WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Xen crash with latest 3.3 bits

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Xen crash with latest 3.3 bits
From: John Levon <levon@xxxxxxxxxxxxxxxxx>
Date: Tue, 10 Mar 2009 11:55:25 -0400
Delivery-date: Tue, 10 Mar 2009 08:55:50 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.9i
Some time after starting an 64-bit SMP Solaris 10 domain (HVM with PV drivers),
I get the below crash. Any ideas?

thanks
john

(xVM) grant_table.c:800:d3 Expanding dom (3) grant table from (4) to (32) 
frames.
(xVM) Assertion '(page->u.inuse.type_info & (7U<<29)) != (7U<<29) || 
(page->u.inuse.type_info & ((1U<<26)-1)) == 0 || v->domain->is_shutting_down' 
failed at common.c:1000
(xVM) ----[ Xen-3.3.2-rc1-pre-xvm-debug  x86_64  debug=y  Not tainted ]----
(xVM) CPU:    12
(xVM) RIP:    e008:[<ffff828c801ad88d>] shadow_promote+0xa0/0x108
(xVM) RFLAGS: 0000000000010246   CONTEXT: hypervisor
(xVM) rax: ffff8300deca6100   rbx: ffff828411d446b0   rcx: 00000000e8000001
(xVM) rdx: 00000000e0000000   rsi: 0000000000721b5e   rdi: ffff8300dec92100
(xVM) rbp: ffff8300dec2fc08   rsp: ffff8300dec2fbe8   r8:  0000000000000020
(xVM) r9:  0000000000000000   r10: ffff828c80240340   r11: ffff828c80207ac8
(xVM) r12: 0000000000000008   r13: ffff8300dec92100   r14: 0000000000721b5e
(xVM) r15: 000000000075112a   cr0: 0000000080050033   cr4: 00000000000006f0
(xVM) cr3: 0000000751252000   cr2: 0000000008046b7c
(xVM) ds: 0000   es: 0000   fs: 0000   gs: 01c3   ss: 0000   cs: e008
(xVM) Xen stack trace from rsp=ffff8300dec2fbe8:
(xVM)    0000000000000008 ffff8300dec92100 0000000000000008 ffff8140c0000200
(xVM)    ffff8300dec2fc68 ffff828c801caf95 0000000000721b5e ffff8300dec2fd08
(xVM)    ffff8300dec2fc68 ffff828c801b00f1 00000000007510fa ffff8300dec92100
(xVM)    ffff8300dec2fe08 ffff8140c0000200 0000000000000006 ffff8300dec2fd08
(xVM)    ffff8300dec2fcc8 ffff828c801cb6e9 ffff8300deca7070 ffff8300dec92100
(xVM)    0000000305a7e000 0000000000751255 00000001deca6100 ffff8300dec2fe08
(xVM)    ffff8300deca6100 ffff8300dec2fe08 ffff8300dec92100 0000000008046b7c
(xVM)    ffff8300dec2fe88 ffff828c801ce2a1 0000000000000001 0000000600000000
(xVM)    0000000000726358 ffff8300dec2ff28 0000000008046b7c ffff8300dec92100
(xVM)    ffffffffffffffff 00000001dec2fd78 ffff8300dec92100 ffff8300dec90000
(xVM)    0000000000008046 0000000000030758 ffff830000000007 ffff828c8018eabe
(xVM)    ffff8300dec2fd68 ffff828c801073a7 fffffe80000b96ac ffffffffffffffda
(xVM)    ffff8300dec2fe18 ffff828c801080f2 ffff8300dec2ff28 0000004000000040
(xVM)    ffff8300dec20001 ade9c9c3c9c0220f 6690666666ffff83 fffffffffb840838
(xVM)    029b002800000010 0000000000000fff 0400000000000000 00000000ffffffff
(xVM)    0cf3004300000000 00000000ffffffff ffff830000000000 ffff828c8018ad6d
(xVM)    ffff8300dec2fe08 ffff828c8019ac12 000000000000000f 00000000000000ff
(xVM)    0000000008046b7c 000000000dbfa027 0000000038a7e027 0000000034f5e027
(xVM)    8000000030758067 000000000071cffc 000000000071cffa 0000000000005a7e
(xVM)    0000000000721b5e 000000000046d708 0000000000000000 0000000008046b7c
(xVM) Xen call trace:
(xVM)    [<ffff828c801ad88d>] shadow_promote+0xa0/0x108
(xVM)    [<ffff828c801caf95>] sh_make_shadow+0x426/0x4a9
(xVM)    [<ffff828c801cb6e9>] shadow_get_and_create_l1e+0x198/0x279
(xVM)    [<ffff828c801ce2a1>] sh_page_fault__guest_4+0xb30/0x1624
(xVM)    [<ffff828c8019e49e>] svm_vmexit_handler+0x633/0xaec
(xVM)



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel