Guest User

Untitled

a guest
Aug 18th, 2018
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.41 KB | None | 0 0
  1. Modules linked in: ipv6
  2. Pid: 39, comm: xenwatch Not tainted 2.6.32-xenU-3831-x86_64 #12
  3. RIP: e030:[<ffffffff811db20b>] [<ffffffff811db20b>] kobject_uevent_env+0x6b/0x430
  4. RSP: e02b:ffff88000f98fc90 EFLAGS: 00010206
  5. RAX: ffff88000eef33d0 RBX: ffff88000eef33e8 RCX: 0000000000000002
  6. RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff88000eef33d0
  7. RBP: ffff88000ec52000 R08: 0000000000000207 R09: 0000000000000987
  8. R10: 0000000000000002 R11: ffffffff811971d0 R12: ffff88000eef33d0
  9. R13: 6e67697369726556 R14: 0000000000000001 R15: 0000000000000000
  10. FS: 00007fcbc0ea37a0(0000) GS:ffff8800015ca000(0000) knlGS:0000000000000000
  11. CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
  12. CR2: 00007fff062f3400 CR3: 000000000efa4000 CR4: 0000000000002660
  13. DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  14. DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  15. Process xenwatch (pid: 39, threadinfo ffff88000f98e000, task ffff88000f976fe0)
  16. Stack:
  17. ffff88000ef25410 ffffffff8112afa5 ffff8800016e5100 ffffffff81387186
  18. <0> ffff880000000000 ffffffff00000000 ffff88000f98fcc0 ffff88000f98fcc0
  19. <0> 0000000000000000 ffff88000ed50cd0 ffffffff813714f4 ffff88000eef33d0
  20. Call Trace:
  21. [<ffffffff8112afa5>] ? sysfs_addrm_finish+0x1a5/0x270
  22. [<ffffffff811c5fdb>] ? elv_unregister_queue+0x1b/0x30
  23. [<ffffffff811caf5c>] ? blk_unregister_queue+0x2c/0x80
  24. [<ffffffff811cf9df>] ? unlink_gendisk+0x2f/0x50
  25. [<ffffffff81123725>] ? del_gendisk+0x85/0x130
  26. [<ffffffff8121e576>] ? blkfront_closing+0x86/0xa0
  27. [<ffffffff8121e944>] ? backend_changed+0x3b4/0x5b0
  28. [<ffffffff8100e8a9>] ? xen_force_evtchn_callback+0x9/0x10
  29. [<ffffffff8100efc2>] ? check_events+0x12/0x20
  30. [<ffffffff811f0736>] ? xenbus_read_driver_state+0x26/0x40
  31. [<ffffffff811f1c42>] ? xenwatch_thread+0xb2/0x170
  32. [<ffffffff81057810>] ? autoremove_wake_function+0x0/0x30
  33. [<ffffffff811f1b90>] ? xenwatch_thread+0x0/0x170
  34. [<ffffffff81057506>] ? kthread+0x96/0xb0
  35. [<ffffffff81012eea>] ? child_rip+0xa/0x20
  36. [<ffffffff810120e6>] ? int_ret_from_sys_call+0x7/0x1b
  37. [<ffffffff8101289d>] ? retint_restore_args+0x5/0x6
  38. [<ffffffff81012ee0>] ? child_rip+0x0/0x20
  39. Code: 48 89 f8 eb 0c 0f 1f 00 48 8b 40 18 48 85 c0 74 7f 48 8b 58 20 48 85 db 74 ee 41 f6 44 24 3c 10 4c 8b 6b 58 75 38 4d 85 ed 74 75 <49> 8b 45 00 48 85 c0 74 0c 4c 89 e6 48 89 df ff d0 85 c0 74 1e
  40. RIP [<ffffffff811db20b>] kobject_uevent_env+0x6b/0x430
  41. RSP <ffff88000f98fc90>
  42. ---[ end trace 9839b936d6547d86 ]---
Add Comment
Please, Sign In to add comment