search for: oops_end

Displaying 20 results from an estimated 82 matches for "oops_end".

2007 May 22
1
Kernel Panic in wct4xxp during unload on Zaptel-1.4.4
...t; CR2: ffffff0000034010 <5> <0>Kernel panic - not syncing: Oops <5> Badness in panic at kernel/panic.c:118 <5> <5> Call Trace:<IRQ> <ffffffff80137a8a>{panic+527} <ffffffff80110bf5>{apic_timer_interrupt+133} <5> <ffffffff80111aec>{oops_end+38} <ffffffff80111b07>{oops_end+65} <5> <ffffffff80124148>{do_page_fault+1204} <ffffffffa0078f51>{:bnx2:bnx2_start_xmit+470} <5> <ffffffff802bb4cd>{netpoll_send_skb+257} <ffffffff80110d91>{error_exit+0} <5> <ffffffffa0163207&gt...
2013 Nov 20
0
[PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c
...signed int die_nest_count; -unsigned __kprobes long oops_begin(void) +unsigned long oops_begin(void) { int cpu; unsigned long flags; @@ -223,8 +223,9 @@ unsigned __kprobes long oops_begin(void) return flags; } EXPORT_SYMBOL_GPL(oops_begin); +NOKPROBE_SYMBOL(oops_begin); -void __kprobes oops_end(unsigned long flags, struct pt_regs *regs, int signr) +void oops_end(unsigned long flags, struct pt_regs *regs, int signr) { if (regs && kexec_should_crash(current)) crash_kexec(regs); @@ -247,8 +248,9 @@ void __kprobes oops_end(unsigned long flags, struct pt_regs *regs, int signr)...
2006 Jan 14
2
CentOS 4.2 x86_64
...e getting CentOS 4.2 x86_64 to boot on some of them in SMP mode (UP works fine). After the installation of CD, it boots up but kernel panics with the following error: Badness in i8042_panic_blink at drivers/input/serio/i8042.c:992 This is the call trace: apic_timer_interrupt+133 vgacon_cursor+0 oops_end+64 release_console_sem+369 error_exit+0 :scsi_mod:scsi_delete_timer+19 :3w_9xxx:twa_interrupt+1323 do_IRQ+197 mwait_idle+86 cpu_idle+26 The Uni processor works fine. I tried the SMP kernel from Fedora Core 4 x86_64 which works fine as well. Any idea what's going on here? I've already t...
2016 Nov 28
1
CentOS 6.4 tcp_fatretrans_alert causes panic
...;s been OK for a long time and the problem emerged all of a sudden, I'm not sure if an upgrade caused this problem. Here's what I got from backtracing: PID: 8136 TASK: ffff8803341aead0 CPU: 2 COMMAND: "" #0 [ffff880028283610] panic at ffffffff815286b8 #1 [ffff880028283690] oops_end at ffffffff8152c8a2 #2 [ffff8800282836c0] no_context at ffffffff81046c1b #3 [ffff880028283710] __bad_area_nosemaphore at ffffffff81046ea5 #4 [ffff880028283760] bad_area_nosemaphore at ffffffff81046f73 #5 [ffff880028283770] __do_page_fault at ffffffff810476d1 #6 [ffff880028283890] do_page_fault...
2023 Feb 17
1
[PATCH] ocfs2: fix defrag path triggering jbd2 ASSERT
...bs2 ASSERT crash stacks: PID: 11297 TASK: ffff974a676dcd00 CPU: 67 COMMAND: "defragfs.ocfs2" #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 0001...
2012 Nov 26
1
kernel panic on Xen
...al exception in interrupt [ 100.973267] Pid: 9, comm: ksoftirqd/1 Tainted: G D 3.2.23 #131 [ 100.973270] Call Trace: [ 100.973273] [<ffffffff816674ae>] panic+0x91/0x1a2 [ 100.973278] [<ffffffff8100adb2>] ? check_events+0x12/0x20 [ 100.973282] [<ffffffff81673b0a>] oops_end+0xea/0xf0 [ 100.973286] [<ffffffff81666e6b>] no_context+0x214/0x223 [ 100.973291] [<ffffffff8113cf94>] ? kmem_cache_free+0x104/0x110 [ 100.973295] [<ffffffff8166704b>] __bad_area_nosemaphore+0x1d1/0x1f0 [ 100.973299] [<ffffffff8166707d>] bad_area_nosemaphore+0x13/0x1...
2011 Feb 11
1
null pointer dereference in iov_iter_copy_from_user_atomic while updating rpm packages
...84843] [<c046c69f>] ? acct_collect+0x3e/0x138 Feb 10 10:59:45 testbox kernel: [ 524.584847] [<c043da92>] ? do_exit+0x1d0/0x62c Feb 10 10:59:45 testbox kernel: [ 524.584850] [<c043bf68>] ? kmsg_dump+0x3a/0xb6 Feb 10 10:59:45 testbox kernel: [ 524.584853] [<c07d555b>] ? oops_end+0xa2/0xa8 Feb 10 10:59:45 testbox kernel: [ 524.584858] [<c07cc31f>] ? no_context+0x128/0x130 Feb 10 10:59:45 testbox kernel: [ 524.584861] [<c07cc441>] ? __bad_area_nosemaphore+0x11a/0x122 Feb 10 10:59:45 testbox kernel: [ 524.584884] [<f81fdd20>] ? btrfs_block_rsv_release+...
2017 Jul 11
2
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...NING (PANIC) crash> bt PID: 4658 TASK: ffff8803c6068f80 CPU: 7 COMMAND: "kworker/u16:26" #0 [ffffc900039f76a0] machine_kexec at ffffffff810481fc #1 [ffffc900039f76f0] __crash_kexec at ffffffff81109e3a #2 [ffffc900039f77b0] crash_kexec at ffffffff8110adc9 #3 [ffffc900039f77c8] oops_end at ffffffff8101d059 #4 [ffffc900039f77e8] no_context at ffffffff81055ce5 #5 [ffffc900039f7838] do_page_fault at ffffffff81056c5b #6 [ffffc900039f7860] page_fault at ffffffff81690a88 [exception RIP: report_bug+93] RIP: ffffffff8167227d RSP: ffffc900039f7918 RFLAGS: 00010002 RAX: fff...
2010 Sep 17
1
General protection fault
...gt;] do_unblank_screen+0x9e/0x170 Sep 17 15:26:18 box6 kernel: [ 1948.826165] [<ffffffff813435f0>] unblank_screen+0x10/0x20 Sep 17 15:26:18 box6 kernel: [ 1948.826169] [<ffffffff812be8ad>] bust_spinlocks+0x1d/0x40 Sep 17 15:26:18 box6 kernel: [ 1948.826172] [<ffffffff8155bbef>] oops_end+0x3f/0xf0 Sep 17 15:26:18 box6 kernel: [ 1948.826175] [<ffffffff8101711b>] die +0x5b/0x90 Sep 17 15:26:18 box6 kernel: [ 1948.826179] [<ffffffff8155b7e2>] do_general_protection+0x152/0x160 Sep 17 15:26:18 box6 kernel: [ 1948.826182] [<ffffffff8155afa5>] general_protection+0x25/...
2010 Sep 21
4
PROBLEM: [BISECTED] 2.6.35.5 xen domU panics just after the boot
...[<ffffffff8133bae9>] panic+0x86/0xfa [ 0.000000] [<ffffffff8103c5c6>] do_exit+0x6d/0x77e [ 0.000000] [<ffffffff8133d43f>] ? _raw_spin_unlock_irqrestore+0x11/0x13 [ 0.000000] [<ffffffff8103ac55>] ? kmsg_dump+0x11e/0x139 [ 0.000000] [<ffffffff8100b936>] oops_end+0x8f/0x94 [ 0.000000] [<ffffffff810239cc>] no_context+0x1f4/0x203 [ 0.000000] [<ffffffff81023b65>] __bad_area_nosemaphore+0x18a/0x1ad [ 0.000000] [<ffffffff81023b96>] bad_area_nosemaphore+0xe/0x10 [ 0.000000] [<ffffffff81023f10>] do_page_fault+0x115/0x229 [...
2010 Sep 21
4
PROBLEM: [BISECTED] 2.6.35.5 xen domU panics just after the boot
...[<ffffffff8133bae9>] panic+0x86/0xfa [ 0.000000] [<ffffffff8103c5c6>] do_exit+0x6d/0x77e [ 0.000000] [<ffffffff8133d43f>] ? _raw_spin_unlock_irqrestore+0x11/0x13 [ 0.000000] [<ffffffff8103ac55>] ? kmsg_dump+0x11e/0x139 [ 0.000000] [<ffffffff8100b936>] oops_end+0x8f/0x94 [ 0.000000] [<ffffffff810239cc>] no_context+0x1f4/0x203 [ 0.000000] [<ffffffff81023b65>] __bad_area_nosemaphore+0x18a/0x1ad [ 0.000000] [<ffffffff81023b96>] bad_area_nosemaphore+0xe/0x10 [ 0.000000] [<ffffffff81023f10>] do_page_fault+0x115/0x229 [...
2014 Sep 09
2
Re: CoreOS support
...ing kernel with flag 0x7 >> [ 7.775735] Pid: 297, comm: mount veid: 0 Tainted: G W --------------- T 2.6.32-30-pve #1 >> [ 7.775735] Call Trace: >> [ 7.775735] [<ffffffff81072bd9>] ? add_taint+0x69/0x70 >> [ 7.775735] [<ffffffff8155c443>] ? oops_end+0x53/0xf0 >> [ 7.775735] [<ffffffff8154f0c7>] ? no_context+0x1eb/0x216 >> [ 7.775735] [<ffffffff810cc22e>] ? is_module_text_address+0xe/0x20 >> [ 7.775735] [<ffffffff8154f260>] ? __bad_area_nosemaphore+0x16e/0x18d >> [ 7.775735] [<fffffff...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...xa0 [ 2.234004] [<ffffffff81747299>] __schedule+0x509/0x7d0 [ 2.234004] [<ffffffff81747589>] schedule+0x29/0x70 [ 2.234004] [<ffffffff81099ab7>] do_exit+0x6e7/0xa60 [ 2.234004] [<ffffffff81740516>] ? printk+0x70/0x86 [ 2.234004] [<ffffffff81017710>] oops_end+0xa0/0xe0 [ 2.234004] [<ffffffff81017bcb>] die+0x4b/0x70 [ 2.234004] [<ffffffff81013f90>] do_trap+0xb0/0x150 [ 2.234004] [<ffffffff810143f6>] do_error_trap+0xa6/0x180 [ 2.234004] [<ffffffffa0210032>] ? virtio_device_ready.part.12+0x4/0x6 [virtio_console] [...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...xa0 [ 2.234004] [<ffffffff81747299>] __schedule+0x509/0x7d0 [ 2.234004] [<ffffffff81747589>] schedule+0x29/0x70 [ 2.234004] [<ffffffff81099ab7>] do_exit+0x6e7/0xa60 [ 2.234004] [<ffffffff81740516>] ? printk+0x70/0x86 [ 2.234004] [<ffffffff81017710>] oops_end+0xa0/0xe0 [ 2.234004] [<ffffffff81017bcb>] die+0x4b/0x70 [ 2.234004] [<ffffffff81013f90>] do_trap+0xb0/0x150 [ 2.234004] [<ffffffff810143f6>] do_error_trap+0xa6/0x180 [ 2.234004] [<ffffffffa0210032>] ? virtio_device_ready.part.12+0x4/0x6 [virtio_console] [...
2013 Feb 14
2
[PATCH] x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.
...ral protection fault: 0000 [#2] > ---[ end trace ab0d29a492dcd330 ]--- > Kernel panic - not syncing: Fatal exception > Pid: 1250, comm: r Tainted: G D --------------- > 2.6.32-356.el6.i686 #1 > Call Trace: > [<c08476df>] ? panic+0x6e/0x122 > [<c084b63c>] ? oops_end+0xbc/0xd0 > [<c084b260>] ? do_general_protection+0x0/0x210 > [<c084a9b7>] ? error_code+0x73/ > ------------- > > Petr says: " > I've analysed the bug and I think that xen_iret() cannot cope with > mangled DS, in this case zeroed out (null selector/desc...
2013 Feb 14
2
[PATCH] x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.
...ral protection fault: 0000 [#2] > ---[ end trace ab0d29a492dcd330 ]--- > Kernel panic - not syncing: Fatal exception > Pid: 1250, comm: r Tainted: G D --------------- > 2.6.32-356.el6.i686 #1 > Call Trace: > [<c08476df>] ? panic+0x6e/0x122 > [<c084b63c>] ? oops_end+0xbc/0xd0 > [<c084b260>] ? do_general_protection+0x0/0x210 > [<c084a9b7>] ? error_code+0x73/ > ------------- > > Petr says: " > I've analysed the bug and I think that xen_iret() cannot cope with > mangled DS, in this case zeroed out (null selector/desc...
2010 Oct 24
0
BUG: soft lockup - CPU#7 stuck for 61s! [udisks-dm-expor:11772]
...e_fl_direct_end+0x0/0x1 [22077.213987]  [<ffffffff8130beda>] ? _spin_unlock_irqrestore+0xd/0xe [22077.214046]  [<ffffffff8104f2a5>] ? release_console_sem+0x17e/0x1af [22077.214105]  [<ffffffff8130beda>] ? _spin_unlock_irqrestore+0xd/0xe [22077.214164]  [<ffffffff8130cd7d>] ? oops_end+0xaf/0xb4 [22077.214222]  [<ffffffff810135f0>] ? do_invalid_op+0x8b/0x95 [22077.214279]  [<ffffffff8100c60c>] ? pin_pagetable_pfn+0x2d/0x36 [22077.214338]  [<ffffffff810bacff>] ? __alloc_pages_nodemask+0x11c/0x5f5 [22077.214397]  [<ffffffff8101293b>] ? invalid_op+0x1b/0x20 [...
2009 Nov 08
9
2.6.31 xenified kernel - not ready for production
Hi, I just want to know if somebody use 2.6.31.4 xenified kernel (aka OpenSUSE) in production? We have been testing it on new Nehalem Xeon server for few weeks w/o any problem. But as soon we tried it on production machine - after several production domUs started - hard OS failure. We had to switch back to 2.6.18.8 - xen stock kernel. Peter _______________________________________________
2017 Jul 11
0
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...t > PID: 4658 TASK: ffff8803c6068f80 CPU: 7 COMMAND: "kworker/u16:26" > #0 [ffffc900039f76a0] machine_kexec at ffffffff810481fc > #1 [ffffc900039f76f0] __crash_kexec at ffffffff81109e3a > #2 [ffffc900039f77b0] crash_kexec at ffffffff8110adc9 > #3 [ffffc900039f77c8] oops_end at ffffffff8101d059 > #4 [ffffc900039f77e8] no_context at ffffffff81055ce5 > #5 [ffffc900039f7838] do_page_fault at ffffffff81056c5b > #6 [ffffc900039f7860] page_fault at ffffffff81690a88 > [exception RIP: report_bug+93] > RIP: ffffffff8167227d RSP: ffffc900039f7918 RFLA...
2023 Feb 28
0
[merged mm-hotfixes-stable] ocfs2-fix-defrag-path-triggering-jbd2-assert.patch removed from -mm tree
...bs2 ASSERT crash stacks: PID: 11297 TASK: ffff974a676dcd00 CPU: 67 COMMAND: "defragfs.ocfs2" #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01 #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205 #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6 #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18 [exception RIP: jbd2_journal_dirty_metadata+0x2ba] RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 0001...