|
|
|
|
|
|
|
|
|
|
xen-users
[Xen-users] kernel paging request errors on dom0 with 2.0.7
hi,
2 or 3 times a day i get "Unable to handle kernel paging request" errors
(see the log below) caused by cron jobs on the privileged domain
(tipically mrtg, logcheck, and a script using rrdtool), but never on the
unprivileged domains.
the memory modules are fine according to memtest86+ and the machine has
no load. domain 0 has 256M of ram, the swap is free and the free
ram is 7M, 93M for buffers, and 22M is cached.
i'm using Xen 2.0.7 on Debian testing.
i've seen the same error reported on xen-devel last year, but the root
of the problem seems to be different.
any suggestions?
thanks in advance,
Krisztian PIFKO
Oct 11 00:02:05 toxic0 kernel: Unable to handle kernel paging request at
virtual address cb93a000
Oct 11 00:02:05 toxic0 kernel: printing eip:
Oct 11 00:02:05 toxic0 kernel: c013f0e1
Oct 11 00:02:05 toxic0 kernel: *pde = ma 0102c067 pa 0002c067
Oct 11 00:02:05 toxic0 kernel: *pte = ma 0c93a063 pa 0b93a063
Oct 11 00:02:05 toxic0 kernel: [zap_pmd_range+85/116] zap_pmd_range+0x55/0x74
Oct 11 00:02:05 toxic0 kernel: [zap_pud_range+55/92] zap_pud_range+0x37/0x5c
Oct 11 00:02:05 toxic0 kernel: [unmap_page_range+120/149]
unmap_page_range+0x78/0x95
Oct 11 00:02:05 toxic0 kernel: [unmap_vmas+236/541] unmap_vmas+0xec/0x21d
Oct 11 00:02:05 toxic0 kernel: [exit_mmap+141/367] exit_mmap+0x8d/0x16f
Oct 11 00:02:05 toxic0 kernel: [mmput+40/142] mmput+0x28/0x8e
Oct 11 00:02:05 toxic0 kernel: [exec_mmap+212/316] exec_mmap+0xd4/0x13c
Oct 11 00:02:05 toxic0 kernel: [flush_old_exec+116/2325]
flush_old_exec+0x74/0x915
Oct 11 00:02:05 toxic0 kernel: [vfs_read+178/279] vfs_read+0xb2/0x117
Oct 11 00:02:05 toxic0 kernel: [kernel_read+74/83] kernel_read+0x4a/0x53
Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+593/3400]
load_elf_binary+0x251/0xd48
Oct 11 00:02:05 toxic0 kernel: [__do_softirq+82/178] __do_softirq+0x52/0xb2
Oct 11 00:02:05 toxic0 kernel: [irq_exit+54/56] irq_exit+0x36/0x38
Oct 11 00:02:05 toxic0 kernel: [do_IRQ+30/36] do_IRQ+0x1e/0x24
Oct 11 00:02:05 toxic0 kernel: [evtchn_do_upcall+81/132]
evtchn_do_upcall+0x51/0x84
Oct 11 00:02:05 toxic0 kernel: [hypervisor_callback+55/64]
hypervisor_callback+0x37/0x40
Oct 11 00:02:05 toxic0 kernel: [strnlen_user+44/63] strnlen_user+0x2c/0x3f
Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+0/3400]
load_elf_binary+0x0/0xd48
Oct 11 00:02:05 toxic0 kernel: [search_binary_handler+100/338]
search_binary_handler+0x64/0x152
Oct 11 00:02:05 toxic0 kernel: [do_execve+388/527] do_execve+0x184/0x20f
Oct 11 00:02:05 toxic0 kernel: [sys_execve+61/136] sys_execve+0x3d/0x88
Oct 11 00:02:05 toxic0 kernel: [syscall_call+7/11] syscall_call+0x7/0xb
Oct 11 00:02:05 toxic0 kernel: Oops: 0003 [#13]
Oct 11 00:02:05 toxic0 kernel: PREEMPT
Oct 11 00:02:05 toxic0 kernel: CPU: 0
Oct 11 00:02:05 toxic0 kernel: EIP: 0061:[zap_pte_range+271/688] Not
tainted VLI
Oct 11 00:02:05 toxic0 kernel: EFLAGS: 00011206 (2.6.11.12-xen0)
Oct 11 00:02:05 toxic0 kernel: EIP is at zap_pte_range+0x10f/0x2b0
Oct 11 00:02:05 toxic0 kernel: eax: 00000000 ebx: c106ae40 ecx: 00003572
edx: 04572065
Oct 11 00:02:05 toxic0 kernel: esi: 04572065 edi: cb93a000 ebp: 00000000
esp: cc57bcfc
Oct 11 00:02:05 toxic0 kernel: ds: 007b es: 007b ss: 0069
Oct 11 00:02:05 toxic0 kernel: Process logcheck (pid: 18315,
threadinfo=cc57a000 task=cee42a00)
Oct 11 00:02:05 toxic0 kernel: Stack: c11f0c00 00000000 00000008 00000000
b8000000 c0441e70 00000000 00002000
Oct 11 00:02:05 toxic0 kernel: b8400000 cd910b80 b8002000 00000000
c013f2d7 c0441e70 cd910b80 b8000000
Oct 11 00:02:05 toxic0 kernel: 00002000 00000000 b8000000 cd910b80
b8002000 00000000 c013f32d c0441e70
Oct 11 00:02:05 toxic0 kernel: Call Trace:
Oct 11 00:02:05 toxic0 kernel: [zap_pmd_range+85/116] zap_pmd_range+0x55/0x74
Oct 11 00:02:05 toxic0 kernel: [zap_pud_range+55/92] zap_pud_range+0x37/0x5c
Oct 11 00:02:05 toxic0 kernel: [unmap_page_range+120/149]
unmap_page_range+0x78/0x95
Oct 11 00:02:05 toxic0 kernel: [unmap_vmas+236/541] unmap_vmas+0xec/0x21d
Oct 11 00:02:05 toxic0 kernel: [exit_mmap+141/367] exit_mmap+0x8d/0x16f
Oct 11 00:02:05 toxic0 kernel: [mmput+40/142] mmput+0x28/0x8e
Oct 11 00:02:05 toxic0 kernel: [exec_mmap+212/316] exec_mmap+0xd4/0x13c
Oct 11 00:02:05 toxic0 kernel: [flush_old_exec+116/2325]
flush_old_exec+0x74/0x915
Oct 11 00:02:05 toxic0 kernel: [vfs_read+178/279] vfs_read+0xb2/0x117
Oct 11 00:02:05 toxic0 kernel: [kernel_read+74/83] kernel_read+0x4a/0x53
Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+593/3400]
load_elf_binary+0x251/0xd48
Oct 11 00:02:05 toxic0 kernel: [__do_softirq+82/178] __do_softirq+0x52/0xb2
Oct 11 00:02:05 toxic0 kernel: [irq_exit+54/56] irq_exit+0x36/0x38
Oct 11 00:02:05 toxic0 kernel: [do_IRQ+30/36] do_IRQ+0x1e/0x24
Oct 11 00:02:05 toxic0 kernel: [evtchn_do_upcall+81/132]
evtchn_do_upcall+0x51/0x84
Oct 11 00:02:05 toxic0 kernel: [hypervisor_callback+55/64]
hypervisor_callback+0x37/0x40
Oct 11 00:02:05 toxic0 kernel: [strnlen_user+44/63] strnlen_user+0x2c/0x3f
Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+0/3400]
load_elf_binary+0x0/0xd48
Oct 11 00:02:05 toxic0 kernel: [search_binary_handler+100/338]
search_binary_handler+0x64/0x152
Oct 11 00:02:05 toxic0 kernel: [do_execve+388/527] do_execve+0x184/0x20f
Oct 11 00:02:05 toxic0 kernel: [sys_execve+61/136] sys_execve+0x3d/0x88
Oct 11 00:02:05 toxic0 kernel: [syscall_call+7/11] syscall_call+0x7/0xb
Oct 11 00:02:05 toxic0 kernel: Code: 13 8d 04 09 01 c0 03 05 44 fb 43 c0 3b 18 0f 84
c0 00 00 00 31 db 31 c0 85 ed 0f 95 c0 85 c0 0f 85 29 01 00 00 89 d6 85 d2 74 06
<c7> 07 00 00 00 00 8b 54 24 14 c7 42 08 01 00 00 00 85 db 74 43
Oct 11 00:02:05 toxic0 kernel: <6>note: logcheck[18315] exited with
preempt_count 1
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-users] kernel paging request errors on dom0 with 2.0.7,
Krisztian PIFKO <=
|
|
|
|
|