[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] 2.6.32.27 dom0 - BUG: unable to handle kernel paging request
On Thu, 2010-12-30 at 22:57 +0000, Christopher S. Aker wrote: > Xen: 3.4.4-rc1-pre 64bit (xenbits @ 19986) > Dom0: 2.6.32.27-1 PAE (xen/stable-2.6.32.x @ > 75cc13f5aa29b4f3227d269ca165dfa8937c94fe) > > We've been running our xen-thrash testsuite on a bunch of hosts against > a very recent build, and we've just hit this on one box: > > BUG: unable to handle kernel paging request at 15555d60 > IP: [<c1022781>] vmalloc_sync_all+0xd1/0x1f0 This looks similar to the issue which we thought was resolved via b2464c422fb44275deeb5770b668351860f68e0e. Can you convert 0xc10022781 to an exact line number? If you have a vmlinux with symbols then: $ gdb vmlinux (gdb) list *0xc10022781 should tell you the file and line. (gdb) disas 0xc10022781 might tell us something too. Ian. > *pdpt = 000000001d8ee027 *pde = 0000000000000000 > Oops: 0000 [#1] SMP > last sysfs file: /sys/devices/system/xen_memory/xen_memory0/info/current_kb > Modules linked in: dm_snapshot iTCO_wdt usbhid > Pid: 44, comm: xenwatch Not tainted (2.6.32.27-1 #1) X8DTU > EIP: 0061:[<c1022781>] EFLAGS: 00010007 CPU: 0 > EIP is at vmalloc_sync_all+0xd1/0x1f0 > EAX: 15555d60 EBX: c1a50c00 ECX: 55555001 EDX: 06855067 > ESI: c173ad60 EDI: dd8f85c4 EBP: 00000009 ESP: dfd7fe64 > DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0069 > Process xenwatch (pid: 44, ti=dfd7e000 task=dfce90f0 task.ti=dfd7e000) > Stack: > 00000018 0001fc55 00000000 c0000d60 f5800000 1fc55067 00000000 1fc55067 > <0> 00000000 c170025c dd2abe00 c898f180 dfd7ff20 c8a1171c c10829d0 c1081370 > <0> 00000000 00000000 c12bbbd6 c1006bf4 0000000d dfd7fee4 dd2a0200 00000008 > Call Trace: > [<c10829d0>] ? alloc_vm_area+0x40/0x60 > [<c1081370>] ? f+0x0/0x10 > [<c12bbbd6>] ? blkif_map+0x36/0x1c0 > [<c1006bf4>] ? check_events+0x8/0xc > [<c12b2b0f>] ? xenbus_gather+0x5f/0x90 > [<c12bb36c>] ? frontend_changed+0x25c/0x2d0 > [<c12b36c5>] ? xenbus_otherend_changed+0x95/0xa0 > [<c12b38bf>] ? frontend_changed+0xf/0x20 > [<c12b1f57>] ? xenwatch_thread+0x87/0x130 > [<c1048700>] ? autoremove_wake_function+0x0/0x40 > [<c12b1ed0>] ? xenwatch_thread+0x0/0x130 > [<c10484e4>] ? kthread+0x74/0x80 > [<c1048470>] ? kthread+0x0/0x80 > [<c1009e67>] ? kernel_thread_helper+0x7/0x10 > Code: 04 8b 45 00 ff 15 14 2e 65 c1 8b 54 24 0c 25 00 f0 ff ff 8d 34 10 > 8b 16 8b 6e 04 f6 c2 01 74 7d 89 c8 25 00 f0 ff ff 03 44 24 0c <8b> 08 > 89 4c 24 04 8b 48 04 f6 44 24 04 01 75 67 89 e9 e8 18 32 > EIP: [<c1022781>] vmalloc_sync_all+0xd1/0x1f0 SS:ESP 0069:dfd7fe64 > CR2: 0000000015555d60 > ---[ end trace 7a29128cd8a0e564 ]--- > > And then a whole load of soft lockup traces. Full output, hypervisor, > and dom0 kernel are in here: > > http://theshore.net/~caker/xen/BUGS/2.6.32.27/ > > -Chris > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |