WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] balloon_process backtrace with stable.2.6.32.x and xen 4.0

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] balloon_process backtrace with stable.2.6.32.x and xen 4.0
From: M A Young <m.a.young@xxxxxxxxxxxx>
Date: Thu, 20 May 2010 14:51:20 +0100 (BST)
Delivery-date: Thu, 20 May 2010 06:53:19 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Alpine 2.00 (GSO 1167 2008-08-23)
I was booting a new guest on a low memory i686 machine and got the backtrace below, and the xen system froze.

        Michael Young

BUG: unable to handle kernel NULL pointer dereference at (null)
IP: [<c0632871>] balloon_process+0x3e5/0x596
*pdpt = 0000000000aab001 *pde = 0000000000000000 Oops: 0000 [#1] SMP last sysfs file: /sys/devices/system/xen_memory/xen_memory0/info/current_kb
Modules linked in: ipt_MASQUERADE iptable_nat nf_nat bridge stp llc nfs lockd 
fscache nfs_acl auth_rpcgss autofs4 sunrpc ipv6 xen_evtchn xenfs uinput 
snd_intel8x0 snd_ac97_codec ac97_bus ppdev snd_seq snd_seq_device parport_pc 
snd_pcm parport e100 mii snd_timer snd soundcore snd_page_alloc iTCO_wdt 
iTCO_vendor_support i2c_i801 i915 drm_kms_helper drm i2c_algo_bit i2c_core 
video output [last unloaded: scsi_wait_scan]
Pid: 9, comm: events/0 Not tainted (2.6.32.13-1.2.104.xendom0.fc12.i686.PAE #1) EIP: 0061:[<c0632871>] EFLAGS: 00010046 CPU: 0
EIP is at balloon_process+0x3e5/0x596
EAX: c25c5000 EBX: 000129a6 ECX: c289fdd8 EDX: 00000000
ESI: 00000000 EDI: 0000c15e EBP: dbcb3f6c ESP: dbcb3f08
DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0069
Process events/0 (pid: 9, ti=dbcb2000 task=dbc8f2c0 task.ti=dbcb2000)
Stack:
dbcb3f38 dbcb3f4c c0ab0288 00000000 00000001 ffffc15e 00000000 0000c15e
 000129a6 00000000 00000261 00000000 c0407250 c2990004 c2998b04 c2990004
 c0407247 00000000 00000000 00000000 00000000 00007ff0 c299c460 c09d92dc
Call Trace:
[<c0407250>] ? check_events+0x8/0xc
[<c0407247>] ? xen_restore_fl_direct_end+0x0/0x1
[<c0458d19>] ? worker_thread+0x140/0x1b9
[<c063248c>] ? balloon_process+0x0/0x596
[<c045c7a5>] ? autoremove_wake_function+0x0/0x34
[<c0458bd9>] ? worker_thread+0x0/0x1b9
[<c045c56d>] ? kthread+0x64/0x69
[<c045c509>] ? kthread+0x0/0x69
[<c040ac07>] ? kernel_thread_helper+0x7/0x10
Code: ff 25 ff ff ff 7f 8b 55 c8 39 f8 89 04 95 e0 6e b6 c0 b8 01 00 00 00 0f 44 45 a8 83 ca ff 89 45 a8 89 d8 e8 bd 3d dd ff 8b 55 b4 <8b> 02 c1 e8 1e 69 c0 00 0b 00 00 05 c0 f3 9e c0 2b 80 ec 0a 00 EIP: [<c0632871>] balloon_process+0x3e5/0x596 SS:ESP 0069:dbcb3f08
CR2: 0000000000000000

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] balloon_process backtrace with stable.2.6.32.x and xen 4.0, M A Young <=