|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 1387] New: With EPT mode, HVM S3 causes Xen HV crash.
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1387
Summary: With EPT mode, HVM S3 causes Xen HV crash.
Product: Xen
Version: unstable
Platform: All
OS/Version: All
Status: NEW
Severity: critical
Priority: P1
Component: Hypervisor
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: haicheng.li@xxxxxxxxx
This bug happens only with EPT enabled. shadow mode works fine.
here is the crash log:
(XEN) HVM1: Press F10 to select boot device.
(XEN) HVM1: Booting from Hard Disk...
(XEN) HVM1: int13_harddisk: function 41, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=81
(XEN) HVM1: *** int 15h function AX=00C0, BX=0000 not yet supported!
(XEN) HVM1: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM1: *** int 15h function AX=EC00, BX=0002 not yet supported!
(XEN) HVM1: KBD: unsupported int 16h function 03
(XEN) HVM1: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 02, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 41, unmapped device for ELDL=81
(XEN) irq.c:235: Dom1 PCI link 0 changed 5 -> 0
(XEN) irq.c:235: Dom1 PCI link 1 changed 10 -> 0
(XEN) irq.c:235: Dom1 PCI link 2 changed 11 -> 0
(XEN) irq.c:235: Dom1 PCI link 3 changed 5 -> 0
(XEN) Xen BUG at page_alloc.c:839
(XEN) ----[ Xen-3.4-unstable x86_64 debug=n Not tainted ]----
(XEN) CPU: 0
(XEN) RIP: e008:[<ffff828c80111231>] free_domheap_pages+0x111/0x270
(XEN) RFLAGS: 0000000000010202 CONTEXT: hypervisor
(XEN) rax: 0000000000000000 rbx: 0000000000000001 rcx: ffff828400000000
(XEN) rdx: 0000000000000000 rsi: 0000000000000000 rdi: ffff8300be206094
(XEN) rbp: ffff8300be206080 rsp: ffff828c80247e18 r8: 0000006c45dbd928
(XEN) r9: ffff828c802005c0 r10: 0000000000000830 r11: 0000000000000000
(XEN) r12: ffff828400000000 r13: ffff8300be206094 r14: 0000000000000000
(XEN) r15: 0000000000000001 cr0: 000000008005003b cr4: 00000000000026b0
(XEN) cr3: 0000000058472000 cr2: 00002aaaab0feba0
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008
(XEN) Xen stack trace from rsp=ffff828c80247e18:
(XEN) 0000000000000001 ffff8300be2de080 ffff8300be3fc080 000000000000fff0
(XEN) 000000000000f000 ffff8300be2de090 0000000000000001 ffff828c80173713
(XEN) 0000000000000001 ffff8300be3e6080 0000000000000000 ffff8300be3e6090
(XEN) 00007fff5fe52dd0 ffff8300be3e6080 ffff828c80247eb8 ffff828c801775a0
(XEN) ffff8801590828c0 ffff828c801af3a1 ffff828c80247f28 ffff828c801afd28
(XEN) 0000000e00000001 0000000000000003 ffffffff8020a53c 0000000000000100
(XEN) 00000036b80cb447 ffff8300be3e6080 0000000000000206 ffff8300be42e080
(XEN) 00007fff5fe52da0 0000000000305000 0000000000000006 00000000ffffffda
(XEN) 0000000000000001 ffff828c801ad169 0000000000000001 00000000ffffffda
(XEN) 0000000000000006 0000000000305000 00007fff5fe52da0 ffff88015918ba80
(XEN) 0000000000000282 000000000000000e 0000000000000001 0000000000000001
(XEN) 0000000000000022 ffffffff8020644a 0000000000000003 00007fff5fe52dd0
(XEN) 0000000000000000 0000010000000000 ffffffff8020644a 000000000000e033
(XEN) 0000000000000282 ffff88011f379e20 000000000000e02b 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) ffff8300be42e080
(XEN) Xen call trace:
(XEN) [<ffff828c80111231>] free_domheap_pages+0x111/0x270
(XEN) [<ffff828c80173713>] hvm_vcpu_reset_state+0xa3/0x2c0
(XEN) [<ffff828c801775a0>] do_hvm_op+0x4b0/0xe60
(XEN) [<ffff828c801af3a1>] toggle_guest_mode+0x21/0x30
(XEN) [<ffff828c801afd28>] do_iret+0xa8/0x1c0
(XEN) [<ffff828c801ad169>] syscall_enter+0xa9/0xae
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Xen BUG at page_alloc.c:839
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 1387] New: With EPT mode, HVM S3 causes Xen HV crash.,
bugzilla-daemon <=
|
|
|
|
|