[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 604] New: hypervisior kernel crashed after 10days running



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=604

           Summary: hypervisior kernel crashed after 10days running
           Product: Xen
           Version: 3.0.1
          Platform: x86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: r.thormann@xxxxxxxxxxxxxxx


dual xeon cpu, 8gb ram, adaptec serial ata controller

selfbuild kernel 2.6.12.6 from xen tarball with pae, patched with aacraid from
adaptec

xen with 3 guests

$> xm info
system                 : Linux
host                   : xen01-dom0
release                : 2.6.12.6-xen
version                : #1 SMP Thu Feb 2 01:05:22 UTC 2006
machine                : i686
nr_cpus                : 4
nr_nodes               : 1
sockets_per_node       : 2
cores_per_socket       : 1
threads_per_core       : 2
cpu_mhz                : 3065
hw_caps                : bfebfbff:00000000:00000000:00000080:00004400
total_memory           : 8192
free_memory            : 241
xen_major              : 3
xen_minor              : 0
xen_extra              : .1
xen_caps               : xen-3.0-x86_32p
platform_params        : virt_start=0xf5800000
xen_changeset          : Thu Feb  2 12:28:53 2006 +0100
cc_compiler            : gcc version 3.3.5 (Debian 1:3.3.5-13)
cc_compile_by          : root
cc_compile_domain      : tha.local
cc_compile_date        : Wed Feb 15 22:06:39 UTC 2006


kernel message:

Apr  6 13:10:01 localhost kernel: ------------[ cut here ]------------
Apr  6 13:10:01 localhost kernel: kernel BUG at <bad filename>:63723!
Apr  6 13:10:01 localhost kernel: invalid operand: 0000 [#1]
Apr  6 13:10:01 localhost kernel: SMP
Apr  6 13:10:01 localhost kernel: Modules linked in: ipt_physdev iptable_filter
ip_tables af_packet bridge ipv6 dm_mod reiserfs ext3 jbd i2c_i801 i2c_core
parport_pc parport softdog floppy pcspkr rtc aic7xxx scsi_transport_spi
hw_random shpchp pci_hotplug ohci_hcd uhci_hcd e1000 evdev tsdev sr_mod sd_mod
font aacraid aic79xx scsi_mod unix
Apr  6 13:10:01 localhost kernel: CPU:    0
Apr  6 13:10:01 localhost kernel: EIP:    0061:[pgd_ctor+38/48]    Tainted: GF 
   VLI
Apr  6 13:10:01 localhost kernel: EFLAGS: 00010282   (2.6.12.6-xen)
Apr  6 13:10:01 localhost kernel: EIP is at pgd_ctor+0x26/0x30
Apr  6 13:10:01 localhost kernel: eax: fffffff4   ebx: 00000001   ecx: f577e000
  edx: 00000000
Apr  6 13:10:01 localhost kernel: esi: c0982d80   edi: ceada518   ebp: ceada500
  esp: c6ad1d38
Apr  6 13:10:01 localhost kernel: ds: 007b   es: 007b   ss: 0069
Apr  6 13:10:01 localhost kernel: Process sh (pid: 17948, threadinfo=c6ad0000
task=c75f4530)
Apr  6 13:10:01 localhost kernel: Stack: cbd36000 00000000 00000020 c014dd51
cbd36000 c0982d80 00000001 ceada500
Apr  6 13:10:01 localhost kernel:        cbd36000 c0982d80 00000000 c014decd
c0982d80 ceada500 00000001 000000d0
Apr  6 13:10:01 localhost kernel:        c0982de0 00000001 000000d0 c531e980
0000000c 000000d0 00000000 c014e0db
Apr  6 13:10:01 localhost kernel: Call Trace:
Apr  6 13:10:01 localhost kernel:  [cache_init_objs+113/128]
cache_init_objs+0x71/0x80
Apr  6 13:10:01 localhost kernel:  [cache_grow+269/416] cache_grow+0x10d/0x1a0
Apr  6 13:10:01 localhost kernel:  [cache_alloc_refill+379/544]
cache_alloc_refill+0x17b/0x220
Apr  6 13:10:01 localhost kernel:  [kmap_atomic+42/48] kmap_atomic+0x2a/0x30
Apr  6 13:10:01 localhost kernel:  [kmem_cache_alloc+127/144]
kmem_cache_alloc+0x7f/0x90
Apr  6 13:10:01 localhost kernel:  [pgd_alloc+29/784] pgd_alloc+0x1d/0x310
Apr  6 13:10:01 localhost kernel:  [prep_new_page+96/112]
prep_new_page+0x60/0x70
Apr  6 13:10:01 localhost kernel:  [buffered_rmqueue+295/544]
buffered_rmqueue+0x127/0x220
Apr  6 13:10:01 localhost kernel:  [mm_init+206/256] mm_init+0xce/0x100
Apr  6 13:10:01 localhost kernel:  [copy_mm+212/976] copy_mm+0xd4/0x3d0
Apr  6 13:10:01 localhost kernel:  [copy_process+991/3328]
copy_process+0x3df/0xd00
Apr  6 13:10:01 localhost kernel:  [do_fork+105/399] do_fork+0x69/0x18f
Apr  6 13:10:01 localhost kernel:  [sys_rt_sigprocmask+170/272]
sys_rt_sigprocmask+0xaa/0x110
Apr  6 13:10:01 localhost kernel:  [sys_fork+49/64] sys_fork+0x31/0x40
Apr  6 13:10:01 localhost kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Apr  6 13:10:01 localhost kernel: Code: 00 f3 ab 5f c3 83 ec 0c b8 20 00 00 00
89 44 24 08 31 c0 89 44 24 04 8b 44 24 10 89 04 24 e8 d2 2b 00 00 85 c0 75 04
83 c4 0c c3 <0f> 0b eb f8 8d b6 00 00 00 00 83 ec 08 b8 f8 e3 36 c0 89 5c 24

Apr  6 13:10:18 localhost kernel:  ------------[ cut here ]------------
Apr  6 13:10:18 localhost kernel: kernel BUG at <bad filename>:63723!
Apr  6 13:10:18 localhost kernel: invalid operand: 0000 [#2]
Apr  6 13:10:18 localhost kernel: SMP
Apr  6 13:10:18 localhost kernel: Modules linked in: ipt_physdev iptable_filter
ip_tables af_packet bridge ipv6 dm_mod reiserfs ext3 jbd i2c_i801 i2c_core
parport_pc parport softdog floppy pcspkr rtc aic7xxx scsi_transport_spi
hw_random shpchp pci_hotplug ohci_hcd uhci_hcd e1000 evdev tsdev sr_mod sd_mod
font aacraid aic79xx scsi_mod unix
Apr  6 13:10:18 localhost kernel: CPU:    0
Apr  6 13:10:18 localhost kernel: EIP:    0061:[pgd_ctor+38/48]    Tainted: GF 
   VLI
Apr  6 13:10:18 localhost kernel: EFLAGS: 00010282   (2.6.12.6-xen)
Apr  6 13:10:18 localhost kernel: EIP is at pgd_ctor+0x26/0x30
Apr  6 13:10:18 localhost kernel: eax: fffffff4   ebx: 00000001   ecx: f577e000
  edx: 00000000
Apr  6 13:10:18 localhost kernel: esi: c0982d80   edi: cc05fad8   ebp: cc05fac0
  esp: caf51d38
Apr  6 13:10:18 localhost kernel: ds: 007b   es: 007b   ss: 0069
Apr  6 13:10:18 localhost kernel: Process watchdog (pid: 8523,
threadinfo=caf50000 task=cc13da40)
Apr  6 13:10:18 localhost kernel: Stack: c759d000 00000000 00000020 c014dd51
c759d000 c0982d80 00000001 cc05fac0
Apr  6 13:10:18 localhost kernel:        c759d000 c0982d80 00000000 c014decd
c0982d80 cc05fac0 00000001 000000d0
Apr  6 13:10:18 localhost kernel:        c0982de0 00000001 000000d0 c531e980
0000000c 000000d0 00000000 c014e0db
Apr  6 13:10:18 localhost kernel: Call Trace:
Apr  6 13:10:18 localhost kernel:  [cache_init_objs+113/128]
cache_init_objs+0x71/0x80
Apr  6 13:10:18 localhost kernel:  [cache_grow+269/416] cache_grow+0x10d/0x1a0
Apr  6 13:10:18 localhost kernel:  [cache_alloc_refill+379/544]
cache_alloc_refill+0x17b/0x220
Apr  6 13:10:18 localhost kernel:  [kmem_cache_alloc+127/144]
kmem_cache_alloc+0x7f/0x90
Apr  6 13:10:18 localhost kernel:  [pgd_alloc+29/784] pgd_alloc+0x1d/0x310
Apr  6 13:10:18 localhost kernel:  [prep_new_page+96/112]
prep_new_page+0x60/0x70
Apr  6 13:10:18 localhost kernel:  [buffered_rmqueue+295/544]
buffered_rmqueue+0x127/0x220
Apr  6 13:10:18 localhost kernel:  [mm_init+206/256] mm_init+0xce/0x100
Apr  6 13:10:18 localhost kernel:  [copy_mm+212/976] copy_mm+0xd4/0x3d0
Apr  6 13:10:18 localhost kernel:  [copy_process+991/3328]
copy_process+0x3df/0xd00
Apr  6 13:10:18 localhost kernel:  [destroy_inode+70/112]
destroy_inode+0x46/0x70
Apr  6 13:10:18 localhost kernel:  [do_fork+105/399] do_fork+0x69/0x18f
Apr  6 13:10:18 localhost kernel:  [sys_fork+49/64] sys_fork+0x31/0x40
Apr  6 13:10:18 localhost kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Apr  6 13:10:18 localhost kernel:  [ip_rcv+32/1376] ip_rcv+0x20/0x560
Apr  6 13:10:18 localhost kernel:  [ip_rcv+288/1376] ip_rcv+0x120/0x560
Apr  6 13:10:18 localhost kernel: Code: 00 f3 ab 5f c3 83 ec 0c b8 20 00 00 00
89 44 24 08 31 c0 89 44 24 04 8b 44 24 10 89 04 24 e8 d2 2b 00 00 85 c0 75 04
83 c4 0c c3 <0f> 0b eb f8 8d b6 00 00 00 00 83 ec 08 b8 f8 e3 36 c0 89 5c 24


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.