[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Test report for Xen-3.3.0-rc4 (#18314)



On Thursday, August 14, 2008 3:27 PM Keir Fraser wrote:

> Thanks Jiajun,
> 
> That's disappointing. :-( I think the second of your crashes
> is the one that
> I've been able to reproduce (but infrequently -- maybe one
> time in 100). The
> symptoms are a bit different for me since I run a debug build and
> crash earlier, well before domain destruction.
> 
> There's a chance that Gianluca's new patch will fix your first
> host crash
> (although the domain crash would probably still remain).

Yes. We tried the patch, still got xen crash.

#########
(XEN) sh error: sh_remove_write_access(): can't remove write access to
mfn 2291b5: guest has 67108863 special-use mappings of it
(XEN) domain_crash called from common.c:2396
(XEN) Domain 1 (vcpu#1) crashed on cpu#0:
(XEN) ----[ Xen-3.3.0-rc5-pre  x86_32p  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) EIP:    0158:[<fe817811>]
(XEN) EFLAGS: 00010282   CONTEXT: hvm guest
(XEN) eax: da0cd300   ebx: 00000000   ecx: 80000000   edx: 00000000
(XEN) esi: 00000000   edi: 00000000   ebp: d8213bb4   esp: d8213bb0
(XEN) cr0: 8005003b   cr4: 000006b8   cr3: 023cb040   cr2: 08046fdc
(XEN) ds: 0160   es: 0160   fs: 0000   gs: 01b0   ss: 0160   cs: 0158
(XEN) Xen BUG at page_alloc.c:839
(XEN) ----[ Xen-3.3.0-rc5-pre  x86_32p  debug=n  Not tainted ]----
(XEN) CPU:    2
(XEN) EIP:    e008:[<ff10f81d>] free_domheap_pages+0x9d/0x250
(XEN) EFLAGS: 00210206   CONTEXT: hypervisor
(XEN) eax: 00000002   ebx: 00000000   ecx: f9bda8f8   edx: 00000002
(XEN) esi: 00000001   edi: ff1c4080   ebp: f9bda8f8   esp: ffbf3d5c
(XEN) cr0: 8005003b   cr4: 000026f0   cr3: 00bd8d20   cr2: 082bfef0
(XEN) ds: e010   es: e010   fs: 0000   gs: 0033   ss: e010   cs: e008
(XEN) Xen stack trace from esp=ffbf3d5c:
(XEN)    ff10ef33 00000015 00000000 f9bda910 f9bda8f8 00000001 ff1c5504
ff1395ac
(XEN)    f9bda8f8 00000000 ffbf3e44 f9bda8f8 f9bda910 f9bda8f8 68000000
ff12fc57
(XEN)    f9bda8f8 ff1c4080 ffbf3e44 ff186515 60000000 ff1c4090 ff1c4080
ff1c4090
(XEN)    ff1c4080 ff1c4080 ffbf3e44 ff12ff2c ffbca080 00000200 ffbf3e44
fffffff3
(XEN)    ff1c4080 00000000 ffbf3e44 ff104171 ff1c4080 00a261a4 00000000
15901a37
(XEN)    00000001 0b200494 0000000b fffffff3 fffffff3 b34f62d8 0000007b
ff1030ad
(XEN)    ff1c4080 b34f62d8 00000090 ff13c005 f9880070 e0000000 00000020
ff1c4080
(XEN)    ff13ad7b f95b2908 00000002 00000005 b7a10001 b7a42554 b7a4b4dc
447c7f77
(XEN)    b34f630c 46257b48 b7f836a0 0000007f 00000000 b8b08ac8 08121598
447c7f77
(XEN)    b7f836a0 b7bcbd74 b34f6338 447c77d3 b7bcbd74 a5dba1ee b7c291e0
0000001f
(XEN)    a5dba1ee 00000000 0836b320 448738e4 b7c291e0 b5573824 b34f6368
447c77d3
(XEN)    b5573824 b7c291e0 a5dba1ee 448738e4 b7c291e0 b7c291e0 43841a1c
000000fb
(XEN)    000000fb 0000005c 43841a15 ffbd4080 00000003 00000004 ffbf3fb4
ffbf3f5c
(XEN)    ff14a64d ffbf3fb4 43841a16 00000001 0000f800 00000004 fed1f030
00000030
(XEN)    ff1f6080 ffbd4080 ff1f6080 00000000 0000005d 00000002 ffbd8080
ffbd8080
(XEN)    b587215b 0000005d 00000004 00000033 0000d3a0 b5b50665 00000004
43841a17
(XEN)    5a9d8fe8 909090ff 90909090 c3900390 ff1f9a00 ff116bbc b5b50665
0000005d
(XEN)    ffbf3fb4 ff1e1003 ff1dd180 ffbd8080 0000007b 0000007b 00305000
ff19d614
(XEN)    b34f62d8 52ab9700 b7fbb430 b34f63a8 00000000 00305000 b34f62d8
52ab9700
(XEN)    b7fbb430 b34f63a8 00000000 00305000 00000024 000d0000 c0101487
00000061
(XEN) Xen call trace:
(XEN)    [<ff10f81d>] free_domheap_pages+0x9d/0x250
(XEN)    [<ff10ef33>] free_heap_pages+0xc3/0x1d0
(XEN)    [<ff1c5504>] nokey+0xc/0x10
(XEN)    [<ff1395ac>] put_page+0x5c/0x60
(XEN)    [<ff12fc57>] relinquish_memory+0xe7/0x290
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff186515>] paging_log_dirty_teardown+0x55/0xa0
(XEN)    [<ff1c4090>] __start+0x25/0x1ef
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff1c4090>] __start+0x25/0x1ef
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff12ff2c>] domain_relinquish_resources+0x12c/0x190
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff104171>] domain_kill+0x71/0x160
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff1030ad>] do_domctl+0x10d/0xc40
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff13c005>] get_page_from_l1e+0x1b5/0x480
(XEN)    [<ff1c4080>] __start+0x15/0x1ef
(XEN)    [<ff13ad7b>] put_page_from_l1e+0x9b/0xf0
(XEN)    [<ff14a64d>] do_general_protection+0x42d/0x1310
(XEN)    [<ff116bbc>] timer_softirq_action+0x10c/0x130
(XEN)    [<ff19d614>] hypercall+0x94/0x9b
(XEN)    
(XEN) 
(XEN) ****************************************
(XEN) Panic on CPU 2:
(XEN) Xen BUG at page_alloc.c:839
(XEN) ****************************************
#########


Best Regards
Jiajun

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.