[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] kernel BUG at arch/x86/mm/pgtable-xen.c:90


  • To: <xen-bugs@xxxxxxxxxxxxxxxxxxx>
  • From: "Manfred Hofbauer" <manfred.hofbauer@xxxxxxxxxx>
  • Date: Tue, 3 Nov 2009 15:42:19 +0100
  • Delivery-date: Tue, 03 Nov 2009 08:48:56 -0800
  • List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
  • Thread-index: Acpck9cgN3+XTQmJQDmIqelEjl3reQ==

Following bug occurs every two months on one of my xen-guests. I am using
Debian as Dom0?
Is there anything I can try to avoid it?

[4079910.285499] ------------[ cut here ]------------
[4079910.285507] kernel BUG at arch/x86/mm/pgtable-xen.c:90!
[4079910.285510] invalid opcode: 0000 [#1] SMP
[4079910.285515] Modules linked in: binfmt_misc rfcomm l2cap bluetooth ppdev
parport_pc lp parport ipv6 ext3 jbd mbcache dm_mirror dm_log dm_snapshot
dm_mod thermal_sys
[4079910.285536]
[4079910.285539] Pid: 17094, comm: oracle Not tainted (2.6.26-1-xen-686 #1)
[4079910.285542] EIP: 0061:[<c0111c87>] EFLAGS: 00010282 CPU: 1
[4079910.285549] EIP is at __pmd_free+0xe2/0x10e
[4079910.285551] EAX: ffffffea EBX: ec2ce000 ECX: 8c192063 EDX: 80000000
[4079910.285554] ESI: 00000000 EDI: 8c192063 EBP: 80000000 ESP: ded91ea0
[4079910.285557]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0069
[4079910.285560] Process oracle (pid: 17094, ti=ded90000 task=ec946100
task.ti=ded90000)
[4079910.285563] Stack: c1df69c0 ec2ce000 00000001 c1df69c0 ded91ef0
40080000 c168c034 c015244a
[4079910.285574]        00000000 00000000 00000000 ded91ef0 00000001
c168c034 c01525fd c1df69c0
[4079910.285584]        c168c034 c01551df 00000001 00000001 00000001
00000000 c1df69c0 83e01fff
[4079910.285597] Call Trace:
[4079910.285602]  [<c015244a>] free_hot_cold_page+0x19/0x1b8
[4079910.285609]  [<c01525fd>] __pagevec_free+0x14/0x1a
[4079910.285614]  [<c01551df>] release_pages+0x13c/0x144
[4079910.285619]  [<c01608dc>] __vma_link+0x3f/0x4a
[4079910.285631]  [<c016644b>] free_pages_and_swap_cache+0x6a/0x7e
[4079910.285641]  [<c01604cc>] unmap_region+0xdd/0xec
[4079910.285649]  [<c0160eba>] do_munmap+0x148/0x19b
[4079910.285655]  [<c0160f3d>] sys_munmap+0x30/0x3e
[4079910.285659]  [<c0103f76>] syscall_call+0x7/0xb
[4079910.285665]  =======================
[4079910.285673] Code: 89 f8 81 e2 00 f0 ff ff c1 e1 0c 25 ff 0f 00 00 89 cf
89 dd 09 c7 09 d5 31 f6 8b 5c 24 04 89 f9 89 ea e8 3d f5 fe ff 85 c0 74 04
<0f> 0b eb fe 8b 04 24 f0 0f ba 30 13 c7 40 14 00 00 00 00 31 d2
[4079910.285760] EIP: [<c0111c87>] __pmd_free+0xe2/0x10e SS:ESP
0069:ded91ea0
[4079910.285782] ---[ end trace fa9fcc1a22300622 ]---



_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.