WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

[Xen-users] kernel paging request errors on dom0 with 2.0.7

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-users] kernel paging request errors on dom0 with 2.0.7
From: Krisztian PIFKO <monsta@xxxxxxxxx>
Date: Tue, 11 Oct 2005 18:50:03 +0200
Delivery-date: Tue, 11 Oct 2005 16:50:43 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mozilla Thunderbird 1.0.5 (Windows/20050711)
hi,

2 or 3 times a day i get "Unable to handle kernel paging request" errors
(see the log below) caused by cron jobs on the privileged domain
(tipically mrtg, logcheck, and a script using rrdtool), but never on the
unprivileged domains.

the memory modules are fine according to memtest86+ and the machine has
no load. domain 0 has 256M of ram, the swap is free and the free
ram is 7M, 93M for buffers, and 22M is cached.

i'm using Xen 2.0.7 on Debian testing.

i've seen the same error reported on xen-devel last year, but the root
of the problem seems to be different.

any suggestions?

thanks in advance,

Krisztian PIFKO

Oct 11 00:02:05 toxic0 kernel: Unable to handle kernel paging request at 
virtual address cb93a000
Oct 11 00:02:05 toxic0 kernel:  printing eip:
Oct 11 00:02:05 toxic0 kernel: c013f0e1
Oct 11 00:02:05 toxic0 kernel: *pde = ma 0102c067 pa 0002c067
Oct 11 00:02:05 toxic0 kernel: *pte = ma 0c93a063 pa 0b93a063
Oct 11 00:02:05 toxic0 kernel:  [zap_pmd_range+85/116] zap_pmd_range+0x55/0x74
Oct 11 00:02:05 toxic0 kernel:  [zap_pud_range+55/92] zap_pud_range+0x37/0x5c
Oct 11 00:02:05 toxic0 kernel:  [unmap_page_range+120/149] 
unmap_page_range+0x78/0x95
Oct 11 00:02:05 toxic0 kernel:  [unmap_vmas+236/541] unmap_vmas+0xec/0x21d
Oct 11 00:02:05 toxic0 kernel:  [exit_mmap+141/367] exit_mmap+0x8d/0x16f
Oct 11 00:02:05 toxic0 kernel:  [mmput+40/142] mmput+0x28/0x8e
Oct 11 00:02:05 toxic0 kernel:  [exec_mmap+212/316] exec_mmap+0xd4/0x13c
Oct 11 00:02:05 toxic0 kernel:  [flush_old_exec+116/2325] 
flush_old_exec+0x74/0x915
Oct 11 00:02:05 toxic0 kernel:  [vfs_read+178/279] vfs_read+0xb2/0x117
Oct 11 00:02:05 toxic0 kernel:  [kernel_read+74/83] kernel_read+0x4a/0x53
Oct 11 00:02:05 toxic0 kernel:  [load_elf_binary+593/3400] 
load_elf_binary+0x251/0xd48
Oct 11 00:02:05 toxic0 kernel:  [__do_softirq+82/178] __do_softirq+0x52/0xb2
Oct 11 00:02:05 toxic0 kernel:  [irq_exit+54/56] irq_exit+0x36/0x38
Oct 11 00:02:05 toxic0 kernel:  [do_IRQ+30/36] do_IRQ+0x1e/0x24
Oct 11 00:02:05 toxic0 kernel:  [evtchn_do_upcall+81/132] 
evtchn_do_upcall+0x51/0x84
Oct 11 00:02:05 toxic0 kernel:  [hypervisor_callback+55/64] 
hypervisor_callback+0x37/0x40
Oct 11 00:02:05 toxic0 kernel:  [strnlen_user+44/63] strnlen_user+0x2c/0x3f
Oct 11 00:02:05 toxic0 kernel:  [load_elf_binary+0/3400] 
load_elf_binary+0x0/0xd48
Oct 11 00:02:05 toxic0 kernel:  [search_binary_handler+100/338] 
search_binary_handler+0x64/0x152
Oct 11 00:02:05 toxic0 kernel:  [do_execve+388/527] do_execve+0x184/0x20f
Oct 11 00:02:05 toxic0 kernel:  [sys_execve+61/136] sys_execve+0x3d/0x88
Oct 11 00:02:05 toxic0 kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Oct 11 00:02:05 toxic0 kernel: Oops: 0003 [#13]
Oct 11 00:02:05 toxic0 kernel: PREEMPT
Oct 11 00:02:05 toxic0 kernel: CPU:    0
Oct 11 00:02:05 toxic0 kernel: EIP:    0061:[zap_pte_range+271/688]    Not 
tainted VLI
Oct 11 00:02:05 toxic0 kernel: EFLAGS: 00011206   (2.6.11.12-xen0)
Oct 11 00:02:05 toxic0 kernel: EIP is at zap_pte_range+0x10f/0x2b0
Oct 11 00:02:05 toxic0 kernel: eax: 00000000   ebx: c106ae40   ecx: 00003572   
edx: 04572065
Oct 11 00:02:05 toxic0 kernel: esi: 04572065   edi: cb93a000   ebp: 00000000   
esp: cc57bcfc
Oct 11 00:02:05 toxic0 kernel: ds: 007b   es: 007b   ss: 0069
Oct 11 00:02:05 toxic0 kernel: Process logcheck (pid: 18315, 
threadinfo=cc57a000 task=cee42a00)
Oct 11 00:02:05 toxic0 kernel: Stack: c11f0c00 00000000 00000008 00000000 
b8000000 c0441e70 00000000 00002000
Oct 11 00:02:05 toxic0 kernel:        b8400000 cd910b80 b8002000 00000000 
c013f2d7 c0441e70 cd910b80 b8000000
Oct 11 00:02:05 toxic0 kernel:        00002000 00000000 b8000000 cd910b80 
b8002000 00000000 c013f32d c0441e70
Oct 11 00:02:05 toxic0 kernel: Call Trace:
Oct 11 00:02:05 toxic0 kernel:  [zap_pmd_range+85/116] zap_pmd_range+0x55/0x74
Oct 11 00:02:05 toxic0 kernel:  [zap_pud_range+55/92] zap_pud_range+0x37/0x5c
Oct 11 00:02:05 toxic0 kernel:  [unmap_page_range+120/149] 
unmap_page_range+0x78/0x95
Oct 11 00:02:05 toxic0 kernel:  [unmap_vmas+236/541] unmap_vmas+0xec/0x21d
Oct 11 00:02:05 toxic0 kernel:  [exit_mmap+141/367] exit_mmap+0x8d/0x16f
Oct 11 00:02:05 toxic0 kernel:  [mmput+40/142] mmput+0x28/0x8e
Oct 11 00:02:05 toxic0 kernel:  [exec_mmap+212/316] exec_mmap+0xd4/0x13c
Oct 11 00:02:05 toxic0 kernel:  [flush_old_exec+116/2325] 
flush_old_exec+0x74/0x915
Oct 11 00:02:05 toxic0 kernel:  [vfs_read+178/279] vfs_read+0xb2/0x117
Oct 11 00:02:05 toxic0 kernel:  [kernel_read+74/83] kernel_read+0x4a/0x53
Oct 11 00:02:05 toxic0 kernel:  [load_elf_binary+593/3400] 
load_elf_binary+0x251/0xd48
Oct 11 00:02:05 toxic0 kernel:  [__do_softirq+82/178] __do_softirq+0x52/0xb2
Oct 11 00:02:05 toxic0 kernel:  [irq_exit+54/56] irq_exit+0x36/0x38
Oct 11 00:02:05 toxic0 kernel:  [do_IRQ+30/36] do_IRQ+0x1e/0x24
Oct 11 00:02:05 toxic0 kernel:  [evtchn_do_upcall+81/132] 
evtchn_do_upcall+0x51/0x84
Oct 11 00:02:05 toxic0 kernel:  [hypervisor_callback+55/64] 
hypervisor_callback+0x37/0x40
Oct 11 00:02:05 toxic0 kernel:  [strnlen_user+44/63] strnlen_user+0x2c/0x3f
Oct 11 00:02:05 toxic0 kernel:  [load_elf_binary+0/3400] 
load_elf_binary+0x0/0xd48
Oct 11 00:02:05 toxic0 kernel:  [search_binary_handler+100/338] 
search_binary_handler+0x64/0x152
Oct 11 00:02:05 toxic0 kernel:  [do_execve+388/527] do_execve+0x184/0x20f
Oct 11 00:02:05 toxic0 kernel:  [sys_execve+61/136] sys_execve+0x3d/0x88
Oct 11 00:02:05 toxic0 kernel:  [syscall_call+7/11] syscall_call+0x7/0xb
Oct 11 00:02:05 toxic0 kernel: Code: 13 8d 04 09 01 c0 03 05 44 fb 43 c0 3b 18 0f 84 
c0 00 00 00 31 db 31 c0 85 ed 0f 95 c0 85 c0 0f 85 29 01 00 00 89 d6 85 d2 74 06 
<c7> 07 00 00 00 00 8b 54 24 14 c7 42 08 01 00 00 00 85 db 74 43
Oct 11 00:02:05 toxic0 kernel:  <6>note: logcheck[18315] exited with 
preempt_count 1

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-users] kernel paging request errors on dom0 with 2.0.7, Krisztian PIFKO <=