|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 36] New: GPF in Xen during ptwr update
http://bugzilla.xensource.com/cgi-bin/bugzilla/show_bug.cgi?id=36
Summary: GPF in Xen during ptwr update
Product: Xen
Version: unstable
Platform: x86
OS/Version: Linux-2.6
Status: NEW
Severity: major
Priority: P2
Component: Hypervisor
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: aliguori@xxxxxxxxxx
CC: hohnbaum@xxxxxxxxxx
During startup Xen is generating a GPF. This is always reproducible on my T41p
laptop. The problem began with yesterday's build (05/10) and was confirmed with
latest BK right before this bug report was posted.
The following is the output and stack trace from a build with 'make optimize=n
debug_crash=y debug=y'. The problem is reproducible with just a normal 'make'.
Stack Trace:
ff12e218 get_page_from_l1e
ff151f3e unmap_domain_mem
ff12e4ff alloc_l1_table
ff12eea9 alloc_page_type
ff12f5f4 get_page_type
ff12de43 get_page_and_type_from_pagenr
ff133aa7 get_page_and_type
ff12e2f8 get_page_from_l2e
ff12ec48 mod_l2_entry
ff130da3 do_mmu_update
ff1332e9 ptwr_do_page_fault
ff1329cc ptwr_flush
ff151673 hypercall
Xen Output:
__ __ _____ ___ _ _
\ \/ /___ _ __ |___ / / _ \ __| | _____ _____| |
\ // _ \ '_ \ |_ \| | | |__ / _` |/ _ \ \ / / _ \ |
/ \ __/ | | | ___) | |_| |__| (_| | __/\ V / __/ |
/_/\_\___|_| |_| |____(_)___/ \__,_|\___| \_/ \___|_|
http://www.cl.cam.ac.uk/netos/xen
University of Cambridge Computer Laboratory
Xen version 3.0-devel (anthony@) (gcc version 3.3.4 20040623 (Gentoo Linux
3.3.4-r1, ssp-3.3.2-2, pie-8.7.6)) Wed May 11 15:34:51 CDT 2005
Latest ChangeSet: information unavailable
(XEN) Physical RAM map:
(XEN) 0000000000000000 - 000000000009f000 (usable)
(XEN) 000000000009f000 - 00000000000a0000 (reserved)
(XEN) 00000000000d2000 - 00000000000d4000 (reserved)
(XEN) 00000000000dc000 - 0000000000100000 (reserved)
(XEN) 0000000000100000 - 000000003ff60000 (usable)
(XEN) 000000003ff60000 - 000000003ff77000 (ACPI data)
(XEN) 000000003ff77000 - 000000003ff79000 (ACPI NVS)
(XEN) 000000003ff80000 - 0000000040000000 (reserved)
(XEN) 00000000ff800000 - 0000000100000000 (reserved)
(XEN) System RAM: 1022MB (1047548kB)
(XEN) Xen heap: 10MB (10636kB)
(XEN) CPU0: Before vendor init, caps: a7e9f9bf 00000000 00000000, vendor = 0
(XEN) CPU caps: a7e9f9bf 00000000 00000000 00000000
(XEN) ACPI: RSDP (v002 IBM ) @ 0x000f6df0
(XEN) ACPI: XSDT (v001 IBM TP-1R 0x00003140 LTP 0x00000000) @ 0x3ff6a6cd
(XEN) ACPI: FADT (v003 IBM TP-1R 0x00003140 IBM 0x00000001) @ 0x3ff6a800
(XEN) ACPI: SSDT (v001 IBM TP-1R 0x00003140 MSFT 0x0100000e) @ 0x3ff6a9b4
(XEN) ACPI: ECDT (v001 IBM TP-1R 0x00003140 IBM 0x00000001) @ 0x3ff76ebc
(XEN) ACPI: TCPA (v001 IBM TP-1R 0x00003140 PTL 0x00000001) @ 0x3ff76f0e
(XEN) ACPI: BOOT (v001 IBM TP-1R 0x00003140 LTP 0x00000001) @ 0x3ff76fd8
(XEN) ACPI: DSDT (v001 IBM TP-1R 0x00003140 MSFT 0x0100000e) @ 0x00000000
(XEN) Local APIC disabled by BIOS -- reenabling.
(XEN) Found and enabled local APIC!
(XEN) Using scheduler: Borrowed Virtual Time (bvt)
(XEN) Initializing CPU#0
(XEN) Detected 1694.533 MHz processor.
(XEN) CPU0 booted
(XEN) enabled ExtINT on CPU#0
(XEN) Using local APIC timer interrupts.
(XEN) Calibrating APIC timer for CPU0...
(XEN) ..... CPU clock speed is 1694.5156 MHz.
(XEN) ..... host bus clock speed is 99.6773 MHz.
(XEN) ..... bus_scale = 0x00006612
(XEN) Time init:
(XEN) .... cpu_freq: 00000000:650085D8
(XEN) .... scale: 00000001:2E25EBCB
(XEN) .... Wall Clock: 1115843932s 50000us
(XEN) mtrr: v2.0 (20020519)
(XEN) (file=grant_table.c, line=1228) Grant table init
(XEN) *** LOADING DOMAIN 0 ***
(XEN) Xen-ELF header found:
'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xC0000000,LOADER=generic'
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN) Dom0 alloc.: 10000000->20000000 (190816 pages to be allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN) Loaded kernel: c0100000->c05b1c44
(XEN) Init. ramdisk: c05b2000->c08af000
(XEN) Phys-Mach map: c08af000->c09a9580
(XEN) Page tables: c09aa000->c09ae000
(XEN) Start info: c09ae000->c09af000
(XEN) Boot stack: c09af000->c09b0000
(XEN) TOTAL: c0000000->c0c00000
(XEN) ENTRY ADDRESS: c0100000
(XEN) Initrd len 0x2fd000, start at 0xc05b2000
(XEN) Scrubbing Free RAM: ...........done.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to
Xen).
(XEN) CPU: 0
(XEN) EIP: 0808:[<ff12e218>]
(XEN) EFLAGS: 00210246 CONTEXT: hypervisor
(XEN) eax: 00000000 ebx: 00010102 ecx: 261a0001 edx: 00000000
(XEN) esi: 00000000 edi: c3400000 ebp: ff103d60 esp: ff103d38
(XEN) ds: 0810 es: 0810 fs: 0810 gs: 0810 ss: 0810 cs: 0808
(XEN) Stack trace from ESP=ff103d38:
(XEN) ff170130 1000a000 00000063 [ff151f3e] ffbfe990 00000000 ffbfe000
00000001
(XEN) fc400000 00000000 ff103d90 [ff12e4ff] 00000000 ffbfa800 80000004
00000004
(XEN) 00000001 00000001 000000d7 fee6a000 0001000a ffbfa800 ff103db0
[ff12eea9]
(XEN) fc5800f0 0000004d ff103dd0 00000000 20000000 00000001 ff103e00
[ff12f5f4]
(XEN) fc5800f0 20000000 ffbfa800 ffbfa800 ffbfa800 80000002 80000003
00000004
(XEN) 00010102 f0000000 f0000000 00000004 261a0001 f0000000 fc580104
f0000000
(XEN) f0000000 261a0001 ff103e30 [ff12de43] fc5800f0 261a0000 00000004
00000000
(XEN) 00000002 00000083 [ff133aa7] 00000004 00000000 fc5800f0 ff103e60
[ff12e2f8]
(XEN) 0001000a 261a0000 ffbfa800 c3400000 00003400 009ab000 000e0003
c0115433
(XEN) 00000000 ffbf9080 ff103ec0 [ff12ec48] 1000a067 00010102 ffbfa800
0000030d
(XEN) ff170130 10102001 00000063 ffbfa800 ffbfa800 00000000 ffbfe000
00000004
(XEN) 00000001 58000002 58000002 00000004 58000003 00000000 00000004
fee69c34
(XEN) ff103ebc 00000000 ff103fb0 [ff130da3] fee69c34 1000a067 00010102
00000000
(XEN) 00000000 00000000 00000000 00000004 0416ddf0 00a40204 83661100
c0102c34
(XEN) c3400000 ff103f6c [ff1332e9] ff103fb8 c09ab028 ff16fae8 00000004
103ff063
(XEN) ffbf9080 ff103f6c [ff1329cc] fe3f8c00 00000001 ffbe9000 00000001
ffbfa800
(XEN) 00000000 40000000 00010102 1000a067 00000000 ff103fa0 c051beec
00000008
(XEN) 00000000 109ab021 10102001 fee69001 ffbf9080 58000002 ffbfa800
ffbf9080
(XEN) 00000000 00000000 00000000 00000000 00000000 00000000 fc581830
00010102
(XEN) 00010102 fee69c34 10102c34 1000a067 ffbf9080 00007ff0 00003400
[ff151673]
(XEN) Call Trace from ESP=ff103d38:
(XEN) [<ff151f3e>] [<ff12e4ff>] [<ff12eea9>] [<ff12f5f4>] [<ff12de43>]
[<ff133aa7>]
(XEN) [<ff12e2f8>] [<ff12ec48>] [<ff130da3>] [<ff1332e9>] [<ff1329cc>]
[<ff151673>]
(XEN) debugtrace_dump() starting
(XEN) debugtrace_dump() finished
****************************************
CPU0 GENERAL PROTECTION FAULT
[error_code=0103]
Aieee! CPU0 is toast...
****************************************
Reboot in five seconds...
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 36] New: GPF in Xen during ptwr update,
bugzilla-daemon <=
|
|
|
|
|