[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen 3.2.1-rc1: ttempt to implicitly unmap a granted PTE 000000047bb78867


  • To: "Christopher S. Aker" <caker@xxxxxxxxxxxx>, xen devel <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
  • Date: Mon, 07 Apr 2008 08:33:33 +0100
  • Delivery-date: Mon, 07 Apr 2008 00:34:21 -0700
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AciYga6+7Xam1QR0Ed2t8AAWy6hiGQ==
  • Thread-topic: [Xen-devel] Xen 3.2.1-rc1: ttempt to implicitly unmap a granted PTE 000000047bb78867

A bug that would have these symptoms was fixed in the linux-2.6.18-xen.hg
repository about a week ago (changeset 496). You'll need to upgrade or
backport the fix.

 -- Keir

On 7/4/08 03:08, "Christopher S. Aker" <caker@xxxxxxxxxxxx> wrote:

> It's me again!
> 
> Xen 3.2.1-rc1 64 bit
> Dom0: 2.6.16.33 PAE
> DomU: 2.6.18.8 (from a pull a few weeks ago)
> 
> Hypervisor stuff:
> http://theshore.net/~caker/xen/BUGfatal_page_fault/
> 
> Guest kernel:
> http://www.theshore.net/~caker/xen/kernels/2.6.18.8-domU-linode7
> 
> (XEN) mm.c:876:d0 Attempt to implicitly unmap a granted PTE
> 000000047bb78867
> (XEN) domain_crash called from mm.c:877
> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
> (XEN) ----[ Xen-3.2.1-rc1  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    0061:[<00000000c0101287>]
> (XEN) RFLAGS: 0000000000000246   CONTEXT: guest
> (XEN) rax: 0000000000000014   rbx: 0000000000000000   rcx: 00000000ce95dd30
> (XEN) rdx: 000000000000000b   rsi: 0000000000000000   rdi: 000000000000000b
> (XEN) rbp: 00000000ce95dfa0   rsp: 00000000ce95dce0   r8:  0000000000000000
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026b0
> (XEN) cr3: 000000062ffe6000   cr2: 00000000b7f29181
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0000   ss: 0069   cs: 0061
> (XEN) Guest stack trace from esp=ce95dce0:
> (XEN)   c034e01d 00000c00 ce95deec 00000058 c1000000 00850004 d204e0e0
> ce95df50
> (XEN)   cd564288 0b2c014f 0000000b 00000000 0000000b 00000001 0000012c
> ce95dfa8
> (XEN)   ce95de88 d255415c 0000000b 0000000b d25a2000 00000000 00000006
> 0000039e
> (XEN)   00000004 00000107 bffc4000 00000004 d25a3000 00000000 00000006
> 00000377
> (XEN)   00000004 00000014 bffc4000 00000004 d25a4000 00000000 00000006
> 00000120
> (XEN)   00000004 000001b8 bffc4000 00000004 d25a5000 00000000 00000006
> 00000359
> (XEN)   00000004 0000022a bf63e000 00000004 d25a6000 00000000 00000006
> 0000037b
> (XEN)   00000004 0000011e bf63e000 00000004 d25a7000 00000000 00000006
> 00000388
> (XEN)   00000004 0000027e bf63e000 00000004 d25a8000 00000000 00000006
> 00000384
> (XEN)   00000004 00000204 bf63e000 00000004 d25a9000 00000000 00000006
> 000003f3
> (XEN)   00000004 00000112 c2cb6000 00000004 d25aa000 00000000 00000006
> 0000035b
> (XEN)   00000004 0000012c c2cb6000 00000004 d25ab000 00000000 00000006
> 00000320
> (XEN)   00000004 00000031 c2cb6000 00000004 d25ac000 00000000 00000006
> 0000012c
> (XEN)   00000004 00000148 c2cb6000 00000004 be453400 00000002 be453800
> 00000002
> (XEN)   be453c00 00000002 bf63e000 00000002 bf63e400 00000002 bf63e800
> 00000002
> (XEN)   bf63ec00 00000002 c2cb6000 00000002 c2cb6400 00000002 c2cb6800
> 00000002
> (XEN)   c2cb6c00 00000002 c761bdc0 ce95dfbc cd564288 00030002 0000007b
> d2af007b
> (XEN)   fffffeff c0101227 00000061 00000246 c034487a 0016ca00 cd2c0440
> 00254b88
> (XEN)   00000000 cd564298 d441676c ce95dfbc cd564288 c034e6e1 00200246
> c034487a
> (XEN)   d204e0e0 0000c0d1 0000c0dc 0000c0cd ca000b01 0000000c 00000000
> 00254b88
> (XEN) Domain 0 crashed: rebooting machine in 5 seconds.
> 
> -Chris
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.