[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 604] New: hypervisior kernel crashed after 10days running
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=604 Summary: hypervisior kernel crashed after 10days running Product: Xen Version: 3.0.1 Platform: x86 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Hypervisor AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: r.thormann@xxxxxxxxxxxxxxx dual xeon cpu, 8gb ram, adaptec serial ata controller selfbuild kernel 2.6.12.6 from xen tarball with pae, patched with aacraid from adaptec xen with 3 guests $> xm info system : Linux host : xen01-dom0 release : 2.6.12.6-xen version : #1 SMP Thu Feb 2 01:05:22 UTC 2006 machine : i686 nr_cpus : 4 nr_nodes : 1 sockets_per_node : 2 cores_per_socket : 1 threads_per_core : 2 cpu_mhz : 3065 hw_caps : bfebfbff:00000000:00000000:00000080:00004400 total_memory : 8192 free_memory : 241 xen_major : 3 xen_minor : 0 xen_extra : .1 xen_caps : xen-3.0-x86_32p platform_params : virt_start=0xf5800000 xen_changeset : Thu Feb 2 12:28:53 2006 +0100 cc_compiler : gcc version 3.3.5 (Debian 1:3.3.5-13) cc_compile_by : root cc_compile_domain : tha.local cc_compile_date : Wed Feb 15 22:06:39 UTC 2006 kernel message: Apr 6 13:10:01 localhost kernel: ------------[ cut here ]------------ Apr 6 13:10:01 localhost kernel: kernel BUG at <bad filename>:63723! Apr 6 13:10:01 localhost kernel: invalid operand: 0000 [#1] Apr 6 13:10:01 localhost kernel: SMP Apr 6 13:10:01 localhost kernel: Modules linked in: ipt_physdev iptable_filter ip_tables af_packet bridge ipv6 dm_mod reiserfs ext3 jbd i2c_i801 i2c_core parport_pc parport softdog floppy pcspkr rtc aic7xxx scsi_transport_spi hw_random shpchp pci_hotplug ohci_hcd uhci_hcd e1000 evdev tsdev sr_mod sd_mod font aacraid aic79xx scsi_mod unix Apr 6 13:10:01 localhost kernel: CPU: 0 Apr 6 13:10:01 localhost kernel: EIP: 0061:[pgd_ctor+38/48] Tainted: GF VLI Apr 6 13:10:01 localhost kernel: EFLAGS: 00010282 (2.6.12.6-xen) Apr 6 13:10:01 localhost kernel: EIP is at pgd_ctor+0x26/0x30 Apr 6 13:10:01 localhost kernel: eax: fffffff4 ebx: 00000001 ecx: f577e000 edx: 00000000 Apr 6 13:10:01 localhost kernel: esi: c0982d80 edi: ceada518 ebp: ceada500 esp: c6ad1d38 Apr 6 13:10:01 localhost kernel: ds: 007b es: 007b ss: 0069 Apr 6 13:10:01 localhost kernel: Process sh (pid: 17948, threadinfo=c6ad0000 task=c75f4530) Apr 6 13:10:01 localhost kernel: Stack: cbd36000 00000000 00000020 c014dd51 cbd36000 c0982d80 00000001 ceada500 Apr 6 13:10:01 localhost kernel: cbd36000 c0982d80 00000000 c014decd c0982d80 ceada500 00000001 000000d0 Apr 6 13:10:01 localhost kernel: c0982de0 00000001 000000d0 c531e980 0000000c 000000d0 00000000 c014e0db Apr 6 13:10:01 localhost kernel: Call Trace: Apr 6 13:10:01 localhost kernel: [cache_init_objs+113/128] cache_init_objs+0x71/0x80 Apr 6 13:10:01 localhost kernel: [cache_grow+269/416] cache_grow+0x10d/0x1a0 Apr 6 13:10:01 localhost kernel: [cache_alloc_refill+379/544] cache_alloc_refill+0x17b/0x220 Apr 6 13:10:01 localhost kernel: [kmap_atomic+42/48] kmap_atomic+0x2a/0x30 Apr 6 13:10:01 localhost kernel: [kmem_cache_alloc+127/144] kmem_cache_alloc+0x7f/0x90 Apr 6 13:10:01 localhost kernel: [pgd_alloc+29/784] pgd_alloc+0x1d/0x310 Apr 6 13:10:01 localhost kernel: [prep_new_page+96/112] prep_new_page+0x60/0x70 Apr 6 13:10:01 localhost kernel: [buffered_rmqueue+295/544] buffered_rmqueue+0x127/0x220 Apr 6 13:10:01 localhost kernel: [mm_init+206/256] mm_init+0xce/0x100 Apr 6 13:10:01 localhost kernel: [copy_mm+212/976] copy_mm+0xd4/0x3d0 Apr 6 13:10:01 localhost kernel: [copy_process+991/3328] copy_process+0x3df/0xd00 Apr 6 13:10:01 localhost kernel: [do_fork+105/399] do_fork+0x69/0x18f Apr 6 13:10:01 localhost kernel: [sys_rt_sigprocmask+170/272] sys_rt_sigprocmask+0xaa/0x110 Apr 6 13:10:01 localhost kernel: [sys_fork+49/64] sys_fork+0x31/0x40 Apr 6 13:10:01 localhost kernel: [syscall_call+7/11] syscall_call+0x7/0xb Apr 6 13:10:01 localhost kernel: Code: 00 f3 ab 5f c3 83 ec 0c b8 20 00 00 00 89 44 24 08 31 c0 89 44 24 04 8b 44 24 10 89 04 24 e8 d2 2b 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b eb f8 8d b6 00 00 00 00 83 ec 08 b8 f8 e3 36 c0 89 5c 24 Apr 6 13:10:18 localhost kernel: ------------[ cut here ]------------ Apr 6 13:10:18 localhost kernel: kernel BUG at <bad filename>:63723! Apr 6 13:10:18 localhost kernel: invalid operand: 0000 [#2] Apr 6 13:10:18 localhost kernel: SMP Apr 6 13:10:18 localhost kernel: Modules linked in: ipt_physdev iptable_filter ip_tables af_packet bridge ipv6 dm_mod reiserfs ext3 jbd i2c_i801 i2c_core parport_pc parport softdog floppy pcspkr rtc aic7xxx scsi_transport_spi hw_random shpchp pci_hotplug ohci_hcd uhci_hcd e1000 evdev tsdev sr_mod sd_mod font aacraid aic79xx scsi_mod unix Apr 6 13:10:18 localhost kernel: CPU: 0 Apr 6 13:10:18 localhost kernel: EIP: 0061:[pgd_ctor+38/48] Tainted: GF VLI Apr 6 13:10:18 localhost kernel: EFLAGS: 00010282 (2.6.12.6-xen) Apr 6 13:10:18 localhost kernel: EIP is at pgd_ctor+0x26/0x30 Apr 6 13:10:18 localhost kernel: eax: fffffff4 ebx: 00000001 ecx: f577e000 edx: 00000000 Apr 6 13:10:18 localhost kernel: esi: c0982d80 edi: cc05fad8 ebp: cc05fac0 esp: caf51d38 Apr 6 13:10:18 localhost kernel: ds: 007b es: 007b ss: 0069 Apr 6 13:10:18 localhost kernel: Process watchdog (pid: 8523, threadinfo=caf50000 task=cc13da40) Apr 6 13:10:18 localhost kernel: Stack: c759d000 00000000 00000020 c014dd51 c759d000 c0982d80 00000001 cc05fac0 Apr 6 13:10:18 localhost kernel: c759d000 c0982d80 00000000 c014decd c0982d80 cc05fac0 00000001 000000d0 Apr 6 13:10:18 localhost kernel: c0982de0 00000001 000000d0 c531e980 0000000c 000000d0 00000000 c014e0db Apr 6 13:10:18 localhost kernel: Call Trace: Apr 6 13:10:18 localhost kernel: [cache_init_objs+113/128] cache_init_objs+0x71/0x80 Apr 6 13:10:18 localhost kernel: [cache_grow+269/416] cache_grow+0x10d/0x1a0 Apr 6 13:10:18 localhost kernel: [cache_alloc_refill+379/544] cache_alloc_refill+0x17b/0x220 Apr 6 13:10:18 localhost kernel: [kmem_cache_alloc+127/144] kmem_cache_alloc+0x7f/0x90 Apr 6 13:10:18 localhost kernel: [pgd_alloc+29/784] pgd_alloc+0x1d/0x310 Apr 6 13:10:18 localhost kernel: [prep_new_page+96/112] prep_new_page+0x60/0x70 Apr 6 13:10:18 localhost kernel: [buffered_rmqueue+295/544] buffered_rmqueue+0x127/0x220 Apr 6 13:10:18 localhost kernel: [mm_init+206/256] mm_init+0xce/0x100 Apr 6 13:10:18 localhost kernel: [copy_mm+212/976] copy_mm+0xd4/0x3d0 Apr 6 13:10:18 localhost kernel: [copy_process+991/3328] copy_process+0x3df/0xd00 Apr 6 13:10:18 localhost kernel: [destroy_inode+70/112] destroy_inode+0x46/0x70 Apr 6 13:10:18 localhost kernel: [do_fork+105/399] do_fork+0x69/0x18f Apr 6 13:10:18 localhost kernel: [sys_fork+49/64] sys_fork+0x31/0x40 Apr 6 13:10:18 localhost kernel: [syscall_call+7/11] syscall_call+0x7/0xb Apr 6 13:10:18 localhost kernel: [ip_rcv+32/1376] ip_rcv+0x20/0x560 Apr 6 13:10:18 localhost kernel: [ip_rcv+288/1376] ip_rcv+0x120/0x560 Apr 6 13:10:18 localhost kernel: Code: 00 f3 ab 5f c3 83 ec 0c b8 20 00 00 00 89 44 24 08 31 c0 89 44 24 04 8b 44 24 10 89 04 24 e8 d2 2b 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b eb f8 8d b6 00 00 00 00 83 ec 08 b8 f8 e3 36 c0 89 5c 24 -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |