x23b unix: [ID 243837 kern.notice] pid=0, pc=0xfffffffffb840dbb, sp=0xffffff00100918e8, eflags=0x10246 brighton unix: [ID 211416 kern.notice] cr0: 8005003b<pg,wp,ne,et,ts,mp,pe> cr4: 6f8<xmme,fxsr,pge,mce,pae,pse,de> unix: [ID 624947 kern.notice] cr2: 23b unix: [ID 625075 kern.notice] cr3: 3000000 unix: [ID 625715 kern.notice] cr8: c unix: [ID 100000 kern.notice] unix: [ID 592667 kern.notice] rdi: 23b rsi: 0 r...
2006 Sep 04
0
debian xen packages : work with 2.6.16, reboots when loading dom0 with 2.6.17
...hed on cpu#0: (XEN) ----[ Xen-3.0.2-3 Not tainted ]---- (XEN) CPU: 0 (XEN) EIP: e019:[<b030c8fc>] (XEN) EFLAGS: 00000282 CONTEXT: guest (XEN) eax: ffffffda ebx: 0000000a ecx: b0301fb4 edx: 00000000 (XEN) esi: b0301f90 edi: b0301fd0 ebp: b0301f84 esp: b03014dc (XEN) cr0: 8005003b cr3: 07085000 (XEN) ds: e021 es: e021 fs: 0000 gs: 0000 ss: e021 cs: e019 (XEN) Guest stack trace from esp=b03014dc: (XEN) b030c8fc 0001e019 00010082 00000000 b0301fe8 00000000 00000000 00000000 (XEN) 00000000 00000000 00000000 00000060 00000000 00000000 00000000 00000000 (XEN)...