WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] kernel BUG at arch/x86/xen/mmu.c:1860!

To: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Subject: Re: [Xen-devel] kernel BUG at arch/x86/xen/mmu.c:1860!
From: Teck Choon Giam <giamteckchoon@xxxxxxxxx>
Date: Sat, 15 Jan 2011 04:32:35 +0800
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Fri, 14 Jan 2011 12:33:20 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=XtOTuASWHrxcRX4UxjANEn4tG/THSVAyMsVUBU8y5NU=; b=KNWI62yVaQR173+YzkwQpt61NcrnlulTincIUYZZzgZHPGzQW6N+I+CV/Pk1oZBOkK IBEO6mR/NKq3WHxiyQIhNzTiDOOL8qWTaaAucidE/zwyeOBqbzqK4aJLKnSzkHHoAdRg zb9HApDAUQCfuAZ2J06ahp0NiPoa3lUF9DqBQ=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=pfIQbaPhozbR8DQxoGeUTyfXFk1fRyX9RIHSeIiut1w9t9nId9HT/CmYcluaqwrkK5 pHIzoC01SFJ4Y8+08RPLXX1mRiDc9EPWa2bigjk6kQjkbArauK2RmgqmSIgNtlFWUkTi B38MqQAuzaIWo0loNoQyWfAcIKgR/JLeqe1PU=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <AANLkTine-4W4bAq5xGqB7C8RzhP_5LYz-S6HMRcWA67Y@xxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <AANLkTi=Hwjooo43FiLPAAGzzOTG440ij_QsEqks6ECVv@xxxxxxxxxxxxxx> <20101227155314.GG3728@xxxxxxxxxxxx> <AANLkTikNvKGc78HQOMtVfi=Q+r8r92=svzZcMLQ2xojQ@xxxxxxxxxxxxxx> <20101228104256.GJ2754@xxxxxxxxxxx> <AANLkTin+B1LZLWeJ2z3ZN6AovDbdnmDg4crQkX66K53c@xxxxxxxxxxxxxx> <AANLkTin7A71hjbbDCVjvX6+q8yVGrg9dK4pesccNzQhh@xxxxxxxxxxxxxx> <AANLkTikusLNCrh3mqh7iZ_d4ftP94rc2HURiEp=WmwA6@xxxxxxxxxxxxxx> <20110114152039.GA7455@xxxxxxxxxxxx> <AANLkTiktYYo09o0kjfXTpmCu_O5G2va8PYbn_gz2Rg=J@xxxxxxxxxxxxxx> <20110114194437.GA25672@xxxxxxxxxxxx> <AANLkTine-4W4bAq5xGqB7C8RzhP_5LYz-S6HMRcWA67Y@xxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
My latest test crash with a little different result:

Jan 15 04:27:16 xen06 kernel: last sysfs file: /sys/devices/system/cpu/cpu3/cache/index2/shared_cpu_map

Normally is related to LVM/DM but now it is related to shared_cpu_map cache?

Jan 15 04:27:16 xen06 kernel: ------------[ cut here ]------------
Jan 15 04:27:16 xen06 kernel: kernel BUG at arch/x86/xen/mmu.c:1860!
Jan 15 04:27:16 xen06 kernel: invalid opcode: 0000 [#1] SMP
Jan 15 04:27:16 xen06 kernel: last sysfs file: /sys/devices/system/cpu/cpu3/cache/index2/shared_cpu_map << SEE THIS?
Jan 15 04:27:16 xen06 kernel: CPU 1
Jan 15 04:27:16 xen06 kernel: Modules linked in: dm_snapshot ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp gfs2 dlm configfs xt_physdev iptable_filter ip_tables x_tables bridge stp be2iscsi iscsi_tcp bnx2i cnic uio ipv6 cxgb3i cxgb3 mdio libiscsi_tcp libiscsi scsi_transport_iscsi dm_mirror dm_multipath scsi_dh video backlight output sbs sbshc power_meter hwmon battery acpi_memhotplug xen_acpi_memhotplug ac parport_pc lp parport sg tg3 libphy ide_cd_mod cdrom serio_raw button tpm_tis tpm tpm_bios i2c_i801 pcspkr i2c_core shpchp iTCO_wdt dm_region_hash dm_log dm_mod ata_piix libata sd_mod scsi_mod raid1 ext3 jbd uhci_hcd ohci_hcd ehci_hcd [last unloaded: microcode]
Jan 15 04:27:16 xen06 kernel: Pid: 26392, comm: mpath_wait Not tainted 2.6.32.27-0.xen.pvops.choon.centos5 #1 PowerEdge 860
Jan 15 04:27:16 xen06 kernel: RIP: e030:[<ffffffff8100cb5b>]  [<ffffffff8100cb5b>] pin_pagetable_pfn+0x53/0x59
Jan 15 04:27:16 xen06 kernel: RSP: e02b:ffff88001aae5dc8  EFLAGS: 00010282
Jan 15 04:27:16 xen06 kernel: RAX: 00000000ffffffea RBX: 000000000003cf04 RCX: 00000000000001e7
Jan 15 04:27:16 xen06 kernel: RDX: 00000000deadbeef RSI: 00000000deadbeef RDI: 00000000deadbeef
Jan 15 04:27:16 xen06 kernel: RBP: ffff88001aae5de8 R08: 0000000000000820 R09: ffff880000000000
Jan 15 04:27:16 xen06 kernel: R10: 00000000deadbeef R11: 0000000000000246 R12: 0000000000000003
Jan 15 04:27:16 xen06 kernel: R13: 000000000003cf04 R14: ffff88001aa6a7c0 R15: 00000033e1a9a4d5
Jan 15 04:27:16 xen06 kernel: FS:  00007f9b8dbdf6e0(0000) GS:ffff88002806c000(0000) knlGS:0000000000000000
Jan 15 04:27:16 xen06 kernel: CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
Jan 15 04:27:16 xen06 kernel: CR2: 00000033e1a9a4d5 CR3: 000000001ab61000 CR4: 0000000000002660
Jan 15 04:27:16 xen06 kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 15 04:27:16 xen06 kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Jan 15 04:27:16 xen06 kernel: Process mpath_wait (pid: 26392, threadinfo ffff88001aae4000, task ffff88001aa6a7c0)
Jan 15 04:27:16 xen06 kernel: Stack:
Jan 15 04:27:16 xen06 kernel:  0000000000000000 000000000020f3d2 000000013e64d518 000000000003cf04
Jan 15 04:27:16 xen06 kernel: <0> ffff88001aae5e08 ffffffff8100e07c ffff880025db0040 ffff880025fda868
Jan 15 04:27:16 xen06 kernel: <0> ffff88001aae5e18 ffffffff8100e0af ffff88001aae5e58 ffffffff810a402f
Jan 15 04:27:16 xen06 kernel: Call Trace:
Jan 15 04:27:16 xen06 kernel:  [<ffffffff8100e07c>] xen_alloc_ptpage+0x64/0x69
Jan 15 04:27:16 xen06 kernel:  [<ffffffff8100e0af>] xen_alloc_pte+0xe/0x10
Jan 15 04:27:16 xen06 kernel:  [<ffffffff810a402f>] __pte_alloc+0x70/0xce
Jan 15 04:27:16 xen06 kernel:  [<ffffffff810a41cd>] handle_mm_fault+0x140/0x8b9
Jan 15 04:27:16 xen06 kernel:  [<ffffffff81319dd5>] ? page_fault+0x25/0x30
Jan 15 04:27:16 xen06 kernel:  [<ffffffff8131be4d>] do_page_fault+0x252/0x2e2
Jan 15 04:27:16 xen06 kernel:  [<ffffffff8116dd7d>] ? __put_user_4+0x1d/0x30
Jan 15 04:27:16 xen06 kernel:  [<ffffffff81319dd5>] page_fault+0x25/0x30
Jan 15 04:27:16 xen06 kernel: Code: 48 b8 ff ff ff ff ff ff ff 7f 48 21 c2 48 89 55 e8 48 8d 7d e0 be 01 00 00 00 31 d2 41 ba f0 7f 00 00 e8 e9 c7 ff ff 85 c0 74 04 <0f> 0b eb fe c9 c3 55 40 f6 c7 01 48 89 e5 53 48 89 fb 74 5b 48
Jan 15 04:27:16 xen06 kernel: RIP  [<ffffffff8100cb5b>] pin_pagetable_pfn+0x53/0x59
Jan 15 04:27:16 xen06 kernel:  RSP <ffff88001aae5dc8>
Jan 15 04:27:16 xen06 kernel: ---[ end trace 865f1d440d090f4f ]---

Sorry, this server doesn't have serial console though :(

Thanks.

Kindest regards,
Giam Teck Choon

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>