WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 604] New: hypervisior kernel crashed after 10days runnin

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 604] New: hypervisior kernel crashed after 10days running
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Thu, 06 Apr 2006 06:06:49 -0700
Delivery-date: Thu, 06 Apr 2006 06:07:24 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=604

           Summary: hypervisior kernel crashed after 10days running
           Product: Xen
           Version: 3.0.1
          Platform: x86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: r.thormann@xxxxxxxxxxxxxxx


dual xeon cpu, 8gb ram, adaptec serial ata controller

selfbuild kernel 2.6.12.6 from xen tarball with pae, patched with aacraid from
adaptec

xen with 3 guests

$> xm info
system                 : Linux
host                   : xen01-dom0
release                : 2.6.12.6-xen
version                : #1 SMP Thu Feb 2 01:05:22 UTC 2006
machine                : i686
nr_cpus                : 4
nr_nodes               : 1
sockets_per_node       : 2
cores_per_socket       : 1
threads_per_core       : 2
cpu_mhz                : 3065
hw_caps                : bfebfbff:00000000:00000000:00000080:00004400
total_memory           : 8192
free_memory            : 241
xen_major              : 3
xen_minor              : 0
xen_extra              : .1
xen_caps               : xen-3.0-x86_32p
platform_params        : virt_start=0xf5800000
xen_changeset          : Thu Feb  2 12:28:53 2006 +0100
cc_compiler            : gcc version 3.3.5 (Debian 1:3.3.5-13)
cc_compile_by          : root
cc_compile_domain      : tha.local
cc_compile_date        : Wed Feb 15 22:06:39 UTC 2006


kernel message:

Apr  6 13:10:01 localhost kernel: ------------[ cut here ]------------
Apr  6 13:10:01 localhost kernel: kernel BUG at <bad filename>:63723!
Apr  6 13:10:01 localhost kernel: invalid operand: 0000 [#1]
Apr  6 13:10:01 localhost kernel: SMP
Apr  6 13:10:01 localhost kernel: Modules linked in: ipt_physdev iptable_filter
ip_tables af_packet bridge ipv6 dm_mod reiserfs ext3 jbd i2c_i801 i2c_core
parport_pc parport softdog floppy pcspkr rtc aic7xxx scsi_transport_spi
hw_random shpchp pci_hotplug ohci_hcd uhci_hcd e1000 evdev tsdev sr_mod sd_mod
font aacraid aic79xx scsi_mod unix
Apr  6 13:10:01 localhost kernel: CPU:    0
Apr  6 13:10:01 localhost kernel: EIP:    0061:[pgd_ctor+38/48]    Tainted: GF 
   VLI
Apr  6 13:10:01 localhost kernel: EFLAGS: 00010282   (2.6.12.6-xen)
Apr  6 13:10:01 localhost kernel: EIP is at pgd_ctor+0x26/0x30
Apr  6 13:10:01 localhost kernel: eax: fffffff4   ebx: 00000001   ecx: f577e000
  edx: 00000000
Apr  6 13:10:01 localhost kernel: esi: c0982d80   edi: ceada518   ebp: ceada500
  esp: c6ad1d38
Apr  6 13:10:01 localhost kernel: ds: 007b   es: 007b   ss: 0069
Apr  6 13:10:01 localhost kernel: Process sh (pid: 17948, threadinfo=c6ad0000
task=c75f4530)
Apr  6 13:10:01 localhost kernel: Stack: cbd36000 00000000 00000020 c014dd51
cbd36000 c0982d80 00000001 ceada500
Apr  6 13:10:01 localhost kernel:        cbd36000 c0982d80 00000000 c014decd
c0982d80 ceada500 00000001 000000d0
Apr  6 13:10:01 localhost kernel:        c0982de0 00000001 000000d0 c531e980
0000000c 000000d0 00000000 c014e0db
Apr  6 13:10:01 localhost kernel: Call Trace:
Apr  6 13:10:01 localhost kernel:  [cache_init_objs+113/128]
cache_init_objs+0x71/0x80
Apr  6 13:10:01 localhost kernel:  [cache_grow+269/416] cache_grow+0x10d/0x1a0
Apr  6 13:10:01 localhost kernel:  [cache_alloc_refill+379/544]
cache_alloc_refill+0x17b/0x220
Apr  6 13:10:01 localhost kernel:  [kmap_atomic+42/48] kmap_atomic+0x2a/0x30
Apr  6 13:10:01 localhost kernel:  [kmem_cache_alloc+127/144]
kmem_cache_alloc+0x7f/0x90
Apr  6 13:10:01 localhost kernel:  [pgd_alloc+29/784] pgd_alloc+0x1d/0x310
Apr  6 13:10:01 localhost kernel:  [prep_new_page+96/112]
prep_new_page+0x60/0x70
Apr  6 13:10:01 localhost kernel:  [buffered_rmqueue+295/544]
buffered_rmqueue+0x127/0x220
Apr  6 13:10:01 localhost kernel:  [mm_init+206/256] mm_init+0xce/0x100
Apr  6 13:10:01 localhost kernel:  [copy_mm+212/976] copy_mm+0xd4/0x3d0
Apr  6 13:10:01 localhost kernel:  [copy_process+991/3328]
copy_process+0x3df/0xd00
Apr  6 13:10:01 localhost kernel:  [do_fork+105/399] do_fork+0x69/0x18f
Apr  6 13:10:01 localhost kernel:  [sys_rt_sigprocmask+170/272]
sys_rt_sigprocmask+0xaa/0x110
Apr  6 13:10:01 localhost kernel:  [sys_fork+49/64] sys_fork+0x31/0x40
Apr  6 13:10:01 localhost kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Apr  6 13:10:01 localhost kernel: Code: 00 f3 ab 5f c3 83 ec 0c b8 20 00 00 00
89 44 24 08 31 c0 89 44 24 04 8b 44 24 10 89 04 24 e8 d2 2b 00 00 85 c0 75 04
83 c4 0c c3 <0f> 0b eb f8 8d b6 00 00 00 00 83 ec 08 b8 f8 e3 36 c0 89 5c 24

Apr  6 13:10:18 localhost kernel:  ------------[ cut here ]------------
Apr  6 13:10:18 localhost kernel: kernel BUG at <bad filename>:63723!
Apr  6 13:10:18 localhost kernel: invalid operand: 0000 [#2]
Apr  6 13:10:18 localhost kernel: SMP
Apr  6 13:10:18 localhost kernel: Modules linked in: ipt_physdev iptable_filter
ip_tables af_packet bridge ipv6 dm_mod reiserfs ext3 jbd i2c_i801 i2c_core
parport_pc parport softdog floppy pcspkr rtc aic7xxx scsi_transport_spi
hw_random shpchp pci_hotplug ohci_hcd uhci_hcd e1000 evdev tsdev sr_mod sd_mod
font aacraid aic79xx scsi_mod unix
Apr  6 13:10:18 localhost kernel: CPU:    0
Apr  6 13:10:18 localhost kernel: EIP:    0061:[pgd_ctor+38/48]    Tainted: GF 
   VLI
Apr  6 13:10:18 localhost kernel: EFLAGS: 00010282   (2.6.12.6-xen)
Apr  6 13:10:18 localhost kernel: EIP is at pgd_ctor+0x26/0x30
Apr  6 13:10:18 localhost kernel: eax: fffffff4   ebx: 00000001   ecx: f577e000
  edx: 00000000
Apr  6 13:10:18 localhost kernel: esi: c0982d80   edi: cc05fad8   ebp: cc05fac0
  esp: caf51d38
Apr  6 13:10:18 localhost kernel: ds: 007b   es: 007b   ss: 0069
Apr  6 13:10:18 localhost kernel: Process watchdog (pid: 8523,
threadinfo=caf50000 task=cc13da40)
Apr  6 13:10:18 localhost kernel: Stack: c759d000 00000000 00000020 c014dd51
c759d000 c0982d80 00000001 cc05fac0
Apr  6 13:10:18 localhost kernel:        c759d000 c0982d80 00000000 c014decd
c0982d80 cc05fac0 00000001 000000d0
Apr  6 13:10:18 localhost kernel:        c0982de0 00000001 000000d0 c531e980
0000000c 000000d0 00000000 c014e0db
Apr  6 13:10:18 localhost kernel: Call Trace:
Apr  6 13:10:18 localhost kernel:  [cache_init_objs+113/128]
cache_init_objs+0x71/0x80
Apr  6 13:10:18 localhost kernel:  [cache_grow+269/416] cache_grow+0x10d/0x1a0
Apr  6 13:10:18 localhost kernel:  [cache_alloc_refill+379/544]
cache_alloc_refill+0x17b/0x220
Apr  6 13:10:18 localhost kernel:  [kmem_cache_alloc+127/144]
kmem_cache_alloc+0x7f/0x90
Apr  6 13:10:18 localhost kernel:  [pgd_alloc+29/784] pgd_alloc+0x1d/0x310
Apr  6 13:10:18 localhost kernel:  [prep_new_page+96/112]
prep_new_page+0x60/0x70
Apr  6 13:10:18 localhost kernel:  [buffered_rmqueue+295/544]
buffered_rmqueue+0x127/0x220
Apr  6 13:10:18 localhost kernel:  [mm_init+206/256] mm_init+0xce/0x100
Apr  6 13:10:18 localhost kernel:  [copy_mm+212/976] copy_mm+0xd4/0x3d0
Apr  6 13:10:18 localhost kernel:  [copy_process+991/3328]
copy_process+0x3df/0xd00
Apr  6 13:10:18 localhost kernel:  [destroy_inode+70/112]
destroy_inode+0x46/0x70
Apr  6 13:10:18 localhost kernel:  [do_fork+105/399] do_fork+0x69/0x18f
Apr  6 13:10:18 localhost kernel:  [sys_fork+49/64] sys_fork+0x31/0x40
Apr  6 13:10:18 localhost kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Apr  6 13:10:18 localhost kernel:  [ip_rcv+32/1376] ip_rcv+0x20/0x560
Apr  6 13:10:18 localhost kernel:  [ip_rcv+288/1376] ip_rcv+0x120/0x560
Apr  6 13:10:18 localhost kernel: Code: 00 f3 ab 5f c3 83 ec 0c b8 20 00 00 00
89 44 24 08 31 c0 89 44 24 04 8b 44 24 10 89 04 24 e8 d2 2b 00 00 85 c0 75 04
83 c4 0c c3 <0f> 0b eb f8 8d b6 00 00 00 00 83 ec 08 b8 f8 e3 36 c0 89 5c 24


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>