[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] kernel BUG at... (was: Xen randomly freezes under load)



---- Original Message ----
From: "Valerio Granato" <contact@xxxxxxxxxx>
To: <xen-users@xxxxxxxxxxxxxxxxxxx>
Sent: Wednesday, May 14, 2008 9:25 AM
Subject: Re: [Xen-users] Xen randomly freezes under load

On the last test it made, after posting, it seems that killing
hald and powersaved on the dom0 helps to recover from freeze.

Ok, without these two processes the server has been up for 24h
without freezes or slowdowns.

This morning I've added another domU, that is saying

kernel: kernel BUG at mm/slab.c:1673!
kernel: invalid opcode: 0000 [1] SMP
kernel: last sysfs file: /kernel/uevent_seqnum
kernel: CPU 2
kernel: Modules linked in: ipv6 reiserfs xenblk xennet
kernel: Pid: 24, comm: events/2 Tainted: G      N 2.6.22.17-0.1-xen #1
kernel: RIP: e030:[<ffffffff80277e5b>]  [<ffffffff80277e5b>]
kmem_freepages+0xb6/0xfb
kernel: RSP: e02b:ffff880000f01df0  EFLAGS: 00010206
kernel: RAX: 0000000000010028 RBX: ffff8800026c7948 RCX: 0000000000000124
kernel: RDX: 0000000000000000 RSI: 0000000000000009 RDI: ffffffff804ab580
kernel: RBP: 0000000000000001 R08: ffffffff804ab74a R09: ffff880000f5a7d0
kernel: R10: ffff880000f67110 R11: 0000000000000002 R12: ffff880004e3c980
kernel: R13: ffff88003134f000 R14: ffff880004e3c980 R15: ffff880001bfdc00
kernel: FS:  00002ad9c46c16f0(0000) GS:ffffffff804dc100(0000)
knlGS:0000000000000000
kernel: CS:  e033 DS: 0000 ES: 0000
kernel: Process events/2 (pid: 24, threadinfo ffff880000f00000, task
ffff880000f5a7d0)
kernel: Stack:  ffff880000f67110 ffff880004e3c980 ffff88007134f000
0000000000000001
kernel:  ffff880001bfdbe0 ffffffff802782c4 0000000000000000 ffff880001bfdbc0
kernel:  ffff88007134f000 ffffffff802785e6 00000003010173b0 ffff880001bfdbc0
kernel: Call Trace:
kernel:  [<ffffffff802782c4>] slab_destroy+0x3c/0x5b
kernel:  [<ffffffff802785e6>] drain_freelist+0xcb/0xeb
kernel:  [<ffffffff802797d9>] cache_reap+0x0/0x104
kernel:  [<ffffffff80279888>] cache_reap+0xaf/0x104
kernel:  [<ffffffff802388d9>] run_workqueue+0xa9/0x167
kernel:  [<ffffffff80239306>] worker_thread+0xe1/0xf0
kernel:  [<ffffffff8023c28e>] autoremove_wake_function+0x0/0x2e
kernel:  [<ffffffff80239225>] worker_thread+0x0/0xf0
kernel:  [<ffffffff8023c157>] kthread+0x47/0x74
kernel:  [<ffffffff80209e48>] child_rip+0xa/0x12
kernel:  [<ffffffff8023c110>] kthread+0x0/0x74
kernel:  [<ffffffff80209e3e>] child_rip+0x0/0x12
kernel:
kernel: Code: 0f 0b eb fe 0f ba 33 07 48 83 c3 38 48 ff ca 48 83 fa ff 75
kernel: RIP  [<ffffffff80277e5b>] kmem_freepages+0xb6/0xfb
kernel:  RSP <ffff880000f01df0>

What this one could be?

Valerio

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.