WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 36] New: GPF in Xen during ptwr update

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 36] New: GPF in Xen during ptwr update
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Wed, 11 May 2005 21:07:13 +0000
Delivery-date: Wed, 11 May 2005 21:07:16 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/cgi-bin/bugzilla/show_bug.cgi?id=36

           Summary: GPF in Xen during ptwr update
           Product: Xen
           Version: unstable
          Platform: x86
        OS/Version: Linux-2.6
            Status: NEW
          Severity: major
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: aliguori@xxxxxxxxxx
                CC: hohnbaum@xxxxxxxxxx


During startup Xen is generating a GPF.  This is always reproducible on my T41p
laptop.  The problem began with yesterday's build (05/10) and was confirmed with
latest BK right before this bug report was posted.

The following is the output and stack trace from a build with 'make optimize=n
debug_crash=y debug=y'.  The problem is reproducible with just a normal 'make'.

Stack Trace:

ff12e218  get_page_from_l1e
ff151f3e  unmap_domain_mem
ff12e4ff  alloc_l1_table
ff12eea9  alloc_page_type
ff12f5f4  get_page_type
ff12de43  get_page_and_type_from_pagenr
ff133aa7  get_page_and_type
ff12e2f8  get_page_from_l2e
ff12ec48  mod_l2_entry
ff130da3  do_mmu_update
ff1332e9  ptwr_do_page_fault
ff1329cc  ptwr_flush
ff151673  hypercall

Xen Output:
 __  __            _____  ___         _                _ 
 \ \/ /___ _ __   |___ / / _ \     __| | _____   _____| |
  \  // _ \ '_ \    |_ \| | | |__ / _` |/ _ \ \ / / _ \ |
  /  \  __/ | | |  ___) | |_| |__| (_| |  __/\ V /  __/ |
 /_/\_\___|_| |_| |____(_)___/    \__,_|\___| \_/ \___|_|
                                                         
 http://www.cl.cam.ac.uk/netos/xen
 University of Cambridge Computer Laboratory

 Xen version 3.0-devel (anthony@) (gcc version 3.3.4 20040623 (Gentoo Linux
3.3.4-r1, ssp-3.3.2-2, pie-8.7.6)) Wed May 11 15:34:51 CDT 2005
 Latest ChangeSet: information unavailable

(XEN) Physical RAM map:
(XEN)  0000000000000000 - 000000000009f000 (usable)
(XEN)  000000000009f000 - 00000000000a0000 (reserved)
(XEN)  00000000000d2000 - 00000000000d4000 (reserved)
(XEN)  00000000000dc000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 000000003ff60000 (usable)
(XEN)  000000003ff60000 - 000000003ff77000 (ACPI data)
(XEN)  000000003ff77000 - 000000003ff79000 (ACPI NVS)
(XEN)  000000003ff80000 - 0000000040000000 (reserved)
(XEN)  00000000ff800000 - 0000000100000000 (reserved)
(XEN) System RAM: 1022MB (1047548kB)
(XEN) Xen heap: 10MB (10636kB)
(XEN) CPU0: Before vendor init, caps: a7e9f9bf 00000000 00000000, vendor = 0
(XEN) CPU caps: a7e9f9bf 00000000 00000000 00000000
(XEN) ACPI: RSDP (v002 IBM                                   ) @ 0x000f6df0
(XEN) ACPI: XSDT (v001 IBM    TP-1R    0x00003140  LTP 0x00000000) @ 0x3ff6a6cd
(XEN) ACPI: FADT (v003 IBM    TP-1R    0x00003140 IBM  0x00000001) @ 0x3ff6a800
(XEN) ACPI: SSDT (v001 IBM    TP-1R    0x00003140 MSFT 0x0100000e) @ 0x3ff6a9b4
(XEN) ACPI: ECDT (v001 IBM    TP-1R    0x00003140 IBM  0x00000001) @ 0x3ff76ebc
(XEN) ACPI: TCPA (v001 IBM    TP-1R    0x00003140 PTL  0x00000001) @ 0x3ff76f0e
(XEN) ACPI: BOOT (v001 IBM    TP-1R    0x00003140  LTP 0x00000001) @ 0x3ff76fd8
(XEN) ACPI: DSDT (v001 IBM    TP-1R    0x00003140 MSFT 0x0100000e) @ 0x00000000
(XEN) Local APIC disabled by BIOS -- reenabling.
(XEN) Found and enabled local APIC!
(XEN) Using scheduler: Borrowed Virtual Time (bvt)
(XEN) Initializing CPU#0
(XEN) Detected 1694.533 MHz processor.
(XEN) CPU0 booted
(XEN) enabled ExtINT on CPU#0
(XEN) Using local APIC timer interrupts.
(XEN) Calibrating APIC timer for CPU0...
(XEN) ..... CPU clock speed is 1694.5156 MHz.
(XEN) ..... host bus clock speed is 99.6773 MHz.
(XEN) ..... bus_scale = 0x00006612
(XEN) Time init:
(XEN) .... cpu_freq:    00000000:650085D8
(XEN) .... scale:       00000001:2E25EBCB
(XEN) .... Wall Clock:  1115843932s 50000us
(XEN) mtrr: v2.0 (20020519)
(XEN) (file=grant_table.c, line=1228) Grant table init
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Xen-ELF header found:
'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xC0000000,LOADER=generic'
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   10000000->20000000 (190816 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: c0100000->c05b1c44
(XEN)  Init. ramdisk: c05b2000->c08af000
(XEN)  Phys-Mach map: c08af000->c09a9580
(XEN)  Page tables:   c09aa000->c09ae000
(XEN)  Start info:    c09ae000->c09af000
(XEN)  Boot stack:    c09af000->c09b0000
(XEN)  TOTAL:         c0000000->c0c00000
(XEN)  ENTRY ADDRESS: c0100000
(XEN) Initrd len 0x2fd000, start at 0xc05b2000
(XEN) Scrubbing Free RAM: ...........done.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to 
Xen).
(XEN) CPU:    0
(XEN) EIP:    0808:[<ff12e218>]      
(XEN) EFLAGS: 00210246   CONTEXT: hypervisor
(XEN) eax: 00000000   ebx: 00010102   ecx: 261a0001   edx: 00000000
(XEN) esi: 00000000   edi: c3400000   ebp: ff103d60   esp: ff103d38
(XEN) ds: 0810   es: 0810   fs: 0810   gs: 0810   ss: 0810   cs: 0808
(XEN) Stack trace from ESP=ff103d38:
(XEN)    ff170130 1000a000 00000063 [ff151f3e] ffbfe990 00000000 ffbfe000 
00000001 
(XEN)    fc400000 00000000 ff103d90 [ff12e4ff] 00000000 ffbfa800 80000004 
00000004 
(XEN)    00000001 00000001 000000d7 fee6a000 0001000a ffbfa800 ff103db0 
[ff12eea9] 
(XEN)    fc5800f0 0000004d ff103dd0 00000000 20000000 00000001 ff103e00 
[ff12f5f4] 
(XEN)    fc5800f0 20000000 ffbfa800 ffbfa800 ffbfa800 80000002 80000003 
00000004 
(XEN)    00010102 f0000000 f0000000 00000004 261a0001 f0000000 fc580104 
f0000000 
(XEN)    f0000000 261a0001 ff103e30 [ff12de43] fc5800f0 261a0000 00000004 
00000000 
(XEN)    00000002 00000083 [ff133aa7] 00000004 00000000 fc5800f0 ff103e60
[ff12e2f8] 
(XEN)    0001000a 261a0000 ffbfa800 c3400000 00003400 009ab000 000e0003 
c0115433 
(XEN)    00000000 ffbf9080 ff103ec0 [ff12ec48] 1000a067 00010102 ffbfa800 
0000030d 
(XEN)    ff170130 10102001 00000063 ffbfa800 ffbfa800 00000000 ffbfe000 
00000004 
(XEN)    00000001 58000002 58000002 00000004 58000003 00000000 00000004 
fee69c34 
(XEN)    ff103ebc 00000000 ff103fb0 [ff130da3] fee69c34 1000a067 00010102 
00000000 
(XEN)    00000000 00000000 00000000 00000004 0416ddf0 00a40204 83661100 
c0102c34 
(XEN)    c3400000 ff103f6c [ff1332e9] ff103fb8 c09ab028 ff16fae8 00000004 
103ff063 
(XEN)    ffbf9080 ff103f6c [ff1329cc] fe3f8c00 00000001 ffbe9000 00000001 
ffbfa800 
(XEN)    00000000 40000000 00010102 1000a067 00000000 ff103fa0 c051beec 
00000008 
(XEN)    00000000 109ab021 10102001 fee69001 ffbf9080 58000002 ffbfa800 
ffbf9080 
(XEN)    00000000 00000000 00000000 00000000 00000000 00000000 fc581830 
00010102 
(XEN)    00010102 fee69c34 10102c34 1000a067 ffbf9080 00007ff0 00003400 
[ff151673] 
(XEN) Call Trace from ESP=ff103d38:
(XEN)    [<ff151f3e>] [<ff12e4ff>] [<ff12eea9>] [<ff12f5f4>] [<ff12de43>]
[<ff133aa7>] 
(XEN)    [<ff12e2f8>] [<ff12ec48>] [<ff130da3>] [<ff1332e9>] [<ff1329cc>]
[<ff151673>] 
(XEN) debugtrace_dump() starting
(XEN) debugtrace_dump() finished

****************************************
CPU0 GENERAL PROTECTION FAULT
[error_code=0103]
Aieee! CPU0 is toast...
****************************************

Reboot in five seconds...



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 36] New: GPF in Xen during ptwr update, bugzilla-daemon <=