[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-ia64-devel] scp bug report



   FYI, I get the below BUG_ON when I try to scp a file from dom0.  To
reproduce, from dom0, scp a file from a remote system (ex. scp
user@remote:~/file ./).  Looks like we're expecting IRQs to be enabled,
but they're not.  Anyone else seeing this?  Thanks,

        Alex

kernel BUG at fs/buffer.c:1346!
ssh[4382]: bugcheck! 0 [1]
Modules linked in:

Pid: 4382, CPU 0, comm:                  ssh
psr : 0000001008022030 ifs : 800000000000048c ip  : [<a00000010012b330>]    Not 
tainted
ip is at __find_get_block+0x630/0x860
unat: 0000000000000000 pfs : 800000000000048c rsc : 000000000000000b
rnat: 0000000000000000 bsps: a00000010101a710 pr  : 00000000005a9999
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a00000010012b330 b6  : a0000001000ba4c0 b7  : a00000010000ad40
f6  : 1003e0000000000000024 f7  : 1003e28f5c28f5c28f5c3
f8  : 1003e00000000000000e1 f9  : 1003e000000002d000000
f10 : 1003e0000000035a4e900 f11 : 1003ed6bf94d5e57a42bd
r1  : a00000010101a710 r2  : a000000100e3ee98 r3  : a000000100e3ee98
r8  : 0000000000000023 r9  : 0000000000000000 r10 : a000000100e44150
r11 : e000000066250f14 r12 : e000000066257c90 r13 : e000000066250000
r14 : 0000000000000001 r15 : f100000000000001 r16 : f100000000004c18
r17 : e00000007a4ffe18 r18 : 0000000000000000 r19 : 0000000000000000
r20 : 0000000000000000 r21 : 0000000000000004 r22 : 0000000000000000
r23 : 0000000000000000 r24 : e000000066250f14 r25 : e000000066250f14
r26 : 0000000000000740 r27 : 0000000000000074 r28 : 0000000000000074
r29 : 0000000000000074 r30 : 0000000000000000 r31 : 0000000000000000

Call Trace:
 [<a00000010001cae0>] show_stack+0x40/0xa0
                                sp=e000000066257820 bsp=e000000066251720
 [<a00000010001d3e0>] show_regs+0x840/0x880
                                sp=e0000000662579f0 bsp=e0000000662516c8
 [<a000000100041920>] die+0x1c0/0x3e0
                                sp=e0000000662579f0 bsp=e000000066251680
 [<a000000100041b90>] die_if_kernel+0x50/0x80
                                sp=e000000066257a10 bsp=e000000066251650
 [<a0000001000432c0>] ia64_bad_break+0x260/0x4a0
                                sp=e000000066257a10 bsp=e000000066251628
 [<a000000100068ea0>] xen_leave_kernel+0x0/0x3b0
                                sp=e000000066257ac0 bsp=e000000066251628
 [<a00000010012b330>] __find_get_block+0x630/0x860
                                sp=e000000066257c90 bsp=e0000000662515c0
 [<a00000010012b590>] __getblk+0x30/0x5e0
                                sp=e000000066257cd0 bsp=e000000066251570
 [<a00000010021f6d0>] __ext3_get_inode_loc+0x370/0x8a0
                                sp=e000000066257cd0 bsp=e0000000662514f8
 [<a00000010021fc40>] ext3_get_inode_loc+0x40/0x60
                                sp=e000000066257cd0 bsp=e0000000662514d0
 [<a00000010021fca0>] ext3_reserve_inode_write+0x40/0x160
                                sp=e000000066257cd0 bsp=e000000066251490
 [<a00000010021fdf0>] ext3_mark_inode_dirty+0x30/0x80
                                sp=e000000066257cd0 bsp=e000000066251468
 [<a000000100226530>] ext3_dirty_inode+0xd0/0x120
                                sp=e000000066257cf0 bsp=e000000066251438
 [<a00000010017bb90>] __mark_inode_dirty+0x90/0x420
                                sp=e000000066257cf0 bsp=e0000000662513f0
 [<a000000100164ef0>] touch_atime+0x1f0/0x220
                                sp=e000000066257cf0 bsp=e0000000662513c8
 [<a00000010014ce80>] __link_path_walk+0x17e0/0x22c0
                                sp=e000000066257d10 bsp=e000000066251370
 [<a00000010014da20>] link_path_walk+0xc0/0x260
                                sp=e000000066257d30 bsp=e000000066251330
 [<a00000010014e480>] do_path_lookup+0x520/0x5c0
                                sp=e000000066257da0 bsp=e0000000662512f0
 [<a00000010014fc80>] __path_lookup_intent_open+0x80/0x120
                                sp=e000000066257db0 bsp=e000000066251298
 [<a00000010014fe20>] path_lookup_open+0x40/0x60
                                sp=e000000066257db0 bsp=e000000066251258
 [<a000000100150130>] open_namei+0xb0/0xea0
                                sp=e000000066257db0 bsp=e0000000662511e8
 [<a000000100122830>] do_filp_open+0x50/0xc0
                                sp=e000000066257dc0 bsp=e0000000662511b0
 [<a000000100122920>] do_sys_open+0x80/0x1c0
                                sp=e000000066257e30 bsp=e000000066251160
 [<a000000100122b30>] sys_open+0x50/0x80
                                sp=e000000066257e30 bsp=e000000066251108
 [<a000000100013f40>] ia64_ret_from_syscall+0x0/0x40
                                sp=e000000066257e30 bsp=e000000066251108

-- 
Alex Williamson                             HP Open Source & Linux Org.


_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.