WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] d273:v3: reserved bit in page table (ec=0019)

To: "Christopher S. Aker" <caker@xxxxxxxxxxxx>, xen devel <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: RE: [Xen-devel] d273:v3: reserved bit in page table (ec=0019)
From: "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx>
Date: Fri, 17 Jul 2009 11:21:13 +0800
Accept-language: en-US
Acceptlanguage: en-US
Cc:
Delivery-date: Thu, 16 Jul 2009 20:23:11 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4A5F537A.8030705@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <4A5F537A.8030705@xxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcoGMZtn/i3YytQvT7+gWUexNRiegQAW/YaQ
Thread-topic: [Xen-devel] d273:v3: reserved bit in page table (ec=0019)
The full log will be helpful.

--jyh

-----Original Message-----
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Christopher S. Aker
Sent: 2009年7月17日 0:21
To: xen devel
Subject: [Xen-devel] d273:v3: reserved bit in page table (ec=0019)

Xen 3.3-testing @ changeset 18651, 64bit dom0 2.6.18.8 @ changeset 888, PAE

Files: http://theshore.net/~caker/xen/BUGS/1.22/

(XEN) d273:v3: reserved bit in page table (ec=0019)
(XEN) Pagetable walk from 00000000c0101347:
(XEN)  L4[0x000] = 000000067c36a027 0000000000016495
(XEN)  L3[0x003] = 000000067c06c027 0000000000016793
(XEN)  L2[0x000] = 00001f5e9d00f403 ffffffffffffffff
(XEN) ----[ Xen-3.3.2-rc1  x86_64  debug=y  Not tainted ]----
(XEN) CPU:    5
(XEN) RIP:    e008:[<ffff828c801c7b50>] show_page_walk+0x1f8/0x244
(XEN) RFLAGS: 0000000000010206   CONTEXT: hypervisor
(XEN) rax: ffff830000000000   rbx: 0000000000000001   rcx: 0000000000003b1d
(XEN) rdx: 00001f5e9d00f808   rsi: 0000000000000101   rdi: ffff828c80287e70
(XEN) rbp: ffff8300cfcefe88   rsp: ffff8300cfcefe68   r8:  0000000000000004
(XEN) r9:  0000000000000000   r10: 00000000ffffffff   r11: 00000000fffffffe
(XEN) r12: 00000001f5e9d00f   r13: 00000000c0101347   r14: 00000000c0101347
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026b0
(XEN) cr3: 00000004ee806000   cr2: ffffa25e9d00f808
(XEN) ds: 007b   es: 007b   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen stack trace from rsp=ffff8300cfcefe68:
(XEN)    ffff8300cfceff28 ffff8300cfceff28 00000000c0101347 0000000000000019
(XEN)    ffff8300cfcefea8 ffff828c8015a649 ffff8300cecce100 0000000000000019
(XEN)    ffff8300cfcefed8 ffff828c8015a7f4 ffff8300cfceff28 ffff8300cf7a8100
(XEN)    00000000c0101347 0000000000000019 ffff8300cfceff18 ffff828c8015eb46
(XEN)    0000000000000000 ffff8300cecce100 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 00007cff303100b7 ffff828c801c56db
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    00000000c13a9fac 00000000deadbeef 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 00000000deadbeef
(XEN)    00000000deadbeef 00000000deadbeef 00000000c13a9f80 0000000e00000019
(XEN)    00000000c0101347 0000000000000061 0000000000010a07 00000000c13a9f20
(XEN)    0000000000000069 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000005 ffff8300cecce100
(XEN) Xen call trace:
(XEN)    [<ffff828c801c7b50>] show_page_walk+0x1f8/0x244
(XEN)    [<ffff828c8015a649>] reserved_bit_page_fault+0x53/0x66
(XEN)    [<ffff828c8015a7f4>] propagate_page_fault+0x198/0x1ad
(XEN)    [<ffff828c8015eb46>] do_page_fault+0x516/0x52c
(XEN)
(XEN) Pagetable walk from ffffa25e9d00f808:
(XEN)  L4[0x144] = 0000000000000000 ffffffffffffffff
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 5:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0000]
(XEN) Faulting linear address: ffffa25e9d00f808
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...

-Chris

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel