[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-bugs] [Bug 390] New: Unable to handle kernel paging request at virtual address c2b02000
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=390 Summary: Unable to handle kernel paging request at virtual address c2b02000 Product: Xen Version: unstable Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Hypervisor AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx ReportedBy: dbarrera@xxxxxxxxxx I am seeing a kernel oops from 'dmesg' on a guest domain. Machine: IBM xSeries 335, 4GB of RAM Xen: PAE enabled build with following changeset: changeset: 7695:6e2225934d84 tag: tip parent: 7683:a5195bf5671d parent: 7694:f544934dd0b6 user: Michael.Fetterman@xxxxxxxxxxxx date: Tue Nov 8 07:41:25 2005 + dmesg output from domU: x335b-vm1:~ # dmesg Linux version 2.6.12.6-xenU (root@x335b) (gcc version 3.3.3 (SuSE Linux)) #1 SMP Tue Nov 8 10:33:32 CST 2005 BIOS-provided physical RAM map: Xen: 0000000000000000 - 0000000010000000 (usable) 0MB HIGHMEM available. 264MB LOWMEM available. On node 0 totalpages: 67584 DMA zone: 67584 pages, LIFO batch:31 Normal zone: 0 pages, LIFO batch:1 HighMem zone: 0 pages, LIFO batch:1 IRQ lockup detection disabled Built 1 zonelists Kernel command line: root=/dev/sdb6 ro Initializing CPU#0 PID hash table entries: 2048 (order: 11, 32768 bytes) Xen reported: 3189.352 MHz processor. Dentry cache hash table entries: 65536 (order: 6, 262144 bytes) Inode-cache hash table entries: 32768 (order: 5, 131072 bytes) vmalloc area: d1000000-f53fe000, maxmem 2d800000 Memory: 255488k/270336k available (1823k kernel code, 6340k reserved, 556k data, 140k init, 0k highmem) Checking if this processor honours the WP bit even in supervisor mode... Ok. Calibrating delay loop... 6356.99 BogoMIPS (lpj=31784960) Mount-cache hash table entries: 512 CPU: After generic identify, caps: bfebfbff 00000000 00000000 00000000 00004400 00000000 00000000 CPU: After vendor identify, caps: bfebfbff 00000000 00000000 00000000 00004400 00000000 00000000 CPU: Trace cache: 12K uops, L1 D cache: 8K CPU: L2 cache: 512K CPU: L3 cache: 1024K CPU: After all inits, caps: bfebc3f1 00000000 00000000 00000080 00004400 00000000 00000000 Enabling fast FPU save and restore... done. Enabling unmasked SIMD FPU exception support... done. Checking 'hlt' instruction... disabled Brought up 1 CPUs CPU0 attaching sched-domain: domain 0: span 01 groups: 01 NET: Registered protocol family 16 xenbus_probe_init CPU0 attaching sched-domain: domain 0: does not load-balance Enabling SMP... CPU0 attaching sched-domain: domain 0: span 03 groups: 01 02 CPU1 attaching sched-domain: domain 0: span 03 groups: 02 01 Initializing CPU#1 CPU0 attaching sched-domain: domain 0: does not load-balance CPU1 attaching sched-domain: domain 0: does not load-balance CPU0 attaching sched-domain: domain 0: span 07 groups:<6>Initializing CPU#2 01 02 04 CPU1 attaching sched-domain: domain 0: span 07 groups: 02 04 01 CPU2 attaching sched-domain: domain 0: span 07 groups: 04 01 02 CPU0 attaching sched-domain: domain 0: does not load-balance CPU1 attaching sched-domain: domain 0: does not load-balance CPU2 attaching sched-domain: domain 0: does not load-balance CPU0 attaching sched-domain: Initializing CPU#3 domain 0: span 0f groups: 01 02 04 08 CPU1 attaching sched-domain: domain 0: span 0f groups: 02 04 08 01 CPU2 attaching sched-domain: domain 0: span 0f groups: 04 08 01 02 CPU3 attaching sched-domain: domain 0: span 0f groups: 08 01 02 04 Brought up 4 CPUs xen_mem: Initialising balloon driver. Grant table initialized Initializing Cryptographic API io scheduler noop registered io scheduler anticipatory registered io scheduler deadline registered io scheduler cfq registered RAMDISK driver initialized: 16 RAM disks of 4096K size 1024 blocksize Xen virtual console successfully installed as tty1 Event-channel device installed. Registering block device major 8 xen_net: Initialising virtual ethernet driver. NET: Registered protocol family 2 IP: routing cache hash table of 1024 buckets, 16Kbytes TCP established hash table entries: 16384 (order: 6, 262144 bytes) TCP bind hash table entries: 16384 (order: 5, 196608 bytes) TCP: Hash tables configured (established 16384 bind 16384) NET: Registered protocol family 1 NET: Registered protocol family 17 EXT3-fs: INFO: recovery required on readonly filesystem. EXT3-fs: write access will be enabled during recovery. EXT3-fs: recovery complete. kjournald starting. Commit interval 5 seconds EXT3-fs: mounted filesystem with ordered data mode. VFS: Mounted root (ext3 filesystem) readonly. Freeing unused kernel memory: 140k freed EXT3 FS on sdb6, internal journal Adding 2104444k swap on /dev/sdb5. Priority:42 extents:1 nfs warning: mount version older than kernel Unable to handle kernel paging request at virtual address c2b02000 printing eip: c02c7d86 05ad4000 -> *pde = 00000000:00d37001 0edcf000 -> *pme = 00000000:e1010067 00011000 -> *pte = 00000000:d5e0a061 Oops: 0003 [#1] PREEMPT SMP Modules linked in: CPU: 2 EIP: 0061:[<c02c7d86>] Not tainted VLI EFLAGS: 00010246 (2.6.12.6-xenU) EIP is at iret_exc+0x59b/0x63c eax: 00000000 ebx: 00001000 ecx: 00001000 edx: 0809c640 esi: 0809b640 edi: c2b02000 ebp: c2b02000 esp: c5d2feb8 ds: 007b es: 007b ss: 0069 Process gzip (pid: 3159, threadinfo=c5d2e000 task=c1358020) Stack: 00000000 00001000 00000000 00000000 00000000 00000000 00000000 c2b02000 c022c946 c2b02000 0809b640 00001000 00000001 c5d2ff64 00001000 00001000 c0177f93 c2b02000 0809b640 00001000 00000000 c1056040 cde6d0f8 00000006 Call Trace: [<c022c946>] copy_from_user+0x46/0xb0 [<c0177f93>] pipe_writev+0x1a3/0x520 [<c010cc69>] monotonic_clock+0xb9/0xd0 [<c0178348>] pipe_write+0x38/0x40 [<c0169d4e>] vfs_write+0xbe/0x140 [<c0169ea1>] sys_write+0x51/0x80 [<c010a219>] syscall_call+0x7/0xb Code: ff 31 c0 e9 d6 49 f6 ff b0 01 e9 cf 49 f6 ff 01 c1 e9 1b 4a f6 ff 8d 4c 88 00 e9 12 4a f6 ff 01 c1 eb 04 8d 4c 88 00 51 50 31 c0 <f3> aa 58 59 e9 8d 4a f6 ff b0 ff e9 d9 52 f6 ff 66 b8 ff ff e9 <1>Unable to handle kernel paging request at virtual address c1c5e000 printing eip: c0157167 022bb000 -> *pde = 00000000:d60d3001 01c39000 -> *pme = 00000000:ee455067 0000a000 -> *pte = 00000000:d60ae061 Oops: 0003 [#2] PREEMPT SMP Modules linked in: CPU: 0 EIP: 0061:[<c0157167>] Not tainted VLI EFLAGS: 00010286 (2.6.12.6-xenU) EIP is at do_wp_page+0x127/0x590 eax: c1c5e000 ebx: c34fa000 ecx: 00000400 edx: c22b6000 esi: c34fa000 edi: c1c5e000 ebp: c1069f40 esp: c22b7e18 ds: 0069 es: 0069 ss: 0069 Process bash (pid: 3378, threadinfo=c22b6000 task=cdd87530) Stack: c1038bc0 00000004 00000000 00001c43 c1c5e000 cdd3b580 c01549f3 00000000 00000000 cdd3b5c0 c1038bc0 dea12065 00000000 c01451d0 dbf0d025 00000000 00000000 cdd3b5c0 00000000 00000940 c1c3cdf8 c1c3cdf8 cdd3b580 00000000 Call Trace: [<c01549f3>] pte_alloc_map+0xb3/0x3b0 [<c01451d0>] __generic_file_aio_read+0x200/0x240 [<c0158b9a>] handle_mm_fault+0x1fa/0x2b0 [<c0126d5d>] current_fs_time+0x5d/0x80 [<c0116bdf>] do_page_fault+0x1df/0x856 [<c0199f4b>] dnotify_parent+0x3b/0xe0 [<c0178348>] pipe_write+0x38/0x40 [<c0169d68>] vfs_write+0xd8/0x140 [<c0169ea1>] sys_write+0x51/0x80 [<c010a5de>] page_fault+0x2e/0x34 Code: 24 04 e8 5d 19 fc ff 89 c3 b8 04 00 00 00 89 de 89 44 24 04 8b 44 24 28 89 04 24 e8 44 19 fc ff 89 44 24 10 b9 00 04 00 00 89 c7 <f3> a5 89 1c 24 b8 03 00 00 00 89 44 24 04 e8 96 19 fc ff b8 04 <6>note: bash[3378] exited with preempt_count 2 scheduling while atomic: bash/0x10000002/3378 [<c02c5853>] schedule+0x693/0x760 [<c0155a04>] unmap_page_range+0x194/0x210 [<c0160d96>] free_pages_and_swap_cache+0x86/0xa0 [<c02c6137>] cond_resched+0x27/0x40 [<c0155bff>] unmap_vmas+0x17f/0x280 [<c015bf57>] exit_mmap+0xa7/0x1c0 [<c011f098>] mmput+0x38/0xa0 [<c0124448>] do_exit+0xa8/0x3f0 [<c010abc8>] die+0x188/0x190 [<c0116e00>] do_page_fault+0x400/0x856 [<c01e9732>] journal_stop+0x192/0x2d0 [<c01daf76>] ext3_mark_iloc_dirty+0x26/0x40 [<c014c2f1>] __do_page_cache_readahead+0xb1/0x1a0 [<c0118aca>] kmap_atomic+0x2a/0x30 [<c01494b2>] buffered_rmqueue+0x1c2/0x2d0 [<c0148ea0>] prep_new_page+0x50/0x60 [<c0149450>] buffered_rmqueue+0x160/0x2d0 [<c0149769>] __alloc_pages+0xd9/0x420 [<c0149769>] __alloc_pages+0xd9/0x420 [<c010a5de>] page_fault+0x2e/0x34 [<c0110069>] show+0x29/0x50 [<c0157167>] do_wp_page+0x127/0x590 [<c01549f3>] pte_alloc_map+0xb3/0x3b0 [<c01451d0>] __generic_file_aio_read+0x200/0x240 [<c0158b9a>] handle_mm_fault+0x1fa/0x2b0 [<c0126d5d>] current_fs_time+0x5d/0x80 [<c0116bdf>] do_page_fault+0x1df/0x856 [<c0199f4b>] dnotify_parent+0x3b/0xe0 [<c0178348>] pipe_write+0x38/0x40 [<c0169d68>] vfs_write+0xd8/0x140 [<c0169ea1>] sys_write+0x51/0x80 [<c010a5de>] page_fault+0x2e/0x34 'xm dmesg' from dom0: x335b:/tmp/xen-unstable.hg # xm dmesg __ __ _____ ___ _ _ \ \/ /___ _ __ |___ / / _ \ __| | _____ _____| | \ // _ \ '_ \ |_ \| | | |__ / _` |/ _ \ \ / / _ \ | / \ __/ | | | ___) | |_| |__| (_| | __/\ V / __/ | /_/\_\___|_| |_| |____(_)___/ \__,_|\___| \_/ \___|_| http://www.cl.cam.ac.uk/netos/xen University of Cambridge Computer Laboratory Xen version 3.0-devel (root@xxxxxxxxxxxxxxxxxx) (gcc version 3.3.3 (SuSE Linux)) Tue Nov 8 10:19:21 CST 2005 Latest ChangeSet: Tue Nov 8 07:41:25 2005 +0100 7695:6e2225934d84 (XEN) Physical RAM map: (XEN) 0000000000000000 - 000000000009d400 (usable) (XEN) 000000000009d400 - 00000000000a0000 (reserved) (XEN) 00000000000e0000 - 0000000000100000 (reserved) (XEN) 0000000000100000 - 00000000f7fec140 (usable) (XEN) 00000000f7fec140 - 00000000f7ff0000 (ACPI data) (XEN) 00000000f7ff0000 - 00000000f8000000 (reserved) (XEN) 00000000fec00000 - 0000000100000000 (reserved) (XEN) 0000000100000000 - 0000000108000000 (usable) (XEN) System RAM: 4095MB (4193828kB) (XEN) Xen heap: 10MB (10280kB) (XEN) PAE enabled, limit: 16 GB (XEN) found SMP MP-table at 0009d540 (XEN) DMI 2.3 present. (XEN) Using APIC driver default (XEN) ACPI: RSDP (v000 IBM ) @ 0x000fdfc0 (XEN) ACPI: RSDT (v001 IBM SERONYXP 0x00001000 IBM 0x45444f43) @ 0xf7feff80 (XEN) ACPI: FADT (v001 IBM SERONYXP 0x00001000 IBM 0x45444f43) @ 0xf7feff00 (XEN) ACPI: MADT (v001 IBM SERONYXP 0x00001000 IBM 0x45444f43) @ 0xf7fefe40 (XEN) ACPI: ASF! (v016 IBM SERONYXP 0x00000001 IBM 0x45444f43) @ 0xf7fefd80 (XEN) ACPI: DSDT (v001 IBM SERTURQU 0x00001000 MSFT 0x0100000b) @ 0x00000000 (XEN) ACPI: Local APIC address 0xfee00000 (XEN) ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) (XEN) Processor #0 15:2 APIC version 20 (XEN) ACPI: LAPIC (acpi_id[0x01] lapic_id[0x06] enabled) (XEN) Processor #6 15:2 APIC version 20 (XEN) ACPI: LAPIC (acpi_id[0x02] lapic_id[0x01] enabled) (XEN) Processor #1 15:2 APIC version 20 (XEN) ACPI: LAPIC (acpi_id[0x03] lapic_id[0x07] enabled) (XEN) Processor #7 15:2 APIC version 20 (XEN) ACPI: LAPIC_NMI (acpi_id[0x00] dfl dfl lint[0x1]) (XEN) ACPI: LAPIC_NMI (acpi_id[0x06] dfl dfl lint[0x1]) (XEN) ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) (XEN) ACPI: LAPIC_NMI (acpi_id[0x07] dfl dfl lint[0x1]) (XEN) ACPI: IOAPIC (id[0x0e] address[0xfec00000] gsi_base[0]) (XEN) IOAPIC[0]: apic_id 14, version 17, address 0xfec00000, GSI 0-15 (XEN) ACPI: IOAPIC (id[0x0d] address[0xfec01000] gsi_base[16]) (XEN) IOAPIC[1]: apic_id 13, version 17, address 0xfec01000, GSI 16-31 (XEN) ACPI: IOAPIC (id[0x0c] address[0xfec02000] gsi_base[32]) (XEN) IOAPIC[2]: apic_id 12, version 17, address 0xfec02000, GSI 32-47 (XEN) ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) (XEN) ACPI: IRQ0 used by override. (XEN) ACPI: IRQ2 used by override. (XEN) Enabling APIC mode: Flat. Using 3 I/O APICs (XEN) Using ACPI (MADT) for SMP configuration information (XEN) Initializing CPU#0 (XEN) Detected 3189.514 MHz processor. (XEN) Using scheduler: Simple EDF Scheduler (sedf) (XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K (XEN) CPU: L2 cache: 512K (XEN) CPU: L3 cache: 1024K (XEN) CPU: Physical Processor ID: 0 (XEN) CPU0: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05 (XEN) Booting processor 1/1 eip 90000 (XEN) Initializing CPU#1 (XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K (XEN) CPU: L2 cache: 512K (XEN) CPU: L3 cache: 1024K (XEN) CPU: Physical Processor ID: 0 (XEN) CPU1: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05 (XEN) Booting processor 2/6 eip 90000 (XEN) Initializing CPU#2 (XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K (XEN) CPU: L2 cache: 512K (XEN) CPU: L3 cache: 1024K (XEN) CPU: Physical Processor ID: 3 (XEN) CPU2: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05 (XEN) Booting processor 3/7 eip 90000 (XEN) Initializing CPU#3 (XEN) CPU: Trace cache: 12K uops, L1 D cache: 8K (XEN) CPU: L2 cache: 512K (XEN) CPU: L3 cache: 1024K (XEN) CPU: Physical Processor ID: 3 (XEN) CPU3: Intel(R) Xeon(TM) CPU 3.20GHz stepping 05 (XEN) Total of 4 processors activated. (XEN) ENABLING IO-APIC IRQs (XEN) ..TIMER: vector=0x31 pin1=2 pin2=-1 (XEN) checking TSC synchronization across 4 CPUs: passed. (XEN) Platform timer is 1.193MHz PIT (XEN) Brought up 4 CPUs (XEN) mtrr: v2.0 (20020519) (XEN) *** LOADING DOMAIN 0 *** (XEN) Xen-ELF header found: 'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xC0000000,PAE=yes,LOADER=generic' (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 0000000003800000->0000000004000000 (125952 pages to be allocated) (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: c0100000->c0639584 (XEN) Init. ramdisk: c063a000->c063a000 (XEN) Phys-Mach map: c063a000->c06b7000 (XEN) Start info: c06b7000->c06b8000 (XEN) Page tables: c06b8000->c06c1000 (XEN) Boot stack: c06c1000->c06c2000 (XEN) TOTAL: c0000000->c0800000 (XEN) ENTRY ADDRESS: c0100000 (XEN) Scrubbing Free RAM: ...........................................done. (XEN) Xen trace buffers: disabled (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen). (XEN) microcode: CPU3 updated from revision 0x11 to 0x29, date = 08112004 (XEN) microcode: CPU1 updated from revision 0x11 to 0x29, date = 08112004 (XEN) microcode: CPU2 updated from revision 0x11 to 0x29, date = 08112004 (XEN) microcode: CPU0 updated from revision 0x11 to 0x29, date = 08112004 (XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: write-combining (XEN) mtrr: type mismatch for fd000000,800000 old: write-back new: write-combining (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM1: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000f8 (XEN) Domain 5 (vcpu#0) crashed on cpu#3: (XEN) CPU: 3 (XEN) EIP: e019:[<c0363810>] (XEN) EFLAGS: 00000206 CONTEXT: guest (XEN) eax: 00000000 ebx: c0082000 ecx: 00006000 edx: 00042000 (XEN) esi: c03eb000 edi: c00ac000 ebp: 00000082 esp: c0355f38 (XEN) cr0: 8005003b cr3: ee865000 (XEN) ds: e021 es: e021 fs: 0000 gs: e021 ss: e021 cs: e019 (XEN) Guest stack trace from esp=c0355f38: (XEN) c00ac000 00000003 c0363810 0001e019 00010206 c03eb000 00010800 00000000 (XEN) 00010800 ffffffff 00000fff 00010800 00000001 00000042 00000000 c031c800 (XEN) 00000000 00001000 00042000 c0363d74 c0386070 00042000 00001000 00000000 (XEN) c0353060 c02c7e27 c0100000 c036c1a0 c035db49 00042000 00001000 00000000 (XEN) 00000000 00000000 ffffe000 c03e2000 00000000 ffffe000 c03e2000 00000000 (XEN) 00000000 c0356857 c0355ff4 00000000 00000000 00000000 00000000 c037e300 (XEN) 0702080b c0100066 (XEN) Domain 6 (vcpu#0) crashed on cpu#3: (XEN) CPU: 3 (XEN) EIP: e019:[<c0363810>] (XEN) EFLAGS: 00000206 CONTEXT: guest (XEN) eax: 00000000 ebx: c0082000 ecx: 00006000 edx: 00042000 (XEN) esi: c03eb000 edi: c00ac000 ebp: 00000082 esp: c0355f38 (XEN) cr0: 8005003b cr3: 00e37000 (XEN) ds: e021 es: e021 fs: 0000 gs: e021 ss: e021 cs: e019 (XEN) Guest stack trace from esp=c0355f38: (XEN) c00ac000 00000003 c0363810 0001e019 00010206 c03eb000 00010800 00000000 (XEN) 00010800 ffffffff 00000fff 00010800 00000001 00000042 00000000 c031c800 (XEN) 00000000 00001000 00042000 c0363d74 c0386070 00042000 00001000 00000000 (XEN) c0353060 c02c7e27 c0100000 c036c1a0 c035db49 00042000 00001000 00000000 (XEN) 00000000 00000000 ffffe000 c03e2000 00000000 ffffe000 c03e2000 00000000 (XEN) 00000000 c0356857 c0355ff4 00000000 00000000 00000000 00000000 c037e300 (XEN) 0702080b c0100066 (XEN) Domain 7 (vcpu#0) crashed on cpu#3: (XEN) CPU: 3 (XEN) EIP: e019:[<c0115b56>] (XEN) EFLAGS: 00000246 CONTEXT: guest (XEN) eax: 00000070 ebx: 00000000 ecx: 00000000 edx: 00000000 (XEN) esi: 00000000 edi: 00000000 ebp: 00000070 esp: c0355ed0 (XEN) cr0: 8005003b cr3: ee0a7000 (XEN) ds: e021 es: e021 fs: 0000 gs: e021 ss: e021 cs: e019 (XEN) Guest stack trace from esp=c0355ed0: (XEN) c0000074 00000003 c0115b56 0001e019 00010246 00000000 00000000 00000000 (XEN) c0000000 c0360cc5 c2a0e000 00001000 00000000 00000000 c022b8e8 c037eda0 (XEN) 00000000 c0800000 c03e6020 00000800 c0361040 c03e6020 00000400 c02f0e0a (XEN) c0355fa4 00010800 00000000 00000000 00000000 00000000 00010000 00000000 (XEN) 00000004 00000003 c03e5018 00000000 c03e5000 00000000 c036c1a0 c036146e (XEN) c03e5000 c036c1a0 c0363cd0 c0386070 c0353060 c02c7e27 00000000 c0361748 (XEN) 002ee0ff c02f0e0a c0353060 c035d4c5 c02f0e0a c0100000 c035db1c c0355ff4 (XEN) c036c1a0 00000080 00000000 00000000 ffffe000 c03e2000 00000000 ffffe000 (XEN) c03e2000 00000000 00000000 c0356857 c0355ff4 00000000 00000000 00000000 (XEN) 00000000 c037e300 0702080b c0100066 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 00000000 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000c0 (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 0000009f (XEN) DOM9: (file=mm.c, line=460) Non-privileged attempt to map I/O space 000000f8 -- Configure bugmail: http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. _______________________________________________ Xen-bugs mailing list Xen-bugs@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-bugs
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |