[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 756] kernel BUG at arch/i386/mm/hypervisor.c:196!



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=756





------- Comment #7 from hedgehog@xxxxxxxxxx  2009-02-05 07:50 -------
(In reply to comment #6)

Not sure this is exactly the same.

DOM0: RHEL 5.3 x86_64 (2.6.18-92.el5xen #1 SMP Tue Apr 29 13:31:30 EDT 2008
x86_64 x86_64 x86_64 GNU/Linux) (kernel from RHEL 5.2 because of Intel RAID
controller driver. haven't it for RHEL 5.3 kernel)
Guest: RHEL 4.7 i386 updated (2.6.9-78.0.13.ELxenU #1 SMP Wed Jan 7 18:25:51
EST 2009 i686 i686 i386 GNU/Linux )

>From time to times Guest crash. This was last time.

------------[ cut here ]------------
kernel BUG at arch/i386/mm/hypervisor.c:336!
invalid operand: 0000 [#1]
SMP 
Modules linked in: nfs lockd nfs_acl sunrpc dm_mirror dm_mod xennet ext3 jbd
xenblk sd_mod scsi_mod
CPU:    0
EIP:    0061:[<c0115f4f>]    Not tainted VLI
EFLAGS: 00010096   (2.6.9-78.0.13.ELxenU) 
EIP is at xen_create_contiguous_region+0x3eb/0x4bf
eax: ffffffff   ebx: 00000006   ecx: eb98cc70   edx: 00000001
esi: 00000000   edi: e983f000   ebp: 0002983f   esp: eb98cc48
ds: 007b   es: 007b   ss: 0068
Process gwrd (pid: 3689, threadinfo=eb98c000 task=ec37ae90)
Stack: e9840000 e9840000 e9840000 10fa9063 80000000 00000000 00000000 00000000 
       00000001 0002983f eb98cc6c 00000001 00000000 00000000 00007ff0 000000d0 
       c02a7a00 00000001 00000001 c7f10040 e983e000 00000001 c01fe8ca e983e000 
Call Trace:
 [<c01fe8ca>] skbuff_ctor+0x2c/0x56
 [<c0144385>] cache_init_objs+0x35/0x56
 [<c0144507>] cache_grow+0xfb/0x187
 [<c01446f6>] cache_alloc_refill+0x163/0x19c
 [<c0144911>] kmem_cache_alloc+0x67/0x97
 [<c0216608>] alloc_skb_from_cache+0x3a/0xb2
 [<c01fe83e>] __alloc_skb+0x76/0x7a
 [<c0239635>] tcp_sendmsg+0x14f/0xc1f
 [<c01a40ec>] find_undo+0x84/0x26d
 [<c0212dfe>] sock_sendmsg+0xe8/0x106
 [<c0117c91>] find_busiest_group+0xd8/0x298
 [<c011a958>] autoremove_wake_function+0x0/0x3a
 [<c011a958>] autoremove_wake_function+0x0/0x3a
 [<c021429c>] sys_recvfrom+0xed/0xfc
 [<c02132a2>] sock_readv_writev+0x89/0x90
 [<c021330f>] sock_writev+0x30/0x36
 [<c015bc2c>] do_readv_writev+0x1cb/0x253
 [<c016ced5>] __pollwait+0x0/0x9b
 [<c015bd30>] vfs_writev+0x3c/0x40
 [<c015bdd2>] sys_writev+0x3b/0x63
 [<c010740f>] syscall_call+0x7/0xb
Code: 00 00 00 8b 44 24 5c bb 06 00 00 00 8d 4c 24 28 8b 54 24 20 05 00 00 00
40 c1 e8 0c 8d 2c 10 89 6c 24 24 e8 34 b2 fe ff 48 74 08 <0f> 0b 50 01 c5 99 27
c0 8b 44 24 24 31 f6 89 fb 8b 0d ec 18 2a 

Next time will get "xm dmesg".


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.