|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 843] 3.0.4 Kernel Oops
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=843
------- Comment #2 from p.bugzilla.xensource.com@xxxxxxxxxxxxxxx 2006-12-22
14:24 -------
Checking the logs there was another oops, see below. Then the server crashed.
Then the other oops came after the restart. The server has been up and
running, problem free for the 22 odd hours since then on 3.0.3
The usage scenario is 54 domU's. with loop back mounted file systems. We
would have used blktap but we've had file corruption with that. (I saw a devel
post that indicated there was going to be a 3.0.4 patch for some blktap related
stuff).
>From our mrtg logging I don't think there was much load (except on startup,
which is normal). After that load was sitting between 1-2.
First kernel oops after restart:
Dec 21 17:50:02 host83 kernel: Unable to handle kernel paging request at
virtual address d92be000
Dec 21 17:50:02 host83 kernel: printing eip:
Dec 21 17:50:02 host83 kernel: c01f2783
Dec 21 17:50:02 host83 kernel: 10adc000 -> *pde = 00000000:f2ff6001
Dec 21 17:50:02 host83 kernel: 087f6000 -> *pme = 00000000:078c5067
Dec 21 17:50:02 host83 kernel: 000c5000 -> *pte = 80000000:e22be061
Dec 21 17:50:02 host83 kernel: Oops: 0003 [#1]
Dec 21 17:50:02 host83 kernel: Modules linked in: dm_mirror dm_mod e100 tg3
ext3 jbd raid5 xor raid1 sata_sil libata sd_mod scsi_mod
Dec 21 17:50:02 host83 kernel: CPU: 0
Dec 21 17:50:02 host83 kernel: EIP: 0061:[<c01f2783>] Not tainted VLI
Dec 21 17:50:02 host83 kernel: EFLAGS: 00010206 (2.6.16.33-xen0 #5)
Dec 21 17:50:02 host83 kernel: EIP is at vsnprintf+0xaa/0x546
Dec 21 17:50:02 host83 kernel: eax: d92be000 ebx: 0000000a ecx: 00000043
edx: c036c36d
Dec 21 17:50:03 host83 kernel: esi: d92be039 edi: 00000000 ebp: 0000006c
esp: caba3e80
Dec 21 17:50:03 host83 kernel: ds: 007b es: 007b ss: 0069
Dec 21 17:50:03 host83 kernel: Process cat (pid: 24817, threadinfo=caba2000
task=cc847030)
Dec 21 17:50:03 host83 kernel: Stack: <0>d92be02e d92be000 00000000 00000000
0000000a 0000000a 00000000 00000000
Dec 21 17:50:03 host83 kernel: ffffffff 0000000a d92be000 d76ba780
d76ba780 cdd09400 00000fbd c0175168
Dec 21 17:50:03 host83 kernel: d92bdfbd 00000043 c036c36e caba3f24
cdd09400 c02ccffd d76ba780 c036c318
Dec 21 17:50:03 host83 kernel: Call Trace:
Dec 21 17:50:03 host83 kernel: [<c0175168>] seq_printf+0x32/0x53
Dec 21 17:50:03 host83 kernel: [<c02ccffd>] dev_seq_printf_stats+0xb5/0xd5
Dec 21 17:50:03 host83 kernel: [<c02cd039>] dev_seq_show+0x1c/0x38
Dec 21 17:50:03 host83 kernel: [<c0174cca>] seq_read+0x237/0x2e3
Dec 21 17:50:03 host83 kernel: [<c0157042>] vfs_read+0x9a/0x121
Dec 21 17:50:03 host83 kernel: [<c0157367>] sys_read+0x4b/0x74
Dec 21 17:50:03 host83 kernel: [<c01049e9>] syscall_call+0x7/0xb
Dec 21 17:50:03 host83 kernel: Code: ff 89 54 24 44 eb a1 31 ff 8d 51 01 89 c8
89 54 24 48 89 d1 0f be 40 01 83 e8 20 83 f8 10 77 10 ff 24 85 90 30 33
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
|
|
|
|