Krisztian PIFKO
2005-Oct-11 16:50 UTC
[Xen-users] kernel paging request errors on dom0 with 2.0.7
hi, 2 or 3 times a day i get "Unable to handle kernel paging request" errors (see the log below) caused by cron jobs on the privileged domain (tipically mrtg, logcheck, and a script using rrdtool), but never on the unprivileged domains. the memory modules are fine according to memtest86+ and the machine has no load. domain 0 has 256M of ram, the swap is free and the free ram is 7M, 93M for buffers, and 22M is cached. i''m using Xen 2.0.7 on Debian testing. i''ve seen the same error reported on xen-devel last year, but the root of the problem seems to be different. any suggestions? thanks in advance, Krisztian PIFKO> Oct 11 00:02:05 toxic0 kernel: Unable to handle kernel paging request at virtual address cb93a000 > Oct 11 00:02:05 toxic0 kernel: printing eip: > Oct 11 00:02:05 toxic0 kernel: c013f0e1 > Oct 11 00:02:05 toxic0 kernel: *pde = ma 0102c067 pa 0002c067 > Oct 11 00:02:05 toxic0 kernel: *pte = ma 0c93a063 pa 0b93a063 > Oct 11 00:02:05 toxic0 kernel: [zap_pmd_range+85/116] zap_pmd_range+0x55/0x74 > Oct 11 00:02:05 toxic0 kernel: [zap_pud_range+55/92] zap_pud_range+0x37/0x5c > Oct 11 00:02:05 toxic0 kernel: [unmap_page_range+120/149] unmap_page_range+0x78/0x95 > Oct 11 00:02:05 toxic0 kernel: [unmap_vmas+236/541] unmap_vmas+0xec/0x21d > Oct 11 00:02:05 toxic0 kernel: [exit_mmap+141/367] exit_mmap+0x8d/0x16f > Oct 11 00:02:05 toxic0 kernel: [mmput+40/142] mmput+0x28/0x8e > Oct 11 00:02:05 toxic0 kernel: [exec_mmap+212/316] exec_mmap+0xd4/0x13c > Oct 11 00:02:05 toxic0 kernel: [flush_old_exec+116/2325] flush_old_exec+0x74/0x915 > Oct 11 00:02:05 toxic0 kernel: [vfs_read+178/279] vfs_read+0xb2/0x117 > Oct 11 00:02:05 toxic0 kernel: [kernel_read+74/83] kernel_read+0x4a/0x53 > Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+593/3400] load_elf_binary+0x251/0xd48 > Oct 11 00:02:05 toxic0 kernel: [__do_softirq+82/178] __do_softirq+0x52/0xb2 > Oct 11 00:02:05 toxic0 kernel: [irq_exit+54/56] irq_exit+0x36/0x38 > Oct 11 00:02:05 toxic0 kernel: [do_IRQ+30/36] do_IRQ+0x1e/0x24 > Oct 11 00:02:05 toxic0 kernel: [evtchn_do_upcall+81/132] evtchn_do_upcall+0x51/0x84 > Oct 11 00:02:05 toxic0 kernel: [hypervisor_callback+55/64] hypervisor_callback+0x37/0x40 > Oct 11 00:02:05 toxic0 kernel: [strnlen_user+44/63] strnlen_user+0x2c/0x3f > Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+0/3400] load_elf_binary+0x0/0xd48 > Oct 11 00:02:05 toxic0 kernel: [search_binary_handler+100/338] search_binary_handler+0x64/0x152 > Oct 11 00:02:05 toxic0 kernel: [do_execve+388/527] do_execve+0x184/0x20f > Oct 11 00:02:05 toxic0 kernel: [sys_execve+61/136] sys_execve+0x3d/0x88 > Oct 11 00:02:05 toxic0 kernel: [syscall_call+7/11] syscall_call+0x7/0xb > Oct 11 00:02:05 toxic0 kernel: Oops: 0003 [#13] > Oct 11 00:02:05 toxic0 kernel: PREEMPT > Oct 11 00:02:05 toxic0 kernel: CPU: 0 > Oct 11 00:02:05 toxic0 kernel: EIP: 0061:[zap_pte_range+271/688] Not tainted VLI > Oct 11 00:02:05 toxic0 kernel: EFLAGS: 00011206 (2.6.11.12-xen0) > Oct 11 00:02:05 toxic0 kernel: EIP is at zap_pte_range+0x10f/0x2b0 > Oct 11 00:02:05 toxic0 kernel: eax: 00000000 ebx: c106ae40 ecx: 00003572 edx: 04572065 > Oct 11 00:02:05 toxic0 kernel: esi: 04572065 edi: cb93a000 ebp: 00000000 esp: cc57bcfc > Oct 11 00:02:05 toxic0 kernel: ds: 007b es: 007b ss: 0069 > Oct 11 00:02:05 toxic0 kernel: Process logcheck (pid: 18315, threadinfo=cc57a000 task=cee42a00) > Oct 11 00:02:05 toxic0 kernel: Stack: c11f0c00 00000000 00000008 00000000 b8000000 c0441e70 00000000 00002000 > Oct 11 00:02:05 toxic0 kernel: b8400000 cd910b80 b8002000 00000000 c013f2d7 c0441e70 cd910b80 b8000000 > Oct 11 00:02:05 toxic0 kernel: 00002000 00000000 b8000000 cd910b80 b8002000 00000000 c013f32d c0441e70 > Oct 11 00:02:05 toxic0 kernel: Call Trace: > Oct 11 00:02:05 toxic0 kernel: [zap_pmd_range+85/116] zap_pmd_range+0x55/0x74 > Oct 11 00:02:05 toxic0 kernel: [zap_pud_range+55/92] zap_pud_range+0x37/0x5c > Oct 11 00:02:05 toxic0 kernel: [unmap_page_range+120/149] unmap_page_range+0x78/0x95 > Oct 11 00:02:05 toxic0 kernel: [unmap_vmas+236/541] unmap_vmas+0xec/0x21d > Oct 11 00:02:05 toxic0 kernel: [exit_mmap+141/367] exit_mmap+0x8d/0x16f > Oct 11 00:02:05 toxic0 kernel: [mmput+40/142] mmput+0x28/0x8e > Oct 11 00:02:05 toxic0 kernel: [exec_mmap+212/316] exec_mmap+0xd4/0x13c > Oct 11 00:02:05 toxic0 kernel: [flush_old_exec+116/2325] flush_old_exec+0x74/0x915 > Oct 11 00:02:05 toxic0 kernel: [vfs_read+178/279] vfs_read+0xb2/0x117 > Oct 11 00:02:05 toxic0 kernel: [kernel_read+74/83] kernel_read+0x4a/0x53 > Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+593/3400] load_elf_binary+0x251/0xd48 > Oct 11 00:02:05 toxic0 kernel: [__do_softirq+82/178] __do_softirq+0x52/0xb2 > Oct 11 00:02:05 toxic0 kernel: [irq_exit+54/56] irq_exit+0x36/0x38 > Oct 11 00:02:05 toxic0 kernel: [do_IRQ+30/36] do_IRQ+0x1e/0x24 > Oct 11 00:02:05 toxic0 kernel: [evtchn_do_upcall+81/132] evtchn_do_upcall+0x51/0x84 > Oct 11 00:02:05 toxic0 kernel: [hypervisor_callback+55/64] hypervisor_callback+0x37/0x40 > Oct 11 00:02:05 toxic0 kernel: [strnlen_user+44/63] strnlen_user+0x2c/0x3f > Oct 11 00:02:05 toxic0 kernel: [load_elf_binary+0/3400] load_elf_binary+0x0/0xd48 > Oct 11 00:02:05 toxic0 kernel: [search_binary_handler+100/338] search_binary_handler+0x64/0x152 > Oct 11 00:02:05 toxic0 kernel: [do_execve+388/527] do_execve+0x184/0x20f > Oct 11 00:02:05 toxic0 kernel: [sys_execve+61/136] sys_execve+0x3d/0x88 > Oct 11 00:02:05 toxic0 kernel: [syscall_call+7/11] syscall_call+0x7/0xb > Oct 11 00:02:05 toxic0 kernel: Code: 13 8d 04 09 01 c0 03 05 44 fb 43 c0 3b 18 0f 84 c0 00 00 00 31 db 31 c0 85 ed 0f 95 c0 85 c0 0f 85 29 01 00 00 89 d6 85 d2 74 06 <c7> 07 00 00 00 00 8b 54 24 14 c7 42 08 01 00 00 00 85 db 74 43 > Oct 11 00:02:05 toxic0 kernel: <6>note: logcheck[18315] exited with preempt_count 1_______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users