[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] 2.6.28-domU: BUG at drivers/block/xen-blkfront.c:243!


  • To: xen devel <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: "Christopher S. Aker" <caker@xxxxxxxxxxxx>
  • Date: Fri, 23 Jan 2009 09:50:42 -0500
  • Delivery-date: Fri, 23 Jan 2009 06:51:05 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

This morning, a user reported hitting this:

kernel BUG at drivers/block/xen-blkfront.c:243!
invalid opcode: 0000 [#1] SMP
last sysfs file: /sys/class/net/ip6tnl0/type
Modules linked in:

Pid: 18889, comm: dump Not tainted (2.6.28-linode15 #2)
EIP: 0061:[<c03ee830>] EFLAGS: 00010046 CPU: 1
EIP is at do_blkif_request+0x2e0/0x360
EAX: 00000001 EBX: 00000000 ECX: c7055740 EDX: d054a650
ESI: d596c144 EDI: d596c184 EBP: 00000325 ESP: c147fc78
 DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0069
Process dump (pid: 18889, ti=c147e000 task=d5b01690 task.ti=c147e000)
Stack:
 00000001 d596c144 00000144 d58fb9e0 d5926000 c9fdba84 00000000 0000000a
 d5926000 00000004 00000003 d596c000 00000000 c7055740 d6132edc ffffffff
 d58fb9e0 d58fb9e0 00000000 00000004 c03a7503 cc471d0c c03a7a42 00000000
Call Trace:
 [<c03a7503>] __generic_unplug_device+0x23/0x30
 [<c03a7a42>] __make_request+0xe2/0x3e0
 [<c0561b15>] _spin_lock+0x5/0x10
 [<c01827d6>] cache_alloc_refill+0x186/0x520
 [<c03a6566>] generic_make_request+0xe6/0x230
 [<c0105c53>] xen_restore_fl_direct_end+0x0/0x1
 [<c01825f7>] kmem_cache_alloc+0x57/0xb0
 [<c016141d>] mempool_alloc+0x2d/0xe0
 [<c03a78d3>] submit_bio+0x63/0xf0
 [<c01a72bd>] bvec_alloc_bs+0x8d/0x140
 [<c01a758b>] bio_alloc_bioset+0x6b/0xe0
 [<c01a389a>] submit_bh+0xba/0xf0
 [<c01a6a05>] block_read_full_page+0x255/0x2d0
 [<c01a9d10>] blkdev_get_block+0x0/0x60
 [<c0166757>] __do_page_cache_readahead+0x1e7/0x220
 [<c0160767>] generic_file_aio_read+0x227/0x670
 [<c0185c65>] do_sync_read+0xd5/0x120
 [<c0105c53>] xen_restore_fl_direct_end+0x0/0x1
 [<c0561ca3>] _spin_unlock_irqrestore+0x13/0x20
 [<c013c3e0>] autoremove_wake_function+0x0/0x40
 [<c012d78b>] do_softirq+0x4b/0x60
 [<c036c5ac>] security_file_permission+0xc/0x10
 [<c0185d0e>] rw_verify_area+0x5e/0xd0
 [<c0185b90>] do_sync_read+0x0/0x120
 [<c018659d>] vfs_read+0x9d/0x160
 [<c01869b1>] sys_read+0x41/0x70
 [<c010840a>] syscall_call+0x7/0xb
Code: 2c 8d 54 03 40 8d 44 0e 54 b9 6c 00 00 00 e8 98 a5 fc ff 8b 44 24 3c e8 ff 92 fd ff 83 44 24 18 01 e9 40 fd ff ff 0f 0b eb fe 90 <0f> 0b eb fe 8b 44 24 20 ba 40 e5 3e c0 8b 4c 24 20 c7 04 24 0b
EIP: [<c03ee830>] do_blkif_request+0x2e0/0x360 SS:ESP 0069:c147fc78
---[ end trace 89f444916269aa8d ]---

-Chris

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.