|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 756] kernel BUG at arch/i386/mm/hypervisor.c:196!
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=756
------- Comment #7 from hedgehog@xxxxxxxxxx 2009-02-05 07:50 -------
(In reply to comment #6)
Not sure this is exactly the same.
DOM0: RHEL 5.3 x86_64 (2.6.18-92.el5xen #1 SMP Tue Apr 29 13:31:30 EDT 2008
x86_64 x86_64 x86_64 GNU/Linux) (kernel from RHEL 5.2 because of Intel RAID
controller driver. haven't it for RHEL 5.3 kernel)
Guest: RHEL 4.7 i386 updated (2.6.9-78.0.13.ELxenU #1 SMP Wed Jan 7 18:25:51
EST 2009 i686 i686 i386 GNU/Linux )
>From time to times Guest crash. This was last time.
------------[ cut here ]------------
kernel BUG at arch/i386/mm/hypervisor.c:336!
invalid operand: 0000 [#1]
SMP
Modules linked in: nfs lockd nfs_acl sunrpc dm_mirror dm_mod xennet ext3 jbd
xenblk sd_mod scsi_mod
CPU: 0
EIP: 0061:[<c0115f4f>] Not tainted VLI
EFLAGS: 00010096 (2.6.9-78.0.13.ELxenU)
EIP is at xen_create_contiguous_region+0x3eb/0x4bf
eax: ffffffff ebx: 00000006 ecx: eb98cc70 edx: 00000001
esi: 00000000 edi: e983f000 ebp: 0002983f esp: eb98cc48
ds: 007b es: 007b ss: 0068
Process gwrd (pid: 3689, threadinfo=eb98c000 task=ec37ae90)
Stack: e9840000 e9840000 e9840000 10fa9063 80000000 00000000 00000000 00000000
00000001 0002983f eb98cc6c 00000001 00000000 00000000 00007ff0 000000d0
c02a7a00 00000001 00000001 c7f10040 e983e000 00000001 c01fe8ca e983e000
Call Trace:
[<c01fe8ca>] skbuff_ctor+0x2c/0x56
[<c0144385>] cache_init_objs+0x35/0x56
[<c0144507>] cache_grow+0xfb/0x187
[<c01446f6>] cache_alloc_refill+0x163/0x19c
[<c0144911>] kmem_cache_alloc+0x67/0x97
[<c0216608>] alloc_skb_from_cache+0x3a/0xb2
[<c01fe83e>] __alloc_skb+0x76/0x7a
[<c0239635>] tcp_sendmsg+0x14f/0xc1f
[<c01a40ec>] find_undo+0x84/0x26d
[<c0212dfe>] sock_sendmsg+0xe8/0x106
[<c0117c91>] find_busiest_group+0xd8/0x298
[<c011a958>] autoremove_wake_function+0x0/0x3a
[<c011a958>] autoremove_wake_function+0x0/0x3a
[<c021429c>] sys_recvfrom+0xed/0xfc
[<c02132a2>] sock_readv_writev+0x89/0x90
[<c021330f>] sock_writev+0x30/0x36
[<c015bc2c>] do_readv_writev+0x1cb/0x253
[<c016ced5>] __pollwait+0x0/0x9b
[<c015bd30>] vfs_writev+0x3c/0x40
[<c015bdd2>] sys_writev+0x3b/0x63
[<c010740f>] syscall_call+0x7/0xb
Code: 00 00 00 8b 44 24 5c bb 06 00 00 00 8d 4c 24 28 8b 54 24 20 05 00 00 00
40 c1 e8 0c 8d 2c 10 89 6c 24 24 e8 34 b2 fe ff 48 74 08 <0f> 0b 50 01 c5 99 27
c0 8b 44 24 24 31 f6 89 fb 8b 0d ec 18 2a
Next time will get "xm dmesg".
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
|
|
|
|