<1>Unable to handle kernel paging request at virtual address 5b5b5b5b5b5b5b8b
<4>kjournald[761]: Oops 11003706212352 [1]
<4>Modules linked in: md dm_mod button sg usbhid uhci_hcd usbcore
<4>
<4>Pid: 761, CPU 2, comm: kjournald
<4>psr : 0000121008026018 ifs : 8000000000000590 ip : [<a0000001002404c1>] Not tainted
<4>ip is at __journal_file_buffer+0x481/0x6a0
[2]more>
<4>unat: 0000000000000000 pfs : 0000000000001229 rsc : 0000000000000003
<4>rnat: 0000000000000000 bsps: 0000000000000000 pr : 000000000000a541
<4>ldrs: 0000000000000000 ccv : 000000000008a01d fpsr: 0009804c8a70433f
<4>csd : 0000000000000000 ssd : 0000000000000000
<4>b0 : a000000100240440 b6 : a0000001006fd4c0 b7 : a000000100462940
<4>f6 : 1003e0000000000000000 f7 : 0ffdd8000000000000000
<4>f8 : 1003e0000000000000000 f9 : 1003e0000000000000005
<4>f10 : 1003e000000000001c1b0 f11 : 1003e00000000000c4bd0
<4>r1 : a000000100c9e3a0 r2 : 000000000008a01d r3 : 000000000008a01d
<4>r8 : 0000000000000001 r9 : 0000000000000000 r10 : ffffffffffaba650
<4>r11 : a000000100785df0 r12 : e00000018198fb10 r13 : e000000181980000
<4>r14 : 0000000000000000 r15 : a000000100785db0 r16 : 0000000000000040
<4>r17 : 0000000000040000 r18 : e00000006258bfd0 r19 : e00000004af096e8
<4>r20 : e00000004af09718 r21 : e0000001cb3313f0 r22 : 000000000008a01d
<4>r23 : 0000000000000000 r24 : e0000001fe4a9c00 r25 : e0000001fe4a82a0
<4>r26 : 0000000000000009 r27 : 0000000000000000 r28 : a00000010023ff90
<4>r29 : ffffffffffaba238 r30 : a000000100785d58 r31 : 0000000000000008
<4>
<4>Call Trace:
<4> [<a000000100018f00>] show_stack+0x80/0xa0
<4> sp=e00000018198f6a0 bsp=e000000181981138
<4> [<a00000010003a790>] die+0x150/0x1e0
<4> sp=e00000018198f870 bsp=e0000001819810f8
[2]more><4> [<a000000100058760>] ia64_do_page_fault+0x720/0xa60
<4> sp=e00000018198f870 bsp=e000000181981090
<4> [<a000000100010480>] ia64_leave_kernel+0x0/0x260
<4> sp=e00000018198f940 bsp=e000000181981090
<4> [<a0000001002404c0>] __journal_file_buffer+0x480/0x6a0
<4> sp=e00000018198fb10 bsp=e000000181981010
<4> [<a000000100247bc0>] journal_commit_transaction+0xba0/0x3520
<4> sp=e00000018198fb10 bsp=e000000181980ee8
<4> [<a000000100256550>] kjournald+0x1d0/0x7a0
<4> sp=e00000018198fd80 bsp=e000000181980e78
<4> [<a0000001000177e0>] kernel_thread_helper+0xe0/0x100
<4> sp=e00000018198fe30 bsp=e000000181980e50
<4> [<a000000100009060>] start_kernel_thread+0x20/0x40
<4> sp=e00000018198fe30 bsp=e000000181980e50
[2]kdb> bt
Stack traceback for pid 761
0xe000000181980000 761 1 1 2 R 0xe0000001819803f0 *kjournald
0xa0000001002404c0 __journal_file_buffer+0x480
args (0xe00000006258c448, 0xe000000181632680, 0x8, 0xe0000001ccec55f0, 0xa000000100240440)
0xa000000100247bc0 journal_commit_transaction+0xba0
args (0xe0000001ffeb4f80, 0xe0000001ccec55f0, 0xe00000006258c448, 0x0, 0xa000000100aad918)
0xa000000100256550 kjournald+0x1d0
args (0xe0000001ffeb4f80, 0xe0000001ffeb4fa4, 0xa000000100ab8368, 0xa000000100ab0118, 0xe0000001ffeb50f4)
0xa0000001000177e0 kernel_thread_helper+0xe0
args (0xa000000100819310, 0xe0000001ffeb4f80, 0xa000000100009060, 0x2, 0xa000000100c9e3a0)
0xa000000100009060 start_kernel_thread+0x20
args (0xa000000100819310, 0xe0000001ffeb4f80)
[2]kdb>
[2]kdb> md 0xe00000006258c448
0xe00000006258c448 ccec55f0 e0000001 00000000 00000008 ?U??...?........
0xe00000006258c458 00000000 00000000 00000000 00000000 ................
0xe00000006258c468 81632680 e0000001 00000000 00000000 .&c....?........
0xe00000006258c478 6258bfd0 e0000000 5b5b5b5b 5b5b5b5b пXb...?[[[[[[[[ <<<---
0xe00000006258c488 00000000 00000000 00000000 00000000 ................
0xe00000006258c498 00000000 00000000 5b5b5b5b 5b5b5b5b ........[[[[[[[[
0xe00000006258c4a8 5b5b5b5b 5b5b5b5b 5b5b5b5b 5b5b5b5b [[[[[[[[[[[[[[[[
0xe00000006258c4b8 5b5b5b5b 5b5b5b5b 5b5b5b5b 5b5b5b5b [[[[[[[[[[[[[[[[
[2]kdb>
[2]kdb> ps R
Task Addr Pid Parent [*] cpu State Thread Command
0xe0000001b0b50000 5144 29815 1 0 R 0xe0000001b0b503f0 growfiles
0xe000000195b60000 5254 5251 1 1 R 0xe000000195b603f0 mkdir09
0xe000000181980000 761 1 1 2 R 0xe0000001819803f0 *kjournald
0xe000000180c10000 69 8 0 2 R 0xe000000180c103f0 kblockd/2
0xe000000181980000 761 1 1 2 R 0xe0000001819803f0 *kjournald
0xe0000001f7ec0000 2565 1 0 2 R 0xe0000001f7ec03f0 klogd
0xe0000001b0b50000 5144 29815 1 0 R 0xe0000001b0b503f0 growfiles
0xe0000001915e0000 5234 6820 0 2 R 0xe0000001915e03f0 mkdir09
0xe0000001ca150000 5239 5234 0 1 R 0xe0000001ca1503f0 mkdir09
0xe0000001cf3b0000 5240 5234 0 2 R 0xe0000001cf3b03f0 mkdir09
0xe00000019e620000 5252 5251 0 1 R 0xe00000019e6203f0 mkdir09
0xe0000001b1bc0000 5253 5251 0 0 R 0xe0000001b1bc03f0 mkdir09
0xe000000195b60000 5254 5251 1 1 R 0xe000000195b603f0 mkdir09
0xe0000001d1040000 5255 5251 0 0 R 0xe0000001d10403f0 mkdir09
0xe0000001ec900000 5256 5251 0 1 R 0xe0000001ec9003f0 mkdir09
[2]kdb> btp 5239
Stack traceback for pid 5239
0xe0000001ca150000 5239 5234 0 1 R 0xe0000001ca1503f0 mkdir09
0xa0000001006fbab0 schedule+0xb30
args (0xe0000001fbd752f8, 0x1008026018, 0xe0000001ca15fdf8, 0x0, 0xe0000001ca15fdf0)
0xa0000001006fa8c0 __down+0x180
args (0xe0000001fbd752f0, 0x1008026018, 0xe0000001fbd752f4, 0xe0000001fbd752f8, 0xe0000001ca150000)
0xa0000001001455b0 sys_rmdir+0x150
args (0x600ffffffffed2b0, 0x400000000000da18, 0x4, 0x2, 0x2c8)
0xa000000100010300 ia64_ret_from_syscall
args (0x600ffffffffed2b0, 0x400000000000da18, 0x4, 0x2, 0x2c8)
[2]kdb> btp 5240
Stack traceback for pid 5240
0xe0000001cf3b0000 5240 5234 0 2 R 0xe0000001cf3b03f0 mkdir09
0xa0000001006fbab0 schedule+0xb30
args (0xe0000001ffeb4fa4, 0x16b65, 0xe0000001ffeb50f4, 0xa000000100246670, 0x815)
0xa000000100246690 start_this_handle+0x970
args (0xe0000001ffeb4f80, 0xe00000019f911c98, 0xe0000001ffeb4fe8, 0xe000000181632680, 0xe000000181632688)
0xa000000100246e60 journal_start+0x200
args (0xe0000001ffeb4f80, 0x5d, 0xe00000019f911c98, 0xa000000100ab8370, 0xa0000001002383d0)
0xa0000001002383d0 ext3_journal_start+0xf0
args (0xe0000001fbd75240, 0x5d, 0xa00000010022e3d0, 0x692, 0x308)
0xa00000010022e3d0 ext3_mkdir+0x70
args (0xe0000001fbd75240, 0xe0000001f13b6d48, 0x3e8, 0xa00000010013d9b0, 0x38a)
0xa00000010013db10 vfs_mkdir+0x1d0
args (0xe0000001fbd75240, 0xe0000001f13b6d48, 0xe0000001fbd75420, 0xe0000001fbd75328, 0xa0000001001458b0)
0xa00000010
[2]kdb> btp 5253
Stack traceback for pid 5253
0xe0000001b1bc0000 5253 5251 0 0 R 0xe0000001b1bc03f0 mkdir09
0xa0000001006fbab0 schedule+0xb30
args (0xe0000001f84aa470, 0x1008026018, 0xe0000001b1bcfdf8, 0x0, 0xe0000001b1bcfdf0)
0xa0000001006fa8c0 __down+0x180
args (0xe0000001f84aa468, 0x1008026018, 0xe0000001f84aa46c, 0xe0000001f84aa470, 0xe0000001b1bc0000)
0xa0000001001455b0 sys_rmdir+0x150
args (0x600ffffffffed2b0, 0x400000000000da18, 0x4, 0x2, 0x0)
0xa000000100010300 ia64_ret_from_syscall
args (0x600ffffffffed2b0, 0x400000000000da18, 0x4, 0x2, 0x0)
[2]kdb> btp 5254
Stack traceback for pid 5254
0xe000000195b60000 5254 5251 1 1 R 0xe000000195b603f0 mkdir09
0xa0000001000090b0 ia64_spinlock_contention+0x30
r31 (spinlock address) 0xe0000001ffeb50dc
0xa0000001006fd4c0 _spin_lock+0x40
args (0xe0000001ffeb50dc)
0xa000000100245130 journal_get_create_access+0x230
args (0xe00000019f912628, 0xe0000001d579e5a0, 0xe000000023422ec0, 0xe00000018163f380, 0xe0000001ffeb4f80)
0xa000000100225d90 ext3_getblk+0x250
args (0xe00000019f912628, 0xe0000001f80b0ba0, 0x30011, 0xa000000100785470, 0xe000000195b6fdc0)
0xa000000100226020 ext3_bread+0x40
args (0xe00000019f912628, 0xe0000001f80b0aa8, 0x0, 0x1, 0xe000000195b6fdc0)
0xa00000010022e490 ext3_mkdir+0x130
args (0xe0000001f84aa3b8, 0xe0000001e8e64820, 0x3e8, 0xe0000001f80b0aa8, 0xe00000019f912628)
0xa00000010013db10 vfs_mkdir+0x1d0
args (0xe0000001f84aa3b8, 0xe0000001e8e64820, 0xe0000001f84aa598, 0xe0000001f84aa4a0, 0xa0000001001458b0)
0xa0000001001458b0 sys_mkdir+0x170
args (0x600ffffffffec2b0, 0xff8, 0x2, 0x0, 0x2000000000260200)
0xa000000100010300 ia64_ret_from_syscall
args (0x600ffffffffec2b0, 0xff8, 0x2, 0x0, 0x2000000000260200)
[2]kdb> btp 5255
Stack traceback for pid 5255
0xe0000001d1040000 5255 5251 0 0 R 0xe0000001d10403f0 mkdir09
0xa0000001006fbab0 schedule+0xb30
args (0xe0000001f84aa470, 0x1008026018, 0xa000000100143590, 0x38a, 0xa000000100c9e3a0)
0xa0000001006fa8c0 __down+0x180
args (0xe0000001f84aa468, 0x1008026018, 0xe0000001f84aa46c, 0xe0000001f84aa470, 0xe0000001d1040000)
0xa00000010013fc80 lookup_create+0x60
args (0xe0000001d104fdd0, 0x1, 0xa000000100145800, 0x813, 0xa0000001001457e0)
0xa000000100145800 sys_mkdir+0xc0
args (0x600ffffffffed2b0, 0xff8, 0x3, 0x11, 0x20000000002c2f18)
0xa000000100010300 ia64_ret_from_syscall
args (0x600ffffffffed2b0, 0xff8, 0x3, 0x11, 0x20000000002c2f18)
[2]kdb> btp 5256
Stack traceback for pid 5256
0xe0000001ec900000 5256 5251 0 1 R 0xe0000001ec9003f0 mkdir09
0xa0000001006fbab0 schedule+0xb30
args (0xe0000001f84aa470, 0x1008026018, 0xe0000001ec90fdf8, 0x0, 0xe0000001ec90fdf0)
0xa0000001006fa8c0 __down+0x180
args (0xe0000001f84aa468, 0x1008026018, 0xe0000001f84aa46c, 0xe0000001f84aa470, 0xe0000001ec900000)
0xa0000001001455b0 sys_rmdir+0x150
args (0x600ffffffffed2b0, 0x400000000000da18, 0x4, 0x2, 0x0)
0xa000000100010300 ia64_ret_from_syscall
args (0x600ffffffffed2b0, 0x400000000000da18, 0x4, 0x2, 0x0)
[2]kdb>