[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Xen crash with mem-sharing and cloning
Hello everyone, I'm trying to chase down a bug that reproducibly crashes Xen (tested with 4.4.1). The problem is somewhere within the mem-sharing subsystem and how that interacts with domains that are being actively saved. In my setup I use the xl toolstack to rapidly create clones of HVM domains by piping "xl save -c" into xl restore with a modified domain config which updates the name/disk/vif. However, during such an operation Xen crashes with the following log if there are already active clones.IMHO there should be no conflict between saving the domain and memsharing, as long as the domain is actually just being checkpointed "-c" - it's memory should remain as is. This is however clearly not the case. Any ideas? Thanks, Tamas ---------------------------------------------------------- (XEN) HVM1 save: CPU (XEN) HVM1 save: PIC (XEN) HVM1 save: IOAPIC (XEN) HVM1 save: LAPIC (XEN) HVM1 save: LAPIC_REGS (XEN) HVM1 save: PCI_IRQ (XEN) HVM1 save: ISA_IRQ (XEN) HVM1 save: PCI_LINK (XEN) HVM1 save: PIT (XEN) HVM1 save: RTC (XEN) HVM1 save: HPET (XEN) HVM1 save: PMTIMER (XEN) HVM1 save: MTRR (XEN) HVM1 save: VIRIDIAN_DOMAIN (XEN) HVM1 save: CPU_XSAVE (XEN) HVM1 save: VIRIDIAN_VCPU (XEN) HVM1 save: VMCE_VCPU (XEN) HVM1 save: TSC_ADJUST (XEN) HVM19 restore: CPU 0 (XEN) HVM19 restore: PIC 0 (XEN) HVM19 restore: PIC 1 (XEN) HVM19 restore: IOAPIC 0 (XEN) HVM19 restore: LAPIC 0 (XEN) HVM19 restore: LAPIC_REGS 0 (XEN) HVM19 restore: PCI_IRQ 0 (XEN) HVM19 restore: ISA_IRQ 0 (XEN) HVM19 restore: PCI_LINK 0 (XEN) HVM19 restore: PIT 0 (XEN) HVM19 restore: RTC 0 (XEN) HVM19 restore: HPET 0 (XEN) HVM19 restore: PMTIMER 0 (XEN) HVM19 restore: MTRR 0 (XEN) HVM19 restore: CPU_XSAVE 0 (XEN) HVM19 restore: VMCE_VCPU 0 (XEN) HVM19 restore: TSC_ADJUST 0 (XEN) ----[ Xen-4.4.1 x86_64 debug=n Not tainted ]---- (XEN) CPU: 2 (XEN) RIP: e008:[<ffff82d0801f2beb>] __mem_sharing_unshare_page+0x1ab/0xb10 (XEN) RFLAGS: 0000000000010283 CONTEXT: hypervisor (XEN) rax: 0000000000000000 rbx: ffff83021fa92000 rcx: 000000000000000d (XEN) rdx: ffff8302ea96cb90 rsi: 0000000000000001 rdi: 00000000002acd06 (XEN) rbp: 0000000000006306 rsp: ffff83042fdffca8 r8: 007fffffffffffff (XEN) r9: 0400000000000000 r10: 0080000000000001 r11: 0000000000000002 (XEN) r12: 0000000000000000 r13: ffff82e00559a0c0 r14: 00000000002acd06 (XEN) r15: 0000000000000000 cr0: 0000000080050033 cr4: 00000000000426f0 (XEN) cr3: 0000000253b45000 cr2: 0000000000000000 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 (XEN) Xen stack trace from rsp=ffff83042fdffca8: (XEN) ffff830400000001 ffff83031010e810 ffff83042fdf8000 ffff82d08030110c (XEN) 00000033b2f75d80 00000000002acd06 0000000100000000 0000000000000000 (XEN) ffff830227b19000 000000070000000c 0000000000000000 0000000000000003 (XEN) ffff83031010e810 0000000000006306 ffff83042fdffec0 ffff83042fdffdb0 (XEN) 0000000000000000 ffff82d0801e45b3 ffff82d080301108 ffff83042fdf8000 (XEN) 0000000000000000 ffff83042fdffec0 ffff83031010e810 ffff83042fdffdb0 (XEN) 0000000000006306 0000000000000002 ffff83021fa92000 ffff82d0801e483b (XEN) ffff830200000001 ffff82d080173f5d 000000fd000000ff 00000000002acd06 (XEN) 0000000000000100 ffff830400000007 ffff83042fdb77e0 0000000000000007 (XEN) ffff83027f86d1a8 0000000000000000 0000000000000000 000000000027f86d (XEN) ffff880056313bd8 ffff82d08017e190 000000000000000a 0000000000000000 (XEN) 0000000000000000 ffff82d08017bc23 ffff82d08012aa4b ffff830400000002 (XEN) ffff83021fa92000 ffff83042fdaf000 ffff8300aecea000 000000012fdaf0b0 (XEN) ffff83042fdf8000 ffff82e004ff0da0 ffff83042fdaf000 0000000000000007 (XEN) ffff83042fdf8000 8000000006306627 ffff83027f86d000 ffff8300aecea000 (XEN) 000000000027f86d 0000000d00000003 0000000000000000 0000000000006306 (XEN) 0000000000253b45 0000000000000000 0000000000000206 00007f8f0000000c (XEN) 000000027f86d1a8 8000000006306627 0000000000000033 ffff8300aecea000 (XEN) 0000000000000001 00007f8f84a35000 0000000000000001 ffff880056313bd8 (XEN) ffff880061468d48 ffff82d080220019 00000091c9d82304 0000000000000003 (XEN) Xen call trace: (XEN) [<ffff82d0801f2beb>] __mem_sharing_unshare_page+0x1ab/0xb10 (XEN) [<ffff82d0801e45b3>] __get_gfn_type_access+0xd3/0x200 (XEN) [<ffff82d0801e483b>] get_page_from_gfn_p2m+0xfb/0x2a0 (XEN) [<ffff82d080173f5d>] get_page+0x2d/0x100 (XEN) [<ffff82d08017e190>] do_mmu_update+0x1080/0x1bb0 (XEN) [<ffff82d08017bc23>] do_mmuext_op+0x803/0x1940 (XEN) [<ffff82d08012aa4b>] add_entry+0x4b/0xb0 (XEN) [<ffff82d080220019>] syscall_enter+0xa9/0xae (XEN) (XEN) Pagetable walk from 0000000000000000: (XEN) L4[0x000] = 0000000000000000 ffffffffffffffff (XEN) (XEN) **************************************** (XEN) Panic on CPU 2: (XEN) FATAL PAGE FAULT (XEN) [error_code=0000] (XEN) Faulting linear address: 0000000000000000 (XEN) **************************************** (XEN) (XEN) Reboot in five seconds... The system is powered off. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |