Advertisement
Guest User

Untitled

a guest
Sep 19th, 2014
267
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.65 KB | None | 0 0
  1. <4>[77536.845298] LVE: [7093] _lve_enter: lve id must not be equal ROOT_LVE
  2. <4>[77536.846441] LVE: [7093] _lve_enter: Can't enter lve from a slave context, pid 7093, oldve 1005
  3. <4>[77536.846753] LVE: [7094] __lve_leave: trying to leave without entering lve 7094:unit
  4. <1>[80273.464296] BUG: unable to handle kernel NULL pointer dereference at 0000000000000009
  5. <1>[80273.464659] IP: [<ffffffff812a19f7>] __list_add+0x17/0xa0
  6. <4>[80273.464659] PGD 7c0c7067 PUD 7c694067 PMD 0
  7. <4>[80273.464810] Oops: 0000 [#1] SMP
  8. <4>[80273.464810] last sysfs file: /sys/devices/system/cpu/online
  9. <4>[80273.464810] CPU 0
  10. <4>[80273.464810] Modules linked in: vzethdev pio_nfs pio_direct pfmt_raw pfmt_ploop1 ploop simfs vzrst nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 vzcpt nfs lockd fscache auth_rpcgss nfs_acl sunrpc vziolimit vzdquota ip6table_mangle xt_length xt_hl xt_tcpmss xt_TCPMSS iptable_mangle iptable_filter xt_multiport xt_limit xt_dscp ipt_REJECT ip_tables vzevent vznetdev vzmon vzdev lve(P)(U) iolimits(P)(U) ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 ppdev parport_pc parport i2c_piix4 i2c_core snd_intel8x0 snd_ac97_codec ac97_bus snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc e1000 sg ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan]
  11. <4>[80273.464810]
  12. <4>[80273.464810] Pid: 8052, comm: env veid: 0 Tainted: P --------------- 2.6.32-531.29.2.lve1.2.67.el6.x86_64 #1 042stab093_5 innotek GmbH VirtualBox/VirtualBox
  13. <4>[80273.464810] RIP: 0010:[<ffffffff812a19f7>] [<ffffffff812a19f7>] __list_add+0x17/0xa0
  14. <4>[80273.464810] RSP: 0018:ffff88007da93a88 EFLAGS: 00010086
  15. <4>[80273.464810] RAX: 0000000000000246 RBX: ffff88007da93b30 RCX: 0000000000000000
  16. <4>[80273.464810] RDX: 0000000000000001 RSI: ffff88007d06be88 RDI: ffff88007da93b30
  17. <4>[80273.464810] RBP: ffff88007da93aa8 R08: 0000000000000001 R09: 0000000000000001
  18. <4>[80273.464810] R10: ffff88007da93fd8 R11: 0000000000000000 R12: 0000000000000282
  19. <4>[80273.464810] R13: ffff88007da93b18 R14: ffff88007dbbad50 R15: 0000000000000012
  20. <4>[80273.464810] FS: 00007f0282e8e700(0000) GS:ffff880002600000(0000) knlGS:0000000000000000
  21. <4>[80273.464810] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  22. <4>[80273.464810] CR2: 0000000000000009 CR3: 000000007c565000 CR4: 00000000000006f0
  23. <4>[80273.464810] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  24. <4>[80273.464810] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  25. <4>[80273.464810] Process env (pid: 8052, veid: 0, threadinfo ffff88007da92000, task ffff88007dbbad50)
  26. <4>[80273.464810] Stack:
  27. <4>[80273.464810] ffff88007dbbad50 ffff88007d06be80 0000000000000282 ffff88007da93b18
  28. <4>[80273.464810] <d> ffff88007da93ae8 ffffffff810a2511 0000000000000008 0000000000000246
  29. <4>[80273.464810] <d> ffff88007da93af8 ffff88007da93b18 ffff88007d06be40 ffff88007d06be80
  30. <4>[80273.464810] Call Trace:
  31. <4>[80273.464810] [<ffffffff810a2511>] prepare_to_wait+0x71/0x80
  32. <4>[80273.464810] [<ffffffffa03792b2>] iolimit_virtinfo+0x1b2/0x460 [vziolimit]
  33. <4>[80273.464810] [<ffffffff81161569>] ? zone_statistics+0x99/0xc0
  34. <4>[80273.464810] [<ffffffff810a21c0>] ? autoremove_wake_function+0x0/0x40
  35. <4>[80273.464810] [<ffffffff81092966>] ? virtinfo_notifier_call+0x76/0xb0
  36. <4>[80273.464810] [<ffffffff81092966>] virtinfo_notifier_call+0x76/0xb0
  37. <4>[80273.464810] [<ffffffff811386de>] generic_file_read_iter+0x49e/0x680
  38. <4>[80273.464810] [<ffffffff8113894b>] generic_file_aio_read+0x8b/0xa0
  39. <4>[80273.464810] [<ffffffff811ad64a>] do_sync_read+0xfa/0x140
  40. <4>[80273.464810] [<ffffffffa00de4c6>] ? ext4_xattr_find_entry+0x36/0xf0 [ext4]
  41. <4>[80273.464810] [<ffffffff810a21c0>] ? autoremove_wake_function+0x0/0x40
  42. <4>[80273.464810] [<ffffffffa00e1c2b>] ? ext4_xattr_security_get+0x2b/0x30 [ext4]
  43. <4>[80273.464810] [<ffffffff811c9d29>] ? dput_nocache+0xc9/0x250
  44. <4>[80273.464810] [<ffffffff811adfe5>] vfs_read+0xb5/0x1a0
  45. <4>[80273.464810] [<ffffffff811b60a6>] kernel_read+0x46/0x60
  46. <4>[80273.464810] [<ffffffff811b619c>] prepare_binprm+0xdc/0x110
  47. <4>[80273.464810] [<ffffffff811b7936>] do_execve+0x1a6/0x2d0
  48. <4>[80273.464810] [<ffffffff8100966a>] sys_execve+0x4a/0x80
  49. <4>[80273.464810] [<ffffffff8100b55a>] stub_execve+0x6a/0xc0
  50. <4>[80273.464810] Code: ff 48 8b 03 eb 92 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 48 83 ec 20 48 89 5d e8 4c 89 65 f0 48 89 fb 4c 89 6d f8 <4c> 8b 42 08 49 89 f5 49 89 d4 49 39 f0 75 27 4d 8b 45 00 4d 39
  51. <1>[80273.464810] RIP [<ffffffff812a19f7>] __list_add+0x17/0xa0
  52. <4>[80273.464810] RSP <ffff88007da93a88>
  53. <4>[80273.464810] CR2: 0000000000000009
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement