[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] dom0 pvops crash



Info on steps to reproduce this might be useful. The actual crash is in the
swapper: presumably something poisonous happened earlier. The error Xen
reports is essentially that a page of memory that dom0 thinks is nothing
special is in fact in use as a page-table page.

 -- Keir

On 25/01/2010 16:29, "Ian Jackson" <Ian.Jackson@xxxxxxxxxxxxx> wrote:

> See the attached log.  After this first oops, the machine is hosed: a
> whole series of similar oopses and userland code has basically stopped
> running.
> 
> I would run ksymoops but the default build of the pvops kernel as
> built by the xen-unstable tree does not apparently include /proc/ksyms (!)
> 
> Ian.
> 
> Jan 25 15:18:42.628549 Debian GNU/Linux 5.0 spider.cam.xci-test.com hvc0
> Jan 25 15:18:42.628568
> Jan 25 15:18:59.329530 spider.cam.xci-test.com login: (XEN) tmem: all pools
> frozen for all domains
> Jan 25 15:18:59.329572 (XEN) tmem: all pools thawed for all domains
> Jan 25 15:18:59.420519 (XEN) tmem: all pools frozen for all domains
> Jan 25 15:18:59.985517 (XEN) tmem: all pools thawed for all domains
> Jan 25 15:19:00.072531 (XEN) memory.c:131:d0 Could not allocate order=9
> extent: id=1 memflags=0 (3 of 4
> Jan 25 15:19:00.072552 )
> Jan 25 15:19:00.072667 (XEN) memory.c:131:d0 Could not allocate order=9
> extent: id=1 memflags=0 (0 of 3
> Jan 25 15:19:00.072678 )
> Jan 25 15:19:00.993526 [   47.790079] device vif1.0 entered promiscuous mode
> Jan 25 15:19:01.105524 [   47.903839] eth0: port 2(vif1.0) entering forwarding
> state
> Jan 25 15:19:02.432531 [   49.227365] eth0: port 2(vif1.0) entering disabled
> state
> Jan 25 15:19:02.553524 [   49.352248] eth0: port 2(vif1.0) entering disabled
> state
> Jan 25 16:11:41.668535 (XEN) mm.c:2362:d0 Bad type (saw 1400000000000001 !=
> exp 7000000000000000) for m
> Jan 25 16:11:41.668576 fn 7cba0 (pfn 730d5)
> Jan 25 16:11:41.680528 (XEN) mm.c:858:d0 Error getting mfn 7cba0 (pfn 730d5)
> from L1 entry 800000007cba
> Jan 25 16:11:41.680552 0063 for l1e_owner=0, pg_owner=0
> Jan 25 16:11:41.688525 (XEN) mm.c:4631:d0 ptwr_emulate: could not
> get_page_from_l1e()
> Jan 25 16:11:41.773511 [ 3208.422690] BUG: unable to handle kernel paging
> request at c17f2d00
> Jan 25 16:11:41.844516 [ 3208.423253] IP: [<c10231c1>] xen_set_pte+0x8c/0x96
> Jan 25 16:11:42.041509 [ 3208.423253] *pdpt = 0000000011eac027 *pde =
> 804062b9b6bdb093
> Jan 25 16:11:42.116507 [ 3208.423253] Oops: 0003 [#1] SMP
> Jan 25 16:11:42.128528 [ 3208.423253] last sysfs file:
> /sys/devices/virtual/net/eth0/bridge/topology_ch
> Jan 25 16:11:42.128549 ange_detected
> Jan 25 16:11:42.437508 [ 3208.423253] Modules linked in: [last unloaded:
> scsi_wait_scan]
> Jan 25 16:11:42.445513 [ 3208.423253]
> Jan 25 16:11:42.488528 [ 3208.423253] Pid: 427, comm: kswapd0 Not tainted
> (2.6.31.6 #1) To Be Filled By
> Jan 25 16:11:42.488548  O.E.M.
> Jan 25 16:11:42.664523 [ 3208.423253] EIP: 0061:[<c10231c1>] EFLAGS: 00010206
> CPU: 1
> Jan 25 16:11:42.788519 [ 3208.423253] EIP is at xen_set_pte+0x8c/0x96
> Jan 25 16:11:42.885525 [ 3208.423253] EAX: c17f2d00 EBX: 0106a682 ECX:
> 80000000 EDX: 80000000
> Jan 25 16:11:43.032526 [ 3208.423253] ESI: 7cba0063 EDI: ffffff30 EBP:
> f7249d9c ESP: f7249d88
> Jan 25 16:11:43.173522 [ 3208.423253]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS:
> 0069
> Jan 25 16:11:43.300528 [ 3208.423253] Process kswapd0 (pid: 427, ti=f7248000
> task=f7109e00 task.ti=f724
> Jan 25 16:11:43.300548 8000)
> Jan 25 16:11:43.465514 [ 3208.423253] Stack:
> Jan 25 16:11:43.669508 [ 3208.423253]  80000000 c17f2d00 80000000 000730d5
> ffffff30 f7249dc4 c1046d12 7
> Jan 25 16:11:43.685507 cba0063
> Jan 25 16:11:43.836509 [ 3208.423253] <0> c1023e40 80000000 ffbff000 0000001a
> c2ef1aa0 00000007 7cba006
> Jan 25 16:11:43.869508 7 f7249ddc
> Jan 25 16:11:44.020509 [ 3208.423253] <0> c1021fa8 00000163 80000000 08baa000
> 00000000 f7249e08 c10c581
> Jan 25 16:11:44.053508 9 c1022082
> Jan 25 16:11:44.064515 [ 3208.423253] Call Trace:
> Jan 25 16:11:44.124522 [ 3208.423253]  [<c1046d12>] ?
> kmap_atomic_prot+0xf5/0x117
> Jan 25 16:11:44.241518 [ 3208.423253]  [<c1023e40>] ? check_events+0x8/0xc
> Jan 25 16:11:44.348523 [ 3208.423253]  [<c1021fa8>] ?
> xen_kmap_atomic_pte+0x2f/0x36
> Jan 25 16:11:44.469524 [ 3208.423253]  [<c10c5819>] ?
> page_check_address+0xce/0x1c1
> Jan 25 16:11:44.593522 [ 3208.423253]  [<c1022082>] ? xen_mc_issue+0x3f/0x42
> Jan 25 16:11:44.705521 [ 3208.423253]  [<c10c59d1>] ?
> page_referenced_one+0x4b/0x11b
> Jan 25 16:11:44.836542 [ 3208.423253]  [<c10c67e2>] ?
> page_referenced+0x8c/0x108
> Jan 25 16:11:44.949524 [ 3208.423253]  [<c10b4034>] ?
> shrink_active_list+0x16c/0x20e
> Jan 25 16:11:45.080523 [ 3208.423253]  [<c10b4ed0>] ? shrink_zone+0x2b1/0x2c6
> Jan 25 16:11:45.189520 [ 3208.423253]  [<c10b53e6>] ? kswapd+0x3d0/0x557
> Jan 25 16:11:45.292524 [ 3208.423253]  [<c10b341c>] ?
> isolate_pages_global+0x0/0x191
> Jan 25 16:11:45.420524 [ 3208.423253]  [<c1069ae7>] ?
> autoremove_wake_function+0x0/0x33
> Jan 25 16:11:45.549520 [ 3208.423253]  [<c10b5016>] ? kswapd+0x0/0x557
> Jan 25 16:11:45.648520 [ 3208.423253]  [<c1069840>] ? kthread+0x6e/0x73
> Jan 25 16:11:45.745518 [ 3208.423253]  [<c10697d2>] ? kthread+0x0/0x73
> Jan 25 16:11:45.848523 [ 3208.423253]  [<c1027bb7>] ?
> kernel_thread_helper+0x7/0x10
> Jan 25 16:11:46.120508 [ 3208.423253] Code: f3 ab c6 05 d8 73 7f c1 00 8b 1d
> 38 73 7f c1 e8 d1 cf 01 00
> Jan 25 16:11:46.280508  8b 55 ec 48 0f 94 c0 0f b6 c0 01 d8 a3 38 73 7f c1 8b
> 45 f0 89 50 04 <89> 30 8d
> Jan 25 16:11:46.400507  65 f4 5b 5e 5f 5d c3 55 89 e5 57 56 89 c6 53 89 d3 83
> Jan 25 16:11:46.512513 [ 3208.423253] EIP: [<c10231c1>] xen_set_pte+0x8c/0x96
> SS:ESP 0069:f7249d88
> Jan 25 16:11:46.560516 [ 3208.423253] CR2: 00000000c17f2d00
> Jan 25 16:11:46.637521 [ 3208.423253] ---[ end trace 133211fa84dd2ce5 ]---
> Jan 25 16:11:46.744524 [ 3208.423253] note: kswapd0[427] exited with
> preempt_count 1
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.