[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 1055] kernel BUG at xen-3.1.0-src/linux-2.6.18-xen/arch/i386/mm/hypervisor.c:185!



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1055


marineam@xxxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |marineam@xxxxxxxxxx




------- Comment #1 from marineam@xxxxxxxxxx  2007-10-03 14:24 -------
This may or may not be related, I've only hit it once but it happened on the
same hypercall:

(XEN) Xen trace buffers: initialized
(XEN) mm.c:1752:d0 Bad type (saw e8000001 != exp 20000000) for mfn 666c8 (pfn
5edde)
(XEN) mm.c:644:d0 Attempt to create linear p.t. with write perms
(XEN) mm.c:1069:d0 Failure in alloc_l2_table: entry 0
(XEN) mm.c:1773:d0 Error while validating mfn 32efe (pfn 2b5a8) for type
40000000: caf=80000003 taf=40000001
(XEN) mm.c:1143:d0 Failure in alloc_l3_table: entry 2
(XEN) mm.c:1773:d0 Error while validating mfn 2bae2 (pfn 241c4) for type
60000000: caf=80000003 taf=60000001
(XEN) mm.c:2042:d0 Error while pinning mfn 2bae2
------------[ cut here ]------------
kernel BUG at arch/i386/mm/hypervisor.c:185!
invalid opcode: 0000 [#1]
SMP 
Modules linked in:
CPU:    0
EIP:    0061:[<c0116d17>]    Not tainted VLI
EFLAGS: 00010282   (2.6.20-xen-r4-osl2 #1)
EIP is at xen_pgd_pin+0x55/0x5f
eax: ffffffea   ebx: deadbeef   ecx: deadbeef   edx: deadbeef
esi: deadbeef   edi: 00000000   ebp: 00000000   esp: c95a2ee0
ds: 007b   es: 007b   ss: 0069
Process bash (pid: 18147, ti=c95a2000 task=ed701030 task.ti=c95a2000)
Stack: 00000002 0002bae2 ece00bcc 241c4000 00483880 ece00bcc c01138f7 ed385900 
       c0113980 ed385900 c011c7dd eceae770 00000015 ece00be8 ece00bec ece00bd8 
       cb58ec80 c0814a70 00000000 ecc25940 c0814a70 c011c8b3 ecc25800 c011d40a 
Call Trace:
 [<c01138f7>] __pgd_pin+0x2f/0x40
 [<c0113980>] mm_pin+0x1c/0x22
 [<c011c7dd>] dup_mm+0x229/0x29a
 [<c011c8b3>] copy_mm+0x65/0x94
 [<c011d40a>] copy_process+0x718/0xc1d
 [<c011da0a>] do_fork+0xa6/0x17b
 [<c01035b0>] sys_fork+0x2c/0x30
 [<c010499c>] syscall_call+0x7/0xb
 [<c04a0033>] svc_pool_map_alloc_arrays+0x50/0x78
 =======================
Code: 0b eb fe a1 c4 50 67 c0 8b 04 90 25 ff ff ff 7f 89 44 24 04 89 e3 b9 01
00 00 00 31 d2 be f0 7f 00 00 e8 2d a6 fe ff 8
5 c0 79 04 <0f> 0b eb fe 83 c4 10 5b 5e c3 56 89 c2 53 c1 ea 0c 83 ec 10 89 
EIP: [<c0116d17>] xen_pgd_pin+0x55/0x5f SS:ESP 0069:c95a2ee0


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.