[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 214] New: hugemmap02 test on dom0 oops



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=214

           Summary: hugemmap02 test on dom0 oops
           Product: Xen
           Version: unstable
          Platform: x86
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: pl@xxxxxxxxxx
                CC: hohnbaum@xxxxxxxxxx


The machine I ran this on was a 3GHz P4 blade with 1GB ram (I did not restrict
dom0_mem in grub.conf for this test)
The only change I made to the default kernel config was to enable hugetlbfs

current changeset is:
changeset:   6559:f0dc15fd3c1bcfc63e432e7fb365792cc671e955
tag:         tip
parent:      6558:dd108e5ad24de2ccabc1fbf3a649d55754e5368c
parent:      6552:8af8ddf9107832cfe509ffe8e9f7ee65856b2fa3
user:        shand@xxxxxxxxxxxxxxxxxxxxxxxxxxx
date:        Wed Aug 31 18:22:45 2005
summary:     merge?

this is the hugemmap02 test from LTP, setup for the test is something like this:
# echo 64 > /proc/sys/vm/nr_hugepages
# mount -thugetlbfs none /var/hugetlbfs
# ./hugemmap02 -H /var/hugetlbfs



Oops: 0003 [#1]
PREEMPT
Modules linked in: thermal processor fan button battery ac sworks_agp agpgart
CPU:    0
EIP:    0061:[<c011acb6>]    Not tainted VLI
EFLAGS: 00010206   (2.6.12-xen0)
EIP is at set_huge_pte+0x66/0xc0
eax: e83f5900   ebx: f3b44ee4   ecx: 00000027   edx: 36a000e7
esi: 90000000   edi: e83f5900   ebp: f3b44ee4   esp: e7e2ded0
ds: 007b   es: 007b   ss: 0069
Process hugemmap02 (pid: 10924, threadinfo=e7e2c000 task=eaded510)
Stack: c12f8000 c011b281 eb405300 f3b44ee4 c12f8000 e83f5900 00000002 00000000
       00000000 eb405300 02000000 00000000 f3b44ee4 c19e8cc0 c01f7110 c19e8d60
       f3b44ee4 02000000 00000000 c19e8d60 f3b44ee4 02000000 ffffffea 90000000
Call Trace:
 [<c011b281>] hugetlb_prefault+0xd1/0x1e0
 [<c01f7110>] hugetlbfs_file_mmap+0xf0/0x150
 [<c0159c45>] do_mmap_pgoff+0x3b5/0x7b0
 [<c0115034>] sys_mmap2+0x84/0xc0
 [<c0109d43>] syscall_call+0x7/0xb
Code: c4 c4 5e c0 89 ca c1 ea 0c 81 e1 ff 0f 00 00 8b 04 90 25 ff ff ff 7f c1
e00c 09 c8 89 c2 83 ca 42 8b 44 24 14 81 ca a1 00 00 00 <89> 10 5b c3 8d b6 00
00 00 00 89 d1 8b 15 d0 ff 5f c0 8b 43 10
 <6>note: hugemmap02[10924] exited with preempt_count 1
scheduling while atomic: hugemmap02/0x00000001/10924
 [<c046e961>] schedule+0x681/0x760
 [<c012110c>] release_console_sem+0x16c/0x190
 [<c0120d9f>] vprintk+0x1df/0x330
 [<c046fc46>] rwsem_down_read_failed+0xc6/0x1e0
 [<c0124bd0>] .text.lock.exit+0x27/0x87
 [<c01233f7>] do_exit+0xa7/0x410
 [<c010a745>] die+0x1c5/0x1d0
 [<c0118a14>] do_page_fault+0x3e4/0x5fa
 [<c01486c3>] __rmqueue+0xd3/0x120
 [<c014885d>] free_hot_cold_page+0x5d/0x1a0
 [<c0148834>] free_hot_cold_page+0x34/0x1a0
 [<c014dcf5>] kmem_cache_alloc+0xa5/0xc0
 [<c02283dc>] radix_tree_node_alloc+0x1c/0x60
 [<c010a0ca>] page_fault+0x2e/0x34
 [<c011acb6>] set_huge_pte+0x66/0xc0
 [<c011b281>] hugetlb_prefault+0xd1/0x1e0
 [<c01f7110>] hugetlbfs_file_mmap+0xf0/0x150
 [<c0159c45>] do_mmap_pgoff+0x3b5/0x7b0
 [<c0115034>] sys_mmap2+0x84/0xc0
 [<c0109d43>] syscall_call+0x7/0xb

After running the test:
# cat /proc/meminfo
MemTotal:       946708 kB
MemFree:        365460 kB
Buffers:         41760 kB
Cached:         224552 kB
SwapCached:          0 kB
Active:         150008 kB
Inactive:       134548 kB
HighTotal:      109884 kB
HighFree:          120 kB
LowTotal:       836824 kB
LowFree:        365340 kB
SwapTotal:     1048784 kB
SwapFree:      1048784 kB
Dirty:               0 kB
Writeback:           0 kB
Mapped:          33592 kB
Slab:            22940 kB
CommitLimit:   1391064 kB
Committed_AS:    49860 kB
PageTables:       1736 kB
VmallocTotal:   114680 kB
VmallocUsed:      2288 kB
VmallocChunk:   112356 kB
HugePages_Total:    64
HugePages_Free:     63
Hugepagesize:     4096 kB

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.