WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual a

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 390] Unable to handle kernel paging request at virtual address c2b02000
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Tue, 08 Nov 2005 20:19:09 +0000
Delivery-date: Tue, 08 Nov 2005 20:19:13 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=390





------- Additional Comments From dbarrera@xxxxxxxxxx  2005-11-08 20:19 -------
Rebooted machine and restarated domU. Dmesg on domU again shows oops:
VFS: Mounted root (ext3 filesystem) readonly.
Freeing unused kernel memory: 140k freed
EXT3 FS on sdb6, internal journal
Adding 2104444k swap on /dev/sdb5.  Priority:42 extents:1
nfs warning: mount version older than kernel
Unable to handle kernel paging request at virtual address c16b3000
 printing eip:
c02c7d86
0cb0d000 -> *pde = 00000000:d7502001
0de52000 -> *pme = 00000000:e59fa067
00007000 -> *pte = 00000000:e04a1061
Oops: 0003 [#1]
PREEMPT SMP
Modules linked in:
CPU:    2
EIP:    0061:[<c02c7d86>]    Not tainted VLI
EFLAGS: 00010246   (2.6.12.6-xenU)
EIP is at iret_exc+0x59b/0x63c
eax: 00000000   ebx: 00001000   ecx: 00001000   edx: 0809b640
esi: 0809a640   edi: c16b3000   ebp: c16b3000   esp: c5247eb8
ds: 007b   es: 007b   ss: 0069
Process gzip (pid: 2966, threadinfo=c5246000 task=c4be8a40)
Stack: 00000000 00001000 00000000 00000000 00000000 00000000 00000000 c16b3000
       c022c946 c16b3000 0809a640 00001000 00000001 c5247f64 00001000 00001000
       c0177f93 c16b3000 0809a640 00001000 00000000 c102d660 cca98868 0000000e
Call Trace:
 [<c022c946>] copy_from_user+0x46/0xb0
 [<c0177f93>] pipe_writev+0x1a3/0x520
 [<c0178348>] pipe_write+0x38/0x40
 [<c0169d4e>] vfs_write+0xbe/0x140
 [<c0169ea1>] sys_write+0x51/0x80
 [<c010a219>] syscall_call+0x7/0xb
Code: ff 31 c0 e9 d6 49 f6 ff b0 01 e9 cf 49 f6 ff 01 c1 e9 1b 4a f6 ff 8d 4c 88
00 e9 12 4a f6 ff 01 c1 eb 04 8d 4c 88 00 51 50 31 c0 <f3> aa 58 59 e9 8d 4a f6
ff b0 ff e9 d9 52 f6 ff 66 b8 ff ff e9

Also, the script untars the LTP test suite tar ball, and it seems to be
attempting to do that when the oops happens:

x335b-vm1:~ # ps aux | grep ltp
root      2965  0.1  0.2   1956   620 ?        D    14:10   0:00 tar -xvzf
ltp-full-20050804.tgz
root      3232  0.0  0.2   1752   632 tty1     S+   14:17   0:00 grep ltp
x335b-vm1:~ #

Note: 'xm dmesg' on dom0 shows no oops or trace this time:
[...]
(XEN) Booting processor 3/7 eip 90000
(XEN) Initializing CPU#3
(XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K
(XEN) CPU: L2 cache: 512K
(XEN) CPU: L3 cache: 1024K
(XEN) CPU: Physical Processor ID: 3
(XEN) CPU3: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05
(XEN) Total of 4 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN) ..TIMER: vector=0x31 pin1=2 pin2=-1
(XEN) checking TSC synchronization across 4 CPUs: passed.
(XEN) Platform timer is 1.193MHz PIT
(XEN) Brought up 4 CPUs
(XEN) mtrr: v2.0 (20020519)
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Xen-ELF header found:
'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xC0000000,PAE=yes,LOADER=generic'
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000003800000->0000000004000000 (125952 pages to be
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: c0100000->c0639584
(XEN)  Init. ramdisk: c063a000->c063a000
(XEN)  Phys-Mach map: c063a000->c06b7000
(XEN)  Start info:    c06b7000->c06b8000
(XEN)  Page tables:   c06b8000->c06c1000
(XEN)  Boot stack:    c06c1000->c06c2000
(XEN)  TOTAL:         c0000000->c0800000
(XEN)  ENTRY ADDRESS: c0100000
(XEN) Scrubbing Free RAM: ...........................................done.
(XEN) Xen trace buffers: disabled
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).
(XEN) microcode: CPU1 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU2 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU3 updated from revision 0x11 to 0x29, date = 08112004
(XEN) microcode: CPU0 updated from revision 0x11 to 0x29, date = 08112004
(XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: 
write-combining
(XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: 
write-combining
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
00000000
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000c0
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
0000009f
(XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 
000000f8



-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs