From mboxrd@z Thu Jan 1 00:00:00 1970 From: Konrad Rzeszutek Wilk Subject: Re: Re: 2.6.37-rc1 mainline domU - BUG: unable to handle kernel paging request Date: Thu, 11 Nov 2010 11:09:24 -0500 Message-ID: <20101111160924.GA28059@dumpdata.com> References: <692381.74198.qm@web56104.mail.re3.yahoo.com> <781150.48622.qm@web56104.mail.re3.yahoo.com> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable Return-path: Content-Disposition: inline In-Reply-To: <781150.48622.qm@web56104.mail.re3.yahoo.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Boris Derzhavets Cc: Jeremy Fitzhardinge , xen-devel@lists.xensource.com, Bruce Edge List-Id: xen-devel@lists.xenproject.org On Thu, Nov 11, 2010 at 04:08:03AM -0800, Boris Derzhavets wrote: > Now reproduced :- >=20 > root@boris-HVM-domU:~# scp=A0 1.log 192.168.1.12:/home/boris/ubuntu > BUG: unable to handle kernel paging request at ffff88000e676930 > IP: [] xen_set_pmd+0x24/0x44 > PGD 1a04067 PUD 1a08067 PMD ee73067 PTE 801000000e676065 > Oops: 0003 [#1] SMP=20 > last sysfs file: /sys/devices/virtual/bdi/0:22/uevent > CPU 0=20 > Modules linked in: nfs fscache parport_pc ppdev nfsd lockd nfs_acl auth= _rpcgss sunrpc exportfs ipv6 lp parport >=20 > Pid: 3534, comm: scp Not tainted 2.6.37-rc1 #1 / Yikes. So no PCI passthrough, just a normal PV DomU. Boris, what version of Linux kernel worked for you as PV DomU? 2.6.36? 2.= 6.35? > RIP: e030:[]=A0 [] xen_set_pmd+0x24= /0x44 > RSP: e02b:ffff88006e697b18=A0 EFLAGS: 00010246 > RAX: 0000000000000000 RBX: ffff88000e676930 RCX: ffffc00000000f98 > RDX: ffffea0000000000 RSI: 0000000000000000 RDI: ffff88000e676930 > RBP: ffff88006e697b28 R08: 00007fff9d120000 R09: ffff88007ffc80a0 > R10: 0000000000000000 R11: ffff88006e697ae8 R12: 0000000000000000 > R13: ffff88007ffcb140 R14: ffff88000e676930 R15: ffff88006f08d7f8 > FS:=A0 00007fa525896700(0000) GS:ffff88007ffbd000(0000) knlGS:000000000= 0000000 > CS:=A0 e033 DS: 0000 ES: 0000 CR0: 000000008005003b > CR2: ffff88000e676930 CR3: 0000000077b0f000 CR4: 0000000000002660 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > Process scp (pid: 3534, threadinfo ffff88006e696000, task ffff88007a32c= 2c0) > Stack: > =A000007fa524e00000 00007fa525b37000 ffff88006e697be8 ffffffff810dc4a4 > =A0ffff88007a26ac88 ffff88006e690298 ffff88007a26ac78 00007fa524a00000 > =A000007f8000000000 00007fff80000000 00007fa525b36fff 00007fa525b36fff > Call Trace: > =A0[] free_pgd_range+0x213/0x397 > =A0[] free_pgtables+0xa4/0xc7 > =A0[] exit_mmap+0xf2/0x12a > =A0[] mmput+0x5e/0xd1 > =A0[] flush_old_exec+0x526/0x600 > =A0[] load_elf_binary+0x2dc/0x1752 > =A0[] ? load_misc_binary+0x6e/0x367 > =A0[] ? ima_must_measure+0x21/0x2b > =A0[] ? process_measurement+0x56/0xe4 > =A0[] search_binary_handler+0xbb/0x24d > =A0[] ? load_elf_binary+0x0/0x1752 > =A0[] do_execve+0x1c1/0x2ae > =A0[] sys_execve+0x3e/0x55 > =A0[] stub_execve+0x6c/0xc0 > Code: 48 83 c4 18 5b c9 c3 55 48 89 e5 41 54 49 89 f4 53 48 89 fb e8 b5= e4 ff ff 48 89 df ff 05 3e 55 c3 00 e8 d5 dd ff ff 84 c0 75 05 <4c> 89 2= 3 eb 16 e8 99 e4 ff ff 4c 89 e6 48 89 df ff 05 23 55 c3=20 > RIP=A0 [] xen_set_pmd+0x24/0x44 > =A0RSP > CR2: ffff88000e676930 > ---[ end trace 073da74f4ce02315 ]--- > lost connection