[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 502] Kernel BUG- (dom0 and domU)
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=502 matta@xxxxxxxxxxxx changed: What |Removed |Added ---------------------------------------------------------------------------- Version|unstable |3.0.1 ------- Additional Comments From matta@xxxxxxxxxxxx 2006-02-10 20:25 ------- More BUG()'s from domU and details from a customer of mine. This is using 3.0.1. Symptom/problem is that I regularly end up with port 25 allowing connections but never showing a banner or anything: vps ~ # telnet xx.xx.xx.xx 25 Trying 207.210.78.180... Connected to vps.overloaded.net. Escape character is '^]'. dmesg says: ------------[ cut here ]------------ kernel BUG at arch/xen/i386/mm/pgtable.c:285! invalid operand: 0000 [#1] Modules linked in: CPU: 0 EIP: 0061:[<c0112d47>] Not tainted VLI EFLAGS: 00010282 (2.6.12.6-xenU) EIP is at pgd_ctor+0x27/0x40 eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000 esi: 00000000 edi: c061df00 ebp: eba2c538 esp: d868fddc ds: 007b es: 007b ss: 0069 Process spamassassin (pid: 24197, threadinfo=d868e000 task=ebd81aa0) Stack: e33a6000 00000000 00000020 c014308d e33a5000 c061df00 00000001 eba2c520 e33a5000 c061df00 00000001 c0143222 c061df00 eba2c520 00000001 000000d0 012265dc 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513 Call Trace: [<c014308d>] cache_init_objs+0x6d/0xa0 [<c0143222>] cache_grow+0xe2/0x1e0 [<c0143513>] cache_alloc_refill+0x1f3/0x230 [<c0143782>] kmem_cache_alloc+0x62/0x70 [<c0112ddc>] pgd_alloc+0x1c/0x330 [<c0118c57>] mm_init+0xd7/0x110 [<c0118cc2>] mm_alloc+0x32/0x40 [<c0167c75>] do_execve+0x75/0x260 [<c01083cc>] sys_execve+0x3c/0x80 [<c010998d>] syscall_call+0x7/0xb Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19 00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27 ------------[ cut here ]------------ kernel BUG at arch/xen/i386/mm/pgtable.c:285! invalid operand: 0000 [#2] Modules linked in: CPU: 0 EIP: 0061:[<c0112d47>] Not tainted VLI EFLAGS: 00010282 (2.6.12.6-xenU) EIP is at pgd_ctor+0x27/0x40 eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000 esi: 00000000 edi: c061df00 ebp: c3debd58 esp: ec331d54 ds: 007b es: 007b ss: 0069 Process tcpserver (pid: 3203, threadinfo=ec330000 task=ec2b5060) Stack: e0723000 00000000 00000020 c014308d e0722000 c061df00 00000001 c3debd40 e0722000 c061df00 00000001 c0143222 c061df00 c3debd40 00000001 000000d0 01000003 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513 Call Trace: [<c014308d>] cache_init_objs+0x6d/0xa0 [<c0143222>] cache_grow+0xe2/0x1e0 [<c0143513>] cache_alloc_refill+0x1f3/0x230 [<c0143782>] kmem_cache_alloc+0x62/0x70 [<c0112ddc>] pgd_alloc+0x1c/0x330 [<c0118c57>] mm_init+0xd7/0x110 [<c0118f0e>] copy_mm+0xce/0x360 [<c0143782>] kmem_cache_alloc+0x62/0x70 [<c0119b59>] copy_process+0x4a9/0xc70 [<c011a43a>] do_fork+0x7a/0x1f5 [<c01082f7>] sys_fork+0x37/0x40 [<c010998d>] syscall_call+0x7/0xb Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19 00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27 ------------[ cut here ]------------ kernel BUG at arch/xen/i386/mm/pgtable.c:285! invalid operand: 0000 [#3] Modules linked in: CPU: 0 EIP: 0061:[<c0112d47>] Not tainted VLI EFLAGS: 00010282 (2.6.12.6-xenU) EIP is at pgd_ctor+0x27/0x40 eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000 esi: 00000000 edi: c061df00 ebp: c3debb58 esp: cb66bddc ds: 007b es: 007b ss: 0069 Process run (pid: 24331, threadinfo=cb66a000 task=cc3dc020) Stack: e5d45000 00000000 00000020 c014308d e5d44000 c061df00 00000001 c3debb40 e5d44000 c061df00 00000001 c0143222 c061df00 c3debb40 00000001 000000d0 01000101 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513 Call Trace: [<c014308d>] cache_init_objs+0x6d/0xa0 [<c0143222>] cache_grow+0xe2/0x1e0 [<c0143513>] cache_alloc_refill+0x1f3/0x230 [<c0143782>] kmem_cache_alloc+0x62/0x70 [<c0112ddc>] pgd_alloc+0x1c/0x330 [<c0118c57>] mm_init+0xd7/0x110 [<c0118cc2>] mm_alloc+0x32/0x40 [<c0167c75>] do_execve+0x75/0x260 [<c01083cc>] sys_execve+0x3c/0x80 [<c010998d>] syscall_call+0x7/0xb Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19 00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27 ------------[ cut here ]------------ kernel BUG at arch/xen/i386/mm/pgtable.c:285! invalid operand: 0000 [#4] Modules linked in: CPU: 0 EIP: 0061:[<c0112d47>] Not tainted VLI EFLAGS: 00010282 (2.6.12.6-xenU) EIP is at pgd_ctor+0x27/0x40 eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000 esi: 00000000 edi: c061df00 ebp: c3debe78 esp: cb66bddc ds: 007b es: 007b ss: 0069 Process report-and-dele (pid: 24459, threadinfo=cb66a000 task=ebd9ba20) Stack: ec31d000 00000000 00000020 c014308d ec31c000 c061df00 00000001 c3debe60 ec31c000 c061df00 00000001 c0143222 c061df00 c3debe60 00000001 000000d0 01f82fa4 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513 Call Trace: [<c014308d>] cache_init_objs+0x6d/0xa0 [<c0143222>] cache_grow+0xe2/0x1e0 [<c0143513>] cache_alloc_refill+0x1f3/0x230 [<c0143782>] kmem_cache_alloc+0x62/0x70 [<c0112ddc>] pgd_alloc+0x1c/0x330 [<c0118c57>] mm_init+0xd7/0x110 [<c0118cc2>] mm_alloc+0x32/0x40 [<c0167c75>] do_execve+0x75/0x260 [<c01083cc>] sys_execve+0x3c/0x80 [<c010998d>] syscall_call+0x7/0xb Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19 00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27 ------------[ cut here ]------------ kernel BUG at arch/xen/i386/mm/pgtable.c:285! invalid operand: 0000 [#5] Modules linked in: CPU: 0 EIP: 0061:[<c0112d47>] Not tainted VLI EFLAGS: 00010282 (2.6.12.6-xenU) EIP is at pgd_ctor+0x27/0x40 eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000 esi: 00000000 edi: c061df00 ebp: c3deb538 esp: d868fddc ds: 007b es: 007b ss: 0069 Process report-and-dele (pid: 24460, threadinfo=d868e000 task=eb87aaa0) Stack: e30ae000 00000000 00000020 c014308d e30ad000 c061df00 00000001 c3deb520 e30ad000 c061df00 00000001 c0143222 c061df00 c3deb520 00000001 000000d0 01f82fa4 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513 Call Trace: [<c014308d>] cache_init_objs+0x6d/0xa0 [<c0143222>] cache_grow+0xe2/0x1e0 [<c0143513>] cache_alloc_refill+0x1f3/0x230 [<c0143782>] kmem_cache_alloc+0x62/0x70 [<c0112ddc>] pgd_alloc+0x1c/0x330 [<c0118c57>] mm_init+0xd7/0x110 [<c0118cc2>] mm_alloc+0x32/0x40 [<c0167c75>] do_execve+0x75/0x260 [<c01083cc>] sys_execve+0x3c/0x80 [<c010998d>] syscall_call+0x7/0xb Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19 00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27 notice tcpserver was one of the processes listed in dmesg as hitting a kernel bug, and now no program has ownership of port 25: vps ~ # netstat -anp | grep 25 tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN - tcp 0 0 207.210.78.180:25 208.48.228.67:50513 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50515 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50511 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50569 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50594 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50580 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50512 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50591 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50568 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50567 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50587 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50590 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50581 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50565 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50571 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50496 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50578 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50589 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50510 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50584 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50514 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50593 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50566 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50574 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50586 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50520 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50519 SYN_RECV - tcp 0 0 207.210.78.180:25 208.48.228.67:50582 SYN_RECV - tcp 1 0 207.210.78.180:25 208.48.228.67:35400 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35404 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35164 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35455 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35340 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35345 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35096 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35098 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35100 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35102 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35105 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35106 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35109 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35110 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35047 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35314 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35066 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35071 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35209 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35212 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35225 CLOSE_WAIT - tcp 1 0 207.210.78.180:25 208.48.228.67:35226 CLOSE_WAIT - tcp 0 0 :::80 :::* LISTEN 3254/apache2 tcp 0 0 ::ffff:207.210.78.18:22 ::ffff:208.48.228.:2278 ESTABLISHED 12502/sshd: matt [p unix 2 [ ACC ] STREAM LISTENING 520684 12505/2 /tmp/ssh-MjcbR12505/agent.12505 unix 3 [ ] STREAM CONNECTED 1421672 22527/0 unix 3 [ ] STREAM CONNECTED 520671 12502/sshd: matt [p unix 3 [ ] STREAM CONNECTED 520670 12505/2 unix 3 [ ] STREAM CONNECTED 10225 3713/sshd: matt [pr I stop tcpserver: #/etc/init.d/svscan stop # ps aux | grep tcpserver root 28810 0.0 0.0 1520 456 pts/0 R+ 15:53 0:00 grep tcpserver but port 25 still listens: vps ~ # telnet xx.xx.xx.xx 25 Trying 207.210.78.180... Connected to vps.overloaded.net. Escape character is '^]'. only solution seems to be a complete reboot. I've only had this live for about a week, but this is the 2nd time this same problem has shown up. -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |