|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] Shadow OOS bug?
Duplicate report of "Xen crash on HVM shutdown" from this week on this list.
Keir: Please commit Gianluca's fix.
Christoph
On Friday 27 June 2008 11:10:06 Cui, Dexuan wrote:
> I'm using c/s 17893: dedfadeadf86.
> When I destroy an HVM guest, I can _occasionally_ (maybe 30% probable)
> see the issue.
> Let me post the log below FYI.
>
> --- Dexuan
>
> (XEN) ----[ Xen-3.3-unstable x86_64 debug=y Not tainted ]----
> (XEN) CPU: 0
> (XEN) RIP: e008:[<ffff828c8019d2bb>] oos_fixup_remove+0x55/0x71
> (XEN) RFLAGS: 0000000000010206 CONTEXT: hypervisor
> (XEN) rax: 0000000000000888 rbx: ffff82840085c7f8 rcx:
> ffff83005d432000
> (XEN) rdx: 0000000000000000 rsi: 0000000000035833 rdi:
> ffff83005d436100
> (XEN) rbp: ffff828c80277a98 rsp: ffff828c80277a98 r8:
> 000000000000005b
> (XEN) r9: ffffffffffffffff r10: 0000000000000000 r11:
> 00ff00ff00ff00ff
> (XEN) r12: 0000000000035833 r13: ffff83005d436100 r14:
> ffff83005d4ec100
> (XEN) r15: ffff83005d436100 cr0: 000000008005003b cr4:
> 00000000000026b0
> (XEN) cr3: 000000003fc3d000 cr2: ffff83005d432888
> (XEN) ds: 0000 es: 0000 fs: 0063 gs: 0000 ss: e010 cs: e008
> (XEN) Xen stack trace from rsp=ffff828c80277a98:
> (XEN) ffff828c80277ac8 ffff828c8019e330 0000000000035833
> 0000000000000008
> (XEN) 0000000000035833 000000000005cdb7 ffff828c80277b18
> ffff828c801bbec6
> (XEN) ffff83005d4ec100 000000000005cdb7 ffff83005d436100
> ffff828400e82498
> (XEN) 0000000000000000 000000000005cdb7 0000000000000002
> ffff83005d436100
> (XEN) ffff828c80277b28 ffff828c801a104c ffff828c80277b98
> ffff828c801bbdb6
> (XEN) 0000beef0000beef ffff83005d436100 0000000000e2d5d8
> ffff83005abbf000
> (XEN) 000000005d4ec100 000000000005abbf 000000000005abbf
> ffff828400e2d5d8
> (XEN) 0000000000000000 000000000005abbf 0000000000000000
> ffff83003b58f000
> (XEN) ffff828c80277ba8 ffff828c801a107d ffff828c80277c08
> ffff828c801bbaa7
> (XEN) ffff83005d4ec100 ffff83005d436100 000000000003b58f
> 000000000003b58f
> (XEN) ffff83005d436100 ffff828400945e58 0000000000000000
> 0000000000000000
> (XEN) 000000000003b58f ffff83005d436100 ffff828c80277c18
> ffff828c801a1084
> (XEN) ffff828c80277c78 ffff828c801bb816 ffff83005d436100
> 0000000080277f28
> (XEN) ffff830059c5d000 0000000000059c5d 0000000000059c5d
> ffff828400e06e88
> (XEN) 0000000000000000 0000000000059c5d ffff83005d4ec100
> 0000000000000002
> (XEN) ffff828c80277c88 ffff828c801a108b ffff828c80277cf8
> ffff828c8019ed8d
> (XEN) ffff828c80277cd8 ffff828c80112a35 ffff83005d436100
> ffff83005d436100
> (XEN) ffff83005d4ed068 ffff83005d436100 0000000100000002
> ffff83005d4ec100
> (XEN) ffff83005d4ed0a8 0000000000000000 0000000000000002
> 0000000000000004
> (XEN) ffff828c80277d58 ffff828c801a038e ffff83005d4ec100
> ffff828c80277f28
> (XEN) Xen call trace:
> (XEN) [<ffff828c8019d2bb>] oos_fixup_remove+0x55/0x71
> (XEN) [<ffff828c8019e330>] shadow_demote+0xb2/0xca
> (XEN) [<ffff828c801bbec6>] sh_destroy_l1_shadow__guest_4+0xe4/0x338
> (XEN) [<ffff828c801a104c>] sh_destroy_shadow+0xfe/0x16f
> (XEN) [<ffff828c801bbdb6>] sh_destroy_l2_shadow__guest_4+0x2df/0x30b
> (XEN) [<ffff828c801a107d>] sh_destroy_shadow+0x12f/0x16f
> (XEN) [<ffff828c801bbaa7>] sh_destroy_l3_shadow__guest_4+0x265/0x295
> (XEN) [<ffff828c801a1084>] sh_destroy_shadow+0x136/0x16f
> (XEN) [<ffff828c801bb816>] sh_destroy_l4_shadow__guest_4+0x2b2/0x2de
> (XEN) [<ffff828c801a108b>] sh_destroy_shadow+0x13d/0x16f
> (XEN) [<ffff828c8019ed8d>] _shadow_prealloc+0x3bb/0x568
> (XEN) [<ffff828c801a038e>] sh_set_allocation+0x1ec/0x32a
> (XEN) [<ffff828c801a5095>] shadow_teardown+0x2d0/0x465
> (XEN) [<ffff828c8019a03a>] paging_teardown+0x2e/0x3d
> (XEN) [<ffff828c8013fa58>] domain_relinquish_resources+0x51/0x190
> (XEN) [<ffff828c80105597>] domain_kill+0x76/0x171
> (XEN) [<ffff828c80104780>] do_domctl+0x54b/0xc4b
> (XEN) [<ffff828c801c71bf>] syscall_enter+0xef/0x149
> (XEN)
> (XEN) Pagetable walk from ffff83005d432888:
> (XEN) L4[0x106] = 000000005d67d027 5555555555555555
> (XEN) L3[0x001] = 000000005d67f027 5555555555555555
> (XEN) L2[0x0ea] = 000000007d59f063 5555555555555555
> (XEN) L1[0x032] = 000000005d432262 5555555555555555
> (XEN)
> (XEN) ****************************************
> (XEN) Panic on CPU 0:
> (XEN) FATAL PAGE FAULT
> (XEN) [error_code=0000]
> (XEN) Faulting linear address: ffff83005d432888
> (XEN) ****************************************
> (XEN)
> (XEN) Reboot in five seconds...
>
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel
--
AMD Saxony, Dresden, Germany
Operating System Research Center
Legal Information:
AMD Saxony Limited Liability Company & Co. KG
Sitz (Geschäftsanschrift):
Wilschdorfer Landstr. 101, 01109 Dresden, Deutschland
Registergericht Dresden: HRA 4896
vertretungsberechtigter Komplementär:
AMD Saxony LLC (Sitz Wilmington, Delaware, USA)
Geschäftsführer der AMD Saxony LLC:
Dr. Hans-R. Deppe, Thomas McCoy
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|