WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 975] New: Random kernel oops with 3.0.5-rc4 hypervisor

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 975] New: Random kernel oops with 3.0.5-rc4 hypervisor
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Wed, 2 May 2007 00:35:18 -0700
Delivery-date: Wed, 02 May 2007 00:36:12 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=975

           Summary: Random kernel oops with 3.0.5-rc4 hypervisor
           Product: Xen
           Version: unspecified
          Platform: x86
        OS/Version: Linux-2.6
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: osprey@xxxxxxxxxxxxxxxxx


The problem appears totally at random when trying to execute a command (any
type of shell command, even ls). The command fails and the kernel says oops,
but the system continue to work. Really, I don't have any idea how this is
possible...


[ 2901.520000] ------------[ cut here ]------------
[ 2901.520000] kernel BUG at arch/i386/mm/hypervisor.c:62!
[ 2901.520000] invalid opcode: 0000 [#1]
[ 2901.520000] SMP 
[ 2901.520000] Modules linked in: ocfs2_dlmfs ocfs2 ocfs2_dlm ocfs2_nodemanager
configfs xt_physdev iptable_filter ip_tables x_tables af_packet nfs nfsd
exportfs lockd sunrpc sctp ipv6 raid456 xor bridge lp parport_pc parport
i2c_piix4 serial_core psmouse shpchp pci_hotplug sworks_agp serio_raw pcspkr
agpgart i2c_savage4 i2c_algo_bit i2c_core evdev ext3 jbd mbcache sd_mod sg st
ide_cd cdrom floppy sata_sil lpfc scsi_transport_fc ohci_hcd usbcore tulip
libata aic7xxx scsi_transport_spi scsi_mod serverworks generic e100 mii raid1
md_mod thermal processor fan dm_mod
[ 2901.520000] CPU:    0
[ 2901.520000] EIP:    0061:[<c011848e>]    Not tainted VLI
[ 2901.520000] EFLAGS: 00010282   (2.6.18-100-server #2) 
[ 2901.520000] EIP is at xen_l1_entry_update+0xae/0xc0
[ 2901.520000] eax: ffffffea   ebx: df457bcc   ecx: 00000001   edx: 00000000
[ 2901.520000] esi: 00007ff0   edi: 00000001   ebp: 00000000   esp: df457bc8
[ 2901.520000] ds: 007b   es: 007b   ss: 0069
[ 2901.520000] Process bash (pid: 8262, ti=df456000 task=c39ad550
task.ti=df456000)
[ 2901.520000] Stack: 00000000 fffff258 000007ff 00000000 00000000 072c2025
c0626c80 00000001 
[ 2901.520000]        f57b4258 c015cbfa 072c2025 00000000 df457c20 c014e230
df457c48 c0190134 
[ 2901.520000]        00000001 00000000 e3523754 df457ca4 072c2025 00000000
0804b000 00000000 
[ 2901.520000] Call Trace:
[ 2901.520000]  [<c015cbfa>] unmap_vmas+0x75a/0x9c0
[ 2901.530000]  [<c0162060>] exit_mmap+0x80/0x100
[ 2901.530000]  [<c011ec33>] mmput+0x33/0xa0
[ 2901.530000]  [<c017e7e7>] flush_old_exec+0x2f7/0xac0
[ 2901.530000]  [<c01a1513>] load_elf_binary+0x593/0x1af0
[ 2901.530000]  [<c017db5b>] search_binary_handler+0x8b/0x230
[ 2901.530000]  [<c019fad4>] load_script+0x214/0x250
[ 2901.530000]  [<c017db5b>] search_binary_handler+0x8b/0x230
[ 2901.530000]  [<c017fa8a>] do_execve+0x1ea/0x220
[ 2901.530000]  [<c010368f>] sys_execve+0x2f/0x90
[ 2901.530000]  [<c010517f>] syscall_call+0x7/0xb
[ 2901.530000]  [<b7ef6402>] 0xb7ef6402
[ 2901.530000] Code: e8 b8 8b fe ff 85 c0 78 22 8b 5c 24 14 8b 74 24 18 8b 7c
24 1c 8b 6c 24 20 83 c4 24 c3 39 c2 72 92 0f 0b 22 00 0c a2 30 c0 eb 88 <0f> 0b
3e 00 2f c7 30 c0 eb d4 90 8d b4 26 00 00 00 00 83 ec 24 
[ 2901.540000] EIP: [<c011848e>] xen_l1_entry_update+0xae/0xc0 SS:ESP
0069:df457bc8
[ 2901.540000]  <6>note: bash[8262] exited with preempt_count 1


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 975] New: Random kernel oops with 3.0.5-rc4 hypervisor, bugzilla-daemon <=