[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 701] New: after hours of heavy i.o. the hypervisior crashed.



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=701

           Summary: after hours of heavy i.o. the hypervisior crashed.
           Product: Xen
           Version: 3.0.2
          Platform: x86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: r.thormann@xxxxxxxxxxxxxxx


restoring a database in an guest from a backup (ca. 300 gb) the hypervisor
crashed.

here the kernel messages:

Jul 12 19:20:03 localhost kernel: ------------[ cut here ]------------
Jul 12 19:20:03 localhost kernel: kernel BUG at arch/i386/mm/pgtable-xen.c:306!
Jul 12 19:20:03 localhost kernel: invalid opcode: 0000 [#1]
Jul 12 19:20:03 localhost kernel: SMP
Jul 12 19:20:03 localhost kernel: Modules linked in: xt_physdev iptable_filter
ip_tables x_tables floppy psmouse rtc i2c_i801 ohci_hcd uhci_hcd usbcore piix
ide_core e1000 sd_mod softdog aic79xx xfs exportfs aacraid
Jul 12 19:20:03 localhost kernel: CPU:    1
Jul 12 19:20:03 localhost kernel: EIP:    0061:[pgd_ctor+48/58]    Not tainted
VLI
Jul 12 19:20:03 localhost kernel: EFLAGS: 00010282   (2.6.16-xen0-adaptec #4)
Jul 12 19:20:03 localhost kernel: EIP is at pgd_ctor+0x30/0x3a
Jul 12 19:20:03 localhost kernel: eax: fffffff4   ebx: 00000001   ecx: 00000001
  edx: 00000000
Jul 12 19:20:03 localhost kernel: esi: c06f1ec0   edi: d56bf63c   ebp: d56bf620
  esp: cb293df4
Jul 12 19:20:03 localhost kernel: ds: 007b   es: 007b   ss: 0069
Jul 12 19:20:03 localhost kernel: Process df (pid: 4159, threadinfo=cb292000
task=d694fa70)
Jul 12 19:20:03 localhost kernel: Stack: <0>cb52b000 00000000 00000020 c015c075
cb52b000 c06f1ec0 00000001 d56bf620
Jul 12 19:20:03 localhost kernel:        cb52b000 c06eff00 00000000 c015c265
c06f1ec0 d56bf620 00000001 000000d0
Jul 12 19:20:03 localhost kernel:        c06eff2c 00000001 000000d0 d8731e40
c06eff10 0000000c c06914c0 c015c455
Jul 12 19:20:03 localhost kernel: Call Trace:
Jul 12 19:20:03 localhost kernel:  [cache_init_objs+98/105]
cache_init_objs+0x62/0x69
Jul 12 19:20:03 localhost kernel:  [cache_grow+315/457] cache_grow+0x13b/0x1c9
Jul 12 19:20:03 localhost kernel:  [cache_alloc_refill+354/523]
cache_alloc_refill+0x162/0x20b
Jul 12 19:20:03 localhost kernel:  [kmem_cache_alloc+132/136]
kmem_cache_alloc+0x84/0x88
Jul 12 19:20:03 localhost kernel:  [pgd_alloc+28/834] pgd_alloc+0x1c/0x342
Jul 12 19:20:03 localhost kernel:  [do_gettimeofday+94/587]
do_gettimeofday+0x5e/0x24b
Jul 12 19:20:03 localhost kernel:  [mm_init+137/182] mm_init+0x89/0xb6
Jul 12 19:20:03 localhost kernel:  [dup_mm+95/827] dup_mm+0x5f/0x33b
Jul 12 19:20:03 localhost kernel:  [start_kernel+121/490]
start_kernel+0x79/0x1ea
Jul 12 19:20:03 localhost kernel:  [smp_init+51/193] smp_init+0x33/0xc1
Jul 12 19:20:03 localhost kernel:  [start_kernel+113/490]
start_kernel+0x71/0x1ea
Jul 12 19:20:03 localhost kernel:  [copy_mm+123/134] copy_mm+0x7b/0x86
Jul 12 19:20:03 localhost kernel:  [copy_process+991/3429]
copy_process+0x3df/0xd65
Jul 12 19:20:03 localhost kernel:  [do_fork+105/395] do_fork+0x69/0x18b
Jul 12 19:20:03 localhost kernel:  [sys_rt_sigprocmask+161/286]
sys_rt_sigprocmask+0xa1/0x11e
Jul 12 19:20:03 localhost kernel:  [sys_fork+55/59] sys_fork+0x37/0x3b
Jul 12 19:20:03 localhost kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Jul 12 19:20:03 localhost kernel: Code: 04 c4 42 c0 00 74 04 83 c4 0c c3 8b 44
24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 b4 3c 00 00
85 c0 74 dc <0f> 0b 32 01 e5 a5 37 c0 eb d2 80 3d 04 c4 42 c0 00 74 01 c3 c7

Jul 12 19:20:15 localhost kernel:  <0>------------[ cut here ]------------
Jul 12 19:20:15 localhost kernel: kernel BUG at arch/i386/mm/pgtable-xen.c:306!
Jul 12 19:20:15 localhost kernel: invalid opcode: 0000 [#2]
Jul 12 19:20:15 localhost kernel: SMP
Jul 12 19:20:15 localhost kernel: Modules linked in: xt_physdev iptable_filter
ip_tables x_tables floppy psmouse rtc i2c_i801 ohci_hcd uhci_hcd usbcore piix
ide_core e1000 sd_mod softdog aic79xx xfs exportfs aacraid
Jul 12 19:20:15 localhost kernel: CPU:    1
Jul 12 19:20:15 localhost kernel: EIP:    0061:[pgd_ctor+48/58]    Not tainted
VLI
Jul 12 19:20:15 localhost kernel: EFLAGS: 00010282   (2.6.16-xen0-adaptec #4)
Jul 12 19:20:15 localhost kernel: EIP is at pgd_ctor+0x30/0x3a
Jul 12 19:20:15 localhost kernel: eax: fffffff4   ebx: 00000001   ecx: 00000001
  edx: 00000000
Jul 12 19:20:15 localhost kernel: esi: c06f1ec0   edi: d71dfd3c   ebp: d71dfd20
  esp: ca921df4
Jul 12 19:20:15 localhost kernel: ds: 007b   es: 007b   ss: 0069
Jul 12 19:20:15 localhost kernel: Process df_inode (pid: 4215,
threadinfo=ca920000 task=cc8bca70)
Jul 12 19:20:15 localhost kernel: Stack: <0>cb16f000 00000000 00000020 c015c075
cb16f000 c06f1ec0 00000001 d71dfd20
Jul 12 19:20:15 localhost kernel:        cb16f000 c06eff00 00000000 c015c265
c06f1ec0 d71dfd20 00000001 000000d0
Jul 12 19:20:15 localhost kernel:        c06eff2c 00000001 000000d0 d572e740
c06eff10 0000000c c06914c0 c015c455
Jul 12 19:20:15 localhost kernel: Call Trace:
Jul 12 19:20:15 localhost kernel:  [cache_init_objs+98/105]
cache_init_objs+0x62/0x69
Jul 12 19:20:15 localhost kernel:  [cache_grow+315/457] cache_grow+0x13b/0x1c9
Jul 12 19:20:15 localhost kernel:  [cache_alloc_refill+354/523]
cache_alloc_refill+0x162/0x20b
Jul 12 19:20:15 localhost kernel:  [kmem_cache_alloc+132/136]
kmem_cache_alloc+0x84/0x88
Jul 12 19:20:15 localhost kernel:  [pgd_alloc+28/834] pgd_alloc+0x1c/0x342
Jul 12 19:20:15 localhost kernel:  [__do_softirq+230/265]
__do_softirq+0xe6/0x109
Jul 12 19:20:15 localhost kernel:  [mm_init+137/182] mm_init+0x89/0xb6
Jul 12 19:20:15 localhost kernel:  [dup_mm+95/827] dup_mm+0x5f/0x33b
Jul 12 19:20:15 localhost kernel:  [hypervisor_callback+44/52]
hypervisor_callback+0x2c/0x34
Jul 12 19:20:15 localhost kernel:  [copy_mm+123/134] copy_mm+0x7b/0x86
Jul 12 19:20:15 localhost kernel:  [copy_process+991/3429]
copy_process+0x3df/0xd65
Jul 12 19:20:15 localhost kernel:  [do_fork+105/395] do_fork+0x69/0x18b
Jul 12 19:20:15 localhost kernel:  [sys_fork+55/59] sys_fork+0x37/0x3b
Jul 12 19:20:15 localhost kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Jul 12 19:20:15 localhost kernel: Code: 04 c4 42 c0 00 74 04 83 c4 0c c3 8b 44
24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00 00 00 00 89 04 24 e8 b4 3c 00 00
85 c0 74 dc <0f> 0b 32 01 e5 a5 37 c0 eb d2 80 3d 04 c4 42 c0 00 74 01 c3 c7

my xm info, if you need:

xm info
host                   : xen01-dom0
release                : 2.6.16-xen0-adaptec
version                : #4 SMP Tue Jul 11 18:15:46 CEST 2006
machine                : i686
nr_cpus                : 4
nr_nodes               : 1
sockets_per_node       : 2
cores_per_socket       : 1
threads_per_core       : 2
cpu_mhz                : 3065
hw_caps                : bfebfbff:00000000:00000000:00000080:00004400
total_memory           : 8192
free_memory            : 57
xen_major              : 3
xen_minor              : 0
xen_extra              : .2-2
xen_caps               : xen-3.0-x86_32p
platform_params        : virt_start=0xf5800000
xen_changeset          : Thu Apr 13 15:18:37 2006 +0100 9617:5802713c159b
cc_compiler            : gcc version 3.3.5 (Debian 1:3.3.5-13)
cc_compile_by          : admin
cc_compile_domain      : localdomain
cc_compile_date        : Mon May  8 14:50:23 CEST 2006


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.