Displaying 2 results from an estimated 2 matches for "dfa371b0".
2009 Apr 16
1
NULL pointer dereference at __switch_to() ( __unlazy_fpu ) with lguest PAE patch
...l/uevent_seqnum
[ 84.749676] Modules linked in:
[ 84.749676]
[ 84.749676] Pid: 1066, comm: find Not tainted (2.6.30-rc2-00167-gcd97824-dirty #1)
[ 84.749676] EIP: 0061:[<c0101f6e>] EFLAGS: 00000092 CPU: 0
[ 84.749676] EIP is at __switch_to+0xd/0x12d
[ 84.749676] EAX: 00000001 EBX: dfa371b0 ECX: df8b0430 EDX: dfa371b0
[ 84.749676] ESI: 00000001 EDI: df887200 EBP: df865ec4 ESP: df865eac
[ 84.749676] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0069
[ 84.749676] Process find (pid: 1066, ti=df864000 task=df8b0430 task.ti=dfa0e000)
[ 84.749676] Stack:
[ 84.749676] 00000000 00000001...
2009 Apr 16
1
NULL pointer dereference at __switch_to() ( __unlazy_fpu ) with lguest PAE patch
...l/uevent_seqnum
[ 84.749676] Modules linked in:
[ 84.749676]
[ 84.749676] Pid: 1066, comm: find Not tainted (2.6.30-rc2-00167-gcd97824-dirty #1)
[ 84.749676] EIP: 0061:[<c0101f6e>] EFLAGS: 00000092 CPU: 0
[ 84.749676] EIP is at __switch_to+0xd/0x12d
[ 84.749676] EAX: 00000001 EBX: dfa371b0 ECX: df8b0430 EDX: dfa371b0
[ 84.749676] ESI: 00000001 EDI: df887200 EBP: df865ec4 ESP: df865eac
[ 84.749676] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0069
[ 84.749676] Process find (pid: 1066, ti=df864000 task=df8b0430 task.ti=dfa0e000)
[ 84.749676] Stack:
[ 84.749676] 00000000 00000001...