WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 254] New: Oops in NFS

http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=254

           Summary: Oops in NFS
           Product: Xen
           Version: unstable
          Platform: All
        OS/Version: Linux-2.6
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Guest-OS
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: kip.macy@xxxxxxxxx


I don't know if this is tied to my lockups or not.
Vanilla supermicro dual dual-core opteron 8GB RAM, dom0_mem=1GB. I wasn't doing
much besides looking through some files.

Unable to handle kernel paging request at virtual address 736e7970
 printing eip:
c0461b59
*pde = ma 00000000 pa 55555000
Oops: 0002 [#1]
PREEMPT 
Modules linked in: video thermal processor fan button battery ac
CPU:    0
EIP:    0061:[<c0461b59>]    Not tainted VLI
EFLAGS: 00010202   (2.6.12-xen0) 
EIP is at put_rpccred+0x9/0x30
eax: 000626fa   ebx: f2a80e18   ecx: f2a80ea8   edx: 736e7964
esi: f2a80e64   edi: ee80fe88   ebp: 00000004   esp: ee80fe64
ds: 007b   es: 007b   ss: 0069
Process zcat (pid: 27366, threadinfo=ee80e000 task=f350e510)
Stack: c01fe7d8 736e7964 f2a80e64 ee80fe88 c0701700 c01fe858 f2a80e64 ee80fe88 
       ee80fe88 000626fa c0701700 00000007 00000000 c0701700 c0701700 f2a80e64 
       00000004 c01fe953 f2a80e64 c0701700 00000004 f2a80e64 c01fe890 ee80ff58 
Call Trace:
 [<c01fe7d8>] nfs_access_add_cache+0x58/0x60
 [<c01fe858>] nfs_do_access+0x78/0xb0
 [<c01fe953>] nfs_permission+0xc3/0x190
 [<c01fe890>] nfs_permission+0x0/0x190
 [<c01763a2>] permission+0xa2/0xb0
 [<c0178355>] may_open+0x65/0x230
 [<c0178644>] open_namei+0x124/0x650
 [<c0165c8b>] filp_open+0x3b/0x70
 [<c0165f6c>] get_unused_fd+0x2c/0xd0
 [<c0166119>] sys_open+0x49/0x90
 [<c0108fa5>] syscall_call+0x7/0xb
Code: 40 0c 8b 40 08 89 44 24 08 0f b7 83 b0 00 00 00 c7 04 24 e2 66 4d c0 89 44
24 04 e8 72 d6 cb ff eb c1 8b 54 24 04 a1 c0 f1 4e c0 <89> 42 0c ff 4a 10 0f 94
c0 84 c0 75 01 c3 8b 42 08 89 54 24 04

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 254] New: Oops in NFS, bugzilla-daemon <=