WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] xen-unstable c/s 19662 freezes up

To: Jan Beulich <JBeulich@xxxxxxxxxx>, Dan Magenheimer <dan.magenheimer@xxxxxxxxxx>
Subject: Re: [Xen-devel] xen-unstable c/s 19662 freezes up
From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Date: Thu, 28 May 2009 09:31:32 +0100
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Thu, 28 May 2009 01:32:11 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4A1E60270200007800003052@xxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcnfahPsNhjN6FAtSo2w3oi6Nll42gABKBSw
Thread-topic: [Xen-devel] xen-unstable c/s 19662 freezes up
User-agent: Microsoft-Entourage/12.17.0.090302
I'd say that's a concern in on_selected_cpus() too, although it tenmds to be
called with less volatile cpumasks. I will fix both.

 -- Keir

On 28/05/2009 08:57, "Jan Beulich" <JBeulich@xxxxxxxxxx> wrote:

> Hmm, that would seem to be a case where the to-be-flushed-cpus mask changes
> under the feet of flush_tlb_mask(). I'd suppose that passing &flush_cpumask
> rather than mask from flush_area_mask() to send_IPI_mask() should help - could
> you give this a try?
> 
> Jan
> 
>>>> Dan Magenheimer <dan.magenheimer@xxxxxxxxxx> 28.05.09 00:10 >>>
>> From: Keir Fraser [mailto:keir.fraser@xxxxxxxxxxxxx]
>> Subject: Re: [Xen-devel] xen-unstable c/s 19662 freezes up
>> 
>> On 27/05/2009 22:24, "Dan Magenheimer"
>> <dan.magenheimer@xxxxxxxxxx> wrote:
>> 
>>> I'm getting a freeze consistently when launching a second PV domain
>>> on xen-unstable tip.  After spending hours assuming it was a tmem
>>> problem, I turned tmem off and reproduced it without tmem.  It
>>> appears from the dump that there is a locking problem in
>> grant tables.
>>> C/s 19658 perhaps?  I'll try backing that out.
>> 
>> Thanks. You can also build with debug=y to get a better
>> backtrace which will
>> only include functions which really are in the backtrace
>> (since debug builds
>> include frame pointers). The backtrace you provided is
>> probably 75% rubbish.
> 
> With 19658 backed out, I still get a freeze.  Now I am
> seeing it when launching the first domain.  Attached are
> dumps from two runs. flush_area_mask is the common denominator.
> 
> =====================================================================
> 
> (XEN) *** Serial input -> Xen (type 'CTRL-a' three times to switch input to
> DOM0
> )
> (XEN) 'd' pressed -> dumping registers
> (XEN)
> (XEN) *** Dumping CPU1 host state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    1
> (XEN) RIP:    e008:[<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN) RFLAGS: 0000000000010292   CONTEXT: hypervisor
> (XEN) rax: 0000000000000000   rbx: 0000000000000064   rcx: 0000000000000001
> (XEN) rdx: 000000000000000a   rsi: 000000000000000a   rdi: 0000000000000000
> (XEN) rbp: ffff83007d4f73b8   rsp: ffff83007d4f73a8   r8:  0000000000000004
> (XEN) r9:  0000000000000004   r10: 0000000000000001   r11: 0000000000000001
> (XEN) r12: ffff83007d4f7548   r13: ffff828c8020be38   r14: 0000000000000286
> (XEN) r15: ffff83007d4f7548   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2dc000   cr2: 000000000938c454
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0000   ss: 0000   cs: e008
> (XEN) Xen stack trace from rsp=ffff83007d4f73a8:
> (XEN)    ffff83007d4f7548 0000000000000064 ffff83007d4f73e8 ffff828c8010e457
> (XEN)    0000000000000064 ffff83007d4f7548 ffff828c8020be38 0000000000000286
> (XEN)    ffff83007d4f7408 ffff828c8010dcdd ffff83007d4f7548 0000000000000064
> (XEN)    ffff83007d4f7418 ffff828c801307a9 ffff83007d4f7438 ffff828c80130878
> (XEN)    ffff828c8020bdc0 ffff828c801307ed ffff83007d4f7488 ffff828c80131c1d
> (XEN)    ffff83007d4f7458 ffff828c80130fbb 64ff83007d4f7488 0000000000000061
> (XEN)    ffff828c802ac5a0 ffff828c8020bdc0 ffff83007d4f7548 ffff83007d4f7f28
> (XEN)    ffff83007d4f74b8 ffff828c80131278 ffff83007d4f7548 ffff828c802a6900
> (XEN)    0000000000000000 ffff828c802be024 ffff83007d4f7538 ffff828c80151edd
> (XEN)    000000f17d4f7f28 ffff828c802be000 ffff828c802ac5c8 0000000000000000
> (XEN)    ffff83007d4f7518 ffff828c80166778 0000000000000000 ffff83007c808308
> (XEN)    ffff83007d4f7f28 ffff83007c808308 ffff83007d4f7f28 ffff828c801e81c0
> (XEN)    0000000000000000 0000000000000100 00007cff82b08a97 ffff828c8014ae46
> (XEN)    0000000000000100 0000000000000000 ffff828c801e81c0 ffff83007d4f7f28
> (XEN)    ffff83007d4f7628 ffff83007c808308 0000000000000000 290000000000005d
> (XEN)    0100000000000000 0800000000000000 fffffffffffffffd 0000000000000001
> (XEN)    ffff828c801e81d0 00000000000000fd ffff83007c808308 000000f100000000
> (XEN)    ffff828c80163311 000000000000e008 0000000000000202 ffff83007d4f75f8
> (XEN)    0000000000000000 ffff828c80163306 ffff828c8011b982 ffff83007d4f76e0
> (XEN)    00000000c381be38 0000000000000001 ffff83007d4f7da8 ffff83007d4f7f28
> (XEN) Xen call trace:
> (XEN)    [<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN)    [<ffff828c8010e457>] dump_registers+0x57/0x140
> (XEN)    [<ffff828c8010dcdd>] handle_keypress+0x76/0x95
> (XEN)    [<ffff828c801307a9>] __serial_rx+0x16/0x5a
> (XEN)    [<ffff828c80130878>] serial_rx+0x8b/0x90
> (XEN)    [<ffff828c80131c1d>] serial_rx_interrupt+0xab/0xc1
> (XEN)    [<ffff828c80131278>] ns16550_interrupt+0x47/0x61
> (XEN)    [<ffff828c80151edd>] do_IRQ+0x476/0x4fd
> (XEN)    [<ffff828c8014ae46>] common_interrupt+0x26/0x30
> (XEN)    [<ffff828c80163311>] flush_area_mask+0x113/0x13e
> (XEN)    [<ffff828c8010c01e>] do_grant_table_op+0xf34/0x16d9
> (XEN)    [<ffff828c8010c9dd>] compat_grant_table_op+0x21a/0x9dd
> (XEN)    [<ffff828c801e5bd0>] compat_hypercall+0xc0/0x119
> (XEN)
> (XEN) *** Dumping CPU1 guest state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    1
> (XEN) RIP:    0061:[<00000000c0101287>]
> (XEN) RFLAGS: 0000000000000246   EM: 0   CONTEXT: pv guest
> (XEN) rax: 0000000000000014   rbx: 0000000000000001   rcx: 00000000c381be20
> (XEN) rdx: 0000000000000001   rsi: 00000000cfd64214   rdi: 000000000000011f
> (XEN) rbp: 00000000c381be38   rsp: 00000000c381be0c   r8:  0000000000000000
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2dc000   cr2: 00000000b7e2a2c0
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0000   ss: 0069   cs: 0061
> (XEN) Guest stack trace from esp=c381be0c:
> (XEN)   c025541b c381be20 cff0b1b0 00000001 00000001 cf263000 00000000
> 00000000
> (XEN)   00000000 0000011f cfac0000 c1219f80 c381bea4 c011e7e1 00000000
> c11e4c60
> (XEN)   c040fb80 c7758000 00000063 80000000 80000000 c381bfc0 00001000
> cf587000
> (XEN)   00000000 cf588000 cf264000 cf587000 c0248ac6 cf263000 00000000
> c381bfc0
> (XEN)   00001000 00001000 c0247829 00000000 c11e4c60 00000000 4a1db591
> c85b7f00
> (XEN)   ca611f48 c012a920 3b9aca00 cfb1dc00 ca611e9c c85b7f00 ca611f48
> 000dbb81
> (XEN)   c0195dad 4a1db591 00000000 c85b7f00 c85b7f00 c0155688 00001000
> 00000001
> (XEN)   c85b7f00 c85b7f48 ca611e9c 004fffff 00000000 000dbb81 000dbb81
> 000dbb7f
> (XEN)   00000000 00000005 00000000 000dbb81 00001000 000dbb80 00000008
> cb6b3540
> (XEN)   00000000 cff0b1b0 00000000 c02556b7 00000020 00000000 cb6b3540
> 00000000
> (XEN)   c0255740 c0255771 cb6b3540 00001000 c01800aa c381bf68 c0247780
> 00001000
> (XEN)   00000000 00000000 cb6b3540 dbb80000 00000000 c0248d29 c0247780
> c381bfc0
> (XEN)   00000000 cf2c0220 cf2c0240 cf2c0230 0000001e cf2c0134 cb6b3540
> 00000001
> (XEN)   00000000 c0248f20 00001000 00000001 00001000 cf2c0134 c11e4c60
> 00001000
> (XEN)   00001000 dbb81000 00000000 c0248b00 00000000 00000000 00000000
> c0103005
> (XEN)   cf2c0134 00000000 00000000 00000000 00000000 00000013 00000000
> 00a16c20
> (XEN)   00a16c20 00000000 00000019 00000f90 00000f30 00000002 00a19cc0
> 000000b7
> (XEN)   ffffffff 00000000 57206e4f 6f646e69 202c7377 656d6f73 66656420
> 746c7561
> (XEN)   636e6520 6e69646f 61207367 6e206572 7020746f 69766f72 20646564
> 50207962
> (XEN)   6f687479 200a2c6e 77202020 656c6968 65687420 72612079 6c612065
> 73796177
> (XEN)
> (XEN) *** Dumping CPU0 host state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    e008:[<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN) RFLAGS: 0000000000010092   CONTEXT: hypervisor
> (XEN) rax: ffff83007d4f7358   rbx: ffff828c8020d6a4   rcx: ffff828c8028ff28
> (XEN) rdx: ffff828c802a6900   rsi: ffff828c8010dae4   rdi: 0000000000000000
> (XEN) rbp: ffff828c8028fda8   rsp: ffff828c8028fd98   r8:  0000000000000000
> (XEN) r9:  ffff83007d2d8000   r10: 00000000deadbeef   r11: 0000000000000000
> (XEN) r12: ffff828c8028ff28   r13: ffff828c801e81c0   r14: 0000000000000000
> (XEN) r15: 0000000000000100   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2d7000   cr2: 00000000c16373c0
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0000   ss: 0000   cs: e008
> (XEN) Xen stack trace from rsp=ffff828c8028fd98:
> (XEN)    ffff828c8028fdc8 ffff828c8020d6a4 ffff828c8028fdb8 ffff828c80162d05
> (XEN)    ffff828c8028fdc8 ffff828c80162d80 00007d737fd70207 ffff828c8014bf00
> (XEN)    0000000000000100 0000000000000000 ffff828c801e81c0 ffff828c8028ff28
> (XEN)    ffff828c8028fe88 ffff828c8020d6a4 0000000000000000 00000000deadbeef
> (XEN)    ffff83007d2d8000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000202 0000000000000000 ffff828c8020d6a8 000000fb00000000
> (XEN)    ffff828c8011b984 000000000000e008 0000000000000246 ffff828c8028fe80
> (XEN)    0000000000000000 ffff828c8028fed8 ffff828c8028fec8 ffff828c801632b5
> (XEN)    00007ff001c9c380 0000000000000000 ffff828c8028ff28 ffff828c802a7900
> (XEN)    0000000000000000 0000000000000000 ffff828c8028fee8 ffff828c8016337d
> (XEN)    0000000000000002 ffff83007d2d8000 ffff828c8028ff18 ffff828c8011b4c7
> (XEN)    0000000000000000 ffff83007d2d8000 0000000000000000 0000000000000000
> (XEN)    00007d737fd700b7 ffff828c801e5ca6 0000000000000000 0000000000000000
> (XEN)    0000000000000000 0000000000000000 00000000c12e1fa4 00000000deadbeef
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000000000 00000000deadbeef 00000000deadbeef 00000000deadbeef
> (XEN)    00000000c92dc040 0000010000000000 00000000c0101347 0000000000000061
> (XEN)    0000000000000a17 00000000c12e1f28 0000000000000069 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    ffff83007d2d8000
> (XEN) Xen call trace:
> (XEN)    [<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN)    [<ffff828c80162d05>] __smp_call_function_interrupt+0x5e/0xa6
> (XEN)    [<ffff828c80162d80>] smp_call_function_interrupt+0x33/0x35
> (XEN)    [<ffff828c8014bf00>] call_function_interrupt+0x30/0x40
> (XEN)    [<ffff828c8011b984>] _spin_lock+0x13/0x2d
> (XEN)    [<ffff828c801632b5>] flush_area_mask+0xb7/0x13e
> (XEN)    [<ffff828c8016337d>] new_tlbflush_clock_period+0x41/0x74
> (XEN)    [<ffff828c8011b4c7>] do_softirq+0x6a/0x77
> (XEN)
> (XEN) *** Dumping CPU0 guest state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    0061:[<00000000c0101347>]
> (XEN) RFLAGS: 0000000000000a17   EM: 1   CONTEXT: pv guest
> (XEN) rax: 0000000000000000   rbx: 00000000deadbeef   rcx: 00000000deadbeef
> (XEN) rdx: 00000000deadbeef   rsi: 00000000deadbeef   rdi: 00000000c92dc040
> (XEN) rbp: 00000000c12e1fa4   rsp: 00000000c12e1f28   r8:  0000000000000000
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2d7000   cr2: 00000000b3678000
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0000   ss: 0069   cs: 0061
> (XEN) Guest stack trace from esp=c12e1f28:
> (XEN)   c030290a 00000001 00000002 00000001 00000000 c040f180 3ca25230
> 0000002b
> (XEN)   c12e1f78 00000001 c12dd080 c8e46c90 3d3a3243 0000002b 0097e013
> c12dd1a8
> (XEN)   c1219f80 0000021a 00000000 c1219fc4 00000005 00073c1c 00000061
> 00000246
> (XEN)   c0108df2 4048bcdf 0000002b 00000000 00000000 ffffffff 00000001
> c040f180
> (XEN)   c01036f1 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 c12dcb10
> c035c8a0
> (XEN)   00000000 00000000 00000000 00000000 ffffffff 00000000 c0130ba0
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)
> 
> ==============================================================================
> 
> (XEN) *** Serial input -> Xen (type 'CTRL-a' three times to switch input to
> DOM0
> )
> (XEN) 'd' pressed -> dumping registers
> (XEN)
> (XEN) *** Dumping CPU1 host state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    1
> (XEN) RIP:    e008:[<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN) RFLAGS: 0000000000210296   CONTEXT: hypervisor
> (XEN) rax: 0000000000000000   rbx: 0000000000000064   rcx: 0000000000000001
> (XEN) rdx: 000000000000000a   rsi: 000000000000000a   rdi: 0000000000000000
> (XEN) rbp: ffff83007d4f7b38   rsp: ffff83007d4f7b28   r8:  0000000000000004
> (XEN) r9:  0000000000000004   r10: 0000000000000001   r11: 0000000000000001
> (XEN) r12: ffff83007d4f7cc8   r13: ffff828c8020be38   r14: 0000000000200282
> (XEN) r15: ffff83007d4f7cc8   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2dc000   cr2: 00000000c28ddd58
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0033   ss: 0000   cs: e008
> (XEN) Xen stack trace from rsp=ffff83007d4f7b28:
> (XEN)    ffff83007d4f7cc8 0000000000000064 ffff83007d4f7b68 ffff828c8010e457
> (XEN)    0000000000000064 ffff83007d4f7cc8 ffff828c8020be38 0000000000200282
> (XEN)    ffff83007d4f7b88 ffff828c8010dcdd ffff83007d4f7cc8 0000000000000064
> (XEN)    ffff83007d4f7b98 ffff828c801307a9 ffff83007d4f7bb8 ffff828c80130878
> (XEN)    ffff828c8020bdc0 ffff828c801307ed ffff83007d4f7c08 ffff828c80131c1d
> (XEN)    ffff83007d4f7bd8 ffff828c80130fbb 64ff83007d4f7c08 0000000000000061
> (XEN)    ffff828c802ac5a0 ffff828c8020bdc0 ffff83007d4f7cc8 ffff83007d4f7f28
> (XEN)    ffff83007d4f7c38 ffff828c80131278 ffff83007d4f7cc8 ffff828c802a6900
> (XEN)    0000000000000000 ffff828c802be024 ffff83007d4f7cb8 ffff828c80151edd
> (XEN)    000000f100000000 ffff828c802be000 ffff828c802ac5c8 ffff828c80159ad7
> (XEN)    000000007d4f7ca8 2000000000000000 0000000000000000 000000000006fd5a
> (XEN)    ffff830070f7f000 ffff83007c808308 ffff83007d4f7f28 ffff828c801e81c0
> (XEN)    0000000000000000 0000000000000100 00007cff82b08317 ffff828c8014ae46
> (XEN)    0000000000000100 0000000000000000 ffff828c801e81c0 ffff83007d4f7f28
> (XEN)    ffff83007d4f7da8 ffff83007c808308 0000000000000000 ffff828c801ed820
> (XEN)    00000000cb2f3e4c 0000000000000000 fffffffffffffffd 0000000000000001
> (XEN)    ffff828c801e81d0 00000000000000fd ffff83007c808308 000000f100000000
> (XEN)    ffff828c80163318 000000000000e008 0000000000200202 ffff83007d4f7d78
> (XEN)    0000000000000000 ffff828c80163306 0000000000000000 0000000000000002
> (XEN)    ffff828c80246560 0000000000000000 ffff828c80246798 0000000000000001
> (XEN) Xen call trace:
> (XEN)    [<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN)    [<ffff828c8010e457>] dump_registers+0x57/0x140
> (XEN)    [<ffff828c8010dcdd>] handle_keypress+0x76/0x95
> (XEN)    [<ffff828c801307a9>] __serial_rx+0x16/0x5a
> (XEN)    [<ffff828c80130878>] serial_rx+0x8b/0x90
> (XEN)    [<ffff828c80131c1d>] serial_rx_interrupt+0xab/0xc1
> (XEN)    [<ffff828c80131278>] ns16550_interrupt+0x47/0x61
> (XEN)    [<ffff828c80151edd>] do_IRQ+0x476/0x4fd
> (XEN)    [<ffff828c8014ae46>] common_interrupt+0x26/0x30
> (XEN)    [<ffff828c80163318>] flush_area_mask+0x11a/0x13e
> (XEN)    [<ffff828c8015a840>] process_deferred_ops+0x64/0x9a
> (XEN)    [<ffff828c8015dd7f>] do_mmuext_op+0x111f/0x11b4
> (XEN)    [<ffff828c801dbb80>] compat_mmuext_op+0x31d/0x455
> (XEN)    [<ffff828c801e5bd0>] compat_hypercall+0xc0/0x119
> (XEN)
> (XEN) *** Dumping CPU1 guest state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    1
> (XEN) RIP:    0061:[<00000000c0101347>]
> (XEN) RFLAGS: 0000000000200246   EM: 0   CONTEXT: pv guest
> (XEN) rax: 000000000000001a   rbx: 00000000cb2f3e4c   rcx: 0000000000000001
> (XEN) rdx: 0000000000000000   rsi: 0000000000007ff0   rdi: 0000000000000000
> (XEN) rbp: 0000000000000001   rsp: 00000000cb2f3e48   r8:  0000000000000000
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2dc000   cr2: 0000000043dcc260
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0033   ss: 0069   cs: 0061
> (XEN) Guest stack trace from esp=cb2f3e48:
> (XEN)   c011c0f5 0000000a 00000000 b6d32000 deadbeef deadbeef c011982d
> c0119d10
> (XEN)   cb2f3e94 00000000 000106bc 0006b897 b6d32000 ccc40200 cba2b000
> b6d32000
> (XEN)   ffffffff ffffffff 00001000 cba2b010 00000027 00000000 cb2f3f54
> c4d50000
> (XEN)   c0267f6f 00001000 00000027 00000000 00000001 80000000 65628225
> 80000000
> (XEN)   00000754 ccc40234 000001d5 cc6a4be8 00000000 c01ea221 cb2f3efc
> d05a877c
> (XEN)   00000000 b7fac000 d05a8754 b6bcb000 000001d5 000001d5 00000000
> 00000167
> (XEN)   d05a8754 ccc40200 c1cb5804 c015f48f 00000000 cc6a4bd0 b6d32000
> 000001d5
> (XEN)   bf9c0001 b6bcb000 00000000 0834a658 c5bc8540 c016a350 000001d5
> c1cb5820
> (XEN)   00000000 c5bc8540 00000000 c4d50000 c4d50000 c02678f0 c5bc8540
> bf9cdbf8
> (XEN)   00145003 c018dc7b 00000010 00000000 c5bc8540 00000010 cb2f2000
> c018dd3c
> (XEN)   00145003 00000000 00000000 c5bc8540 bf9cdbf8 cb2f2000 c018e002
> bf9cdbf8
> (XEN)   00000001 00000010 000001d5 001d5000 c01059bf 00000010 00145003
> bf9cdbf8
> (XEN)   000001d5 001d5000 b6bcb000 ffffffda c010007b c010007b 00000036
> b7faf410
> (XEN)   00000073 00200293 bf9cdba8 0000007b ffffffff ffffffff 353ee824
> 458bffff
> (XEN)   053365f0 00000014 01cd850f c4810000 0000008c 5d5f5e5b 90458dc3
> 14244489
> (XEN)   8994458d 8d0c2444 ff8caf83 244489ff 98458b04 182444c7 00000000
> 102444c7
> (XEN)   00000073 082444c7 00000073 8900b70f 11e82404 89ffffcb fef4e9c6
> 838bffff
> (XEN)   ffffffa8 082444c7 00000000 04244489 8b98458b 04893840 f29ae824
> 458b0000
> (XEN)   38408b98 e8240489 0000f2bc 8b98458b 40c74450 00000038 0fd28500
> 00009284
> (XEN)   24448900 70838d0c 89fffe3e 8b082444 001cd483 24548900 24048904
> 0009a7e8
> (XEN)
> (XEN) *** Dumping CPU0 host state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    e008:[<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN) RFLAGS: 0000000000210092   CONTEXT: hypervisor
> (XEN) rax: ffff83007d4f7ad8   rbx: ffff828c8020d6a4   rcx: ffff828c8028ff28
> (XEN) rdx: ffff828c802a6900   rsi: ffff828c8010dae4   rdi: 0000000000000000
> (XEN) rbp: ffff828c8028fb08   rsp: ffff828c8028faf8   r8:  0000000000000000
> (XEN) r9:  0100000000000000   r10: 4900000000000002   r11: 0000000000000000
> (XEN) r12: ffff828c8028ff28   r13: ffff828c801e81c0   r14: 0000000000000000
> (XEN) r15: 0000000000000100   cr0: 0000000080050033   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2d7000   cr2: ffff81000059b220
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0033   ss: 0000   cs: e008
> (XEN) Xen stack trace from rsp=ffff828c8028faf8:
> (XEN)    ffff83007c808000 ffff828c8020d6a4 ffff828c8028fb18 ffff828c80162d05
> (XEN)    ffff828c8028fb28 ffff828c80162d80 00007d737fd704a7 ffff828c8014bf00
> (XEN)    0000000000000100 0000000000000000 ffff828c801e81c0 ffff828c8028ff28
> (XEN)    ffff828c8028fbe8 ffff828c8020d6a4 0000000000000000 4900000000000002
> (XEN)    0100000000000000 0000000000000000 0000000000000000 0000000000000000
> (XEN)    0000000000200202 00000000000026f0 ffff828c8020d6a8 000000fb00000000
> (XEN)    ffff828c8011b984 000000000000e008 0000000000200246 ffff828c8028fbe0
> (XEN)    0000000000000000 ffff828c8028fd28 ffff828c8028fc28 ffff828c801632b5
> (XEN)    ffff828c8028fc48 0000000000000020 e800000000000001 ffff828400000000
> (XEN)    ffff828400f06e80 e800000000000000 ffff828c8028fd68 ffff828c80158801
> (XEN)    ffff828400dfa040 ffff828400000000 0000000000000000 6000000000000000
> (XEN)    ffff828c8028fc68 ffff828c80159ad7 000000008028fca8 2000000000000000
> (XEN)    000000008028fc88 000000000006fd02 0000000000000027 ffff83007d2d8000
> (XEN)    ffff828400e12520 0000000070929027 000000006fd02027 ffff83007d2d7000
> (XEN)    ffff828c8028fcc8 0000000000000000 ffff828c8028fce8 ffff828c801581de
> (XEN)    ffff83007d2d8000 000000006fd02027 ffff828c8028fd98 ffff828c8015ca00
> (XEN)    0000000080244100 a000000000000000 ffff828c8028fd58 ffff828c8015638f
> (XEN)    ffff828c8011b982 0000000000000000 0000000000000003 0000000000078374
> (XEN)    0000000000078374 00000000ffffffea ffff828400f06e80 ffff828400000000
> (XEN)    0000000000000000 2000000000000000 ffff828c8028fd78 ffff828c80159ad7
> (XEN) Xen call trace:
> (XEN)    [<ffff828c8010daed>] __dump_execstate+0x9/0x78
> (XEN)    [<ffff828c80162d05>] __smp_call_function_interrupt+0x5e/0xa6
> (XEN)    [<ffff828c80162d80>] smp_call_function_interrupt+0x33/0x35
> (XEN)    [<ffff828c8014bf00>] call_function_interrupt+0x30/0x40
> (XEN)    [<ffff828c8011b984>] _spin_lock+0x13/0x2d
> (XEN)    [<ffff828c801632b5>] flush_area_mask+0xb7/0x13e
> (XEN)    [<ffff828c80158801>] __get_page_type+0x244/0x14fc
> (XEN)    [<ffff828c80159ad7>] get_page_type+0xe/0x39
> (XEN)    [<ffff828c8015a1b8>] get_page_and_type_from_pagenr+0x6e/0xa0
> (XEN)    [<ffff828c801583fe>] get_page_from_l2e+0xf1/0x2b0
> (XEN)    [<ffff828c8015f484>] do_mmu_update+0x77e/0x13da
> (XEN)    [<ffff828c801e5bd0>] compat_hypercall+0xc0/0x119
> (XEN)
> (XEN) *** Dumping CPU0 guest state: ***
> (XEN) ----[ Xen-3.4.0-rc4-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    0
> (XEN) RIP:    0061:[<00000000c0101027>]
> (XEN) RFLAGS: 0000000000200246   EM: 0   CONTEXT: pv guest
> (XEN) rax: 0000000000000001   rbx: 00000000c5011da4   rcx: 0000000000000001
> (XEN) rdx: 0000000000000000   rsi: 0000000000007ff0   rdi: 0000000000000000
> (XEN) rbp: 0000000080000000   rsp: 00000000c5011d98   r8:  0000000000000000
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (XEN) r15: 0000000000000000   cr0: 0000000080050033   cr4: 00000000000026f0
> (XEN) cr3: 000000007d2d7000   cr2: 00000000b3644000
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0033   ss: 0069   cs: 0061
> (XEN) Guest stack trace from esp=c5011d98:
> (XEN)   c011c6ea 78374067 00000000 703d5cd8 00000000 78374067 00000000
> 00000000
> (XEN)   78374067 00000000 c0163ede c562acd8 cbaf0ac0 0d68b000 00000000
> 00000001
> (XEN)   00000000 00000000 cbaf0ac0 c0164ec1 c4043594 00000000 c01936d7
> cc89b9e8
> (XEN)   00000000 c0411f80 c5011f34 b3644000 c1cb538c cbaf0ac0 00000000
> 00000000
> (XEN)   00000000 00000000 00000000 00000000 c562acd8 c12a74c0 c01979a4
> 00000000
> (XEN)   c12a74c0 081bd758 081bd000 c0168a1d 081bd758 081bd000 c5011e88
> c013e857
> (XEN)   fffffffc 00000000 00000020 00000000 c5041c00 00000000 001ad140
> c03109c0
> (XEN)   00000001 00300063 80000000 80000000 00000001 c11ad140 00000001
> 00000002
> (XEN)   c1cb538c cbaf0ac0 c01187fc 00000001 c018b8e4 c017bacf c0363b80
> c11ad140
> (XEN)   00000001 c5011f0c cbaf0af4 ccc1b380 b3644000 ffffffff c01ecb8b
> 00000000
> (XEN)   00000000 0000000a ffffffff ffffffff 00000002 00000000 32975fff
> cd68a000
> (XEN)   c44eda00 cd68a000 c01186f0 c44eda14 c0105b6b c44eda00 00000002
> cd68a000
> (XEN)   cd68a000 b3644000 c44eda14 00000002 c501007b c015007b ffffffff
> c01ed7e2
> (XEN)   00000061 00210293 00000002 00000000 c01bc7f9 00000002 00000000
> 00001000
> (XEN)   00000000 00000002 b3644000 cd32269c c03725d0 cd880780 b3644000
> c5011fa4
> (XEN)   00001000 c017ae0c c5011fa4 00001000 c01bc700 cd880780 fffffff7
> b796bbb4
> (XEN)   c5010000 c017b391 c5011fa4 00000000 00000000 00000001 00000018
> 082e4270
> (XEN)   c01059bf 00000018 b3644000 00001000 082e4270 b796bbb4 b70d59c0
> ffffffda
> (XEN)   0000007b c010007b 00000003 b7fa2410 00000073 00200246 b70d5998
> 0000007b
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000
> 00000000
> (XEN)
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel