[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 756] kernel BUG at arch/i386/mm/hypervisor.c:196!
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=756 ------- Comment #7 from hedgehog@xxxxxxxxxx 2009-02-05 07:50 ------- (In reply to comment #6) Not sure this is exactly the same. DOM0: RHEL 5.3 x86_64 (2.6.18-92.el5xen #1 SMP Tue Apr 29 13:31:30 EDT 2008 x86_64 x86_64 x86_64 GNU/Linux) (kernel from RHEL 5.2 because of Intel RAID controller driver. haven't it for RHEL 5.3 kernel) Guest: RHEL 4.7 i386 updated (2.6.9-78.0.13.ELxenU #1 SMP Wed Jan 7 18:25:51 EST 2009 i686 i686 i386 GNU/Linux ) >From time to times Guest crash. This was last time. ------------[ cut here ]------------ kernel BUG at arch/i386/mm/hypervisor.c:336! invalid operand: 0000 [#1] SMP Modules linked in: nfs lockd nfs_acl sunrpc dm_mirror dm_mod xennet ext3 jbd xenblk sd_mod scsi_mod CPU: 0 EIP: 0061:[<c0115f4f>] Not tainted VLI EFLAGS: 00010096 (2.6.9-78.0.13.ELxenU) EIP is at xen_create_contiguous_region+0x3eb/0x4bf eax: ffffffff ebx: 00000006 ecx: eb98cc70 edx: 00000001 esi: 00000000 edi: e983f000 ebp: 0002983f esp: eb98cc48 ds: 007b es: 007b ss: 0068 Process gwrd (pid: 3689, threadinfo=eb98c000 task=ec37ae90) Stack: e9840000 e9840000 e9840000 10fa9063 80000000 00000000 00000000 00000000 00000001 0002983f eb98cc6c 00000001 00000000 00000000 00007ff0 000000d0 c02a7a00 00000001 00000001 c7f10040 e983e000 00000001 c01fe8ca e983e000 Call Trace: [<c01fe8ca>] skbuff_ctor+0x2c/0x56 [<c0144385>] cache_init_objs+0x35/0x56 [<c0144507>] cache_grow+0xfb/0x187 [<c01446f6>] cache_alloc_refill+0x163/0x19c [<c0144911>] kmem_cache_alloc+0x67/0x97 [<c0216608>] alloc_skb_from_cache+0x3a/0xb2 [<c01fe83e>] __alloc_skb+0x76/0x7a [<c0239635>] tcp_sendmsg+0x14f/0xc1f [<c01a40ec>] find_undo+0x84/0x26d [<c0212dfe>] sock_sendmsg+0xe8/0x106 [<c0117c91>] find_busiest_group+0xd8/0x298 [<c011a958>] autoremove_wake_function+0x0/0x3a [<c011a958>] autoremove_wake_function+0x0/0x3a [<c021429c>] sys_recvfrom+0xed/0xfc [<c02132a2>] sock_readv_writev+0x89/0x90 [<c021330f>] sock_writev+0x30/0x36 [<c015bc2c>] do_readv_writev+0x1cb/0x253 [<c016ced5>] __pollwait+0x0/0x9b [<c015bd30>] vfs_writev+0x3c/0x40 [<c015bdd2>] sys_writev+0x3b/0x63 [<c010740f>] syscall_call+0x7/0xb Code: 00 00 00 8b 44 24 5c bb 06 00 00 00 8d 4c 24 28 8b 54 24 20 05 00 00 00 40 c1 e8 0c 8d 2c 10 89 6c 24 24 e8 34 b2 fe ff 48 74 08 <0f> 0b 50 01 c5 99 27 c0 8b 44 24 24 31 f6 89 fb 8b 0d ec 18 2a Next time will get "xm dmesg". -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |