Guest User

Untitled

a guest
Oct 20th, 2012
49
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Oct 20 16:02:43 dom0 logger: /etc/xen/scripts/vif-bridge: Successful vif-bridge offline for vif6.0, bridge brloc.
  2. Oct 20 16:02:43 dom0 logger: /etc/xen/scripts/xen-hotplug-cleanup: XENBUS_PATH=backend/vif/6/0
  3. Oct 20 16:04:17 dom0 logger: /etc/xen/scripts/xen-hotplug-cleanup: Forced to steal lock on /var/run/xen-hotplug/block from 3554: /etc/xen/scripts/block!
  4. Oct 20 16:04:17 dom0 logger: /etc/xen/scripts/xen-hotplug-cleanup: Forced to steal lock on /var/run/xen-hotplug/block from unknown!
  5. Oct 20 16:04:17 dom0 logger: /etc/xen/scripts/xen-hotplug-cleanup: Forced to steal lock on /var/run/xen-hotplug/block from unknown!
  6. Oct 20 16:04:17 dom0 logger: /etc/xen/scripts/xen-hotplug-cleanup: Forced to steal lock on /var/run/xen-hotplug/block from unknown!
  7. Oct 20 16:04:20 dom0 kernel: [ 518.559313] BUG: unable to handle kernel paging request at ffff8803ced69000
  8. Oct 20 16:04:20 dom0 kernel: [ 518.560766] IP: [<ffffffff81015d73>] __sanitize_i387_state+0x24/0xe1
  9. Oct 20 16:04:20 dom0 kernel: [ 518.562154] PGD 1606067 PUD b9cac067 PMD b9d23067 PTE 0
  10. Oct 20 16:04:20 dom0 kernel: [ 518.563529] Oops: 0000 [#3] SMP
  11. Oct 20 16:04:20 dom0 kernel: [ 518.564878] CPU 4
  12. Oct 20 16:04:20 dom0 kernel: [ 518.564885] Modules linked in: xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack xt_physdev iptable_filter ip_tables xen_netback xen_blkback acpi_cpufreq cpufreq_userspace cpufreq_stats cpufreq_conservative cpufreq_powersave ebt_dnat ebtable_nat ebtables x_tables xen_evtchn xenfs bridge stp ext2 loop i915 drm_kms_helper drm i2c_algo_bit eeepc_wmi coretemp crc32c_intel i2c_i801 i2c_core snd_pcm snd_timer snd soundcore snd_page_alloc asus_wmi ghash_clmulni_intel sparse_keymap pcspkr rfkill tpm_tis tpm tpm_bios aesni_intel cryptd aes_x86_64 psmouse joydev aes_generic evdev serio_raw video button wmi ext4 mbcache jbd2 crc16 dm_mod multipath linear mperf aacraid 3w_xxxx raid10 raid456 async_raid6_recov async_pq raid6_pq async_xor xor async_memcpy async_tx raid1 raid0 md_mod sata_nv sata_sil sata_via usbhid hid sd_mod crc_t10dif xhci_hcd ahci libahci libata ehci_hcd e1000e 3w_9xxx usbcore scsi_mod usb_common processor thermal_sys [last unloaded: scsi_wait_scan]
  13. Oct 20 16:04:20 dom0 kernel: [ 518.577064]
  14. Oct 20 16:04:20 dom0 kernel: [ 518.578362] Pid: 3678, comm: udevd Tainted: G D 3.2.0-0.bpo.3-amd64 #1 System manufacturer System Product Name/P8B WS
  15. Oct 20 16:04:20 dom0 kernel: [ 518.580977] RIP: e030:[<ffffffff81015d73>] [<ffffffff81015d73>] __sanitize_i387_state+0x24/0xe1
  16. Oct 20 16:04:20 dom0 kernel: [ 518.582284] RSP: e02b:ffff8803cf049e10 EFLAGS: 00010246
  17. Oct 20 16:04:20 dom0 kernel: [ 518.583570] RAX: 0000000000000000 RBX: 00007fffa7c07ac0 RCX: 0000000000000200
  18. Oct 20 16:04:20 dom0 kernel: [ 518.584906] RDX: ffff8803ced68e00 RSI: ffff8803cf049fd8 RDI: ffff8803cf250240
  19. Oct 20 16:04:20 dom0 kernel: [ 518.586191] RBP: ffff8803cf250240 R08: dead000000200200 R09: dead000000100100
  20. Oct 20 16:04:20 dom0 kernel: [ 518.587440] R10: ffff8803e6b0b170 R11: ffffffff81004511 R12: 0000000000000000
  21. Oct 20 16:04:20 dom0 kernel: [ 518.588672] R13: 00007fffa7c078f8 R14: ffff8803cf250240 R15: 00007fffa7c07ac0
  22. Oct 20 16:04:20 dom0 kernel: [ 518.589895] FS: 00007f4355f567a0(0000) GS:ffff8803e6b00000(0000) knlGS:0000000000000000
  23. Oct 20 16:04:20 dom0 kernel: [ 518.591102] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
  24. Oct 20 16:04:20 dom0 kernel: [ 518.592295] CR2: ffff8803ced69000 CR3: 00000003d0969000 CR4: 0000000000002660
  25. Oct 20 16:04:20 dom0 kernel: [ 518.593479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  26. Oct 20 16:04:20 dom0 kernel: [ 518.594651] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  27. Oct 20 16:04:20 dom0 kernel: [ 518.595803] Process udevd (pid: 3678, threadinfo ffff8803cf048000, task ffff8803cf250240)
  28. Oct 20 16:04:20 dom0 kernel: [ 518.596947] Stack:
  29. Oct 20 16:04:20 dom0 kernel: [ 518.598065] ffffffff81015f48 ffff8803cf049f58 000000000000000f ffff8803cf2506e8
  30. Oct 20 16:04:20 dom0 kernel: [ 518.599192] ffffffff8100e132 ffff8803cf250240 ffffffff81368e18 000000000000000f
  31. Oct 20 16:04:20 dom0 kernel: [ 518.600304] ffffffff00000000 000000000000016d ffffffff8106aec3 0000000000000000
  32. Oct 20 16:04:20 dom0 kernel: [ 518.601397] Call Trace:
  33. Oct 20 16:04:20 dom0 kernel: [ 518.602462] [<ffffffff81015f48>] ? save_i387_xstate+0x118/0x1e2
  34. Oct 20 16:04:20 dom0 kernel: [ 518.603522] [<ffffffff8100e132>] ? do_signal+0x21f/0x635
  35. Oct 20 16:04:20 dom0 kernel: [ 518.604560] [<ffffffff81368e18>] ? do_page_fault+0x311/0x34c
  36. Oct 20 16:04:20 dom0 kernel: [ 518.605579] [<ffffffff8106aec3>] ? ktime_get_ts+0x5f/0x85
  37. Oct 20 16:04:20 dom0 kernel: [ 518.606582] [<ffffffff81057c2d>] ? __set_task_blocked+0x5a/0x61
  38. Oct 20 16:04:20 dom0 kernel: [ 518.607564] [<ffffffff8100e56d>] ? do_notify_resume+0x25/0x67
  39. Oct 20 16:04:20 dom0 kernel: [ 518.608528] [<ffffffff8136b560>] ? int_signal+0x12/0x17
  40. Oct 20 16:04:20 dom0 kernel: [ 518.609474] Code: c1 ea 20 0f 01 d1 c3 48 8b 97 50 04 00 00 48 85 d2 0f 84 d0 00 00 00 83 bf 48 04 00 00 00 74 04 0f 0b eb fe 48 8b 05 bd 87 72 00 <48> 8b b2 00 02 00 00 48 89 c1 48 21 f1 48 39 c1 0f 84 a6 00 00
  41. Oct 20 16:04:20 dom0 kernel: [ 518.611541] RIP [<ffffffff81015d73>] __sanitize_i387_state+0x24/0xe1
  42. Oct 20 16:04:20 dom0 kernel: [ 518.612497] RSP <ffff8803cf049e10>
  43. Oct 20 16:04:20 dom0 kernel: [ 518.613429] CR2: ffff8803ced69000
  44. Oct 20 16:04:20 dom0 kernel: [ 518.614342] ---[ end trace cdba5ed7bb2d3d9c ]---
  45. Oct 20 16:04:20 dom0 udevd[365]: worker [3678] unexpectedly returned with status 0x0009
RAW Paste Data