[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Shadow OOS bug?
Duplicate report of "Xen crash on HVM shutdown" from this week on this list. Keir: Please commit Gianluca's fix. Christoph On Friday 27 June 2008 11:10:06 Cui, Dexuan wrote: > I'm using c/s 17893: dedfadeadf86. > When I destroy an HVM guest, I can _occasionally_ (maybe 30% probable) > see the issue. > Let me post the log below FYI. > > --- Dexuan > > (XEN) ----[ Xen-3.3-unstable x86_64 debug=y Not tainted ]---- > (XEN) CPU: 0 > (XEN) RIP: e008:[<ffff828c8019d2bb>] oos_fixup_remove+0x55/0x71 > (XEN) RFLAGS: 0000000000010206 CONTEXT: hypervisor > (XEN) rax: 0000000000000888 rbx: ffff82840085c7f8 rcx: > ffff83005d432000 > (XEN) rdx: 0000000000000000 rsi: 0000000000035833 rdi: > ffff83005d436100 > (XEN) rbp: ffff828c80277a98 rsp: ffff828c80277a98 r8: > 000000000000005b > (XEN) r9: ffffffffffffffff r10: 0000000000000000 r11: > 00ff00ff00ff00ff > (XEN) r12: 0000000000035833 r13: ffff83005d436100 r14: > ffff83005d4ec100 > (XEN) r15: ffff83005d436100 cr0: 000000008005003b cr4: > 00000000000026b0 > (XEN) cr3: 000000003fc3d000 cr2: ffff83005d432888 > (XEN) ds: 0000 es: 0000 fs: 0063 gs: 0000 ss: e010 cs: e008 > (XEN) Xen stack trace from rsp=ffff828c80277a98: > (XEN) ffff828c80277ac8 ffff828c8019e330 0000000000035833 > 0000000000000008 > (XEN) 0000000000035833 000000000005cdb7 ffff828c80277b18 > ffff828c801bbec6 > (XEN) ffff83005d4ec100 000000000005cdb7 ffff83005d436100 > ffff828400e82498 > (XEN) 0000000000000000 000000000005cdb7 0000000000000002 > ffff83005d436100 > (XEN) ffff828c80277b28 ffff828c801a104c ffff828c80277b98 > ffff828c801bbdb6 > (XEN) 0000beef0000beef ffff83005d436100 0000000000e2d5d8 > ffff83005abbf000 > (XEN) 000000005d4ec100 000000000005abbf 000000000005abbf > ffff828400e2d5d8 > (XEN) 0000000000000000 000000000005abbf 0000000000000000 > ffff83003b58f000 > (XEN) ffff828c80277ba8 ffff828c801a107d ffff828c80277c08 > ffff828c801bbaa7 > (XEN) ffff83005d4ec100 ffff83005d436100 000000000003b58f > 000000000003b58f > (XEN) ffff83005d436100 ffff828400945e58 0000000000000000 > 0000000000000000 > (XEN) 000000000003b58f ffff83005d436100 ffff828c80277c18 > ffff828c801a1084 > (XEN) ffff828c80277c78 ffff828c801bb816 ffff83005d436100 > 0000000080277f28 > (XEN) ffff830059c5d000 0000000000059c5d 0000000000059c5d > ffff828400e06e88 > (XEN) 0000000000000000 0000000000059c5d ffff83005d4ec100 > 0000000000000002 > (XEN) ffff828c80277c88 ffff828c801a108b ffff828c80277cf8 > ffff828c8019ed8d > (XEN) ffff828c80277cd8 ffff828c80112a35 ffff83005d436100 > ffff83005d436100 > (XEN) ffff83005d4ed068 ffff83005d436100 0000000100000002 > ffff83005d4ec100 > (XEN) ffff83005d4ed0a8 0000000000000000 0000000000000002 > 0000000000000004 > (XEN) ffff828c80277d58 ffff828c801a038e ffff83005d4ec100 > ffff828c80277f28 > (XEN) Xen call trace: > (XEN) [<ffff828c8019d2bb>] oos_fixup_remove+0x55/0x71 > (XEN) [<ffff828c8019e330>] shadow_demote+0xb2/0xca > (XEN) [<ffff828c801bbec6>] sh_destroy_l1_shadow__guest_4+0xe4/0x338 > (XEN) [<ffff828c801a104c>] sh_destroy_shadow+0xfe/0x16f > (XEN) [<ffff828c801bbdb6>] sh_destroy_l2_shadow__guest_4+0x2df/0x30b > (XEN) [<ffff828c801a107d>] sh_destroy_shadow+0x12f/0x16f > (XEN) [<ffff828c801bbaa7>] sh_destroy_l3_shadow__guest_4+0x265/0x295 > (XEN) [<ffff828c801a1084>] sh_destroy_shadow+0x136/0x16f > (XEN) [<ffff828c801bb816>] sh_destroy_l4_shadow__guest_4+0x2b2/0x2de > (XEN) [<ffff828c801a108b>] sh_destroy_shadow+0x13d/0x16f > (XEN) [<ffff828c8019ed8d>] _shadow_prealloc+0x3bb/0x568 > (XEN) [<ffff828c801a038e>] sh_set_allocation+0x1ec/0x32a > (XEN) [<ffff828c801a5095>] shadow_teardown+0x2d0/0x465 > (XEN) [<ffff828c8019a03a>] paging_teardown+0x2e/0x3d > (XEN) [<ffff828c8013fa58>] domain_relinquish_resources+0x51/0x190 > (XEN) [<ffff828c80105597>] domain_kill+0x76/0x171 > (XEN) [<ffff828c80104780>] do_domctl+0x54b/0xc4b > (XEN) [<ffff828c801c71bf>] syscall_enter+0xef/0x149 > (XEN) > (XEN) Pagetable walk from ffff83005d432888: > (XEN) L4[0x106] = 000000005d67d027 5555555555555555 > (XEN) L3[0x001] = 000000005d67f027 5555555555555555 > (XEN) L2[0x0ea] = 000000007d59f063 5555555555555555 > (XEN) L1[0x032] = 000000005d432262 5555555555555555 > (XEN) > (XEN) **************************************** > (XEN) Panic on CPU 0: > (XEN) FATAL PAGE FAULT > (XEN) [error_code=0000] > (XEN) Faulting linear address: ffff83005d432888 > (XEN) **************************************** > (XEN) > (XEN) Reboot in five seconds... > > > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-devel -- AMD Saxony, Dresden, Germany Operating System Research Center Legal Information: AMD Saxony Limited Liability Company & Co. KG Sitz (Geschäftsanschrift): Wilschdorfer Landstr. 101, 01109 Dresden, Deutschland Registergericht Dresden: HRA 4896 vertretungsberechtigter Komplementär: AMD Saxony LLC (Sitz Wilmington, Delaware, USA) Geschäftsführer der AMD Saxony LLC: Dr. Hans-R. Deppe, Thomas McCoy _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |