On Tue, May 8, 2012 at 8:43 AM, Giorgos Kappes <geokapp@xxxxxxxxx> wrote: > When I am running deboostrap to install a base Debian Squeeze system > on a Ceph directory the client's kernel crashes with the following > message: > > I: Extracting zlib1g... > W: Failure trying to run: chroot /mnt/debian mount -t proc proc /proc > [ 759.776151] kernel tried to execute NX-protected page - exploit > attempt? (uid: 0) > [ 759.776169] BUG: unable to handle kernel paging request at ffffe8fffffe4ab0 ... > [ 759.776438] [<ffffffff81099405>] ? __rcu_process_callbacks+0x1c7/0x2f8 > [ 759.776447] [<ffffffff81099898>] ? rcu_process_callbacks+0x2c/0x56 > [ 759.776457] [<ffffffff8104cb72>] ? __do_softirq+0xc4/0x1a0 > [ 759.776465] [<ffffffff81096875>] ? handle_percpu_irq+0x3d/0x54 > [ 759.776475] [<ffffffff8150efb6>] ? __xen_evtchn_do_upcall+0x1c7/0x205 > [ 759.776484] [<ffffffff8176e52c>] ? call_softirq+0x1c/0x30 > [ 759.776493] [<ffffffff8100fa47>] ? do_softirq+0x3f/0x79 > [ 759.776501] [<ffffffff8104c942>] ? irq_exit+0x44/0xb5 > [ 759.776508] [<ffffffff8150ffc6>] ? xen_evtchn_do_upcall+0x27/0x32 > [ 759.776516] [<ffffffff8176e57e>] ? xen_do_hypervisor_callback+0x1e/0x30 ... > My simple cluster consists of 3 nodes in total. Each node is a Xen > domU guest running the Linux kernel 3.2.6 and ceph 0.43. For > reference, here is my configuration: ... > My Ceph kernel client is another Xen domU node running the Linux > kernel 3.2.11. I have also tried a native client with the same result. > Please note that this bug happens only in the client side. > Your help would be greatly appreciated. Your backtrace includes Xen code in it -- can you reproduce this bug with a mainline kernel, without Xen at all? Also, the error encountered is from the NX security subsystem. It would be nice to know what would happen without NX. -- To unsubscribe from this list: send the line "unsubscribe ceph-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html