WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 502] Kernel BUG- (dom0 and domU)

http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=502


matta@xxxxxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
            Version|unstable                    |3.0.1




------- Additional Comments From matta@xxxxxxxxxxxx  2006-02-10 20:25 -------
More BUG()'s from domU and details from a customer of mine.  This is using 
3.0.1.

Symptom/problem is that I regularly end up with port 25 allowing connections
but never showing a banner or anything:

vps ~ # telnet xx.xx.xx.xx 25
Trying 207.210.78.180...
Connected to vps.overloaded.net.
Escape character is '^]'.

dmesg says:

------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#1]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: eba2c538 esp: d868fddc
ds: 007b es: 007b ss: 0069
Process spamassassin (pid: 24197, threadinfo=d868e000 task=ebd81aa0)
Stack: e33a6000 00000000 00000020 c014308d e33a5000 c061df00 00000001 eba2c520

e33a5000 c061df00 00000001 c0143222 c061df00 eba2c520 00000001 000000d0

012265dc 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513

Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#2]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3debd58 esp: ec331d54
ds: 007b es: 007b ss: 0069
Process tcpserver (pid: 3203, threadinfo=ec330000 task=ec2b5060)
Stack: e0723000 00000000 00000020 c014308d e0722000 c061df00 00000001 c3debd40

e0722000 c061df00 00000001 c0143222 c061df00 c3debd40 00000001 000000d0

01000003 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513

Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118f0e>] copy_mm+0xce/0x360
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0119b59>] copy_process+0x4a9/0xc70
[<c011a43a>] do_fork+0x7a/0x1f5
[<c01082f7>] sys_fork+0x37/0x40
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#3]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3debb58 esp: cb66bddc
ds: 007b es: 007b ss: 0069
Process run (pid: 24331, threadinfo=cb66a000 task=cc3dc020)
Stack: e5d45000 00000000 00000020 c014308d e5d44000 c061df00 00000001 c3debb40

e5d44000 c061df00 00000001 c0143222 c061df00 c3debb40 00000001 000000d0

01000101 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513

Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#4]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3debe78 esp: cb66bddc
ds: 007b es: 007b ss: 0069
Process report-and-dele (pid: 24459, threadinfo=cb66a000 task=ebd9ba20)
Stack: ec31d000 00000000 00000020 c014308d ec31c000 c061df00 00000001 c3debe60

ec31c000 c061df00 00000001 c0143222 c061df00 c3debe60 00000001 000000d0

01f82fa4 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513

Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#5]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3deb538 esp: d868fddc
ds: 007b es: 007b ss: 0069
Process report-and-dele (pid: 24460, threadinfo=d868e000 task=eb87aaa0)
Stack: e30ae000 00000000 00000020 c014308d e30ad000 c061df00 00000001 c3deb520

e30ad000 c061df00 00000001 c0143222 c061df00 c3deb520 00000001 000000d0

01f82fa4 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513

Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27

notice tcpserver was one of the processes listed in dmesg as hitting a kernel
bug, and now no program has ownership of port 25:

vps ~ # netstat -anp | grep 25
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50513 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50515 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50511 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50569 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50594 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50580 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50512 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50591 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50568 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50567 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50587 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50590 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50581 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50565 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50571 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50496 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50578 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50589 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50510 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50584 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50514 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50593 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50566 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50574 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50586 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50520 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50519 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50582 SYN_RECV
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35400 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35404 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35164 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35455 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35340 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35345 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35096 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35098 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35100 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35102 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35105 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35106 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35109 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35110 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35047 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35314 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35066 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35071 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35209 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35212 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35225 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35226 CLOSE_WAIT
-
tcp 0 0 :::80 :::* LISTEN
3254/apache2
tcp 0 0 ::ffff:207.210.78.18:22 ::ffff:208.48.228.:2278 ESTABLISHED
12502/sshd: matt [p
unix 2 [ ACC ] STREAM LISTENING 520684 12505/2
/tmp/ssh-MjcbR12505/agent.12505
unix 3 [ ] STREAM CONNECTED 1421672 22527/0
unix 3 [ ] STREAM CONNECTED 520671 12502/sshd: matt [p
unix 3 [ ] STREAM CONNECTED 520670 12505/2
unix 3 [ ] STREAM CONNECTED 10225 3713/sshd: matt [pr

I stop tcpserver:

#/etc/init.d/svscan stop
# ps aux | grep tcpserver
root 28810 0.0 0.0 1520 456 pts/0 R+ 15:53 0:00 grep
tcpserver

but port 25 still listens:

vps ~ # telnet xx.xx.xx.xx 25
Trying 207.210.78.180...
Connected to vps.overloaded.net.
Escape character is '^]'.

only solution seems to be a complete reboot. I've only had this live for about
a week, but this is the 2nd time this same problem has shown up.

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>