[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual address c2b02000



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=390





------- Additional Comments From dbarrera@xxxxxxxxxx  2005-11-08 20:19 -------
Rebooted machine and restarated domU. Dmesg on domU again shows oops:
VFS: Mounted root (ext3 filesystem) readonly.
Freeing unused kernel memory: 140k freed
EXT3 FS on sdb6, internal journal
Adding 2104444k swap on /dev/sdb5.  Priority:42 extents:1
nfs warning: mount version older than kernel
Unable to handle kernel paging request at virtual address c16b3000
 printing eip:
c02c7d86
0cb0d000 -> *pde = 00000000:d7502001
0de52000 -> *pme = 00000000:e59fa067
00007000 -> *pte = 00000000:e04a1061
Oops: 0003 [#1]
PREEMPT SMP
Modules linked in:
CPU:    2
EIP:    0061:[<c02c7d86>]    Not tainted VLI
EFLAGS: 00010246   (2.6.12.6-xenU)
EIP is at iret_exc+0x59b/0x63c
eax: 00000000   ebx: 00001000   ecx: 00001000   edx: 0809b640
esi: 0809a640   edi: c16b3000   ebp: c16b3000   esp: c5247eb8
ds: 007b   es: 007b   ss: 0069
Process gzip (pid: 2966, threadinfo=c5246000 task=c4be8a40)
Stack: 00000000 00001000 00000000 00000000 00000000 00000000 00000000 c16b3000
       c022c946 c16b3000 0809a640 00001000 00000001 c5247f64 00001000 00001000
       c0177f93 c16b3000 0809a640 00001000 00000000 c102d660 cca98868 0000000e
Call Trace:
 [<c022c946>] copy_from_user+0x46/0xb0
 [<c0177f93>] pipe_writev+0x1a3/0x520
 [<c0178348>] pipe_write+0x38/0x40
 [<c0169d4e>] vfs_write+0xbe/0x140
 [<c0169ea1>] sys_write+0x51/0x80
 [<c010a219>] syscall_call+0x7/0xb
Code: ff 31 c0 e9 d6 49 f6 ff b0 01 e9 cf 49 f6 ff 01 c1 e9 1b 4a f6 ff 8d 4c 88
00 e9 12 4a f6 ff 01 c1 eb 04 8d 4c 88 00 51 50 31 c0 <f3> aa 58 59 e9 8d 4a f6
ff b0 ff e9 d9 52 f6 ff 66 b8 ff ff e9

Also, the script untars the LTP test suite tar ball, and it seems to be
attempting to do that when the oops happens:

x335b-vm1:~ # ps aux | grep ltp
root      2965  0.1  0.2   1956   620 ?        D    14:10   0:00 tar -xvzf
ltp-full-20050804.tgz
root      3232  0.0  0.2   1752   632 tty1     S+   14:17   0:00 grep ltp
x335b-vm1:~ #

Note: 'xm dmesg' on dom0 shows no oops or trace this time:
[...]
(XEN) Booting processor 3/7 eip 90000
(XEN) Initializing CPU#3
(XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K
(XEN) CPU: L2 cache: 512K
(XEN) CPU: L3 cache: 1024K
(XEN) CPU: Physical Processor ID: 3
(XEN) CPU3: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05
(XEN) Total of 4 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN) ..TIMER: vector=0x31 pin1=2 pin2=-1
(XEN) checking TSC synchronization across 4 CPUs: passed.
(XEN) Platform timer is 1.193MHz PIT
(XEN) Brought up 4 CPUs
(XEN) mtrr: v2.0 (20020519)
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Xen-ELF header found:
'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xC0000000,PAE=yes,LOADER=generic'
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000003800000->0000000004000000 (125952 pages to be
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: c0100000->c0639584
(XEN)  Init. ramdisk: c063a000->c063a000
(XEN)  Phys-Mach map: c063a000->c06b7000
(XEN)  Start info:    c06b7000->c06b8000
(XEN)  Page tables:   c06b8000->c06c1000
(XEN)  Boot stack:    c06c1000->c06c2000
(XEN)  TOTAL:         c0000000->c0800000
(XEN)  ENTRY ADDRESS: c0100000
(XEN) Scrubbing Free RAM: ...........................................done.
(XEN) Xen trace buffers: disabled
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).
(XEN) microcode: CPU1 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU2 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU3 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU0 updated from revision 0x11 to 0x29, date = 08112004
(XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: 
write-combining
(XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: 
write-combining
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000f8



-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.