Re: [Xen-devel] file corruption!!!
On 18 Jul 2004, at 18:48, Ian Pratt wrote:
On 17 Jul 2004, at 21:21, Ian Pratt wrote:
It would be very interesting to hear whether you get the problem
with the 2.6.7 xen linux. It might give us a clue as to whether
the problem is with the backend blk driver or within the domain
itself (the 2.6.7 implementation is completely different).
I can certainly give the 2.6.7 guest another try. I did have it
booting, but I didn't persist with it long enough to tell if there was
fs corruption -- there seemed to be issues loading modules, and when I
compiled everything in, I got a gpf when racoon tried to use a PF_KEY
socket. I'll try and get some useful dumps for both these problems.
I haven't tried loading modules, but I can't think why it
wouldn't work (assuming the mechanism is basically the same as
It's different enough to need new userspace tools. The symptoms of
failure are a GPF, and the userspace process stuck in D (be it insmod
or lsmod). The results of feeding the GPF to ksymoops are below (I
hesitate to say it's actually decoded).
BTW: what's racoon, and what's a PF_KEY socket?
racoon is the ISAKMP daemon used with the 2.6 kernel's KAME IPSec code.
It uses a PF_KEY socket to communicate with the kernel. I've
successfully used it in a 2.4 guest.
No modules in ksyms, skipping objects
No ksyms, skipping lsmod
EIP: 0061:[<c01471a7>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246 (2.6.7-xenU)
eax: 00000600 ebx: c5400000 ecx: 00000001 edx: 00000600
esi: c0102c54 edi: c5089000 ebp: c5087000 esp: c04b1ec4
ds: 0069 es: 0069 ss: 0069
Stack: c0102c50 c5087000 00002000 c122c6a8 c122c6e0 00000001 c01473f8
c5087000 fffffffe c0147491 c5087000 00000000 c5055c19 c5084380
fffffffe c5084380 c014753e c5087000 00000001 c012d9c3 c5087000
c04b1ed0: [<c01473f8>] c04b1ee0: [<c0147491>] c04b1f00: [<c014753e>]
c04b1f0c: [<c012d9c3>] c04b1f38: [<c02da440>] c04b1f94: [<c012dc5d>]
Code: 0f 22 e2 0f 20 d9 0f 22 d9 0f 22 e0 83 c4 0c 5b 5e 5f c3 e8
>>EIP; c01471a7 <unmap_vm_area+5d/80> <=====
>>ebx; c5400000 <pg0+50c8000/3bcc5000>
>>esi; c0102c54 <swapper_pg_dir+c54/1000>
>>edi; c5089000 <pg0+4d51000/3bcc5000>
>>ebp; c5087000 <pg0+4d4f000/3bcc5000>
>>esp; c04b1ec4 <pg0+179ec4/3bcc5000>
Code; c01471a7 <unmap_vm_area+5d/80>
Code; c01471a7 <unmap_vm_area+5d/80> <=====
0: 0f 22 e2 mov %edx,%cr4 <=====
Code; c01471aa <unmap_vm_area+60/80>
3: 0f 20 d9 mov %cr3,%ecx
Code; c01471ad <unmap_vm_area+63/80>
6: 0f 22 d9 mov %ecx,%cr3
Code; c01471b0 <unmap_vm_area+66/80>
9: 0f 22 e0 mov %eax,%cr4
Code; c01471b3 <unmap_vm_area+69/80>
c: 83 c4 0c add $0xc,%esp
Code; c01471b6 <unmap_vm_area+6c/80>
f: 5b pop %ebx
Code; c01471b7 <unmap_vm_area+6d/80>
10: 5e pop %esi
Code; c01471b8 <unmap_vm_area+6e/80>
11: 5f pop %edi
Code; c01471b9 <unmap_vm_area+6f/80>
12: c3 ret
Code; c01471ba <unmap_vm_area+70/80>
13: e8 00 00 00 00 call 18 <_EIP+0x18>
This SF.Net email is sponsored by BEA Weblogic Workshop
FREE Java Enterprise J2EE developer tools!
Get your free copy of BEA WebLogic Workshop 8.1 today.
Xen-devel mailing list