[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] crash while booting latest hackery kernel



I get the following crash while booting a kernel built with the latest version of xen/dom0/hackery (booting without xen, but booting with xen also crashes in a similar way but I haven't managed to capture the crash from that) Reverting bd4a7874716d1b1f69cacfef4adf9f94050ecd82 and cfb667260eb7f6dd26ceb6d49da818978396757d allows it to boot.

        Michael Young

general protection fault: 0000 [#1] SMP
last sysfs file:
CPU 0
Modules linked in:
Pid: 1, comm: swapper Tainted: G        W  2.6.29-1.2.15.fc11.x86_64 #1
RIP: 0010:[<ffffffff810bb7c4>]  [<ffffffff810bb7c4>] put_page+0x16/0xb5
RSP: 0018:ffff88003f67ba80  EFLAGS: 00010282
RAX: 0000000000006b6b RBX: ffff88003f569a30 RCX: 00000000001d0006
RDX: ffff88003f569df8 RSI: ffffffff810e05b6 RDI: 6b6b6b6b6b6b6b6b
RBP: ffff88003f67bab0 R08: ffffffff81612690 R09: 000000000000005a
R10: ffffe200019bb240 R11: 0000000000000000 R12: 0000000000000001
R13: ffff88003f569a40 R14: 0000000000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff880003200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000000000201000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process swapper (pid: 1, threadinfo ffff88003f67a000, task ffff88003f680000)
Stack:
 0000000000000000 ffff88003f569a30 0000000000000001 ffff88003f569a40
 0000000000000000 0000000000000000 ffff88003f67bae0 ffffffff813001e3
 ffff88003f67bae0 ffff88003f712000 0000000000000000 ffff88003f712000
Call Trace:
 [<ffffffff813001e3>] skb_release_data+0x8c/0xd5
 [<ffffffff812ffefa>] __kfree_skb+0x1e/0x87
 [<ffffffff812fff93>] kfree_skb+0x30/0x32
 [<ffffffff81321b42>] netlink_broadcast+0x22c/0x276
 [<ffffffff8119ee06>] kobject_uevent_env+0x2bc/0x366
 [<ffffffff8119eebb>] kobject_uevent+0xb/0xd
 [<ffffffff8119e503>] kset_register+0x35/0x3c
 [<ffffffff81249584>] __class_register+0xe0/0x171
 [<ffffffff8164eec0>] ? kobject_uevent_init+0x0/0x46
 [<ffffffff8164f797>] ? pcibus_class_init+0x0/0x19
 [<ffffffff8164f7ae>] pcibus_class_init+0x17/0x19
 [<ffffffff8100a080>] do_one_initcall+0x75/0x18a
 [<ffffffff810de897>] ? check_object+0x175/0x1af
 [<ffffffff810dfe39>] ? __slab_free+0x238/0x265
 [<ffffffff810717d3>] ? trace_hardirqs_on_caller+0x1f/0x152
 [<ffffffff81071913>] ? trace_hardirqs_on+0xd/0xf
 [<ffffffff81073030>] ? print_lock_contention_bug+0x1b/0xe1
 [<ffffffff811335ca>] ? proc_register+0x123/0x1a2
 [<ffffffff811a7cf2>] ? _raw_spin_unlock+0x8f/0x98
 [<ffffffff813a2f48>] ? _spin_unlock+0x2b/0x30
 [<ffffffff81133633>] ? proc_register+0x18c/0x1a2
 [<ffffffff81133767>] ? create_proc_entry+0x79/0x91
 [<ffffffff8109bf9a>] ? register_irq_proc+0xb3/0xcf
 [<ffffffff81130000>] ? proc_pid_syscall+0x88/0xb7
 [<ffffffff8162b710>] kernel_init+0x1d9/0x22f
 [<ffffffff81012d8a>] child_rip+0xa/0x20
 [<ffffffff813a2ebb>] ? _spin_unlock_irq+0x30/0x3c
 [<ffffffff81012750>] ? restore_args+0x0/0x30
 [<ffffffff8162b537>] ? kernel_init+0x0/0x22f
 [<ffffffff81012d80>] ? child_rip+0x0/0x20
Code: 89 e5 0f 1f 44 00 00 48 c7 c7 12 b5 0b 81 e8 b0 3e fa ff c9 c3 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 08 0f 1f 44 00 00 <48> f7 07 00 60 00 00 48
 89 fb 74 07 e8 b6 f4 ff ff eb 7f 8b 47
RIP  [<ffffffff810bb7c4>] put_page+0x16/0xb5
 RSP <ffff88003f67ba80>
---[ end trace 4eaa2a86a8e2da23 ]---
swapper used greatest stack depth: 4384 bytes left
Kernel panic - not syncing: Attempted to kill init!
Pid: 1, comm: swapper Tainted: G      D W  2.6.29-1.2.15.fc11.x86_64 #1
Call Trace:
 [<ffffffff813a01ec>] panic+0x7a/0x131
 [<ffffffff810717d3>] ? trace_hardirqs_on_caller+0x1f/0x152
 [<ffffffff813a2cf9>] ? _write_unlock_irq+0x30/0x3b
 [<ffffffff8105153f>] ? do_exit+0x363/0x890
 [<ffffffff8105125b>] do_exit+0x7f/0x890
 [<ffffffff813a44f6>] oops_end+0xbf/0xc7
 [<ffffffff810154a9>] die+0x5a/0x63
 [<ffffffff813a40da>] do_general_protection+0x11e/0x126
 [<ffffffff813a38f5>] general_protection+0x25/0x30
 [<ffffffff810e05b6>] ? kfree+0xf7/0x110
 [<ffffffff810bb7c4>] ? put_page+0x16/0xb5
 [<ffffffff813001e3>] skb_release_data+0x8c/0xd5
 [<ffffffff812ffefa>] __kfree_skb+0x1e/0x87
 [<ffffffff812fff93>] kfree_skb+0x30/0x32
 [<ffffffff81321b42>] netlink_broadcast+0x22c/0x276
 [<ffffffff8119ee06>] kobject_uevent_env+0x2bc/0x366
 [<ffffffff8119eebb>] kobject_uevent+0xb/0xd
 [<ffffffff8119e503>] kset_register+0x35/0x3c
 [<ffffffff81249584>] __class_register+0xe0/0x171
 [<ffffffff8164eec0>] ? kobject_uevent_init+0x0/0x46
 [<ffffffff8164f797>] ? pcibus_class_init+0x0/0x19
 [<ffffffff8164f7ae>] pcibus_class_init+0x17/0x19
 [<ffffffff8100a080>] do_one_initcall+0x75/0x18a
 [<ffffffff810de897>] ? check_object+0x175/0x1af
 [<ffffffff810dfe39>] ? __slab_free+0x238/0x265
 [<ffffffff810717d3>] ? trace_hardirqs_on_caller+0x1f/0x152
 [<ffffffff81071913>] ? trace_hardirqs_on+0xd/0xf
 [<ffffffff81073030>] ? print_lock_contention_bug+0x1b/0xe1
 [<ffffffff811335ca>] ? proc_register+0x123/0x1a2
 [<ffffffff811a7cf2>] ? _raw_spin_unlock+0x8f/0x98
 [<ffffffff813a2f48>] ? _spin_unlock+0x2b/0x30
 [<ffffffff81133633>] ? proc_register+0x18c/0x1a2
 [<ffffffff81133767>] ? create_proc_entry+0x79/0x91
 [<ffffffff8109bf9a>] ? register_irq_proc+0xb3/0xcf
 [<ffffffff81130000>] ? proc_pid_syscall+0x88/0xb7
 [<ffffffff8162b710>] kernel_init+0x1d9/0x22f
 [<ffffffff81012d8a>] child_rip+0xa/0x20
 [<ffffffff813a2ebb>] ? _spin_unlock_irq+0x30/0x3c
 [<ffffffff81012750>] ? restore_args+0x0/0x30
 [<ffffffff8162b537>] ? kernel_init+0x0/0x22f
 [<ffffffff81012d80>] ? child_rip+0x0/0x20

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.