[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] pvops-2.6.32 - reserved bit in page table
Hi After I got the HP machine running, the next step was to try it on my old workstation again. It crashs with | reserved bit in page table (ec=000B) The kernel is 2.6.32 derived from the xen/stable-2.6.32.y branch. Xen is 3.4.3-rc3. (XEN) Xen version 3.4 (Debian 3.4.3~rc3-1) (waldi@xxxxxxxxxx) (gcc version 4.4.3 (Debian 4.4.3-3) ) Mon Mar 1 22:03:27 UTC 2010 (XEN) Console output is synchronous. (XEN) Command line: sync_console console=com1 com1=9600,8n1 noreboot (XEN) Video information: (XEN) VGA is text mode 80x25, font 8x16 (XEN) VBE/DDC methods: V2; EDID transfer time: 1 seconds (XEN) Disc information: (XEN) Found 1 MBR signatures (XEN) Found 1 EDD information structures (XEN) Xen-e820 RAM map: (XEN) 0000000000000000 - 000000000009fc00 (usable) (XEN) 000000000009fc00 - 00000000000a0000 (reserved) (XEN) 00000000000ca000 - 00000000000ce000 (reserved) (XEN) 00000000000f0000 - 0000000000100000 (reserved) (XEN) 0000000000100000 - 000000001fff0000 (usable) (XEN) 000000001fff0000 - 000000001fff8000 (ACPI data) (XEN) 000000001fff8000 - 0000000020000000 (ACPI NVS) (XEN) 00000000fec00000 - 00000000fec01000 (reserved) (XEN) 00000000fee00000 - 00000000fee01000 (reserved) (XEN) 00000000fff80000 - 0000000100000000 (reserved) (XEN) System RAM: 511MB (523836kB) (XEN) ACPI: RSDP 000FABB0, 0014 (r0 AMI ) (XEN) ACPI: RSDT 1FFF0000, 002C (r1 AMIINT VIA_K7 11 MSFT 97) (XEN) ACPI: FACP 1FFF0030, 0074 (r1 AMIINT VIA_K7 11 MSFT 97) (XEN) ACPI: DSDT 1FFF0110, 298C (r1 VIA VIA_K7 1000 MSFT 100000D) (XEN) ACPI: FACS 1FFF8000, 0040 (XEN) ACPI: APIC 1FFF00B0, 0054 (r1 AMIINT 9 MSFT 97) (XEN) Xen heap: 9MB (9856kB) (XEN) Domain heap initialised (XEN) Processor #0 6:4 APIC version 16 (XEN) IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 (XEN) Enabling APIC mode: Flat. Using 1 I/O APICs (XEN) Using scheduler: SMP Credit Scheduler (credit) (XEN) Detected 1303.014 MHz processor. (XEN) CPU0: AMD Athlon(tm) Processor stepping 04 (XEN) Total of 1 processors activated. (XEN) ENABLING IO-APIC IRQs (XEN) -> Using new ACK method (XEN) Platform timer is 3.579MHz ACPI PM Timer (XEN) Brought up 1 CPUs (XEN) I/O virtualisation disabled (XEN) Brought up 1 CPUs (XEN) I/O virtualisation disabled (XEN) CPUIDLE: disabled due to no HPET. Force enable with 'cpuidle'. (XEN) *** LOADING DOMAIN 0 *** (XEN) Xen kernel: 32-bit, PAE, lsb (XEN) Dom0 kernel: 32-bit, PAE, lsb, paddr 0x1000000 -> 0x1649000 (XEN) PHYSICAL MEMORY ARRANGEMENT: (XEN) Dom0 alloc.: 0000000018000000->000000001c000000 (102401 pages to be allocated) (XEN) VIRTUAL MEMORY ARRANGEMENT: (XEN) Loaded kernel: c1000000->c1649000 (XEN) Init. ramdisk: c1649000->c2ae2200 (XEN) Phys-Mach map: c2ae3000->c2b57004 (XEN) Start info: c2b58000->c2b5847c (XEN) Page tables: c2b59000->c2b74000 (XEN) Boot stack: c2b74000->c2b75000 (XEN) TOTAL: c0000000->c2c00000 (XEN) ENTRY ADDRESS: c13ef000 (XEN) Dom0 has maximum 1 VCPUs (XEN) Scrubbing Free RAM: done. (XEN) Xen trace buffers: disabled (XEN) Std. Loglevel: Errors and warnings (XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) (XEN) ********************************************** (XEN) ******* WARNING: CONSOLE OUTPUT IS SYNCHRONOUS (XEN) ******* This option is intended to aid debugging of Xen by ensuring (XEN) ******* that all output is synchronously delivered on the serial line. (XEN) ******* However it can introduce SIGNIFICANT latencies and affect (XEN) ******* timekeeping. It is NOT recommended for production use! (XEN) ********************************************** (XEN) 3... 2... 1... (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen) (XEN) Freed 120kB init memory. mapping kernel into physical memory Xen: setup ISA identity maps about to get started... (XEN) d0:v0: unhandled page fault (ec=000B) (XEN) Pagetable walk from c2b73b98: (XEN) L3[0x003] = 0000000019466001 00001466 (XEN) L2[0x015] = 000000001ab73067 00002b73 (XEN) L1[0x173] = 000007ff1ab73021 ffffffff (XEN) d0:v0: reserved bit in page table (ec=000B) (XEN) Pagetable walk from c2b73b98: (XEN) L3[0x003] = 0000000019466001 00001466 (XEN) L2[0x015] = 000000001ab73067 00002b73 (XEN) L1[0x173] = 000007ff1ab73021 ffffffff (XEN) ----[ Xen-3.4 x86_32p debug=n Tainted: C ]---- (XEN) CPU: 0 (XEN) EIP: e019:[<c1005903>] (XEN) EFLAGS: 00010246 EM: 1 CONTEXT: pv guest (XEN) eax: 00000000 ebx: fffff001 ecx: 000007ff edx: 00000000 (XEN) esi: c2b73b98 edi: 000007ff ebp: 00002b73 esp: c1377e68 (XEN) cr0: 8005003b cr4: 000002f0 cr3: 19379000 cr2: c2b73b98 (XEN) ds: e021 es: e021 fs: 00d8 gs: 00e0 ss: e021 cs: e019 (XEN) Guest stack trace from esp=c1377e68: (XEN) d0:v0: reserved bit in page table (ec=0009) (XEN) Pagetable walk from c1377e68: (XEN) L3[0x003] = 0000000019466001 00001466 (XEN) L2[0x009] = 000000001ab67067 00002b67 (XEN) L1[0x177] = 000007fffffff003 ffffffff (XEN) ----[ Xen-3.4 x86_32p debug=n Tainted: C ]---- (XEN) CPU: 0 (XEN) EIP: e008:[<ff1529f0>] show_guest_stack+0x60/0x160 (XEN) EFLAGS: 00010246 CONTEXT: hypervisor (XEN) eax: 00000000 ebx: c1377e68 ecx: 00000000 edx: 00000000 (XEN) esi: 00000014 edi: ffbf4000 ebp: 00000000 esp: ff223f20 (XEN) cr0: 8005003b cr4: 000002f0 cr3: 19379000 cr2: c1377e68 (XEN) ds: e010 es: e010 fs: 00d8 gs: 00e0 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ff223f20: (XEN) ff1cc108 c1377e68 00000000 ff153860 ff223fb4 ffbf4000 00000000 c2b73b98 (XEN) ff223fb4 ffbf4000 00000000 ff1538c5 ff223fb4 00000000 00000000 0000000b (XEN) c2b73b9c ff223fb4 c2b73b98 ff155fcb c2b73b98 0000000b ff223fb4 c1c5d3f5 (XEN) 00000000 ffffffff ff223fb4 0000000b ff11726a 00000000 ff1b26a4 ffbe0000 (XEN) 0000e021 0000e021 00002b73 ff1b29e3 ff223fb4 fffff001 000007ff 00000000 (XEN) c2b73b98 000007ff 00002b73 00000000 000e000b c1005903 0000e019 00010246 (XEN) c1377e68 0000e021 0000e021 0000e021 000000d8 000000e0 00000000 ffbe0000 (XEN) Xen call trace: (XEN) [<ff1529f0>] show_guest_stack+0x60/0x160 (XEN) [<ff153860>] show_execution_state+0x10/0x20 (XEN) [<ff1538c5>] reserved_bit_page_fault+0x55/0x70 (XEN) [<ff155fcb>] do_page_fault+0x10b/0x330 (XEN) [<ff11726a>] __do_softirq+0x4a/0x70 (XEN) [<ff1b26a4>] hypercall+0x94/0x9b (XEN) [<ff1b29e3>] handle_exception+0x73/0xa7 (XEN) (XEN) Fault while accessing guest memory. (XEN) d0:v0: reserved bit in page table (ec=000B) (XEN) Pagetable walk from c1377e5c: (XEN) L3[0x003] = 0000000019466001 00001466 (XEN) L2[0x009] = 000000001ab67067 00002b67 (XEN) L1[0x177] = 000007fffffff003 ffffffff (XEN) ----[ Xen-3.4 x86_32p debug=n Tainted: C ]---- (XEN) CPU: 0 (XEN) EIP: e008:[<ff1b2825>] ring1+0x12/0xde (XEN) EFLAGS: 00010296 CONTEXT: hypervisor (XEN) eax: c1005903 ebx: ffbe0000 ecx: 00010203 edx: ffbe0cf4 (XEN) esi: c1377e5c edi: 0000e021 ebp: 00002b73 esp: ff223fb0 (XEN) cr0: 8005003b cr4: 000002f0 cr3: 19379000 cr2: c1377e5c (XEN) ds: e010 es: e010 fs: 00d8 gs: e021 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ff223fb0: (XEN) ff1b2a0e fffff001 000007ff 00000000 c2b73b98 000007ff 00002b73 00000000 (XEN) 000e000b c1005903 0000e019 00010246 c1377e68 0000e021 0000e021 0000e021 (XEN) 000000d8 000000e0 00000000 ffbe0000 (XEN) Xen call trace: (XEN) [<ff1b2825>] ring1+0x12/0xde (XEN) [<ff1b2a0e>] handle_exception+0x9e/0xa7 (XEN) (XEN) domain_crash_sync called from entry.S (ff1b2a0e) (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN) ----[ Xen-3.4 x86_32p debug=n Tainted: C ]---- (XEN) CPU: 0 (XEN) EIP: e019:[<c1005903>] (XEN) EFLAGS: 00010246 EM: 1 CONTEXT: pv guest (XEN) eax: 00000000 ebx: fffff001 ecx: 000007ff edx: 00000000 (XEN) esi: c2b73b98 edi: 000007ff ebp: 00002b73 esp: c1377e68 (XEN) cr0: 8005003b cr4: 000002f0 cr3: 19379000 cr2: c2b73b98 (XEN) ds: e021 es: e021 fs: 00d8 gs: 00e0 ss: e021 cs: e019 (XEN) Guest stack trace from esp=c1377e68: (XEN) d0:v0: reserved bit in page table (ec=0009) (XEN) Pagetable walk from c1377e68: (XEN) L3[0x003] = 0000000019466001 00001466 (XEN) L2[0x009] = 000000001ab67067 00002b67 (XEN) L1[0x177] = 000007fffffff003 ffffffff (XEN) ----[ Xen-3.4 x86_32p debug=n Tainted: C ]---- (XEN) CPU: 0 (XEN) EIP: e008:[<ff1529f0>] show_guest_stack+0x60/0x160 (XEN) EFLAGS: 00010246 CONTEXT: hypervisor (XEN) eax: 00000000 ebx: c1377e68 ecx: 00000000 edx: 00000000 (XEN) esi: 00000014 edi: 0000e021 ebp: 00002b73 esp: ff223f40 (XEN) cr0: 8005003b cr4: 000002f0 cr3: 19379000 cr2: c1377e68 (XEN) ds: e010 es: e010 fs: 00d8 gs: e021 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ff223f40: (XEN) ff1cc108 c1377e68 00002b73 ff153860 ff223fb4 00000000 00000000 ffbf4000 (XEN) ff223fb4 0000e021 00002b73 ff104beb ff223fb4 00000000 00000000 00000000 (XEN) 0000000a ff223fb4 ff200020 ff104c15 ffbf4000 0000e021 ff235d91 ffbe0000 (XEN) c1377e5c ffbe0000 c1377e5c ff1b28f1 ff1b2a0e fffff001 000007ff 00000000 (XEN) c2b73b98 000007ff 00002b73 00000000 000e000b c1005903 0000e019 00010246 (XEN) c1377e68 0000e021 0000e021 0000e021 000000d8 000000e0 00000000 ffbe0000 (XEN) Xen call trace: (XEN) [<ff1529f0>] show_guest_stack+0x60/0x160 (XEN) [<ff153860>] show_execution_state+0x10/0x20 (XEN) [<ff104beb>] __domain_crash+0x9b/0xa0 (XEN) [<ff104c15>] __domain_crash_synchronous+0x25/0x80 (XEN) [<ff1b28f1>] domain_crash_synchronous_string+0x0/0x2d (XEN) [<ff1b2a0e>] handle_exception+0x9e/0xa7 (XEN) (XEN) Fault while accessing guest memory. (XEN) Domain 0 crashed: 'noreboot' set - not rebooting. -- She won' go Warp 7, Cap'n! The batteries are dead! _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |