|
|
|
|
|
|
|
|
|
|
xen-ia64-devel
Re: [Xen-ia64-devel] BUG at mm.c:605
Hi Alex.
I think the issue is same as reported in the below thread.
http://lists.xensource.com/archives/html/xen-ia64-devel/2006-09/msg00204.html
I tried to convince him, but failed.
I think that the best way is to revert the patch and we should seek
for the right fix.
I guess that making xennet.rx_copy default enabled is the beginning.
The root cause is that relinquish_memory() writes the P2M simulteniously
with __acquire_grant_for_copy().
relinquish_memory() of IA64 assumes that no one else read the P2M
table at the same time. However the such assumption is wrong now.
Although I haven't dug into its details, I suspect that
the race between relinquish_memory() and get_page()
(or __acquire_grant_for_copy()) exists not only on ia64,
but also on x86.
thanks.
On Tue, Oct 17, 2006 at 05:13:21PM -0600, Alex Williamson wrote:
>
> I seem to be hitting the BUG below with increasing regularity lately.
> Typically it occurs right when a domU is in the middle of rebooting (it
> appears to have shut down completely, I get a dom0 console prompt, then
> the BUG below). It's random enough that I haven't been able to isolate
> it to a particular changeset. Has anyone else seen this or (better yet)
> have a fix? It's getting in the way of testing all the new patches
> since I'm seeing this on xen-ia64-unstable.hg. Thanks,
>
> Alex
>
> --
> Alex Williamson HP Open Source & Linux Org.
>
> (XEN) BUG at mm.c:605
> (XEN) die_if_kernel: bug check 0
> (XEN) d 0xf000000007c88080 domid 0
> (XEN) vcpu 0xf000000007c60000 vcpu 0
> (XEN)
> (XEN) CPU 0
> (XEN) psr : 0000101008226038 ifs : 8000000000000288 ip : [<f000000004048e50>]
> (XEN) ip is at __bug+0x40/0x60
> (XEN) unat: 0000000000000000 pfs : 0000000000000288 rsc : 0000000000000003
> (XEN) rnat: 0000000000004000 bsps: 000000000000435b pr : 000000000059aa69
> (XEN) ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
> (XEN) csd : 0000000000000000 ssd : 0000000000000000
> (XEN) b0 : f000000004048e50 b6 : f000000004049e10 b7 : a00000010064afa0
> (XEN) f6 : 0fffbccccccccc8c00000 f7 : 0ffdbf300000000000000
> (XEN) f8 : 10001c000000000000000 f9 : 10002a000000000000000
> (XEN) f10 : 0fffe9999999996900000 f11 : 1003e0000000000000000
> (XEN) r1 : f000000004326f00 r2 : 000000000000435b r3 : f0000040fdad7781
> (XEN) r8 : 0000000000000000 r9 : 0000000000000000 r10 : 0000000000000000
> (XEN) r11 : 00000000005a0969 r12 : f000000007c67900 r13 : f000000007c60000
> (XEN) r14 : 0000000000004000 r15 : f00000000412ff2a r16 : 0000000000004001
> (XEN) r17 : f0000000041294fc r18 : 000000000000035b r19 : f0000000041294f8
> (XEN) r20 : f000000007c67860 r21 : f000000007c60010 r22 : 0000000000000080
> (XEN) r23 : 000000000002003c r24 : f000000007c67e20 r25 : f000000007c67e28
> (XEN) r26 : 0000000000000000 r27 : 0000000000000000 r28 : 0000000000000000
> (XEN) r29 : 0000000000000001 r30 : 0000000000000000 r31 : f000000004133db8
> (XEN)
> (XEN) Call Trace:
> (XEN) [<f0000000040a0330>] show_stack+0x80/0xa0
> (XEN) sp=f000000007c67520 bsp=f000000007c612c0
> (XEN) [<f00000000407abc0>] die_if_kernel+0x90/0xe0
> (XEN) sp=f000000007c676f0 bsp=f000000007c61290
> (XEN) [<f00000000406f330>] ia64_handle_break+0x220/0x2d0
> (XEN) sp=f000000007c676f0 bsp=f000000007c61258
> (XEN) [<f00000000409d220>] ia64_leave_kernel+0x0/0x310
> (XEN) sp=f000000007c67700 bsp=f000000007c61258
> (XEN) [<f000000004048e50>] __bug+0x40/0x60
> (XEN) sp=f000000007c67900 bsp=f000000007c61218
> (XEN) [<f000000004063f10>] lookup_noalloc_domain_pte+0x40/0x130
> (XEN) sp=f000000007c67900 bsp=f000000007c611e8
> (XEN) [<f000000004065d40>] lookup_domain_mpa+0x30/0x250
> (XEN) sp=f000000007c67900 bsp=f000000007c611b8
> (XEN) [<f0000000040664f0>] gmfn_to_mfn_foreign+0xc0/0xf0
> (XEN) sp=f000000007c67900 bsp=f000000007c61190
> (XEN) [<f000000004026910>] __acquire_grant_for_copy+0x3a0/0x490
> (XEN) sp=f000000007c67900 bsp=f000000007c61140
> (XEN) [<f000000004029870>] do_grant_table_op+0x1f80/0x2c20
> (XEN) sp=f000000007c67900 bsp=f000000007c61038
> (XEN) [<f00000000402f060>] do_multicall+0x2b0/0x390
> (XEN) sp=f000000007c67960 bsp=f000000007c60fa0
> (XEN) [<f00000000405ec40>] ia64_hypercall+0x990/0x1020
> (XEN) sp=f000000007c67960 bsp=f000000007c60f40
> (XEN) [<f00000000406f260>] ia64_handle_break+0x150/0x2d0
> (XEN) sp=f000000007c67df0 bsp=f000000007c60f08
> (XEN) [<f00000000409d220>] ia64_leave_kernel+0x0/0x310
> (XEN) sp=f000000007c67e00 bsp=f000000007c60f08
> (XEN) domain_crash_sync called from xenmisc.c:108
> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
> (XEN) d 0xf000000007c88080 domid 0
> (XEN) vcpu 0xf000000007c60000 vcpu 0
> (XEN)
> (XEN) CPU 0
> (XEN) psr : 0000101208026030 ifs : 800000000000040b ip : [<a00000010006d4d0>]
> (XEN) ip is at ???
> (XEN) unat: 0000000000000000 pfs : 800000000000040b rsc : 000000000000000b
> (XEN) rnat: 0000000000000000 bsps: e000000079609260 pr : 00000000005a5a65
> (XEN) ldrs: 0000000001680000 ccv : 0000000000000000 fpsr: 0009804c8a70433f
> (XEN) csd : 0000000000000000 ssd : 0000000000000000
> (XEN) b0 : a00000010006d4a0 b6 : a0000001006aee00 b7 : a00000010064afa0
> (XEN) f6 : 1003e0000000000000000 f7 : 1003e000000000000023a
> (XEN) f8 : 0fffe8e7fdc6000000000 f9 : 1003efffffffffffffc00
> (XEN) f10 : 000000000000000000000 f11 : 000000000000000000000
> (XEN) r1 : a00000010102cc90 r2 : 000000000000000d r3 : 8000000004fb7758
> (XEN) r8 : 0000000004fb7758 r9 : 0000000000000000 r10 : 0000000000000000
> (XEN) r11 : a000000100da9248 r12 : e00000007960fbd0 r13 : e000000079608000
> (XEN) r14 : 8000000004fb7758 r15 : 0000000000000001 r16 : a000000100da9200
> (XEN) r17 : 0000000000000001 r18 : e00000007960fc38 r19 : 00000000000007ff
> (XEN) r20 : ffffffffffff0060 r21 : a000000100fb7758 r22 : 0000000000000080
> (XEN) r23 : e00000007960fc30 r24 : 0000005000000080 r25 : 0000000000000000
> (XEN) r26 : 0000000000000000 r27 : 00000000000003ed r28 : 00028000000403ed
> (XEN) r29 : 0000000000000001 r30 : 0000000000000000 r31 : e00000007960fc28
> (XEN)
> (XEN) Call Trace:
> (XEN) [<f0000000040a0330>] show_stack+0x80/0xa0
> (XEN) sp=f000000007c67520 bsp=f000000007c61300
> (XEN) [<f00000000401f070>] __domain_crash+0xd0/0x110
> (XEN) sp=f000000007c676f0 bsp=f000000007c612d8
> (XEN) [<f00000000401f0d0>] __domain_crash_synchronous+0x20/0x50
> (XEN) sp=f000000007c676f0 bsp=f000000007c612c0
> (XEN) [<f00000000407ac00>] die_if_kernel+0xd0/0xe0
> (XEN) sp=f000000007c676f0 bsp=f000000007c61290
> (XEN) [<f00000000406f330>] ia64_handle_break+0x220/0x2d0
> (XEN) sp=f000000007c676f0 bsp=f000000007c61258
> (XEN) [<f00000000409d220>] ia64_leave_kernel+0x0/0x310
> (XEN) sp=f000000007c67700 bsp=f000000007c61258
> (XEN) [<f000000004048e50>] __bug+0x40/0x60
> (XEN) sp=f000000007c67900 bsp=f000000007c61218
> (XEN) [<f000000004063f10>] lookup_noalloc_domain_pte+0x40/0x130
> (XEN) sp=f000000007c67900 bsp=f000000007c611e8
> (XEN) [<f000000004065d40>] lookup_domain_mpa+0x30/0x250
> (XEN) sp=f000000007c67900 bsp=f000000007c611b8
> (XEN) [<f0000000040664f0>] gmfn_to_mfn_foreign+0xc0/0xf0
> (XEN) sp=f000000007c67900 bsp=f000000007c61190
> (XEN) [<f000000004026910>] __acquire_grant_for_copy+0x3a0/0x490
> (XEN) sp=f000000007c67900 bsp=f000000007c61140
> (XEN) [<f000000004029870>] do_grant_table_op+0x1f80/0x2c20
> (XEN) sp=f000000007c67900 bsp=f000000007c61038
> (XEN) [<f00000000402f060>] do_multicall+0x2b0/0x390
> (XEN) sp=f000000007c67960 bsp=f000000007c60fa0
> (XEN) [<f00000000405ec40>] ia64_hypercall+0x990/0x1020
> (XEN) sp=f000000007c67960 bsp=f000000007c60f40
> (XEN) [<f00000000406f260>] ia64_handle_break+0x150/0x2d0
> (XEN) sp=f000000007c67df0 bsp=f000000007c60f08
> (XEN) [<f00000000409d220>] ia64_leave_kernel+0x0/0x310
> (XEN) sp=f000000007c67e00 bsp=f000000007c60f08
> (XEN)
> (XEN) Call Trace:
> (XEN) [<f0000000040a0330>] show_stack+0x80/0xa0
> (XEN) sp=f000000007c67520 bsp=f000000007c61300
> (XEN) [<f00000000401f080>] __domain_crash+0xe0/0x110
> (XEN) sp=f000000007c676f0 bsp=f000000007c612d8
> (XEN) [<f00000000401f0d0>] __domain_crash_synchronous+0x20/0x50
> (XEN) sp=f000000007c676f0 bsp=f000000007c612c0
> (XEN) [<f00000000407ac00>] die_if_kernel+0xd0/0xe0
> (XEN) sp=f000000007c676f0 bsp=f000000007c61290
> (XEN) [<f00000000406f330>] ia64_handle_break+0x220/0x2d0
> (XEN) sp=f000000007c676f0 bsp=f000000007c61258
> (XEN) [<f00000000409d220>] ia64_leave_kernel+0x0/0x310
> (XEN) sp=f000000007c67700 bsp=f000000007c61258
> (XEN) [<f000000004048e50>] __bug+0x40/0x60
> (XEN) sp=f000000007c67900 bsp=f000000007c61218
> (XEN) [<f000000004063f10>] lookup_noalloc_domain_pte+0x40/0x130
> (XEN) sp=f000000007c67900 bsp=f000000007c611e8
> (XEN) [<f000000004065d40>] lookup_domain_mpa+0x30/0x250
> (XEN) sp=f000000007c67900 bsp=f000000007c611b8
> (XEN) [<f0000000040664f0>] gmfn_to_mfn_foreign+0xc0/0xf0
> (XEN) sp=f000000007c67900 bsp=f000000007c61190
> (XEN) [<f000000004026910>] __acquire_grant_for_copy+0x3a0/0x490
> (XEN) sp=f000000007c67900 bsp=f000000007c61140
> (XEN) [<f000000004029870>] do_grant_table_op+0x1f80/0x2c20
> (XEN) sp=f000000007c67900 bsp=f000000007c61038
> (XEN) [<f00000000402f060>] do_multicall+0x2b0/0x390
> (XEN) sp=f000000007c67960 bsp=f000000007c60fa0
> (XEN) [<f00000000405ec40>] ia64_hypercall+0x990/0x1020
> (XEN) sp=f000000007c67960 bsp=f000000007c60f40
> (XEN) [<f00000000406f260>] ia64_handle_break+0x150/0x2d0
> (XEN) sp=f000000007c67df0 bsp=f000000007c60f08
> (XEN) [<f00000000409d220>] ia64_leave_kernel+0x0/0x310
> (XEN) sp=f000000007c67e00 bsp=f000000007c60f08
> (XEN) Domain 0 crashed: rebooting machine in 5 seconds.
>
>
>
> _______________________________________________
> Xen-ia64-devel mailing list
> Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-ia64-devel
--
yamahata
_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel
|
|
|
|
|