So the why is clearer, just not the how. The crash happens because on
releasing memory, there are pages with the foreign bit set (meaning
those came from a special allocator). The code section in question is
special to the xen patch and will take an element of the page structure
as a function pointer of the destructor. This (0xc1b19960) is outside
the in kernel addresses (maybe completely wrong) and causes a page fault
on the instruction fetch.

Now the "only" thing left is to find out how this happens... Meanwhile,
is there some reasonably easy way of triggering this at will?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/705562

Title:
  ami-6836dc01 8.04 32 bit AMI kernel lock bug

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to