WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1735] New: Xen panic when free p2m page

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1735] New: Xen panic when free p2m page
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Fri, 11 Feb 2011 00:17:43 -0800
Delivery-date: Fri, 11 Feb 2011 00:17:50 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1735

           Summary: Xen panic when free p2m page
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P1
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: yang.z.zhang@xxxxxxxxx


Environment:
------------
Service Arch (ia32/ia32e/IA64): 32e
Guest Arch (ia32/ia32e/IA64): 32e
Guest OS Type (Linux/Windows):Linux
Change Set: 22904
Hardware: westmere-EP
Other:

xen changeset:   22904:c64dcc4d2eca
tag:         tip
user:        Keir Fraser <keir@xxxxxxx>
date:        Thu Feb 10 17:24:41 2011 +0000
files:       xen/Makefile
description:
Update Xen evrsion to 4.1.0-rc5-pre

pvops dom0:
commit 75cc13f5aa29b4f3227d269ca165dfa8937c94fe
Merge: 2607c07 a386bf7
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
Date:   Thu Dec 9 17:16:16 2010 -0800

qemu-xen:
commit 833e7e9a4c95739429dc0c803bbbf2346f9897fd
Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
Date:   Thu Jul 8 17:33:29 2010 +0100



Bug detailed description:
--------------------------
We met xen panic when run the case of live migration. We see this issue against
changeset 22904. From the log, it shows the domain want to free the p2m page
which not belong to itself and then it raise the panic. 
And this issue is very hard to reproduce. 

[ 3833.665676] tap30.0: no IPv6 routers present
[ 3834.240678] vif30.0: no IPv6 routers present
(XEN) HVM30: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM30: *** int 15h function AX=ec00, BX=0002 not yet supported!
(XEN) HVM30: KBD: unsupported int 16h function 03
(XEN) HVM30: int13_harddisk: function 15, unmapped device for ELDL=81
(XEN) HVM30: int13_harddisk: function 02, unmapped device for ELDL=81
(XEN) HVM30: int13_harddisk: function 41, unmapped device for ELDL=81
[ 3838.470695] xenbr0: port 2(vif30.0) entering forwarding state
[ 3838.599680] xenbr0: port 3(tap30.0) entering forwarding state
(XEN) irq.c:324: Dom30 callback via changed to GSI 5
[ 3875.893762] device xenbr0 left promiscuous mode
(XEN) Assertion 'page_get_owner(pg) == d' failed at hap.c:334
(XEN) ----[ Xen-4.1.0-rc5-pre  x86_64  debug=y  Not tainted ]----
(XEN) CPU:    19
(XEN) RIP:    e008:[<ffff82c480202737>] hap_free_p2m_page+0xdf/0x1f8
(XEN) RFLAGS: 0000000000010207   CONTEXT: hypervisor
(XEN) rax: 0000000000000000   rbx: ffff83029269a000   rcx: 0000000000000000
(XEN) rdx: 0000000000000000   rsi: ffff82f60524d060   rdi: ffff83029269aee4
(XEN) rbp: ffff83013ef3fc18   rsp: ffff83013ef3fbf8   r8:  ffff830292684000
(XEN) r9:  0000000000000001   r10: ffff81000bc50b00   r11: 0000000000000280
(XEN) r12: ffff82f60524d060   r13: 0000000000000001   r14: ffff830292684008
(XEN) r15: 000000000000f539   cr0: 000000008005003b   cr4: 00000000000026f0
(XEN) cr3: 00000002b8342000   cr2: 00002ae9d01fd020
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen stack trace from rsp=ffff83013ef3fbf8:
(XEN)    ffff83013ef3fc28 ffff830292683000 0000000000292683 ffff83029269a000
(XEN)    ffff83013ef3fc28 ffff82c4801cadb2 ffff83013ef3fc98 ffff82c4801ccca8
(XEN)    0000000900000000 ffff83029269af18 0000000000000000 0000000000000000
(XEN)    0000000000000008 ffff83013ef3ff18 0000000000292680 0000000000000001
(XEN)    ffff830102ae8d90 000000000000f539 0000000000000000 0000000000000000
(XEN)    ffff83013ef3fd18 ffff82c4801abfec ffff8300bf7d6000 01ff8300bf0de000
(XEN)    ffff81000f539ee8 01ff83013ef3fcf0 000000000f539ee8 ffff8300bf7d6000
(XEN)    0000000000138b39 ffff8300bf7d6000 0000000200000007 ffff830102ae8d90
(XEN)    0000000000000000 0000000000000030 0000000000000030 ffff83013ef3ff18
(XEN)    ffff83013ef3ff08 ffff82c4801c996d ffff82c400000000 ffff82c480156e67
(XEN)    0000000000000000 0000000000080000 0000000000000000 ffff83013ef3fd70
(XEN)    0000038f5c4ba958 ffff8300bf7d6000 0000000000000000 00000000000001aa
(XEN)    000000000f539ee8 ffff83013ef3fdd0 0000000000000080 0000000000000002
(XEN)    ffff8300bf7d6000 000000000000f539 ffff83013ef3fdc0 ffff83013ef3fe10
(XEN)    ffff82c48017b74f 00000000000001fe 0000003ace40c4fe 0000038f21985de1
(XEN)    000000ffb6d8e01f 0000000000000000 0000000000000000 ffff83013ef3fe20
(XEN)    ffff83013ef3fe18 ffff82c480125af7 0000000000000202 ffff83013ef3fe28
(XEN)    ffff82c4801236e2 ffff8300bf7d7810 ffff83013ef3fe58 ffff82c4801bb9cb
(XEN)    0000000000000282 ffff83013ef3fe58 ffff82c4801236e2 ffff8300bf7d6000
(XEN)    ffff83013ef3feb8 ffff82c4801bbe3b ffff83013ef3fe88 ffff82c4801b7f2c
(XEN) Xen call trace:
(XEN)    [<ffff82c480202737>] hap_free_p2m_page+0xdf/0x1f8
(XEN)    [<ffff82c4801cadb2>] paging_free_log_dirty_page+0x42/0x44
(XEN)    [<ffff82c4801ccca8>] paging_mark_dirty+0x447/0x51f
(XEN)    [<ffff82c4801abfec>] hvm_hap_nested_page_fault+0x1be/0x23a
(XEN)    [<ffff82c4801c996d>] vmx_vmexit_handler+0x1875/0x1bf8
(XEN)
(XEN) [VT-D]iommu.c:1785: VT-d page table not sharing with EPT table
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 19:
(XEN) Assertion 'page_get_owner(pg) == d' failed at hap.c:334
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
(XEN) Resetting with ACPI MEMORY or I/O RESET_REG.


Reproduce steps:
----------------
1.install the latest xen-unstable(22904)
2.prepare the guest and use xl create to start guest
3.run xl migrate to do migration

Current result:
----------------
xen panic

Expected result:
----------------
guest work well

Basic root-causing log:
----------------------


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>