WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] scp bug report

To: xen-ia64-devel <xen-ia64-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-ia64-devel] scp bug report
From: Alex Williamson <alex.williamson@xxxxxx>
Date: Tue, 01 Aug 2006 15:55:36 -0600
Delivery-date: Tue, 01 Aug 2006 14:55:58 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Organization: OSLO R&D
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
   FYI, I get the below BUG_ON when I try to scp a file from dom0.  To
reproduce, from dom0, scp a file from a remote system (ex. scp
user@remote:~/file ./).  Looks like we're expecting IRQs to be enabled,
but they're not.  Anyone else seeing this?  Thanks,

        Alex

kernel BUG at fs/buffer.c:1346!
ssh[4382]: bugcheck! 0 [1]
Modules linked in:

Pid: 4382, CPU 0, comm:                  ssh
psr : 0000001008022030 ifs : 800000000000048c ip  : [<a00000010012b330>]    Not 
tainted
ip is at __find_get_block+0x630/0x860
unat: 0000000000000000 pfs : 800000000000048c rsc : 000000000000000b
rnat: 0000000000000000 bsps: a00000010101a710 pr  : 00000000005a9999
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a00000010012b330 b6  : a0000001000ba4c0 b7  : a00000010000ad40
f6  : 1003e0000000000000024 f7  : 1003e28f5c28f5c28f5c3
f8  : 1003e00000000000000e1 f9  : 1003e000000002d000000
f10 : 1003e0000000035a4e900 f11 : 1003ed6bf94d5e57a42bd
r1  : a00000010101a710 r2  : a000000100e3ee98 r3  : a000000100e3ee98
r8  : 0000000000000023 r9  : 0000000000000000 r10 : a000000100e44150
r11 : e000000066250f14 r12 : e000000066257c90 r13 : e000000066250000
r14 : 0000000000000001 r15 : f100000000000001 r16 : f100000000004c18
r17 : e00000007a4ffe18 r18 : 0000000000000000 r19 : 0000000000000000
r20 : 0000000000000000 r21 : 0000000000000004 r22 : 0000000000000000
r23 : 0000000000000000 r24 : e000000066250f14 r25 : e000000066250f14
r26 : 0000000000000740 r27 : 0000000000000074 r28 : 0000000000000074
r29 : 0000000000000074 r30 : 0000000000000000 r31 : 0000000000000000

Call Trace:
 [<a00000010001cae0>] show_stack+0x40/0xa0
                                sp=e000000066257820 bsp=e000000066251720
 [<a00000010001d3e0>] show_regs+0x840/0x880
                                sp=e0000000662579f0 bsp=e0000000662516c8
 [<a000000100041920>] die+0x1c0/0x3e0
                                sp=e0000000662579f0 bsp=e000000066251680
 [<a000000100041b90>] die_if_kernel+0x50/0x80
                                sp=e000000066257a10 bsp=e000000066251650
 [<a0000001000432c0>] ia64_bad_break+0x260/0x4a0
                                sp=e000000066257a10 bsp=e000000066251628
 [<a000000100068ea0>] xen_leave_kernel+0x0/0x3b0
                                sp=e000000066257ac0 bsp=e000000066251628
 [<a00000010012b330>] __find_get_block+0x630/0x860
                                sp=e000000066257c90 bsp=e0000000662515c0
 [<a00000010012b590>] __getblk+0x30/0x5e0
                                sp=e000000066257cd0 bsp=e000000066251570
 [<a00000010021f6d0>] __ext3_get_inode_loc+0x370/0x8a0
                                sp=e000000066257cd0 bsp=e0000000662514f8
 [<a00000010021fc40>] ext3_get_inode_loc+0x40/0x60
                                sp=e000000066257cd0 bsp=e0000000662514d0
 [<a00000010021fca0>] ext3_reserve_inode_write+0x40/0x160
                                sp=e000000066257cd0 bsp=e000000066251490
 [<a00000010021fdf0>] ext3_mark_inode_dirty+0x30/0x80
                                sp=e000000066257cd0 bsp=e000000066251468
 [<a000000100226530>] ext3_dirty_inode+0xd0/0x120
                                sp=e000000066257cf0 bsp=e000000066251438
 [<a00000010017bb90>] __mark_inode_dirty+0x90/0x420
                                sp=e000000066257cf0 bsp=e0000000662513f0
 [<a000000100164ef0>] touch_atime+0x1f0/0x220
                                sp=e000000066257cf0 bsp=e0000000662513c8
 [<a00000010014ce80>] __link_path_walk+0x17e0/0x22c0
                                sp=e000000066257d10 bsp=e000000066251370
 [<a00000010014da20>] link_path_walk+0xc0/0x260
                                sp=e000000066257d30 bsp=e000000066251330
 [<a00000010014e480>] do_path_lookup+0x520/0x5c0
                                sp=e000000066257da0 bsp=e0000000662512f0
 [<a00000010014fc80>] __path_lookup_intent_open+0x80/0x120
                                sp=e000000066257db0 bsp=e000000066251298
 [<a00000010014fe20>] path_lookup_open+0x40/0x60
                                sp=e000000066257db0 bsp=e000000066251258
 [<a000000100150130>] open_namei+0xb0/0xea0
                                sp=e000000066257db0 bsp=e0000000662511e8
 [<a000000100122830>] do_filp_open+0x50/0xc0
                                sp=e000000066257dc0 bsp=e0000000662511b0
 [<a000000100122920>] do_sys_open+0x80/0x1c0
                                sp=e000000066257e30 bsp=e000000066251160
 [<a000000100122b30>] sys_open+0x50/0x80
                                sp=e000000066257e30 bsp=e000000066251108
 [<a000000100013f40>] ia64_ret_from_syscall+0x0/0x40
                                sp=e000000066257e30 bsp=e000000066251108

-- 
Alex Williamson                             HP Open Source & Linux Org.


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel

<Prev in Thread] Current Thread [Next in Thread>