[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] dom0 pvops crash



On Mon, Jan 25, 2010 at 05:10:45PM +0000, Keir Fraser wrote:
> Info on steps to reproduce this might be useful. The actual crash is in the
> swapper: presumably something poisonous happened earlier. The error Xen
> reports is essentially that a page of memory that dom0 thinks is nothing
> special is in fact in use as a page-table page.
> 

Here's the hacky fix from last summer:
http://lists.xensource.com/archives/html/xen-devel/2009-06/msg00519.html

On my testbox I can trigger that bug just by compiling a kernel in dom0.

CONFIG_HIGHPTE=n is stable for me, while CONFIG_HIGHPTE=y most probably 
makes dom0 crash during a kernel compile.

(dom0 and Xen are 32bit PAE)

-- Pasi

>  -- Keir
> 
> On 25/01/2010 16:29, "Ian Jackson" <Ian.Jackson@xxxxxxxxxxxxx> wrote:
> 
> > See the attached log.  After this first oops, the machine is hosed: a
> > whole series of similar oopses and userland code has basically stopped
> > running.
> > 
> > I would run ksymoops but the default build of the pvops kernel as
> > built by the xen-unstable tree does not apparently include /proc/ksyms (!)
> > 
> > Ian.
> > 
> > Jan 25 15:18:42.628549 Debian GNU/Linux 5.0 spider.cam.xci-test.com hvc0
> > Jan 25 15:18:42.628568
> > Jan 25 15:18:59.329530 spider.cam.xci-test.com login: (XEN) tmem: all pools
> > frozen for all domains
> > Jan 25 15:18:59.329572 (XEN) tmem: all pools thawed for all domains
> > Jan 25 15:18:59.420519 (XEN) tmem: all pools frozen for all domains
> > Jan 25 15:18:59.985517 (XEN) tmem: all pools thawed for all domains
> > Jan 25 15:19:00.072531 (XEN) memory.c:131:d0 Could not allocate order=9
> > extent: id=1 memflags=0 (3 of 4
> > Jan 25 15:19:00.072552 )
> > Jan 25 15:19:00.072667 (XEN) memory.c:131:d0 Could not allocate order=9
> > extent: id=1 memflags=0 (0 of 3
> > Jan 25 15:19:00.072678 )
> > Jan 25 15:19:00.993526 [   47.790079] device vif1.0 entered promiscuous mode
> > Jan 25 15:19:01.105524 [   47.903839] eth0: port 2(vif1.0) entering 
> > forwarding
> > state
> > Jan 25 15:19:02.432531 [   49.227365] eth0: port 2(vif1.0) entering disabled
> > state
> > Jan 25 15:19:02.553524 [   49.352248] eth0: port 2(vif1.0) entering disabled
> > state
> > Jan 25 16:11:41.668535 (XEN) mm.c:2362:d0 Bad type (saw 1400000000000001 !=
> > exp 7000000000000000) for m
> > Jan 25 16:11:41.668576 fn 7cba0 (pfn 730d5)
> > Jan 25 16:11:41.680528 (XEN) mm.c:858:d0 Error getting mfn 7cba0 (pfn 730d5)
> > from L1 entry 800000007cba
> > Jan 25 16:11:41.680552 0063 for l1e_owner=0, pg_owner=0
> > Jan 25 16:11:41.688525 (XEN) mm.c:4631:d0 ptwr_emulate: could not
> > get_page_from_l1e()
> > Jan 25 16:11:41.773511 [ 3208.422690] BUG: unable to handle kernel paging
> > request at c17f2d00
> > Jan 25 16:11:41.844516 [ 3208.423253] IP: [<c10231c1>] xen_set_pte+0x8c/0x96
> > Jan 25 16:11:42.041509 [ 3208.423253] *pdpt = 0000000011eac027 *pde =
> > 804062b9b6bdb093
> > Jan 25 16:11:42.116507 [ 3208.423253] Oops: 0003 [#1] SMP
> > Jan 25 16:11:42.128528 [ 3208.423253] last sysfs file:
> > /sys/devices/virtual/net/eth0/bridge/topology_ch
> > Jan 25 16:11:42.128549 ange_detected
> > Jan 25 16:11:42.437508 [ 3208.423253] Modules linked in: [last unloaded:
> > scsi_wait_scan]
> > Jan 25 16:11:42.445513 [ 3208.423253]
> > Jan 25 16:11:42.488528 [ 3208.423253] Pid: 427, comm: kswapd0 Not tainted
> > (2.6.31.6 #1) To Be Filled By
> > Jan 25 16:11:42.488548  O.E.M.
> > Jan 25 16:11:42.664523 [ 3208.423253] EIP: 0061:[<c10231c1>] EFLAGS: 
> > 00010206
> > CPU: 1
> > Jan 25 16:11:42.788519 [ 3208.423253] EIP is at xen_set_pte+0x8c/0x96
> > Jan 25 16:11:42.885525 [ 3208.423253] EAX: c17f2d00 EBX: 0106a682 ECX:
> > 80000000 EDX: 80000000
> > Jan 25 16:11:43.032526 [ 3208.423253] ESI: 7cba0063 EDI: ffffff30 EBP:
> > f7249d9c ESP: f7249d88
> > Jan 25 16:11:43.173522 [ 3208.423253]  DS: 007b ES: 007b FS: 00d8 GS: 0000 
> > SS:
> > 0069
> > Jan 25 16:11:43.300528 [ 3208.423253] Process kswapd0 (pid: 427, ti=f7248000
> > task=f7109e00 task.ti=f724
> > Jan 25 16:11:43.300548 8000)
> > Jan 25 16:11:43.465514 [ 3208.423253] Stack:
> > Jan 25 16:11:43.669508 [ 3208.423253]  80000000 c17f2d00 80000000 000730d5
> > ffffff30 f7249dc4 c1046d12 7
> > Jan 25 16:11:43.685507 cba0063
> > Jan 25 16:11:43.836509 [ 3208.423253] <0> c1023e40 80000000 ffbff000 
> > 0000001a
> > c2ef1aa0 00000007 7cba006
> > Jan 25 16:11:43.869508 7 f7249ddc
> > Jan 25 16:11:44.020509 [ 3208.423253] <0> c1021fa8 00000163 80000000 
> > 08baa000
> > 00000000 f7249e08 c10c581
> > Jan 25 16:11:44.053508 9 c1022082
> > Jan 25 16:11:44.064515 [ 3208.423253] Call Trace:
> > Jan 25 16:11:44.124522 [ 3208.423253]  [<c1046d12>] ?
> > kmap_atomic_prot+0xf5/0x117
> > Jan 25 16:11:44.241518 [ 3208.423253]  [<c1023e40>] ? check_events+0x8/0xc
> > Jan 25 16:11:44.348523 [ 3208.423253]  [<c1021fa8>] ?
> > xen_kmap_atomic_pte+0x2f/0x36
> > Jan 25 16:11:44.469524 [ 3208.423253]  [<c10c5819>] ?
> > page_check_address+0xce/0x1c1
> > Jan 25 16:11:44.593522 [ 3208.423253]  [<c1022082>] ? xen_mc_issue+0x3f/0x42
> > Jan 25 16:11:44.705521 [ 3208.423253]  [<c10c59d1>] ?
> > page_referenced_one+0x4b/0x11b
> > Jan 25 16:11:44.836542 [ 3208.423253]  [<c10c67e2>] ?
> > page_referenced+0x8c/0x108
> > Jan 25 16:11:44.949524 [ 3208.423253]  [<c10b4034>] ?
> > shrink_active_list+0x16c/0x20e
> > Jan 25 16:11:45.080523 [ 3208.423253]  [<c10b4ed0>] ? 
> > shrink_zone+0x2b1/0x2c6
> > Jan 25 16:11:45.189520 [ 3208.423253]  [<c10b53e6>] ? kswapd+0x3d0/0x557
> > Jan 25 16:11:45.292524 [ 3208.423253]  [<c10b341c>] ?
> > isolate_pages_global+0x0/0x191
> > Jan 25 16:11:45.420524 [ 3208.423253]  [<c1069ae7>] ?
> > autoremove_wake_function+0x0/0x33
> > Jan 25 16:11:45.549520 [ 3208.423253]  [<c10b5016>] ? kswapd+0x0/0x557
> > Jan 25 16:11:45.648520 [ 3208.423253]  [<c1069840>] ? kthread+0x6e/0x73
> > Jan 25 16:11:45.745518 [ 3208.423253]  [<c10697d2>] ? kthread+0x0/0x73
> > Jan 25 16:11:45.848523 [ 3208.423253]  [<c1027bb7>] ?
> > kernel_thread_helper+0x7/0x10
> > Jan 25 16:11:46.120508 [ 3208.423253] Code: f3 ab c6 05 d8 73 7f c1 00 8b 1d
> > 38 73 7f c1 e8 d1 cf 01 00
> > Jan 25 16:11:46.280508  8b 55 ec 48 0f 94 c0 0f b6 c0 01 d8 a3 38 73 7f c1 
> > 8b
> > 45 f0 89 50 04 <89> 30 8d
> > Jan 25 16:11:46.400507  65 f4 5b 5e 5f 5d c3 55 89 e5 57 56 89 c6 53 89 d3 
> > 83
> > Jan 25 16:11:46.512513 [ 3208.423253] EIP: [<c10231c1>] 
> > xen_set_pte+0x8c/0x96
> > SS:ESP 0069:f7249d88
> > Jan 25 16:11:46.560516 [ 3208.423253] CR2: 00000000c17f2d00
> > Jan 25 16:11:46.637521 [ 3208.423253] ---[ end trace 133211fa84dd2ce5 ]---
> > Jan 25 16:11:46.744524 [ 3208.423253] note: kswapd0[427] exited with
> > preempt_count 1
> > 
> > _______________________________________________
> > Xen-devel mailing list
> > Xen-devel@xxxxxxxxxxxxxxxxxxx
> > http://lists.xensource.com/xen-devel
> 
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.