[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 167] New: x86 - Oops - Unable to handle kernel NULL pointer dereference at virtual address 0000001c



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=167

           Summary: x86 - Oops - Unable to handle kernel NULL pointer
                    dereference at virtual address 0000001c
           Product: Xen
           Version: unstable
          Platform: x86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: dbarrera@xxxxxxxxxx
                CC: hohnbaum@xxxxxxxxxx


This Oops was captured on a SLES 9 SP2 box, with on DomU up and functional. 
Machine and VM continue to run as though unaffected. No workloads were running
at the time.

summary:     Use a SWIOTLB to use pre-reserved bounce buffers for high memory

Last changeste on build:

changeset:   6192:3d187585c1415fbb14cb285cc71e0ff0faf81e67
tag:         tip
user:        kaf24@xxxxxxxxxxxxxxxxxxxx
date:        Tue Aug 16 04:20:47 2005



Unable to handle kernel NULL pointer dereference at virtual address 0000001c
 printing eip:
c0156906
*pde = ma 07663067 pa 0be63067
*pte = ma 00000000 pa 55555000
Oops: 0000 [#1]
PREEMPT
Modules linked in: intel_agp agpgart thermal processor fan button battery ac
CPU:    0
EIP:    0061:[<c0156906>]    Not tainted VLI
EFLAGS: 00010206   (2.6.12-xen0)
EIP is at generic_page_range+0x26/0x170
eax: b6e73000   ebx: 00000000   ecx: b6df1000   edx: 000002db
esi: 00007ff1   edi: 00007ff1   ebp: cd8c56e0   esp: cd8c568c
ds: 007b   es: 007b   ss: 0069
Process X (pid: 9864, threadinfo=cd8c4000 task=cd853590)
Stack: cb1a47c0 c1163480 b6df0000 cd8c56dc b6df0fff b6df1000 b6e73000 cd8c56e0
       00007ff1 00007ff1 cd8c56e0 c0119cff 00000000 b6df1000 00082000 c0119be0
       cd8c56dc 00000082 cd8c5f00 00186000 cd8c6720 069a43b4 00000000 e0104000
Call Trace:
 [<c0119cff>] direct_remap_area_pages+0xdf/0x180
 [<c0119be0>] direct_remap_area_pte_fn+0x0/0x40
 [<c0114814>] sys_mmap2+0x84/0xc0
 [<c010a7e3>] syscall_call+0x7/0xb
Code: 5d 2f 00 eb b7 55 57 56 53 83 ec 1c 8b 4c 24 34 8b 44 24 38 01 c8 39 c1 89
 44 24 18 0f 83 10 01 00 00 8b 5c 24 30 89 ca c1 ea 16 <8b> 43 1c 8d 2c 90 b8 00
 e0 ff ff 21 e0 ff 40 14 8b 44 24 18 48

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.