This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-bugs] [Bug 1349] New: kernel BUG - guest down

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1349] New: kernel BUG - guest down
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Mon, 15 Sep 2008 02:07:45 -0700
Delivery-date: Mon, 15 Sep 2008 02:07:49 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx

           Summary: kernel BUG - guest down
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: Linux
            Status: NEW
          Severity: blocker
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: marco.strullato@xxxxxxxxx

Hi, I had a kernel bug on my system:
dom0: centos 5 64 bit
Guest: centos 4.5 32 bit

I had

kernel BUG at arch/i386/mm/hypervisor.c:196!
invalid operand: 0000 [#1]
Modules linked in: md5 ipv6 xennet dm_snapshot dm_zero dm_mirror ext3 jbd
dm_mod xenblk sd_mod scsi_mod
CPU:    1
EIP:    0061:[<c0114c6e>]    Not tainted VLI
EFLAGS: 00010282   (2.6.9-55.ELxenU) 
EIP is at xen_pgd_pin+0x46/0x54
eax: ffffffea   ebx: c967be2c   ecx: 00000001   edx: 00000000
esi: 00007ff0   edi: c8496040   ebp: c8496040   esp: c967be2c
ds: 007b   es: 007b   ss: 0068
Process sh (pid: 14179, threadinfo=c967b000 task=ecb96840)
Stack: 00000002 000618b3 ea257018 2a257000 00544ae0 cb869d40 c011246b 2a257000 
       ea257000 00000061 80000000 cb869d84 c01124ff ea257000 00000001 c967be78 
       c0161d57 cb869d40 ecb96840 caacb740 c967beb4 00000080 c0158417 ed791580 
Call Trace:
 [<c011246b>] __pgd_pin+0x2d/0x41
 [<c01124ff>] mm_pin+0x21/0x2e
 [<c0161d57>] exec_mmap+0xf8/0x1eb
 [<c0158417>] vfs_read+0xcf/0xd8
 [<c0161ef8>] flush_old_exec+0x46/0x228
 [<c017e42c>] load_elf_binary+0x361/0xce5
 [<c017e610>] load_elf_binary+0x545/0xce5
 [<c0146050>] kmap_high+0x2d/0x1fb
 [<c0146214>] kmap_high+0x1f1/0x1fb
 [<c0146231>] kunmap_high+0x13/0x95
 [<c0146296>] kunmap_high+0x78/0x95
 [<c0161763>] copy_strings+0x22f/0x23a
 [<c017e0cb>] load_elf_binary+0x0/0xce5
 [<c016295e>] search_binary_handler+0xb4/0x229
 [<c0162c4b>] do_execve+0x178/0x210
 [<c0105d79>] sys_execve+0x2c/0x8e
 [<c010737f>] syscall_call+0x7/0xb
Code: 00 75 0d a1 a0 80 35 c0 8b 04 90 25 ff ff ff 7f 89 44 24 04 89 e3 b9 01
00 00 00 31 d2 be f0 7f 00 00 e8 d6 c6 fe ff 85 c0 79 08 <0f> 0b c4 00 87 2d 27
c0 83 c4 10 5b 5e c3 56 53 83 ec 10 8b 54 
 <0>Fatal exception: panic in 5 seconds

Configure bugmail: 
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Xen-bugs mailing list

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 1349] New: kernel BUG - guest down, bugzilla-daemon <=