This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] file corruption!!!

On 18 Jul 2004, at 18:48, Ian Pratt wrote:

On 17 Jul 2004, at 21:21, Ian Pratt wrote:

It would be very interesting to hear whether you get the problem
with the 2.6.7 xen linux. It might give us a clue as to whether
the problem is with the backend blk driver or within the domain
itself (the 2.6.7 implementation is completely different).

I can certainly give the 2.6.7 guest another try. I did have it
booting, but I didn't persist with it long enough to tell if there was
fs corruption -- there seemed to be issues loading modules, and when I
compiled everything in, I got a gpf when racoon tried to use a PF_KEY
socket. I'll try and get some useful dumps for both these problems.

I haven't tried loading modules, but I can't think why it
wouldn't work (assuming the mechanism is basically the same as

It's different enough to need new userspace tools. The symptoms of failure are a GPF, and the userspace process stuck in D (be it insmod or lsmod). The results of feeding the GPF to ksymoops are below (I hesitate to say it's actually decoded).

BTW:  what's racoon, and what's a PF_KEY socket?

racoon is the ISAKMP daemon used with the 2.6 kernel's KAME IPSec code. It uses a PF_KEY socket to communicate with the kernel. I've successfully used it in a 2.4 guest.


No modules in ksyms, skipping objects
No ksyms, skipping lsmod
CPU:    0
EIP:    0061:[<c01471a7>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246   (2.6.7-xenU)
eax: 00000600   ebx: c5400000   ecx: 00000001   edx: 00000600
esi: c0102c54   edi: c5089000   ebp: c5087000   esp: c04b1ec4
ds: 0069   es: 0069   ss: 0069
Stack: c0102c50 c5087000 00002000 c122c6a8 c122c6e0 00000001 c01473f8 c122c6a8 c5087000 fffffffe c0147491 c5087000 00000000 c5055c19 c5084380 c5015000 fffffffe c5084380 c014753e c5087000 00000001 c012d9c3 c5087000 c5087000
Call Trace:
c04b1ed0: [<c01473f8>] c04b1ee0: [<c0147491>] c04b1f00: [<c014753e>] c04b1f0c: [<c012d9c3>] c04b1f38: [<c02da440>] c04b1f94: [<c012dc5d>] c04b1fb4: [<c010a663>]
Code: 0f 22 e2 0f 20 d9 0f 22 d9 0f 22 e0 83 c4 0c 5b 5e 5f c3 e8

>>EIP; c01471a7 <unmap_vm_area+5d/80>   <=====

>>ebx; c5400000 <pg0+50c8000/3bcc5000>
>>esi; c0102c54 <swapper_pg_dir+c54/1000>
>>edi; c5089000 <pg0+4d51000/3bcc5000>
>>ebp; c5087000 <pg0+4d4f000/3bcc5000>
>>esp; c04b1ec4 <pg0+179ec4/3bcc5000>

Code;  c01471a7 <unmap_vm_area+5d/80>
00000000 <_EIP>:
Code;  c01471a7 <unmap_vm_area+5d/80>   <=====
   0:   0f 22 e2                  mov    %edx,%cr4   <=====
Code;  c01471aa <unmap_vm_area+60/80>
   3:   0f 20 d9                  mov    %cr3,%ecx
Code;  c01471ad <unmap_vm_area+63/80>
   6:   0f 22 d9                  mov    %ecx,%cr3
Code;  c01471b0 <unmap_vm_area+66/80>
   9:   0f 22 e0                  mov    %eax,%cr4
Code;  c01471b3 <unmap_vm_area+69/80>
   c:   83 c4 0c                  add    $0xc,%esp
Code;  c01471b6 <unmap_vm_area+6c/80>
   f:   5b                        pop    %ebx
Code;  c01471b7 <unmap_vm_area+6d/80>
  10:   5e                        pop    %esi
Code;  c01471b8 <unmap_vm_area+6e/80>
  11:   5f                        pop    %edi
Code;  c01471b9 <unmap_vm_area+6f/80>
  12:   c3                        ret
Code;  c01471ba <unmap_vm_area+70/80>
  13:   e8 00 00 00 00            call   18 <_EIP+0x18>

This SF.Net email is sponsored by BEA Weblogic Workshop
FREE Java Enterprise J2EE developer tools!
Get your free copy of BEA WebLogic Workshop 8.1 today.
Xen-devel mailing list