search for: dfa371b0

Displaying 2 results from an estimated 2 matches for "dfa371b0".

2009 Apr 16
1
NULL pointer dereference at __switch_to() ( __unlazy_fpu ) with lguest PAE patch
...l/uevent_seqnum [ 84.749676] Modules linked in: [ 84.749676] [ 84.749676] Pid: 1066, comm: find Not tainted (2.6.30-rc2-00167-gcd97824-dirty #1) [ 84.749676] EIP: 0061:[<c0101f6e>] EFLAGS: 00000092 CPU: 0 [ 84.749676] EIP is at __switch_to+0xd/0x12d [ 84.749676] EAX: 00000001 EBX: dfa371b0 ECX: df8b0430 EDX: dfa371b0 [ 84.749676] ESI: 00000001 EDI: df887200 EBP: df865ec4 ESP: df865eac [ 84.749676] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0069 [ 84.749676] Process find (pid: 1066, ti=df864000 task=df8b0430 task.ti=dfa0e000) [ 84.749676] Stack: [ 84.749676] 00000000 00000001...
2009 Apr 16
1
NULL pointer dereference at __switch_to() ( __unlazy_fpu ) with lguest PAE patch
...l/uevent_seqnum [ 84.749676] Modules linked in: [ 84.749676] [ 84.749676] Pid: 1066, comm: find Not tainted (2.6.30-rc2-00167-gcd97824-dirty #1) [ 84.749676] EIP: 0061:[<c0101f6e>] EFLAGS: 00000092 CPU: 0 [ 84.749676] EIP is at __switch_to+0xd/0x12d [ 84.749676] EAX: 00000001 EBX: dfa371b0 ECX: df8b0430 EDX: dfa371b0 [ 84.749676] ESI: 00000001 EDI: df887200 EBP: df865ec4 ESP: df865eac [ 84.749676] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0069 [ 84.749676] Process find (pid: 1066, ti=df864000 task=df8b0430 task.ti=dfa0e000) [ 84.749676] Stack: [ 84.749676] 00000000 00000001...