|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 1735] New: Xen panic when free p2m page
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1735
Summary: Xen panic when free p2m page
Product: Xen
Version: unstable
Platform: x86-64
OS/Version: Linux
Status: NEW
Severity: major
Priority: P1
Component: Hypervisor
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: yang.z.zhang@xxxxxxxxx
Environment:
------------
Service Arch (ia32/ia32e/IA64): 32e
Guest Arch (ia32/ia32e/IA64): 32e
Guest OS Type (Linux/Windows):Linux
Change Set: 22904
Hardware: westmere-EP
Other:
xen changeset: 22904:c64dcc4d2eca
tag: tip
user: Keir Fraser <keir@xxxxxxx>
date: Thu Feb 10 17:24:41 2011 +0000
files: xen/Makefile
description:
Update Xen evrsion to 4.1.0-rc5-pre
pvops dom0:
commit 75cc13f5aa29b4f3227d269ca165dfa8937c94fe
Merge: 2607c07 a386bf7
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
Date: Thu Dec 9 17:16:16 2010 -0800
qemu-xen:
commit 833e7e9a4c95739429dc0c803bbbf2346f9897fd
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date: Thu Jul 8 17:33:29 2010 +0100
Bug detailed description:
--------------------------
We met xen panic when run the case of live migration. We see this issue against
changeset 22904. From the log, it shows the domain want to free the p2m page
which not belong to itself and then it raise the panic.
And this issue is very hard to reproduce.
[ 3833.665676] tap30.0: no IPv6 routers present
[ 3834.240678] vif30.0: no IPv6 routers present
(XEN) HVM30: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM30: *** int 15h function AX=ec00, BX=0002 not yet supported!
(XEN) HVM30: KBD: unsupported int 16h function 03
(XEN) HVM30: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM30: int13_harddisk: function 02, unmapped device for ELDL=81
(XEN) HVM30: int13_harddisk: function 41, unmapped device for ELDL=81
[ 3838.470695] xenbr0: port 2(vif30.0) entering forwarding state
[ 3838.599680] xenbr0: port 3(tap30.0) entering forwarding state
(XEN) irq.c:324: Dom30 callback via changed to GSI 5
[ 3875.893762] device xenbr0 left promiscuous mode
(XEN) Assertion 'page_get_owner(pg) == d' failed at hap.c:334
(XEN) ----[ Xen-4.1.0-rc5-pre x86_64 debug=y Not tainted ]----
(XEN) CPU: 19
(XEN) RIP: e008:[<ffff82c480202737>] hap_free_p2m_page+0xdf/0x1f8
(XEN) RFLAGS: 0000000000010207 CONTEXT: hypervisor
(XEN) rax: 0000000000000000 rbx: ffff83029269a000 rcx: 0000000000000000
(XEN) rdx: 0000000000000000 rsi: ffff82f60524d060 rdi: ffff83029269aee4
(XEN) rbp: ffff83013ef3fc18 rsp: ffff83013ef3fbf8 r8: ffff830292684000
(XEN) r9: 0000000000000001 r10: ffff81000bc50b00 r11: 0000000000000280
(XEN) r12: ffff82f60524d060 r13: 0000000000000001 r14: ffff830292684008
(XEN) r15: 000000000000f539 cr0: 000000008005003b cr4: 00000000000026f0
(XEN) cr3: 00000002b8342000 cr2: 00002ae9d01fd020
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: e008
(XEN) Xen stack trace from rsp=ffff83013ef3fbf8:
(XEN) ffff83013ef3fc28 ffff830292683000 0000000000292683 ffff83029269a000
(XEN) ffff83013ef3fc28 ffff82c4801cadb2 ffff83013ef3fc98 ffff82c4801ccca8
(XEN) 0000000900000000 ffff83029269af18 0000000000000000 0000000000000000
(XEN) 0000000000000008 ffff83013ef3ff18 0000000000292680 0000000000000001
(XEN) ffff830102ae8d90 000000000000f539 0000000000000000 0000000000000000
(XEN) ffff83013ef3fd18 ffff82c4801abfec ffff8300bf7d6000 01ff8300bf0de000
(XEN) ffff81000f539ee8 01ff83013ef3fcf0 000000000f539ee8 ffff8300bf7d6000
(XEN) 0000000000138b39 ffff8300bf7d6000 0000000200000007 ffff830102ae8d90
(XEN) 0000000000000000 0000000000000030 0000000000000030 ffff83013ef3ff18
(XEN) ffff83013ef3ff08 ffff82c4801c996d ffff82c400000000 ffff82c480156e67
(XEN) 0000000000000000 0000000000080000 0000000000000000 ffff83013ef3fd70
(XEN) 0000038f5c4ba958 ffff8300bf7d6000 0000000000000000 00000000000001aa
(XEN) 000000000f539ee8 ffff83013ef3fdd0 0000000000000080 0000000000000002
(XEN) ffff8300bf7d6000 000000000000f539 ffff83013ef3fdc0 ffff83013ef3fe10
(XEN) ffff82c48017b74f 00000000000001fe 0000003ace40c4fe 0000038f21985de1
(XEN) 000000ffb6d8e01f 0000000000000000 0000000000000000 ffff83013ef3fe20
(XEN) ffff83013ef3fe18 ffff82c480125af7 0000000000000202 ffff83013ef3fe28
(XEN) ffff82c4801236e2 ffff8300bf7d7810 ffff83013ef3fe58 ffff82c4801bb9cb
(XEN) 0000000000000282 ffff83013ef3fe58 ffff82c4801236e2 ffff8300bf7d6000
(XEN) ffff83013ef3feb8 ffff82c4801bbe3b ffff83013ef3fe88 ffff82c4801b7f2c
(XEN) Xen call trace:
(XEN) [<ffff82c480202737>] hap_free_p2m_page+0xdf/0x1f8
(XEN) [<ffff82c4801cadb2>] paging_free_log_dirty_page+0x42/0x44
(XEN) [<ffff82c4801ccca8>] paging_mark_dirty+0x447/0x51f
(XEN) [<ffff82c4801abfec>] hvm_hap_nested_page_fault+0x1be/0x23a
(XEN) [<ffff82c4801c996d>] vmx_vmexit_handler+0x1875/0x1bf8
(XEN)
(XEN) [VT-D]iommu.c:1785: VT-d page table not sharing with EPT table
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 19:
(XEN) Assertion 'page_get_owner(pg) == d' failed at hap.c:334
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
(XEN) Resetting with ACPI MEMORY or I/O RESET_REG.
Reproduce steps:
----------------
1.install the latest xen-unstable(22904)
2.prepare the guest and use xl create to start guest
3.run xl migrate to do migration
Current result:
----------------
xen panic
Expected result:
----------------
guest work well
Basic root-causing log:
----------------------
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 1735] New: Xen panic when free p2m page,
bugzilla-daemon <=
|
|
|
|
|