[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 1349] New: kernel BUG - guest down



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1349

           Summary: kernel BUG - guest down
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: Linux
            Status: NEW
          Severity: blocker
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: marco.strullato@xxxxxxxxx


Hi, I had a kernel bug on my system:
dom0: centos 5 64 bit
kernel-xen-2.6.18-53.1.14.el5.centos.plus
xen-libs-3.2.0-0xs
xen-3.2.0-0xs
Guest: centos 4.5 32 bit
kernel-xenU-2.6.9-55.EL

I had

kernel BUG at arch/i386/mm/hypervisor.c:196!
invalid operand: 0000 [#1]
SMP 
Modules linked in: md5 ipv6 xennet dm_snapshot dm_zero dm_mirror ext3 jbd
dm_mod xenblk sd_mod scsi_mod
CPU:    1
EIP:    0061:[<c0114c6e>]    Not tainted VLI
EFLAGS: 00010282   (2.6.9-55.ELxenU) 
EIP is at xen_pgd_pin+0x46/0x54
eax: ffffffea   ebx: c967be2c   ecx: 00000001   edx: 00000000
esi: 00007ff0   edi: c8496040   ebp: c8496040   esp: c967be2c
ds: 007b   es: 007b   ss: 0068
Process sh (pid: 14179, threadinfo=c967b000 task=ecb96840)
Stack: 00000002 000618b3 ea257018 2a257000 00544ae0 cb869d40 c011246b 2a257000 
       ea257000 00000061 80000000 cb869d84 c01124ff ea257000 00000001 c967be78 
       c0161d57 cb869d40 ecb96840 caacb740 c967beb4 00000080 c0158417 ed791580 
Call Trace:
 [<c011246b>] __pgd_pin+0x2d/0x41
 [<c01124ff>] mm_pin+0x21/0x2e
 [<c0161d57>] exec_mmap+0xf8/0x1eb
 [<c0158417>] vfs_read+0xcf/0xd8
 [<c0161ef8>] flush_old_exec+0x46/0x228
 [<c017e42c>] load_elf_binary+0x361/0xce5
 [<c017e610>] load_elf_binary+0x545/0xce5
 [<c0146050>] kmap_high+0x2d/0x1fb
 [<c0146214>] kmap_high+0x1f1/0x1fb
 [<c0146231>] kunmap_high+0x13/0x95
 [<c0146296>] kunmap_high+0x78/0x95
 [<c0161763>] copy_strings+0x22f/0x23a
 [<c017e0cb>] load_elf_binary+0x0/0xce5
 [<c016295e>] search_binary_handler+0xb4/0x229
 [<c0162c4b>] do_execve+0x178/0x210
 [<c0105d79>] sys_execve+0x2c/0x8e
 [<c010737f>] syscall_call+0x7/0xb
Code: 00 75 0d a1 a0 80 35 c0 8b 04 90 25 ff ff ff 7f 89 44 24 04 89 e3 b9 01
00 00 00 31 d2 be f0 7f 00 00 e8 d6 c6 fe ff 85 c0 79 08 <0f> 0b c4 00 87 2d 27
c0 83 c4 10 5b 5e c3 56 53 83 ec 10 8b 54 
 <0>Fatal exception: panic in 5 seconds


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.