WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1387] New: With EPT mode, HVM S3 causes Xen HV crash.

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1387] New: With EPT mode, HVM S3 causes Xen HV crash.
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Fri, 14 Nov 2008 01:07:39 -0800
Delivery-date: Fri, 14 Nov 2008 01:07:44 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1387

           Summary: With EPT mode, HVM S3 causes Xen HV crash.
           Product: Xen
           Version: unstable
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: critical
          Priority: P1
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: haicheng.li@xxxxxxxxx


This bug happens only with EPT enabled. shadow mode works fine.

here is the crash log:

(XEN) HVM1: Press F10 to select boot device.
(XEN) HVM1: Booting from Hard Disk...
(XEN) HVM1: int13_harddisk: function 41, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=81
(XEN) HVM1: *** int 15h function AX=00C0, BX=0000 not yet supported!
(XEN) HVM1: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM1: *** int 15h function AX=EC00, BX=0002 not yet supported!
(XEN) HVM1: KBD: unsupported int 16h function 03
(XEN) HVM1: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 02, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 41, unmapped device for ELDL=81
(XEN) irq.c:235: Dom1 PCI link 0 changed 5 -> 0
(XEN) irq.c:235: Dom1 PCI link 1 changed 10 -> 0
(XEN) irq.c:235: Dom1 PCI link 2 changed 11 -> 0
(XEN) irq.c:235: Dom1 PCI link 3 changed 5 -> 0
(XEN) Xen BUG at page_alloc.c:839
(XEN) ----[ Xen-3.4-unstable  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff828c80111231>] free_domheap_pages+0x111/0x270
(XEN) RFLAGS: 0000000000010202   CONTEXT: hypervisor
(XEN) rax: 0000000000000000   rbx: 0000000000000001   rcx: ffff828400000000
(XEN) rdx: 0000000000000000   rsi: 0000000000000000   rdi: ffff8300be206094
(XEN) rbp: ffff8300be206080   rsp: ffff828c80247e18   r8:  0000006c45dbd928
(XEN) r9:  ffff828c802005c0   r10: 0000000000000830   r11: 0000000000000000
(XEN) r12: ffff828400000000   r13: ffff8300be206094   r14: 0000000000000000
(XEN) r15: 0000000000000001   cr0: 000000008005003b   cr4: 00000000000026b0
(XEN) cr3: 0000000058472000   cr2: 00002aaaab0feba0
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff828c80247e18:
(XEN)    0000000000000001 ffff8300be2de080 ffff8300be3fc080 000000000000fff0
(XEN)    000000000000f000 ffff8300be2de090 0000000000000001 ffff828c80173713
(XEN)    0000000000000001 ffff8300be3e6080 0000000000000000 ffff8300be3e6090
(XEN)    00007fff5fe52dd0 ffff8300be3e6080 ffff828c80247eb8 ffff828c801775a0
(XEN)    ffff8801590828c0 ffff828c801af3a1 ffff828c80247f28 ffff828c801afd28
(XEN)    0000000e00000001 0000000000000003 ffffffff8020a53c 0000000000000100
(XEN)    00000036b80cb447 ffff8300be3e6080 0000000000000206 ffff8300be42e080
(XEN)    00007fff5fe52da0 0000000000305000 0000000000000006 00000000ffffffda
(XEN)    0000000000000001 ffff828c801ad169 0000000000000001 00000000ffffffda
(XEN)    0000000000000006 0000000000305000 00007fff5fe52da0 ffff88015918ba80
(XEN)    0000000000000282 000000000000000e 0000000000000001 0000000000000001
(XEN)    0000000000000022 ffffffff8020644a 0000000000000003 00007fff5fe52dd0
(XEN)    0000000000000000 0000010000000000 ffffffff8020644a 000000000000e033
(XEN)    0000000000000282 ffff88011f379e20 000000000000e02b 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    ffff8300be42e080
(XEN) Xen call trace:
(XEN)    [<ffff828c80111231>] free_domheap_pages+0x111/0x270
(XEN)    [<ffff828c80173713>] hvm_vcpu_reset_state+0xa3/0x2c0
(XEN)    [<ffff828c801775a0>] do_hvm_op+0x4b0/0xe60
(XEN)    [<ffff828c801af3a1>] toggle_guest_mode+0x21/0x30
(XEN)    [<ffff828c801afd28>] do_iret+0xa8/0x1c0
(XEN)    [<ffff828c801ad169>] syscall_enter+0xa9/0xae
(XEN)    
(XEN) 
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Xen BUG at page_alloc.c:839
(XEN) ****************************************
(XEN) 
(XEN) Reboot in five seconds...


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 1387] New: With EPT mode, HVM S3 causes Xen HV crash., bugzilla-daemon <=