WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 390] New: Unable to handle kernel paging request at virt

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 390] New: Unable to handle kernel paging request at virtual address c2b02000
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Tue, 08 Nov 2005 19:47:59 +0000
Delivery-date: Tue, 08 Nov 2005 19:48:07 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=390

           Summary: Unable to handle kernel paging request at virtual
                    address c2b02000
           Product: Xen
           Version: unstable
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: dbarrera@xxxxxxxxxx


I am seeing a kernel oops from 'dmesg' on a guest domain. 

Machine: IBM xSeries 335, 4GB of RAM
Xen: PAE enabled build with following changeset:

changeset:   7695:6e2225934d84
tag:         tip
parent:      7683:a5195bf5671d
parent:      7694:f544934dd0b6
user:        Michael.Fetterman@xxxxxxxxxxxx
date:        Tue Nov  8 07:41:25 2005 +

dmesg output from domU:

x335b-vm1:~ # dmesg
Linux version 2.6.12.6-xenU (root@x335b) (gcc version 3.3.3 (SuSE Linux)) #1 SMP
Tue Nov 8 10:33:32 CST 2005
BIOS-provided physical RAM map:
 Xen: 0000000000000000 - 0000000010000000 (usable)
0MB HIGHMEM available.
264MB LOWMEM available.
On node 0 totalpages: 67584
  DMA zone: 67584 pages, LIFO batch:31
  Normal zone: 0 pages, LIFO batch:1
  HighMem zone: 0 pages, LIFO batch:1
IRQ lockup detection disabled
Built 1 zonelists
Kernel command line:  root=/dev/sdb6 ro
Initializing CPU#0
PID hash table entries: 2048 (order: 11, 32768 bytes)
Xen reported: 3189.352 MHz processor.
Dentry cache hash table entries: 65536 (order: 6, 262144 bytes)
Inode-cache hash table entries: 32768 (order: 5, 131072 bytes)
vmalloc area: d1000000-f53fe000, maxmem 2d800000
Memory: 255488k/270336k available (1823k kernel code, 6340k reserved, 556k data,
140k init, 0k highmem)
Checking if this processor honours the WP bit even in supervisor mode... Ok.
Calibrating delay loop... 6356.99 BogoMIPS (lpj=31784960)
Mount-cache hash table entries: 512
CPU: After generic identify, caps: bfebfbff 00000000 00000000 00000000 00004400
00000000 00000000
CPU: After vendor identify, caps: bfebfbff 00000000 00000000 00000000 00004400
00000000 00000000
CPU: Trace cache: 12K uops, L1 D cache: 8K
CPU: L2 cache: 512K
CPU: L3 cache: 1024K
CPU: After all inits, caps: bfebc3f1 00000000 00000000 00000080 00004400
00000000 00000000
Enabling fast FPU save and restore... done.
Enabling unmasked SIMD FPU exception support... done.
Checking 'hlt' instruction... disabled
Brought up 1 CPUs
CPU0 attaching sched-domain:
 domain 0: span 01
  groups: 01
NET: Registered protocol family 16
xenbus_probe_init
CPU0 attaching sched-domain:
 domain 0: does not load-balance
Enabling SMP...
CPU0 attaching sched-domain:
 domain 0: span 03
  groups: 01 02
CPU1 attaching sched-domain:
 domain 0: span 03
  groups: 02 01
Initializing CPU#1
CPU0 attaching sched-domain:
 domain 0: does not load-balance
CPU1 attaching sched-domain:
 domain 0: does not load-balance
CPU0 attaching sched-domain:
 domain 0: span 07
  groups:<6>Initializing CPU#2
 01 02 04
CPU1 attaching sched-domain:
 domain 0: span 07
  groups: 02 04 01
CPU2 attaching sched-domain:
 domain 0: span 07
  groups: 04 01 02
CPU0 attaching sched-domain:
 domain 0: does not load-balance
CPU1 attaching sched-domain:
 domain 0: does not load-balance
CPU2 attaching sched-domain:
 domain 0: does not load-balance
CPU0 attaching sched-domain:
Initializing CPU#3
 domain 0: span 0f
  groups: 01 02 04 08
CPU1 attaching sched-domain:
 domain 0: span 0f
  groups: 02 04 08 01
CPU2 attaching sched-domain:
 domain 0: span 0f
  groups: 04 08 01 02
CPU3 attaching sched-domain:
 domain 0: span 0f
  groups: 08 01 02 04
Brought up 4 CPUs
xen_mem: Initialising balloon driver.
Grant table initialized
Initializing Cryptographic API
io scheduler noop registered
io scheduler anticipatory registered
io scheduler deadline registered
io scheduler cfq registered
RAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksize
Xen virtual console successfully installed as tty1
Event-channel device installed.
Registering block device major 8
xen_net: Initialising virtual ethernet driver.
NET: Registered protocol family 2
IP: routing cache hash table of 1024 buckets, 16Kbytes
TCP established hash table entries: 16384 (order: 6, 262144 bytes)
TCP bind hash table entries: 16384 (order: 5, 196608 bytes)
TCP: Hash tables configured (established 16384 bind 16384)
NET: Registered protocol family 1
NET: Registered protocol family 17
EXT3-fs: INFO: recovery required on readonly filesystem.
EXT3-fs: write access will be enabled during recovery.
EXT3-fs: recovery complete.
kjournald starting.  Commit interval 5 seconds
EXT3-fs: mounted filesystem with ordered data mode.
VFS: Mounted root (ext3 filesystem) readonly.
Freeing unused kernel memory: 140k freed
EXT3 FS on sdb6, internal journal
Adding 2104444k swap on /dev/sdb5.  Priority:42 extents:1
nfs warning: mount version older than kernel
Unable to handle kernel paging request at virtual address c2b02000
 printing eip:
c02c7d86
05ad4000 -> *pde = 00000000:00d37001
0edcf000 -> *pme = 00000000:e1010067
00011000 -> *pte = 00000000:d5e0a061
Oops: 0003 [#1]
PREEMPT SMP
Modules linked in:
CPU:    2
EIP:    0061:[<c02c7d86>]    Not tainted VLI
EFLAGS: 00010246   (2.6.12.6-xenU)
EIP is at iret_exc+0x59b/0x63c
eax: 00000000   ebx: 00001000   ecx: 00001000   edx: 0809c640
esi: 0809b640   edi: c2b02000   ebp: c2b02000   esp: c5d2feb8
ds: 007b   es: 007b   ss: 0069
Process gzip (pid: 3159, threadinfo=c5d2e000 task=c1358020)
Stack: 00000000 00001000 00000000 00000000 00000000 00000000 00000000 c2b02000
       c022c946 c2b02000 0809b640 00001000 00000001 c5d2ff64 00001000 00001000
       c0177f93 c2b02000 0809b640 00001000 00000000 c1056040 cde6d0f8 00000006
Call Trace:
 [<c022c946>] copy_from_user+0x46/0xb0
 [<c0177f93>] pipe_writev+0x1a3/0x520
 [<c010cc69>] monotonic_clock+0xb9/0xd0
 [<c0178348>] pipe_write+0x38/0x40
 [<c0169d4e>] vfs_write+0xbe/0x140
 [<c0169ea1>] sys_write+0x51/0x80
 [<c010a219>] syscall_call+0x7/0xb
Code: ff 31 c0 e9 d6 49 f6 ff b0 01 e9 cf 49 f6 ff 01 c1 e9 1b 4a f6 ff 8d 4c 88
00 e9 12 4a f6 ff 01 c1 eb 04 8d 4c 88 00 51 50 31 c0 <f3> aa 58 59 e9 8d 4a f6
ff b0 ff e9 d9 52 f6 ff 66 b8 ff ff e9
 <1>Unable to handle kernel paging request at virtual address c1c5e000
 printing eip:
c0157167
022bb000 -> *pde = 00000000:d60d3001
01c39000 -> *pme = 00000000:ee455067
0000a000 -> *pte = 00000000:d60ae061
Oops: 0003 [#2]
PREEMPT SMP
Modules linked in:
CPU:    0
EIP:    0061:[<c0157167>]    Not tainted VLI
EFLAGS: 00010286   (2.6.12.6-xenU)
EIP is at do_wp_page+0x127/0x590
eax: c1c5e000   ebx: c34fa000   ecx: 00000400   edx: c22b6000
esi: c34fa000   edi: c1c5e000   ebp: c1069f40   esp: c22b7e18
ds: 0069   es: 0069   ss: 0069
Process bash (pid: 3378, threadinfo=c22b6000 task=cdd87530)
Stack: c1038bc0 00000004 00000000 00001c43 c1c5e000 cdd3b580 c01549f3 00000000
       00000000 cdd3b5c0 c1038bc0 dea12065 00000000 c01451d0 dbf0d025 00000000
       00000000 cdd3b5c0 00000000 00000940 c1c3cdf8 c1c3cdf8 cdd3b580 00000000
Call Trace:
 [<c01549f3>] pte_alloc_map+0xb3/0x3b0
 [<c01451d0>] __generic_file_aio_read+0x200/0x240
 [<c0158b9a>] handle_mm_fault+0x1fa/0x2b0
 [<c0126d5d>] current_fs_time+0x5d/0x80
 [<c0116bdf>] do_page_fault+0x1df/0x856
 [<c0199f4b>] dnotify_parent+0x3b/0xe0
 [<c0178348>] pipe_write+0x38/0x40
 [<c0169d68>] vfs_write+0xd8/0x140
 [<c0169ea1>] sys_write+0x51/0x80
 [<c010a5de>] page_fault+0x2e/0x34
Code: 24 04 e8 5d 19 fc ff 89 c3 b8 04 00 00 00 89 de 89 44 24 04 8b 44 24 28 89
04 24 e8 44 19 fc ff 89 44 24 10 b9 00 04 00 00 89 c7 <f3> a5 89 1c 24 b8 03 00
00 00 89 44 24 04 e8 96 19 fc ff b8 04
 <6>note: bash[3378] exited with preempt_count 2
scheduling while atomic: bash/0x10000002/3378
 [<c02c5853>] schedule+0x693/0x760
 [<c0155a04>] unmap_page_range+0x194/0x210
 [<c0160d96>] free_pages_and_swap_cache+0x86/0xa0
 [<c02c6137>] cond_resched+0x27/0x40
 [<c0155bff>] unmap_vmas+0x17f/0x280
 [<c015bf57>] exit_mmap+0xa7/0x1c0
 [<c011f098>] mmput+0x38/0xa0
 [<c0124448>] do_exit+0xa8/0x3f0
 [<c010abc8>] die+0x188/0x190
 [<c0116e00>] do_page_fault+0x400/0x856
 [<c01e9732>] journal_stop+0x192/0x2d0
 [<c01daf76>] ext3_mark_iloc_dirty+0x26/0x40
 [<c014c2f1>] __do_page_cache_readahead+0xb1/0x1a0
 [<c0118aca>] kmap_atomic+0x2a/0x30
 [<c01494b2>] buffered_rmqueue+0x1c2/0x2d0
 [<c0148ea0>] prep_new_page+0x50/0x60
 [<c0149450>] buffered_rmqueue+0x160/0x2d0
 [<c0149769>] __alloc_pages+0xd9/0x420
 [<c0149769>] __alloc_pages+0xd9/0x420
 [<c010a5de>] page_fault+0x2e/0x34
 [<c0110069>] show+0x29/0x50
 [<c0157167>] do_wp_page+0x127/0x590
 [<c01549f3>] pte_alloc_map+0xb3/0x3b0
 [<c01451d0>] __generic_file_aio_read+0x200/0x240
 [<c0158b9a>] handle_mm_fault+0x1fa/0x2b0
 [<c0126d5d>] current_fs_time+0x5d/0x80
 [<c0116bdf>] do_page_fault+0x1df/0x856
 [<c0199f4b>] dnotify_parent+0x3b/0xe0
 [<c0178348>] pipe_write+0x38/0x40
 [<c0169d68>] vfs_write+0xd8/0x140
 [<c0169ea1>] sys_write+0x51/0x80
 [<c010a5de>] page_fault+0x2e/0x34


'xm dmesg' from dom0: 

x335b:/tmp/xen-unstable.hg # xm dmesg
 __  __            _____  ___         _                _
 \ \/ /___ _ __   |___ / / _ \     __| | _____   _____| |
  \  // _ \ '_ \    |_ \| | | |__ / _` |/ _ \ \ / / _ \ |
  /  \  __/ | | |  ___) | |_| |__| (_| |  __/\ V /  __/ |
 /_/\_\___|_| |_| |____(_)___/    \__,_|\___| \_/ \___|_|

 http://www.cl.cam.ac.uk/netos/xen
 University of Cambridge Computer Laboratory

 Xen version 3.0-devel (root@xxxxxxxxxxxxxxxxxx) (gcc version 3.3.3 (SuSE
Linux)) Tue Nov  8 10:19:21 CST 2005
 Latest ChangeSet: Tue Nov  8 07:41:25 2005 +0100 7695:6e2225934d84

(XEN) Physical RAM map:
(XEN)  0000000000000000 - 000000000009d400 (usable)
(XEN)  000000000009d400 - 00000000000a0000 (reserved)
(XEN)  00000000000e0000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 00000000f7fec140 (usable)
(XEN)  00000000f7fec140 - 00000000f7ff0000 (ACPI data)
(XEN)  00000000f7ff0000 - 00000000f8000000 (reserved)
(XEN)  00000000fec00000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 0000000108000000 (usable)
(XEN) System RAM: 4095MB (4193828kB)
(XEN) Xen heap: 10MB (10280kB)
(XEN) PAE enabled, limit: 16 GB
(XEN) found SMP MP-table at 0009d540
(XEN) DMI 2.3 present.
(XEN) Using APIC driver default
(XEN) ACPI: RSDP (v000 IBM                                   ) @ 0x000fdfc0
(XEN) ACPI: RSDT (v001 IBM    SERONYXP 0x00001000 IBM  0x45444f43) @ 0xf7feff80
(XEN) ACPI: FADT (v001 IBM    SERONYXP 0x00001000 IBM  0x45444f43) @ 0xf7feff00
(XEN) ACPI: MADT (v001 IBM    SERONYXP 0x00001000 IBM  0x45444f43) @ 0xf7fefe40
(XEN) ACPI: ASF! (v016 IBM    SERONYXP 0x00000001 IBM  0x45444f43) @ 0xf7fefd80
(XEN) ACPI: DSDT (v001 IBM    SERTURQU 0x00001000 MSFT 0x0100000b) @ 0x00000000
(XEN) ACPI: Local APIC address 0xfee00000
(XEN) ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled)
(XEN) Processor #0 15:2 APIC version 20
(XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x06] enabled)
(XEN) Processor #6 15:2 APIC version 20
(XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled)
(XEN) Processor #1 15:2 APIC version 20
(XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x07] enabled)
(XEN) Processor #7 15:2 APIC version 20
(XEN) ACPI: LAPIC_NMI (acpi_id[0x00] dfl dfl lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x06] dfl dfl lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1])
(XEN) ACPI: LAPIC_NMI (acpi_id[0x07] dfl dfl lint[0x1])
(XEN) ACPI: IOAPIC (id[0x0e] address[0xfec00000] gsi_base[0])
(XEN) IOAPIC[0]: apic_id 14, version 17, address 0xfec00000, GSI 0-15
(XEN) ACPI: IOAPIC (id[0x0d] address[0xfec01000] gsi_base[16])
(XEN) IOAPIC[1]: apic_id 13, version 17, address 0xfec01000, GSI 16-31
(XEN) ACPI: IOAPIC (id[0x0c] address[0xfec02000] gsi_base[32])
(XEN) IOAPIC[2]: apic_id 12, version 17, address 0xfec02000, GSI 32-47
(XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
(XEN) ACPI: IRQ0 used by override.
(XEN) ACPI: IRQ2 used by override.
(XEN) Enabling APIC mode:  Flat.  Using 3 I/O APICs
(XEN) Using ACPI (MADT) for SMP configuration information
(XEN) Initializing CPU#0
(XEN) Detected 3189.514 MHz processor.
(XEN) Using scheduler: Simple EDF Scheduler (sedf)
(XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K
(XEN) CPU: L2 cache: 512K
(XEN) CPU: L3 cache: 1024K
(XEN) CPU: Physical Processor ID: 0
(XEN) CPU0: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05
(XEN) Booting processor 1/1 eip 90000
(XEN) Initializing CPU#1
(XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K
(XEN) CPU: L2 cache: 512K
(XEN) CPU: L3 cache: 1024K
(XEN) CPU: Physical Processor ID: 0
(XEN) CPU1: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05
(XEN) Booting processor 2/6 eip 90000
(XEN) Initializing CPU#2
(XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K
(XEN) CPU: L2 cache: 512K
(XEN) CPU: L3 cache: 1024K
(XEN) CPU: Physical Processor ID: 3
(XEN) CPU2: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05
(XEN) Booting processor 3/7 eip 90000
(XEN) Initializing CPU#3
(XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K
(XEN) CPU: L2 cache: 512K
(XEN) CPU: L3 cache: 1024K
(XEN) CPU: Physical Processor ID: 3
(XEN) CPU3: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05
(XEN) Total of 4 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN) ..TIMER: vector=0x31 pin1=2 pin2=-1
(XEN) checking TSC synchronization across 4 CPUs: passed.
(XEN) Platform timer is 1.193MHz PIT
(XEN) Brought up 4 CPUs
(XEN) mtrr: v2.0 (20020519)
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Xen-ELF header found:
'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xC0000000,PAE=yes,LOADER=generic'
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000003800000->0000000004000000 (125952 pages to be
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: c0100000->c0639584
(XEN)  Init. ramdisk: c063a000->c063a000
(XEN)  Phys-Mach map: c063a000->c06b7000
(XEN)  Start info:    c06b7000->c06b8000
(XEN)  Page tables:   c06b8000->c06c1000
(XEN)  Boot stack:    c06c1000->c06c2000
(XEN)  TOTAL:         c0000000->c0800000
(XEN)  ENTRY ADDRESS: c0100000
(XEN) Scrubbing Free RAM: ...........................................done.
(XEN) Xen trace buffers: disabled
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).
(XEN) microcode: CPU3 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU1 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU2 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU0 updated from revision 0x11 to 0x29, date = 08112004
(XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: 
write-combining
(XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: 
write-combining
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000f8
(XEN) Domain 5 (vcpu#0) crashed on cpu#3:
(XEN) CPU:    3
(XEN) EIP:    e019:[<c0363810>]
(XEN) EFLAGS: 00000206   CONTEXT: guest
(XEN) eax: 00000000   ebx: c0082000   ecx: 00006000   edx: 00042000
(XEN) esi: c03eb000   edi: c00ac000   ebp: 00000082   esp: c0355f38
(XEN) cr0: 8005003b   cr3: ee865000
(XEN) ds: e021   es: e021   fs: 0000   gs: e021   ss: e021   cs: e019
(XEN) Guest stack trace from esp=c0355f38:
(XEN)    c00ac000 00000003 c0363810 0001e019 00010206 c03eb000 00010800 00000000
(XEN)    00010800 ffffffff 00000fff 00010800 00000001 00000042 00000000 c031c800
(XEN)    00000000 00001000 00042000 c0363d74 c0386070 00042000 00001000 00000000
(XEN)    c0353060 c02c7e27 c0100000 c036c1a0 c035db49 00042000 00001000 00000000
(XEN)    00000000 00000000 ffffe000 c03e2000 00000000 ffffe000 c03e2000 00000000
(XEN)    00000000 c0356857 c0355ff4 00000000 00000000 00000000 00000000 c037e300
(XEN)    0702080b c0100066
(XEN) Domain 6 (vcpu#0) crashed on cpu#3:
(XEN) CPU:    3
(XEN) EIP:    e019:[<c0363810>]
(XEN) EFLAGS: 00000206   CONTEXT: guest
(XEN) eax: 00000000   ebx: c0082000   ecx: 00006000   edx: 00042000
(XEN) esi: c03eb000   edi: c00ac000   ebp: 00000082   esp: c0355f38
(XEN) cr0: 8005003b   cr3: 00e37000
(XEN) ds: e021   es: e021   fs: 0000   gs: e021   ss: e021   cs: e019
(XEN) Guest stack trace from esp=c0355f38:
(XEN)    c00ac000 00000003 c0363810 0001e019 00010206 c03eb000 00010800 00000000
(XEN)    00010800 ffffffff 00000fff 00010800 00000001 00000042 00000000 c031c800
(XEN)    00000000 00001000 00042000 c0363d74 c0386070 00042000 00001000 00000000
(XEN)    c0353060 c02c7e27 c0100000 c036c1a0 c035db49 00042000 00001000 00000000
(XEN)    00000000 00000000 ffffe000 c03e2000 00000000 ffffe000 c03e2000 00000000
(XEN)    00000000 c0356857 c0355ff4 00000000 00000000 00000000 00000000 c037e300
(XEN)    0702080b c0100066
(XEN) Domain 7 (vcpu#0) crashed on cpu#3:
(XEN) CPU:    3
(XEN) EIP:    e019:[<c0115b56>]
(XEN) EFLAGS: 00000246   CONTEXT: guest
(XEN) eax: 00000070   ebx: 00000000   ecx: 00000000   edx: 00000000
(XEN) esi: 00000000   edi: 00000000   ebp: 00000070   esp: c0355ed0
(XEN) cr0: 8005003b   cr3: ee0a7000
(XEN) ds: e021   es: e021   fs: 0000   gs: e021   ss: e021   cs: e019
(XEN) Guest stack trace from esp=c0355ed0:
(XEN)    c0000074 00000003 c0115b56 0001e019 00010246 00000000 00000000 00000000
(XEN)    c0000000 c0360cc5 c2a0e000 00001000 00000000 00000000 c022b8e8 c037eda0
(XEN)    00000000 c0800000 c03e6020 00000800 c0361040 c03e6020 00000400 c02f0e0a
(XEN)    c0355fa4 00010800 00000000 00000000 00000000 00000000 00010000 00000000
(XEN)    00000004 00000003 c03e5018 00000000 c03e5000 00000000 c036c1a0 c036146e
(XEN)    c03e5000 c036c1a0 c0363cd0 c0386070 c0353060 c02c7e27 00000000 c0361748
(XEN)    002ee0ff c02f0e0a c0353060 c035d4c5 c02f0e0a c0100000 c035db1c c0355ff4
(XEN)    c036c1a0 00000080 00000000 00000000 ffffe000 c03e2000 00000000 ffffe000
(XEN)    c03e2000 00000000 00000000 c0356857 c0355ff4 00000000 00000000 00000000
(XEN)    00000000 c037e300 0702080b c0100066
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000f8

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 390] New: Unable to handle kernel paging request at virtual address c2b02000, bugzilla-daemon <=