|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 502] Kernel BUG- (dom0 and domU)
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=502
matta@xxxxxxxxxxxx changed:
What |Removed |Added
----------------------------------------------------------------------------
Version|unstable |3.0.1
------- Additional Comments From matta@xxxxxxxxxxxx 2006-02-10 20:25 -------
More BUG()'s from domU and details from a customer of mine. This is using
3.0.1.
Symptom/problem is that I regularly end up with port 25 allowing connections
but never showing a banner or anything:
vps ~ # telnet xx.xx.xx.xx 25
Trying 207.210.78.180...
Connected to vps.overloaded.net.
Escape character is '^]'.
dmesg says:
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#1]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: eba2c538 esp: d868fddc
ds: 007b es: 007b ss: 0069
Process spamassassin (pid: 24197, threadinfo=d868e000 task=ebd81aa0)
Stack: e33a6000 00000000 00000020 c014308d e33a5000 c061df00 00000001 eba2c520
e33a5000 c061df00 00000001 c0143222 c061df00 eba2c520 00000001 000000d0
012265dc 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513
Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#2]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3debd58 esp: ec331d54
ds: 007b es: 007b ss: 0069
Process tcpserver (pid: 3203, threadinfo=ec330000 task=ec2b5060)
Stack: e0723000 00000000 00000020 c014308d e0722000 c061df00 00000001 c3debd40
e0722000 c061df00 00000001 c0143222 c061df00 c3debd40 00000001 000000d0
01000003 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513
Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118f0e>] copy_mm+0xce/0x360
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0119b59>] copy_process+0x4a9/0xc70
[<c011a43a>] do_fork+0x7a/0x1f5
[<c01082f7>] sys_fork+0x37/0x40
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#3]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3debb58 esp: cb66bddc
ds: 007b es: 007b ss: 0069
Process run (pid: 24331, threadinfo=cb66a000 task=cc3dc020)
Stack: e5d45000 00000000 00000020 c014308d e5d44000 c061df00 00000001 c3debb40
e5d44000 c061df00 00000001 c0143222 c061df00 c3debb40 00000001 000000d0
01000101 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513
Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#4]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3debe78 esp: cb66bddc
ds: 007b es: 007b ss: 0069
Process report-and-dele (pid: 24459, threadinfo=cb66a000 task=ebd9ba20)
Stack: ec31d000 00000000 00000020 c014308d ec31c000 c061df00 00000001 c3debe60
ec31c000 c061df00 00000001 c0143222 c061df00 c3debe60 00000001 000000d0
01f82fa4 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513
Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
------------[ cut here ]------------
kernel BUG at arch/xen/i386/mm/pgtable.c:285!
invalid operand: 0000 [#5]
Modules linked in:
CPU: 0
EIP: 0061:[<c0112d47>] Not tainted VLI
EFLAGS: 00010282 (2.6.12.6-xenU)
EIP is at pgd_ctor+0x27/0x40
eax: fffffff4 ebx: 00000001 ecx: 00000001 edx: 00000000
esi: 00000000 edi: c061df00 ebp: c3deb538 esp: d868fddc
ds: 007b es: 007b ss: 0069
Process report-and-dele (pid: 24460, threadinfo=d868e000 task=eb87aaa0)
Stack: e30ae000 00000000 00000020 c014308d e30ad000 c061df00 00000001 c3deb520
e30ad000 c061df00 00000001 c0143222 c061df00 c3deb520 00000001 000000d0
01f82fa4 000000d0 00000000 c061a980 c061df1c 0000000c c061df0c c0143513
Call Trace:
[<c014308d>] cache_init_objs+0x6d/0xa0
[<c0143222>] cache_grow+0xe2/0x1e0
[<c0143513>] cache_alloc_refill+0x1f3/0x230
[<c0143782>] kmem_cache_alloc+0x62/0x70
[<c0112ddc>] pgd_alloc+0x1c/0x330
[<c0118c57>] mm_init+0xd7/0x110
[<c0118cc2>] mm_alloc+0x32/0x40
[<c0167c75>] do_execve+0x75/0x260
[<c01083cc>] sys_execve+0x3c/0x80
[<c010998d>] syscall_call+0x7/0xb
Code: f3 ab 5f c3 83 ec 0c 8b 44 24 10 c7 44 24 08 20 00 00 00 c7 44 24 04 00
00 00 00 89 04 24 e8 01 27 00 00 85 c0 75 04 83 c4 0c c3 <0f> 0b 1d 01 19
00 40 c0 83 c4 0c c3 8d b6 00 00 00 00 8d bc 27
notice tcpserver was one of the processes listed in dmesg as hitting a kernel
bug, and now no program has ownership of port 25:
vps ~ # netstat -anp | grep 25
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50513 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50515 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50511 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50569 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50594 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50580 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50512 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50591 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50568 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50567 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50587 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50590 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50581 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50565 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50571 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50496 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50578 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50589 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50510 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50584 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50514 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50593 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50566 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50574 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50586 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50520 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50519 SYN_RECV
-
tcp 0 0 207.210.78.180:25 208.48.228.67:50582 SYN_RECV
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35400 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35404 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35164 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35455 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35340 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35345 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35096 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35098 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35100 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35102 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35105 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35106 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35109 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35110 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35047 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35314 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35066 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35071 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35209 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35212 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35225 CLOSE_WAIT
-
tcp 1 0 207.210.78.180:25 208.48.228.67:35226 CLOSE_WAIT
-
tcp 0 0 :::80 :::* LISTEN
3254/apache2
tcp 0 0 ::ffff:207.210.78.18:22 ::ffff:208.48.228.:2278 ESTABLISHED
12502/sshd: matt [p
unix 2 [ ACC ] STREAM LISTENING 520684 12505/2
/tmp/ssh-MjcbR12505/agent.12505
unix 3 [ ] STREAM CONNECTED 1421672 22527/0
unix 3 [ ] STREAM CONNECTED 520671 12502/sshd: matt [p
unix 3 [ ] STREAM CONNECTED 520670 12505/2
unix 3 [ ] STREAM CONNECTED 10225 3713/sshd: matt [pr
I stop tcpserver:
#/etc/init.d/svscan stop
# ps aux | grep tcpserver
root 28810 0.0 0.0 1520 456 pts/0 R+ 15:53 0:00 grep
tcpserver
but port 25 still listens:
vps ~ # telnet xx.xx.xx.xx 25
Trying 207.210.78.180...
Connected to vps.overloaded.net.
Escape character is '^]'.
only solution seems to be a complete reboot. I've only had this live for about
a week, but this is the 2nd time this same problem has shown up.
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 502] Kernel BUG- (dom0 and domU),
bugzilla-daemon <=
|
|
|
|
|