This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] kernel BUG at arch/x86/xen/mmu.c:1860!

To: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Subject: Re: [Xen-devel] kernel BUG at arch/x86/xen/mmu.c:1860!
From: Teck Choon Giam <giamteckchoon@xxxxxxxxx>
Date: Fri, 28 Jan 2011 01:17:42 +0800
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Thu, 27 Jan 2011 09:18:35 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=wb3So15tTzjue92x56y2VGXHDtFhbTJ9gGAAUEl8Owg=; b=fnIkCrb4rV/CXAkedas4Se+ffBa6LdHXQNz5qAq+wkdtl5Gq4y9ctNmS/E4Drh7LNa DJ2ygUWGm7Wt3UKxQXHtg3qHpjk2KxkEByEijtW1J5v6PzVGcTFsRbVJWuLMS9Xmu8qK Vh+mgxKpNOOm0g3f4Iv79phc4TlbBodx440t4=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=DEsYZlW6Gv6wsf/iOOm6Tp0jIwbaLwBFK4+RcS8I1h4KpVqpUX+9+D+aGKjQPw6LMA zgDNFIPJRm9SDqAOV4Aei+V0PmukJXFMrkQFP3FjdyiMB70I0vdP2gCJ2Gr78LSW4GGR 23flr2+2/lvxxkT35d/2wFxDMHo1ErGMFar24=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20110126143103.GB18978@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <AANLkTikusLNCrh3mqh7iZ_d4ftP94rc2HURiEp=WmwA6@xxxxxxxxxxxxxx> <20110114152039.GA7455@xxxxxxxxxxxx> <AANLkTiktYYo09o0kjfXTpmCu_O5G2va8PYbn_gz2Rg=J@xxxxxxxxxxxxxx> <20110114194437.GA25672@xxxxxxxxxxxx> <AANLkTine-4W4bAq5xGqB7C8RzhP_5LYz-S6HMRcWA67Y@xxxxxxxxxxxxxx> <AANLkTimtC4HADFmQy-kDxRC4tX0sTQ=B7Xayh8moCjXv@xxxxxxxxxxxxxx> <AANLkTimkLGmX47gMKXxFbGgCe3LMQOyvHRoRSfgT=stS@xxxxxxxxxxxxxx> <20110124143615.GD6511@xxxxxxxxxxxx> <AANLkTikdQ1KXe_oxaE9nRG=idq0zG3TV90NSjq1vdtZa@xxxxxxxxxxxxxx> <20110125144809.GA7405@xxxxxxxxxxxx> <20110126143103.GB18978@xxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx

On Wed, Jan 26, 2011 at 10:31 PM, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> wrote:
On Tue, Jan 25, 2011 at 09:48:09AM -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Jan 24, 2011 at 11:56:21PM +0800, Teck Choon Giam wrote:
> > On Mon, Jan 24, 2011 at 10:36 PM, Konrad Rzeszutek Wilk <
> > konrad.wilk@xxxxxxxxxx> wrote:
> >
> > > On Mon, Jan 24, 2011 at 09:42:02AM +0800, Teck Choon Giam wrote:
> > > > Sorry, does anyone able to solve this bug?  My prevention doing sleep 5
> > > and
> > > > sync method only last me longest 20+- days of uptime then the same bug
> > > will
> > > > appear :(
> > >
> > > You have to give more details. Which kernel and what does the back-trace
> > > look like?
> > >
> >
> > Thanks for your prompt reply.
> >
> > Kernel is from
> > http://git.kernel.org/?p=linux/kernel/git/jeremy/xen.git;a=summary latest
> > stable/2.6.32.x

What does git log show? What is the latest commit you have there?

commit 75cc13f5aa29b4f3227d269ca165dfa8937c94fe
Merge: 2607c07 a386bf7
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
Date:   Thu Dec 9 17:16:16 2010 -0800

    Merge commit 'v2.6.32.27' into xen/next-2.6.32
    * commit 'v2.6.32.27': (128 commits)
      x86: uv: xpc NULL deref when mesq becomes empty
      X86: uv: xpc_make_first_contact hang due to not accepting ACTIVE state
      x86: uv: XPC receive message reuse triggers invalid BUG_ON()
      UV - XPC: pass nasid instead of nid to gru_create_message_queue
      net sched: fix some kernel memory leaks
      act_nat: use stack variable
      nmi: fix clock comparator revalidation
      net: Limit socket I/O iovec total length to INT_MAX.
      net: Truncate recvfrom and sendto length to INT_MAX.
      rds: Integer overflow in RDS cmsg handling
      econet: fix CVE-2010-3850
      econet: disallow NULL remote addr for sendmsg(), fixes CVE-2010-3849
      x86-32: Fix dummy trampoline-related inline stubs
      x86, mm: Fix CONFIG_VMSPLIT_1G and 2G_OPT trampoline
      x86-32: Separate 1:1 pagetables from swapper_pg_dir
      crypto: padlock - Fix AES-CBC handling on odd-block-sized input
      x25: Prevent crashing when parsing bad X.25 facilities
      V4L/DVB: ivtvfb: prevent reading uninitialized stack memory
      can-bcm: fix minor heap overflow

Anything that I can test or you need me to test... feel free to ask so that I can speed up in tracking/hunting this bug down :)


Kindest regards,
Giam Teck Choon
Xen-devel mailing list