[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] pvops-2.6.32 - reserved bit in page table


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: Bastian Blank <waldi@xxxxxxxxxx>
  • Date: Wed, 24 Mar 2010 13:50:28 +0100
  • Delivery-date: Wed, 24 Mar 2010 05:51:13 -0700
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hi

After I got the HP machine running, the next step was to try it on my
old workstation again. It crashs with 
| reserved bit in page table (ec=000B)

The kernel is 2.6.32 derived from the xen/stable-2.6.32.y branch. Xen is 
3.4.3-rc3.

(XEN) Xen version 3.4 (Debian 3.4.3~rc3-1) (waldi@xxxxxxxxxx) (gcc version 
4.4.3 (Debian 4.4.3-3) ) Mon Mar  1 22:03:27 UTC 2010
(XEN) Console output is synchronous.
(XEN) Command line: sync_console console=com1 com1=9600,8n1 noreboot
(XEN) Video information:
(XEN)  VGA is text mode 80x25, font 8x16
(XEN)  VBE/DDC methods: V2; EDID transfer time: 1 seconds
(XEN) Disc information:
(XEN)  Found 1 MBR signatures
(XEN)  Found 1 EDD information structures
(XEN) Xen-e820 RAM map:
(XEN)  0000000000000000 - 000000000009fc00 (usable)
(XEN)  000000000009fc00 - 00000000000a0000 (reserved)
(XEN)  00000000000ca000 - 00000000000ce000 (reserved)
(XEN)  00000000000f0000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 000000001fff0000 (usable)
(XEN)  000000001fff0000 - 000000001fff8000 (ACPI data)
(XEN)  000000001fff8000 - 0000000020000000 (ACPI NVS)
(XEN)  00000000fec00000 - 00000000fec01000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000fff80000 - 0000000100000000 (reserved)
(XEN) System RAM: 511MB (523836kB)
(XEN) ACPI: RSDP 000FABB0, 0014 (r0 AMI   )
(XEN) ACPI: RSDT 1FFF0000, 002C (r1 AMIINT VIA_K7         11 MSFT       97)
(XEN) ACPI: FACP 1FFF0030, 0074 (r1 AMIINT VIA_K7         11 MSFT       97)
(XEN) ACPI: DSDT 1FFF0110, 298C (r1    VIA   VIA_K7     1000 MSFT  100000D)
(XEN) ACPI: FACS 1FFF8000, 0040
(XEN) ACPI: APIC 1FFF00B0, 0054 (r1 AMIINT                 9 MSFT       97)
(XEN) Xen heap: 9MB (9856kB)
(XEN) Domain heap initialised
(XEN) Processor #0 6:4 APIC version 16
(XEN) IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Detected 1303.014 MHz processor.
(XEN) CPU0: AMD Athlon(tm) Processor stepping 04
(XEN) Total of 1 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using new ACK method
(XEN) Platform timer is 3.579MHz ACPI PM Timer
(XEN) Brought up 1 CPUs
(XEN) I/O virtualisation disabled
(XEN) Brought up 1 CPUs
(XEN) I/O virtualisation disabled
(XEN) CPUIDLE: disabled due to no HPET. Force enable with 'cpuidle'.
(XEN) *** LOADING DOMAIN 0 ***
(XEN)  Xen  kernel: 32-bit, PAE, lsb
(XEN)  Dom0 kernel: 32-bit, PAE, lsb, paddr 0x1000000 -> 0x1649000
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   0000000018000000->000000001c000000 (102401 pages to be 
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: c1000000->c1649000
(XEN)  Init. ramdisk: c1649000->c2ae2200
(XEN)  Phys-Mach map: c2ae3000->c2b57004
(XEN)  Start info:    c2b58000->c2b5847c
(XEN)  Page tables:   c2b59000->c2b74000
(XEN)  Boot stack:    c2b74000->c2b75000
(XEN)  TOTAL:         c0000000->c2c00000
(XEN)  ENTRY ADDRESS: c13ef000
(XEN) Dom0 has maximum 1 VCPUs
(XEN) Scrubbing Free RAM: done.
(XEN) Xen trace buffers: disabled
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) **********************************************
(XEN) ******* WARNING: CONSOLE OUTPUT IS SYNCHRONOUS
(XEN) ******* This option is intended to aid debugging of Xen by ensuring
(XEN) ******* that all output is synchronously delivered on the serial line.
(XEN) ******* However it can introduce SIGNIFICANT latencies and affect
(XEN) ******* timekeeping. It is NOT recommended for production use!
(XEN) **********************************************
(XEN) 3... 2... 1...
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen)
(XEN) Freed 120kB init memory.
mapping kernel into physical memory
Xen: setup ISA identity maps
about to get started...
(XEN) d0:v0: unhandled page fault (ec=000B)
(XEN) Pagetable walk from c2b73b98:
(XEN)  L3[0x003] = 0000000019466001 00001466
(XEN)  L2[0x015] = 000000001ab73067 00002b73
(XEN)  L1[0x173] = 000007ff1ab73021 ffffffff
(XEN) d0:v0: reserved bit in page table (ec=000B)
(XEN) Pagetable walk from c2b73b98:
(XEN)  L3[0x003] = 0000000019466001 00001466
(XEN)  L2[0x015] = 000000001ab73067 00002b73
(XEN)  L1[0x173] = 000007ff1ab73021 ffffffff
(XEN) ----[ Xen-3.4  x86_32p  debug=n  Tainted:    C ]----
(XEN) CPU:    0
(XEN) EIP:    e019:[<c1005903>]
(XEN) EFLAGS: 00010246   EM: 1   CONTEXT: pv guest
(XEN) eax: 00000000   ebx: fffff001   ecx: 000007ff   edx: 00000000
(XEN) esi: c2b73b98   edi: 000007ff   ebp: 00002b73   esp: c1377e68
(XEN) cr0: 8005003b   cr4: 000002f0   cr3: 19379000   cr2: c2b73b98
(XEN) ds: e021   es: e021   fs: 00d8   gs: 00e0   ss: e021   cs: e019
(XEN) Guest stack trace from esp=c1377e68:
(XEN)   d0:v0: reserved bit in page table (ec=0009)
(XEN) Pagetable walk from c1377e68:
(XEN)  L3[0x003] = 0000000019466001 00001466
(XEN)  L2[0x009] = 000000001ab67067 00002b67
(XEN)  L1[0x177] = 000007fffffff003 ffffffff
(XEN) ----[ Xen-3.4  x86_32p  debug=n  Tainted:    C ]----
(XEN) CPU:    0
(XEN) EIP:    e008:[<ff1529f0>] show_guest_stack+0x60/0x160
(XEN) EFLAGS: 00010246   CONTEXT: hypervisor
(XEN) eax: 00000000   ebx: c1377e68   ecx: 00000000   edx: 00000000
(XEN) esi: 00000014   edi: ffbf4000   ebp: 00000000   esp: ff223f20
(XEN) cr0: 8005003b   cr4: 000002f0   cr3: 19379000   cr2: c1377e68
(XEN) ds: e010   es: e010   fs: 00d8   gs: 00e0   ss: e010   cs: e008
(XEN) Xen stack trace from esp=ff223f20:
(XEN)    ff1cc108 c1377e68 00000000 ff153860 ff223fb4 ffbf4000 00000000 c2b73b98
(XEN)    ff223fb4 ffbf4000 00000000 ff1538c5 ff223fb4 00000000 00000000 0000000b
(XEN)    c2b73b9c ff223fb4 c2b73b98 ff155fcb c2b73b98 0000000b ff223fb4 c1c5d3f5
(XEN)    00000000 ffffffff ff223fb4 0000000b ff11726a 00000000 ff1b26a4 ffbe0000
(XEN)    0000e021 0000e021 00002b73 ff1b29e3 ff223fb4 fffff001 000007ff 00000000
(XEN)    c2b73b98 000007ff 00002b73 00000000 000e000b c1005903 0000e019 00010246
(XEN)    c1377e68 0000e021 0000e021 0000e021 000000d8 000000e0 00000000 ffbe0000
(XEN) Xen call trace:
(XEN)    [<ff1529f0>] show_guest_stack+0x60/0x160
(XEN)    [<ff153860>] show_execution_state+0x10/0x20
(XEN)    [<ff1538c5>] reserved_bit_page_fault+0x55/0x70
(XEN)    [<ff155fcb>] do_page_fault+0x10b/0x330
(XEN)    [<ff11726a>] __do_softirq+0x4a/0x70
(XEN)    [<ff1b26a4>] hypercall+0x94/0x9b
(XEN)    [<ff1b29e3>] handle_exception+0x73/0xa7
(XEN)
(XEN) Fault while accessing guest memory.
(XEN) d0:v0: reserved bit in page table (ec=000B)
(XEN) Pagetable walk from c1377e5c:
(XEN)  L3[0x003] = 0000000019466001 00001466
(XEN)  L2[0x009] = 000000001ab67067 00002b67
(XEN)  L1[0x177] = 000007fffffff003 ffffffff
(XEN) ----[ Xen-3.4  x86_32p  debug=n  Tainted:    C ]----
(XEN) CPU:    0
(XEN) EIP:    e008:[<ff1b2825>] ring1+0x12/0xde
(XEN) EFLAGS: 00010296   CONTEXT: hypervisor
(XEN) eax: c1005903   ebx: ffbe0000   ecx: 00010203   edx: ffbe0cf4
(XEN) esi: c1377e5c   edi: 0000e021   ebp: 00002b73   esp: ff223fb0
(XEN) cr0: 8005003b   cr4: 000002f0   cr3: 19379000   cr2: c1377e5c
(XEN) ds: e010   es: e010   fs: 00d8   gs: e021   ss: e010   cs: e008
(XEN) Xen stack trace from esp=ff223fb0:
(XEN)    ff1b2a0e fffff001 000007ff 00000000 c2b73b98 000007ff 00002b73 00000000
(XEN)    000e000b c1005903 0000e019 00010246 c1377e68 0000e021 0000e021 0000e021
(XEN)    000000d8 000000e0 00000000 ffbe0000
(XEN) Xen call trace:
(XEN)    [<ff1b2825>] ring1+0x12/0xde
(XEN)    [<ff1b2a0e>] handle_exception+0x9e/0xa7
(XEN)
(XEN) domain_crash_sync called from entry.S (ff1b2a0e)
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-3.4  x86_32p  debug=n  Tainted:    C ]----
(XEN) CPU:    0
(XEN) EIP:    e019:[<c1005903>]
(XEN) EFLAGS: 00010246   EM: 1   CONTEXT: pv guest
(XEN) eax: 00000000   ebx: fffff001   ecx: 000007ff   edx: 00000000
(XEN) esi: c2b73b98   edi: 000007ff   ebp: 00002b73   esp: c1377e68
(XEN) cr0: 8005003b   cr4: 000002f0   cr3: 19379000   cr2: c2b73b98
(XEN) ds: e021   es: e021   fs: 00d8   gs: 00e0   ss: e021   cs: e019
(XEN) Guest stack trace from esp=c1377e68:
(XEN)   d0:v0: reserved bit in page table (ec=0009)
(XEN) Pagetable walk from c1377e68:
(XEN)  L3[0x003] = 0000000019466001 00001466
(XEN)  L2[0x009] = 000000001ab67067 00002b67
(XEN)  L1[0x177] = 000007fffffff003 ffffffff
(XEN) ----[ Xen-3.4  x86_32p  debug=n  Tainted:    C ]----
(XEN) CPU:    0
(XEN) EIP:    e008:[<ff1529f0>] show_guest_stack+0x60/0x160
(XEN) EFLAGS: 00010246   CONTEXT: hypervisor
(XEN) eax: 00000000   ebx: c1377e68   ecx: 00000000   edx: 00000000
(XEN) esi: 00000014   edi: 0000e021   ebp: 00002b73   esp: ff223f40
(XEN) cr0: 8005003b   cr4: 000002f0   cr3: 19379000   cr2: c1377e68
(XEN) ds: e010   es: e010   fs: 00d8   gs: e021   ss: e010   cs: e008
(XEN) Xen stack trace from esp=ff223f40:
(XEN)    ff1cc108 c1377e68 00002b73 ff153860 ff223fb4 00000000 00000000 ffbf4000
(XEN)    ff223fb4 0000e021 00002b73 ff104beb ff223fb4 00000000 00000000 00000000
(XEN)    0000000a ff223fb4 ff200020 ff104c15 ffbf4000 0000e021 ff235d91 ffbe0000
(XEN)    c1377e5c ffbe0000 c1377e5c ff1b28f1 ff1b2a0e fffff001 000007ff 00000000
(XEN)    c2b73b98 000007ff 00002b73 00000000 000e000b c1005903 0000e019 00010246
(XEN)    c1377e68 0000e021 0000e021 0000e021 000000d8 000000e0 00000000 ffbe0000
(XEN) Xen call trace:
(XEN)    [<ff1529f0>] show_guest_stack+0x60/0x160
(XEN)    [<ff153860>] show_execution_state+0x10/0x20
(XEN)    [<ff104beb>] __domain_crash+0x9b/0xa0
(XEN)    [<ff104c15>] __domain_crash_synchronous+0x25/0x80
(XEN)    [<ff1b28f1>] domain_crash_synchronous_string+0x0/0x2d
(XEN)    [<ff1b2a0e>] handle_exception+0x9e/0xa7
(XEN)
(XEN) Fault while accessing guest memory.
(XEN) Domain 0 crashed: 'noreboot' set - not rebooting.
-- 
She won' go Warp 7, Cap'n!  The batteries are dead!

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.