[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] dom0 pvops crash
On Mon, Jan 25, 2010 at 04:29:16PM +0000, Ian Jackson wrote: > See the attached log. After this first oops, the machine is hosed: a > whole series of similar oopses and userland code has basically stopped > running. > Hmm.. so that looks like a 32bit kernel. Do you happen to have CONFIG_HIGHPTE=y in .config? -- Pasi > I would run ksymoops but the default build of the pvops kernel as > built by the xen-unstable tree does not apparently include /proc/ksyms (!) > > Ian. > > Jan 25 15:18:42.628549 Debian GNU/Linux 5.0 spider.cam.xci-test.com hvc0 > Jan 25 15:18:42.628568 > Jan 25 15:18:59.329530 spider.cam.xci-test.com login: (XEN) tmem: all pools > frozen for all domains > Jan 25 15:18:59.329572 (XEN) tmem: all pools thawed for all domains > Jan 25 15:18:59.420519 (XEN) tmem: all pools frozen for all domains > Jan 25 15:18:59.985517 (XEN) tmem: all pools thawed for all domains > Jan 25 15:19:00.072531 (XEN) memory.c:131:d0 Could not allocate order=9 > extent: id=1 memflags=0 (3 of 4 > Jan 25 15:19:00.072552 ) > Jan 25 15:19:00.072667 (XEN) memory.c:131:d0 Could not allocate order=9 > extent: id=1 memflags=0 (0 of 3 > Jan 25 15:19:00.072678 ) > Jan 25 15:19:00.993526 [ 47.790079] device vif1.0 entered promiscuous mode > Jan 25 15:19:01.105524 [ 47.903839] eth0: port 2(vif1.0) entering > forwarding state > Jan 25 15:19:02.432531 [ 49.227365] eth0: port 2(vif1.0) entering disabled > state > Jan 25 15:19:02.553524 [ 49.352248] eth0: port 2(vif1.0) entering disabled > state > Jan 25 16:11:41.668535 (XEN) mm.c:2362:d0 Bad type (saw 1400000000000001 != > exp 7000000000000000) for m > Jan 25 16:11:41.668576 fn 7cba0 (pfn 730d5) > Jan 25 16:11:41.680528 (XEN) mm.c:858:d0 Error getting mfn 7cba0 (pfn 730d5) > from L1 entry 800000007cba > Jan 25 16:11:41.680552 0063 for l1e_owner=0, pg_owner=0 > Jan 25 16:11:41.688525 (XEN) mm.c:4631:d0 ptwr_emulate: could not > get_page_from_l1e() > Jan 25 16:11:41.773511 [ 3208.422690] BUG: unable to handle kernel paging > request at c17f2d00 > Jan 25 16:11:41.844516 [ 3208.423253] IP: [<c10231c1>] xen_set_pte+0x8c/0x96 > Jan 25 16:11:42.041509 [ 3208.423253] *pdpt = 0000000011eac027 *pde = > 804062b9b6bdb093 > Jan 25 16:11:42.116507 [ 3208.423253] Oops: 0003 [#1] SMP > Jan 25 16:11:42.128528 [ 3208.423253] last sysfs file: > /sys/devices/virtual/net/eth0/bridge/topology_ch > Jan 25 16:11:42.128549 ange_detected > Jan 25 16:11:42.437508 [ 3208.423253] Modules linked in: [last unloaded: > scsi_wait_scan] > Jan 25 16:11:42.445513 [ 3208.423253] > Jan 25 16:11:42.488528 [ 3208.423253] Pid: 427, comm: kswapd0 Not tainted > (2.6.31.6 #1) To Be Filled By > Jan 25 16:11:42.488548 O.E.M. > Jan 25 16:11:42.664523 [ 3208.423253] EIP: 0061:[<c10231c1>] EFLAGS: 00010206 > CPU: 1 > Jan 25 16:11:42.788519 [ 3208.423253] EIP is at xen_set_pte+0x8c/0x96 > Jan 25 16:11:42.885525 [ 3208.423253] EAX: c17f2d00 EBX: 0106a682 ECX: > 80000000 EDX: 80000000 > Jan 25 16:11:43.032526 [ 3208.423253] ESI: 7cba0063 EDI: ffffff30 EBP: > f7249d9c ESP: f7249d88 > Jan 25 16:11:43.173522 [ 3208.423253] DS: 007b ES: 007b FS: 00d8 GS: 0000 > SS: 0069 > Jan 25 16:11:43.300528 [ 3208.423253] Process kswapd0 (pid: 427, ti=f7248000 > task=f7109e00 task.ti=f724 > Jan 25 16:11:43.300548 8000) > Jan 25 16:11:43.465514 [ 3208.423253] Stack: > Jan 25 16:11:43.669508 [ 3208.423253] 80000000 c17f2d00 80000000 000730d5 > ffffff30 f7249dc4 c1046d12 7 > Jan 25 16:11:43.685507 cba0063 > Jan 25 16:11:43.836509 [ 3208.423253] <0> c1023e40 80000000 ffbff000 0000001a > c2ef1aa0 00000007 7cba006 > Jan 25 16:11:43.869508 7 f7249ddc > Jan 25 16:11:44.020509 [ 3208.423253] <0> c1021fa8 00000163 80000000 08baa000 > 00000000 f7249e08 c10c581 > Jan 25 16:11:44.053508 9 c1022082 > Jan 25 16:11:44.064515 [ 3208.423253] Call Trace: > Jan 25 16:11:44.124522 [ 3208.423253] [<c1046d12>] ? > kmap_atomic_prot+0xf5/0x117 > Jan 25 16:11:44.241518 [ 3208.423253] [<c1023e40>] ? check_events+0x8/0xc > Jan 25 16:11:44.348523 [ 3208.423253] [<c1021fa8>] ? > xen_kmap_atomic_pte+0x2f/0x36 > Jan 25 16:11:44.469524 [ 3208.423253] [<c10c5819>] ? > page_check_address+0xce/0x1c1 > Jan 25 16:11:44.593522 [ 3208.423253] [<c1022082>] ? xen_mc_issue+0x3f/0x42 > Jan 25 16:11:44.705521 [ 3208.423253] [<c10c59d1>] ? > page_referenced_one+0x4b/0x11b > Jan 25 16:11:44.836542 [ 3208.423253] [<c10c67e2>] ? > page_referenced+0x8c/0x108 > Jan 25 16:11:44.949524 [ 3208.423253] [<c10b4034>] ? > shrink_active_list+0x16c/0x20e > Jan 25 16:11:45.080523 [ 3208.423253] [<c10b4ed0>] ? shrink_zone+0x2b1/0x2c6 > Jan 25 16:11:45.189520 [ 3208.423253] [<c10b53e6>] ? kswapd+0x3d0/0x557 > Jan 25 16:11:45.292524 [ 3208.423253] [<c10b341c>] ? > isolate_pages_global+0x0/0x191 > Jan 25 16:11:45.420524 [ 3208.423253] [<c1069ae7>] ? > autoremove_wake_function+0x0/0x33 > Jan 25 16:11:45.549520 [ 3208.423253] [<c10b5016>] ? kswapd+0x0/0x557 > Jan 25 16:11:45.648520 [ 3208.423253] [<c1069840>] ? kthread+0x6e/0x73 > Jan 25 16:11:45.745518 [ 3208.423253] [<c10697d2>] ? kthread+0x0/0x73 > Jan 25 16:11:45.848523 [ 3208.423253] [<c1027bb7>] ? > kernel_thread_helper+0x7/0x10 > Jan 25 16:11:46.120508 [ 3208.423253] Code: f3 ab c6 05 d8 73 7f c1 00 8b 1d > 38 73 7f c1 e8 d1 cf 01 00 > Jan 25 16:11:46.280508 8b 55 ec 48 0f 94 c0 0f b6 c0 01 d8 a3 38 73 7f c1 8b > 45 f0 89 50 04 <89> 30 8d > Jan 25 16:11:46.400507 65 f4 5b 5e 5f 5d c3 55 89 e5 57 56 89 c6 53 89 d3 83 > Jan 25 16:11:46.512513 [ 3208.423253] EIP: [<c10231c1>] xen_set_pte+0x8c/0x96 > SS:ESP 0069:f7249d88 > Jan 25 16:11:46.560516 [ 3208.423253] CR2: 00000000c17f2d00 > Jan 25 16:11:46.637521 [ 3208.423253] ---[ end trace 133211fa84dd2ce5 ]--- > Jan 25 16:11:46.744524 [ 3208.423253] note: kswapd0[427] exited with > preempt_count 1 > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |