WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 756] kernel BUG at arch/i386/mm/hypervisor.c:196!

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 756] kernel BUG at arch/i386/mm/hypervisor.c:196!
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Thu, 5 Feb 2009 07:50:33 -0800
Delivery-date: Thu, 05 Feb 2009 07:50:39 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <bug-756-3@xxxxxxxxxxxxxxxxxxxxxxxxxxx/bugzilla/>
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=756





------- Comment #7 from hedgehog@xxxxxxxxxx  2009-02-05 07:50 -------
(In reply to comment #6)

Not sure this is exactly the same.

DOM0: RHEL 5.3 x86_64 (2.6.18-92.el5xen #1 SMP Tue Apr 29 13:31:30 EDT 2008
x86_64 x86_64 x86_64 GNU/Linux) (kernel from RHEL 5.2 because of Intel RAID
controller driver. haven't it for RHEL 5.3 kernel)
Guest: RHEL 4.7 i386 updated (2.6.9-78.0.13.ELxenU #1 SMP Wed Jan 7 18:25:51
EST 2009 i686 i686 i386 GNU/Linux )

>From time to times Guest crash. This was last time.

------------[ cut here ]------------
kernel BUG at arch/i386/mm/hypervisor.c:336!
invalid operand: 0000 [#1]
SMP 
Modules linked in: nfs lockd nfs_acl sunrpc dm_mirror dm_mod xennet ext3 jbd
xenblk sd_mod scsi_mod
CPU:    0
EIP:    0061:[<c0115f4f>]    Not tainted VLI
EFLAGS: 00010096   (2.6.9-78.0.13.ELxenU) 
EIP is at xen_create_contiguous_region+0x3eb/0x4bf
eax: ffffffff   ebx: 00000006   ecx: eb98cc70   edx: 00000001
esi: 00000000   edi: e983f000   ebp: 0002983f   esp: eb98cc48
ds: 007b   es: 007b   ss: 0068
Process gwrd (pid: 3689, threadinfo=eb98c000 task=ec37ae90)
Stack: e9840000 e9840000 e9840000 10fa9063 80000000 00000000 00000000 00000000 
       00000001 0002983f eb98cc6c 00000001 00000000 00000000 00007ff0 000000d0 
       c02a7a00 00000001 00000001 c7f10040 e983e000 00000001 c01fe8ca e983e000 
Call Trace:
 [<c01fe8ca>] skbuff_ctor+0x2c/0x56
 [<c0144385>] cache_init_objs+0x35/0x56
 [<c0144507>] cache_grow+0xfb/0x187
 [<c01446f6>] cache_alloc_refill+0x163/0x19c
 [<c0144911>] kmem_cache_alloc+0x67/0x97
 [<c0216608>] alloc_skb_from_cache+0x3a/0xb2
 [<c01fe83e>] __alloc_skb+0x76/0x7a
 [<c0239635>] tcp_sendmsg+0x14f/0xc1f
 [<c01a40ec>] find_undo+0x84/0x26d
 [<c0212dfe>] sock_sendmsg+0xe8/0x106
 [<c0117c91>] find_busiest_group+0xd8/0x298
 [<c011a958>] autoremove_wake_function+0x0/0x3a
 [<c011a958>] autoremove_wake_function+0x0/0x3a
 [<c021429c>] sys_recvfrom+0xed/0xfc
 [<c02132a2>] sock_readv_writev+0x89/0x90
 [<c021330f>] sock_writev+0x30/0x36
 [<c015bc2c>] do_readv_writev+0x1cb/0x253
 [<c016ced5>] __pollwait+0x0/0x9b
 [<c015bd30>] vfs_writev+0x3c/0x40
 [<c015bdd2>] sys_writev+0x3b/0x63
 [<c010740f>] syscall_call+0x7/0xb
Code: 00 00 00 8b 44 24 5c bb 06 00 00 00 8d 4c 24 28 8b 54 24 20 05 00 00 00
40 c1 e8 0c 8d 2c 10 89 6c 24 24 e8 34 b2 fe ff 48 74 08 <0f> 0b 50 01 c5 99 27
c0 8b 44 24 24 31 f6 89 fb 8b 0d ec 18 2a 

Next time will get "xm dmesg".


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>