Displaying 20 results from an estimated 82 matches for "oops_end".
2007 May 22
1
Kernel Panic in wct4xxp during unload on Zaptel-1.4.4
...t; CR2: ffffff0000034010
<5> <0>Kernel panic - not syncing: Oops
<5> Badness in panic at kernel/panic.c:118
<5>
<5> Call Trace:<IRQ> <ffffffff80137a8a>{panic+527}
<ffffffff80110bf5>{apic_timer_interrupt+133}
<5> <ffffffff80111aec>{oops_end+38} <ffffffff80111b07>{oops_end+65}
<5> <ffffffff80124148>{do_page_fault+1204}
<ffffffffa0078f51>{:bnx2:bnx2_start_xmit+470}
<5> <ffffffff802bb4cd>{netpoll_send_skb+257}
<ffffffff80110d91>{error_exit+0}
<5> <ffffffffa0163207>...
2013 Nov 20
0
[PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c
...signed int die_nest_count;
-unsigned __kprobes long oops_begin(void)
+unsigned long oops_begin(void)
{
int cpu;
unsigned long flags;
@@ -223,8 +223,9 @@ unsigned __kprobes long oops_begin(void)
return flags;
}
EXPORT_SYMBOL_GPL(oops_begin);
+NOKPROBE_SYMBOL(oops_begin);
-void __kprobes oops_end(unsigned long flags, struct pt_regs *regs, int signr)
+void oops_end(unsigned long flags, struct pt_regs *regs, int signr)
{
if (regs && kexec_should_crash(current))
crash_kexec(regs);
@@ -247,8 +248,9 @@ void __kprobes oops_end(unsigned long flags, struct pt_regs *regs, int signr)...
2006 Jan 14
2
CentOS 4.2 x86_64
...e getting CentOS 4.2 x86_64 to boot on some
of them in SMP mode (UP works fine). After the installation of CD, it
boots up but kernel panics with the following error:
Badness in i8042_panic_blink at drivers/input/serio/i8042.c:992
This is the call trace:
apic_timer_interrupt+133
vgacon_cursor+0
oops_end+64
release_console_sem+369
error_exit+0
:scsi_mod:scsi_delete_timer+19
:3w_9xxx:twa_interrupt+1323
do_IRQ+197
mwait_idle+86
cpu_idle+26
The Uni processor works fine.
I tried the SMP kernel from Fedora Core 4 x86_64 which works fine as
well. Any idea what's going on here? I've already t...
2016 Nov 28
1
CentOS 6.4 tcp_fatretrans_alert causes panic
...;s been OK for a long time and the problem emerged all of a sudden,
I'm not sure if an upgrade caused this problem. Here's what I got from
backtracing:
PID: 8136 TASK: ffff8803341aead0 CPU: 2 COMMAND: ""
#0 [ffff880028283610] panic at ffffffff815286b8
#1 [ffff880028283690] oops_end at ffffffff8152c8a2
#2 [ffff8800282836c0] no_context at ffffffff81046c1b
#3 [ffff880028283710] __bad_area_nosemaphore at ffffffff81046ea5
#4 [ffff880028283760] bad_area_nosemaphore at ffffffff81046f73
#5 [ffff880028283770] __do_page_fault at ffffffff810476d1
#6 [ffff880028283890] do_page_fault...
2023 Feb 17
1
[PATCH] ocfs2: fix defrag path triggering jbd2 ASSERT
...bs2 ASSERT
crash stacks:
PID: 11297 TASK: ffff974a676dcd00 CPU: 67 COMMAND: "defragfs.ocfs2"
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 0001...
2012 Nov 26
1
kernel panic on Xen
...al exception in interrupt
[ 100.973267] Pid: 9, comm: ksoftirqd/1 Tainted: G D 3.2.23 #131
[ 100.973270] Call Trace:
[ 100.973273] [<ffffffff816674ae>] panic+0x91/0x1a2
[ 100.973278] [<ffffffff8100adb2>] ? check_events+0x12/0x20
[ 100.973282] [<ffffffff81673b0a>] oops_end+0xea/0xf0
[ 100.973286] [<ffffffff81666e6b>] no_context+0x214/0x223
[ 100.973291] [<ffffffff8113cf94>] ? kmem_cache_free+0x104/0x110
[ 100.973295] [<ffffffff8166704b>] __bad_area_nosemaphore+0x1d1/0x1f0
[ 100.973299] [<ffffffff8166707d>] bad_area_nosemaphore+0x13/0x1...
2011 Feb 11
1
null pointer dereference in iov_iter_copy_from_user_atomic while updating rpm packages
...84843] [<c046c69f>] ?
acct_collect+0x3e/0x138
Feb 10 10:59:45 testbox kernel: [ 524.584847] [<c043da92>] ?
do_exit+0x1d0/0x62c
Feb 10 10:59:45 testbox kernel: [ 524.584850] [<c043bf68>] ?
kmsg_dump+0x3a/0xb6
Feb 10 10:59:45 testbox kernel: [ 524.584853] [<c07d555b>] ?
oops_end+0xa2/0xa8
Feb 10 10:59:45 testbox kernel: [ 524.584858] [<c07cc31f>] ?
no_context+0x128/0x130
Feb 10 10:59:45 testbox kernel: [ 524.584861] [<c07cc441>] ?
__bad_area_nosemaphore+0x11a/0x122
Feb 10 10:59:45 testbox kernel: [ 524.584884] [<f81fdd20>] ?
btrfs_block_rsv_release+...
2017 Jul 11
2
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...NING (PANIC)
crash> bt
PID: 4658 TASK: ffff8803c6068f80 CPU: 7 COMMAND: "kworker/u16:26"
#0 [ffffc900039f76a0] machine_kexec at ffffffff810481fc
#1 [ffffc900039f76f0] __crash_kexec at ffffffff81109e3a
#2 [ffffc900039f77b0] crash_kexec at ffffffff8110adc9
#3 [ffffc900039f77c8] oops_end at ffffffff8101d059
#4 [ffffc900039f77e8] no_context at ffffffff81055ce5
#5 [ffffc900039f7838] do_page_fault at ffffffff81056c5b
#6 [ffffc900039f7860] page_fault at ffffffff81690a88
[exception RIP: report_bug+93]
RIP: ffffffff8167227d RSP: ffffc900039f7918 RFLAGS: 00010002
RAX: fff...
2010 Sep 17
1
General protection fault
...gt;]
do_unblank_screen+0x9e/0x170
Sep 17 15:26:18 box6 kernel: [ 1948.826165] [<ffffffff813435f0>]
unblank_screen+0x10/0x20
Sep 17 15:26:18 box6 kernel: [ 1948.826169] [<ffffffff812be8ad>]
bust_spinlocks+0x1d/0x40
Sep 17 15:26:18 box6 kernel: [ 1948.826172] [<ffffffff8155bbef>]
oops_end+0x3f/0xf0
Sep 17 15:26:18 box6 kernel: [ 1948.826175] [<ffffffff8101711b>] die
+0x5b/0x90
Sep 17 15:26:18 box6 kernel: [ 1948.826179] [<ffffffff8155b7e2>]
do_general_protection+0x152/0x160
Sep 17 15:26:18 box6 kernel: [ 1948.826182] [<ffffffff8155afa5>]
general_protection+0x25/...
2010 Sep 21
4
PROBLEM: [BISECTED] 2.6.35.5 xen domU panics just after the boot
...[<ffffffff8133bae9>] panic+0x86/0xfa
[ 0.000000] [<ffffffff8103c5c6>] do_exit+0x6d/0x77e
[ 0.000000] [<ffffffff8133d43f>] ? _raw_spin_unlock_irqrestore+0x11/0x13
[ 0.000000] [<ffffffff8103ac55>] ? kmsg_dump+0x11e/0x139
[ 0.000000] [<ffffffff8100b936>] oops_end+0x8f/0x94
[ 0.000000] [<ffffffff810239cc>] no_context+0x1f4/0x203
[ 0.000000] [<ffffffff81023b65>] __bad_area_nosemaphore+0x18a/0x1ad
[ 0.000000] [<ffffffff81023b96>] bad_area_nosemaphore+0xe/0x10
[ 0.000000] [<ffffffff81023f10>] do_page_fault+0x115/0x229
[...
2010 Sep 21
4
PROBLEM: [BISECTED] 2.6.35.5 xen domU panics just after the boot
...[<ffffffff8133bae9>] panic+0x86/0xfa
[ 0.000000] [<ffffffff8103c5c6>] do_exit+0x6d/0x77e
[ 0.000000] [<ffffffff8133d43f>] ? _raw_spin_unlock_irqrestore+0x11/0x13
[ 0.000000] [<ffffffff8103ac55>] ? kmsg_dump+0x11e/0x139
[ 0.000000] [<ffffffff8100b936>] oops_end+0x8f/0x94
[ 0.000000] [<ffffffff810239cc>] no_context+0x1f4/0x203
[ 0.000000] [<ffffffff81023b65>] __bad_area_nosemaphore+0x18a/0x1ad
[ 0.000000] [<ffffffff81023b96>] bad_area_nosemaphore+0xe/0x10
[ 0.000000] [<ffffffff81023f10>] do_page_fault+0x115/0x229
[...
2014 Sep 09
2
Re: CoreOS support
...ing kernel with flag 0x7
>> [ 7.775735] Pid: 297, comm: mount veid: 0 Tainted: G W --------------- T 2.6.32-30-pve #1
>> [ 7.775735] Call Trace:
>> [ 7.775735] [<ffffffff81072bd9>] ? add_taint+0x69/0x70
>> [ 7.775735] [<ffffffff8155c443>] ? oops_end+0x53/0xf0
>> [ 7.775735] [<ffffffff8154f0c7>] ? no_context+0x1eb/0x216
>> [ 7.775735] [<ffffffff810cc22e>] ? is_module_text_address+0xe/0x20
>> [ 7.775735] [<ffffffff8154f260>] ? __bad_area_nosemaphore+0x16e/0x18d
>> [ 7.775735] [<fffffff...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...xa0
[ 2.234004] [<ffffffff81747299>] __schedule+0x509/0x7d0
[ 2.234004] [<ffffffff81747589>] schedule+0x29/0x70
[ 2.234004] [<ffffffff81099ab7>] do_exit+0x6e7/0xa60
[ 2.234004] [<ffffffff81740516>] ? printk+0x70/0x86
[ 2.234004] [<ffffffff81017710>] oops_end+0xa0/0xe0
[ 2.234004] [<ffffffff81017bcb>] die+0x4b/0x70
[ 2.234004] [<ffffffff81013f90>] do_trap+0xb0/0x150
[ 2.234004] [<ffffffff810143f6>] do_error_trap+0xa6/0x180
[ 2.234004] [<ffffffffa0210032>] ?
virtio_device_ready.part.12+0x4/0x6 [virtio_console]
[...
2014 Oct 20
1
Virtio_config BUG with 3.18-rc1
...xa0
[ 2.234004] [<ffffffff81747299>] __schedule+0x509/0x7d0
[ 2.234004] [<ffffffff81747589>] schedule+0x29/0x70
[ 2.234004] [<ffffffff81099ab7>] do_exit+0x6e7/0xa60
[ 2.234004] [<ffffffff81740516>] ? printk+0x70/0x86
[ 2.234004] [<ffffffff81017710>] oops_end+0xa0/0xe0
[ 2.234004] [<ffffffff81017bcb>] die+0x4b/0x70
[ 2.234004] [<ffffffff81013f90>] do_trap+0xb0/0x150
[ 2.234004] [<ffffffff810143f6>] do_error_trap+0xa6/0x180
[ 2.234004] [<ffffffffa0210032>] ?
virtio_device_ready.part.12+0x4/0x6 [virtio_console]
[...
2013 Feb 14
2
[PATCH] x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.
...ral protection fault: 0000 [#2]
> ---[ end trace ab0d29a492dcd330 ]---
> Kernel panic - not syncing: Fatal exception
> Pid: 1250, comm: r Tainted: G D ---------------
> 2.6.32-356.el6.i686 #1
> Call Trace:
> [<c08476df>] ? panic+0x6e/0x122
> [<c084b63c>] ? oops_end+0xbc/0xd0
> [<c084b260>] ? do_general_protection+0x0/0x210
> [<c084a9b7>] ? error_code+0x73/
> -------------
>
> Petr says: "
> I've analysed the bug and I think that xen_iret() cannot cope with
> mangled DS, in this case zeroed out (null selector/desc...
2013 Feb 14
2
[PATCH] x86/xen: don't assume %ds is usable in xen_iret for 32-bit PVOPS.
...ral protection fault: 0000 [#2]
> ---[ end trace ab0d29a492dcd330 ]---
> Kernel panic - not syncing: Fatal exception
> Pid: 1250, comm: r Tainted: G D ---------------
> 2.6.32-356.el6.i686 #1
> Call Trace:
> [<c08476df>] ? panic+0x6e/0x122
> [<c084b63c>] ? oops_end+0xbc/0xd0
> [<c084b260>] ? do_general_protection+0x0/0x210
> [<c084a9b7>] ? error_code+0x73/
> -------------
>
> Petr says: "
> I've analysed the bug and I think that xen_iret() cannot cope with
> mangled DS, in this case zeroed out (null selector/desc...
2010 Oct 24
0
BUG: soft lockup - CPU#7 stuck for 61s! [udisks-dm-expor:11772]
...e_fl_direct_end+0x0/0x1
[22077.213987] [<ffffffff8130beda>] ? _spin_unlock_irqrestore+0xd/0xe
[22077.214046] [<ffffffff8104f2a5>] ? release_console_sem+0x17e/0x1af
[22077.214105] [<ffffffff8130beda>] ? _spin_unlock_irqrestore+0xd/0xe
[22077.214164] [<ffffffff8130cd7d>] ? oops_end+0xaf/0xb4
[22077.214222] [<ffffffff810135f0>] ? do_invalid_op+0x8b/0x95
[22077.214279] [<ffffffff8100c60c>] ? pin_pagetable_pfn+0x2d/0x36
[22077.214338] [<ffffffff810bacff>] ? __alloc_pages_nodemask+0x11c/0x5f5
[22077.214397] [<ffffffff8101293b>] ? invalid_op+0x1b/0x20
[...
2009 Nov 08
9
2.6.31 xenified kernel - not ready for production
Hi,
I just want to know if somebody use 2.6.31.4 xenified kernel (aka
OpenSUSE) in production?
We have been testing it on new Nehalem Xeon server for few weeks w/o
any problem.
But as soon we tried it on production machine - after several
production domUs started - hard OS failure.
We had to switch back to 2.6.18.8 - xen stock kernel.
Peter
_______________________________________________
2017 Jul 11
0
[regression drm/noveau] suspend to ram -> BOOM: exception RIP: drm_calc_vbltimestamp_from_scanoutpos+335
...t
> PID: 4658 TASK: ffff8803c6068f80 CPU: 7 COMMAND: "kworker/u16:26"
> #0 [ffffc900039f76a0] machine_kexec at ffffffff810481fc
> #1 [ffffc900039f76f0] __crash_kexec at ffffffff81109e3a
> #2 [ffffc900039f77b0] crash_kexec at ffffffff8110adc9
> #3 [ffffc900039f77c8] oops_end at ffffffff8101d059
> #4 [ffffc900039f77e8] no_context at ffffffff81055ce5
> #5 [ffffc900039f7838] do_page_fault at ffffffff81056c5b
> #6 [ffffc900039f7860] page_fault at ffffffff81690a88
> [exception RIP: report_bug+93]
> RIP: ffffffff8167227d RSP: ffffc900039f7918 RFLA...
[merged mm-hotfixes-stable] ocfs2-fix-defrag-path-triggering-jbd2-assert.patch removed from -mm tree
2023 Feb 28
0
[merged mm-hotfixes-stable] ocfs2-fix-defrag-path-triggering-jbd2-assert.patch removed from -mm tree
...bs2 ASSERT
crash stacks:
PID: 11297 TASK: ffff974a676dcd00 CPU: 67 COMMAND: "defragfs.ocfs2"
#0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01
#1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d
#2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d
#3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f
#4 [ffffb25d8dad3a58] do_trap at ffffffff83833205
#5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6
#6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18
[exception RIP: jbd2_journal_dirty_metadata+0x2ba]
RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 0001...