| 
 Hi list, 
I had a hypervisor crash and would need some assistance. 
This is a SLES11 SP1 system with some patches from Novell. 
I got a vmcore but reading it with crash in xen-mode failed. So I tried 
# strings vmcore | grep '(XEN)' 
and got the following output (among others): 
(XEN) page_alloc.c:1111:d9 Over-allocation for domain 9: 263169 > 263168 
(XEN) memory.c:132:d9 Could not allocate order=0 extent: id=9 memflags=0 (79 of 512) 
(XEN) memory.c:171:d9 Domain 9 page number 11fe4f invalid 
(XEN) page_alloc.c:1111:d9 Over-allocation for domain 9: 263169 > 263168 
(XEN) memory.c:132:d9 Could not allocate order=0 extent: id=9 memflags=0 (79 of 512) 
(XEN) memory.c:171:d9 Domain 9 page number 11fe4f invalid 
    These messages are surely caused by failures of our balloon stuff in 
    our domU. 
(XEN) sh error: sh_remove_all_mappings(): can't find all mappings of mfn 3f3daac: c=00000005 t=7400000000000000 
    Because I'am not familiar with the shadow code, what type of mappings can 
    lead to such a warning, in which direction should I look? 
(XEN) Xen BUG at page_alloc.c:385 
    The code line is: 
        BUG_ON(pg[i].count_info != PGC_state_free); 
    Is it possible in any way that a free page is in use? Or is it always a 
    failure somewhere in the code like a multiple use of the same page? 
    Any help would be very welcome. 
    Thanks. 
    Dietmar.  
(XEN) ----[ Xen-4.0.0_21091_04-0.2.6.1590.1.PTF.624285  x86_64  debug=n  Tainted:    C ]---- 
(XEN) CPU:    15 
(XEN) RIP:    e008:[<ffff82c480117491>] alloc_heap_pages+0x451/0x460 
(XEN) RFLAGS: 0000000000010a02   CONTEXT: hypervisor 
(XEN) rax: 0180000000000000   rbx: ffff82f65ac3afc0   rcx: 0000000000000000 
(XEN) rdx: 0000000000000019   rsi: 0000000000000000   rdi: ffff833fcfbff9e8 
(XEN) rbp: 0000000000000000   rsp: ffff833fcfbff998   r8:  0000000000000001 
(XEN) r9:  00000000000001db   r10: 0000000000000000   r11: ffff82c48047fc80 
(XEN) r12: ffff82c480267324   r13: ffff833fcfbff9e8   r14: 0000000000000020 
(XEN) r15: ffff833fcfbff9c8   cr0: 0000000080050033   cr4: 00000000000026f0 
(XEN) cr3: 0000003012034000   cr2: 00000000beff6fec 
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008 
(XEN) Xen stack trace from rsp=ffff833fcfbff998: 
(XEN)    ffff8330193e0000 0000000000000000 0000000100000027 ffff82f65ac3afc0 
(XEN)    00000001ffb83cb0 0000000000000001 0000000000000000 0000000000000000 
(XEN)    0000000000000000 0000000000000000 ffff833fcfbffa2c ffff833fcfbfff28 
(XEN)    ffff833fcfbfff28 ffff833fcfbffa1c 0000000400000001 0000000000000000 
(XEN)    0000000000000027 0000000000000000 ffff8330193e0000 0000000000000000 
(XEN)    0000000000000000 ffff82c4801177e8 0100000000000006 0000000000000000 
(XEN)    0000000000000196 ffff9700ffb83cb0 0000000000000006 ffff833fcfbfff28 
(XEN)    ffff8330193e0000 ffff82c480114396 ffffffffffffffff ffff833fcfbffb2c 
(XEN)    ffff833fcfbfff28 ffff8330193e0000 0000000000000223 ffff830077c26000 
(XEN)    ffff9700ff02315b 0000000000000010 ffff833fcfbffc00 ffff82c4801a4ce2 
(XEN)    00000000cfbffc58 ffff833fcfbfff28 ffff833fcfbfff28 ffff833fcfbffc80 
(XEN)    ffff833fcfbfff28 ffff833fcfbffb1c 00000004193e0218 0000000000000380 
(XEN)    0000000100000004 000000000000a09b ffff82c480483280 0000000000000200 
(XEN)    ffff9700ffb83000 ffff830077c26000 ffff833fcfbfff28 0000000000000200 
(XEN)    0000000000000001 ffff82c48019e419 ffff833fcfbffb78 ffff830077c26000 
(XEN)    ffff9700ff02315b ffff830077c26000 ffff833fcfbffbe8 ffff830077c26000 
(XEN)    ffff97600016bbd8 ffff82c4801a8cf2 ffff9700fe1a9f98 0000000000000000 
(XEN)    ffff833fcfbffc78 ffff82c4801a4db0 0000000133210188 ffff833fcfbfff28 
(XEN)    ffff833fcfbffc1c ffff833fcfbfff28 ffff833fcfbfff28 0000004000000040 
(XEN)    0000000500000001 48c300000380b889 ff9700ffb81708b8 ffff9700ff02315b 
(XEN) Xen call trace: 
(XEN)    [<ffff82c480117491>] alloc_heap_pages+0x451/0x460 
(XEN)    [<ffff82c4801177e8>] alloc_domheap_pages+0x178/0x1a0 
(XEN)    [<ffff82c480114396>] do_memory_op+0xb86/0x1d20 
(XEN)    [<ffff82c4801a4ce2>] __hvm_copy+0x1c2/0x4c0 
(XEN)    [<ffff82c48019e419>] hvm_emulate_one+0xc9/0x1b0 
(XEN)    [<ffff82c4801a8cf2>] handle_mmio+0x92/0x1b0 
(XEN)    [<ffff82c4801a4db0>] __hvm_copy+0x290/0x4c0 
(XEN)    [<ffff82c4801a51c0>] copy_to_user_hvm+0x60/0x100 
(XEN)    [<ffff82c4801a292e>] hvm_memory_op+0xe/0x40 
(XEN)    [<ffff82c4801a2c57>] hvm_do_hypercall+0x247/0x280 
(XEN)    [<ffff82c4801be86b>] vmx_vmexit_handler+0xaab/0x1dd0 
(XEN)    [<ffff82c4801b31be>] pt_restore_timer+0x5e/0xb0 
(XEN)    [<ffff82c4801a3d31>] hvm_do_resume+0x31/0x1b0 
(XEN)    [<ffff82c4801b8d43>] vmx_do_resume+0x123/0x1d0 
(XEN)    [<ffff82c48014d852>] context_switch+0x192/0xed0 
(XEN)    [<ffff82c48014c6bd>] vcpu_kick+0x1d/0x80 
(XEN)    [<ffff82c4801b3243>] pt_update_irq+0x33/0x230 
(XEN)    [<ffff82c4801aa184>] hvm_vcpu_has_pending_irq+0x54/0x70 
(XEN)    [<ffff82c4801b7e2c>] vmx_intr_assist+0x5c/0x240 
(XEN)    [<ffff82c4801bb1fb>] vmx_vmenter_helper+0x5b/0x150 
(XEN)    [<ffff82c4801b7be3>] vmx_asm_do_vmentry+0x0/0xdd 
(XEN)     
(XEN)  
(XEN) **************************************** 
(XEN) Panic on CPU 15: 
(XEN) Xen BUG at page_alloc.c:385 
(XEN) **************************************** 
(XEN)  
(XEN) Reboot in five seconds... 
(XEN) do_IRQ: 15.225 No irq handler for vector (irq -1) 
--  
Company details: http://ts.fujitsu.com/imprint.html  |