[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 843] 3.0.4 Kernel Oops
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=843 ------- Comment #2 from p.bugzilla.xensource.com@xxxxxxxxxxxxxxx 2006-12-22 14:24 ------- Checking the logs there was another oops, see below. Then the server crashed. Then the other oops came after the restart. The server has been up and running, problem free for the 22 odd hours since then on 3.0.3 The usage scenario is 54 domU's. with loop back mounted file systems. We would have used blktap but we've had file corruption with that. (I saw a devel post that indicated there was going to be a 3.0.4 patch for some blktap related stuff). >From our mrtg logging I don't think there was much load (except on startup, which is normal). After that load was sitting between 1-2. First kernel oops after restart: Dec 21 17:50:02 host83 kernel: Unable to handle kernel paging request at virtual address d92be000 Dec 21 17:50:02 host83 kernel: printing eip: Dec 21 17:50:02 host83 kernel: c01f2783 Dec 21 17:50:02 host83 kernel: 10adc000 -> *pde = 00000000:f2ff6001 Dec 21 17:50:02 host83 kernel: 087f6000 -> *pme = 00000000:078c5067 Dec 21 17:50:02 host83 kernel: 000c5000 -> *pte = 80000000:e22be061 Dec 21 17:50:02 host83 kernel: Oops: 0003 [#1] Dec 21 17:50:02 host83 kernel: Modules linked in: dm_mirror dm_mod e100 tg3 ext3 jbd raid5 xor raid1 sata_sil libata sd_mod scsi_mod Dec 21 17:50:02 host83 kernel: CPU: 0 Dec 21 17:50:02 host83 kernel: EIP: 0061:[<c01f2783>] Not tainted VLI Dec 21 17:50:02 host83 kernel: EFLAGS: 00010206 (2.6.16.33-xen0 #5) Dec 21 17:50:02 host83 kernel: EIP is at vsnprintf+0xaa/0x546 Dec 21 17:50:02 host83 kernel: eax: d92be000 ebx: 0000000a ecx: 00000043 edx: c036c36d Dec 21 17:50:03 host83 kernel: esi: d92be039 edi: 00000000 ebp: 0000006c esp: caba3e80 Dec 21 17:50:03 host83 kernel: ds: 007b es: 007b ss: 0069 Dec 21 17:50:03 host83 kernel: Process cat (pid: 24817, threadinfo=caba2000 task=cc847030) Dec 21 17:50:03 host83 kernel: Stack: <0>d92be02e d92be000 00000000 00000000 0000000a 0000000a 00000000 00000000 Dec 21 17:50:03 host83 kernel: ffffffff 0000000a d92be000 d76ba780 d76ba780 cdd09400 00000fbd c0175168 Dec 21 17:50:03 host83 kernel: d92bdfbd 00000043 c036c36e caba3f24 cdd09400 c02ccffd d76ba780 c036c318 Dec 21 17:50:03 host83 kernel: Call Trace: Dec 21 17:50:03 host83 kernel: [<c0175168>] seq_printf+0x32/0x53 Dec 21 17:50:03 host83 kernel: [<c02ccffd>] dev_seq_printf_stats+0xb5/0xd5 Dec 21 17:50:03 host83 kernel: [<c02cd039>] dev_seq_show+0x1c/0x38 Dec 21 17:50:03 host83 kernel: [<c0174cca>] seq_read+0x237/0x2e3 Dec 21 17:50:03 host83 kernel: [<c0157042>] vfs_read+0x9a/0x121 Dec 21 17:50:03 host83 kernel: [<c0157367>] sys_read+0x4b/0x74 Dec 21 17:50:03 host83 kernel: [<c01049e9>] syscall_call+0x7/0xb Dec 21 17:50:03 host83 kernel: Code: ff 89 54 24 44 eb a1 31 ff 8d 51 01 89 c8 89 54 24 48 89 d1 0f be 40 01 83 e8 20 83 f8 10 77 10 ff 24 85 90 30 33 -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |