[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] 3.2.1-rc5: BUG at page_alloc.c:859 (free_domheap_pages)


  • To: "Christopher S. Aker" <caker@xxxxxxxxxxxx>, xen devel <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
  • Date: Thu, 31 Jul 2008 15:56:28 +0100
  • Cc:
  • Delivery-date: Thu, 31 Jul 2008 07:56:56 -0700
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AcjzHZwv2tOVQF8QEd2L3gAX8io7RQ==
  • Thread-topic: [Xen-devel] 3.2.1-rc5: BUG at page_alloc.c:859 (free_domheap_pages)

Could be. The physical page being freed looks plausible in this dump at
least, if this machine has >= 16GB of memory. The physical address of the
page is 0x3ff05e000. The fact the top of the crash message is repeated twice
is odd.

 -- Keir

On 31/7/08 15:44, "Christopher S. Aker" <caker@xxxxxxxxxxxx> wrote:

> Xen 3.2.1-rc5 x86_64
> dom0: 2.6.18.8 at changeset 524, PAE
> 
> http://theshore.net/~caker/xen/build-1.11/xen-3.2.1-rc5.gz
> http://theshore.net/~caker/xen/build-1.11/xen-syms-3.2.1-rc5
> 
> This looks related to the "FATAL PAGE FAULT" problems we've had...
> 
> (XEN) Xen BUG at page_alloc.c:859
> (XEN) ----[ Xen-3.2.1-rc5  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    7
> (XEN) RIP:    e008:[<ffff828c80113372>] free_domheap_pages+0x238/0x412
> (XEN) RFLAGS: 0000000000210202   CONTEXT: hypervisor
> (XEN) rax: ffff828409fd8eb0   rbx: ffff8300cf18c100   rcx: 0000000000000000
> (XEN) rdx: 0000000000000007   rsi: ffff828409fd8eb0   rdi: ffff828409fd8eb0
> (XEN) Xen BUG at page_alloc.c:859
> (XEN) ----[ Xen-3.2.1-rc5  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    7
> (XEN) RIP:    e008:[<ffff828c80113372>] free_domheap_pages+0x238/0x412
> (XEN) RFLAGS: 0000000000210202   CONTEXT: hypervisor
> (XEN) rax: ffff828409fd8eb0   rbx: ffff8300cf18c100   rcx: 0000000000000000
> (XEN) rdx: 0000000000000007   rsi: ffff828409fd8eb0   rdi: ffff828409fd8eb0
> (XEN) rbp: ffff8300ceeefd48   rsp: ffff8300ceeefd38   r8:  0000000000000000
> (XEN) r9:  0000000000000001   r10: 0000000000000000   r11: ffff828409fd8eb0
> (XEN) r12: ffff828409fd8e88   r13: ffff8300cf18c100   r14: ffff8300cf18d0f8
> (XEN) r15: ffff8300cf18c118   cr0: 000000008005003b   cr4: 00000000000026b0
> (XEN) cr3: 000000062ffdf000   cr2: 00000000b7deb697
> (XEN) ds: 007b   es: 007b   fs: 0000   gs: 0033   ss: 0000   cs: e008
> (XEN) Xen stack trace from rsp=ffff8300ceeefd38:
> (XEN)    ffff828409fd8eb0 ffff828409fd8e88 ffff8300ceeefd68
> ffff828c8013d93a
> (XEN)    ffff8300cf18d0f8 ffff828409fd8eb0 ffff8300ceeefdb8
> ffff828c80131705
> (XEN)    0000000088000000 0000000080000000 ffff8300ceeeff28
> ffff8300cf18c100
> (XEN)    ffff8300cf18c100 00000000b3573508 0000000000000000
> 0000000000000000
> (XEN)    ffff8300ceeefdd8 ffff828c80131a94 ffff8300cf18c100
> 0000000000000000
> (XEN)    ffff8300ceeefe08 ffff828c80105638 ffff8300ceeefe18
> ffff828c80114da0
> (XEN)    00000000b3573508 fffffffffffffff3 ffff8300ceeeff08
> ffff828c8010479f
> (XEN)    ffff8300ceeefe48 0000000000200286 0000000000000007
> 000c878102c2a165
> (XEN)    ffff8300cf146100 ffff8300ceed8100 0000000500000002
> 0839d874b7b50067
> (XEN)    083b936401573538 b7dfac50b7b5668c b7aa18ac00000001
> 00000001b79c12cc
> (XEN)    080facafb3573568 081361e0083cf228 080797e7b458ee84
> 00000000b458eea0
> (XEN)    b7df502c00000060 b45d602c00000000 0805946cb3573588
> b7df502cb45d602c
> (XEN)    b7df86a000000000 00000002b4637164 a5dba1eea5dba1ee
> 0000001f00000000
> (XEN)    ffff8300ceeefee8 ffff8300cee3c100 0000000000000000
> 0000000000000000
> (XEN)    0000000000000000 0000000000000000 00007cff311100b7
> ffff828c801bdd50
> (XEN)    00000000c0101487 0000000000000024 0000000000000000
> 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000305000
> 00000000b3573508
> (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> (XEN)    0000000000000024 0000000000000000 00000000b7e30440
> 00000000b35735d8
> (XEN)    0000000000000000 0000010000000000 00000000c0101487
> 0000000000000061
> (XEN) Xen call trace:
> (XEN)    [<ffff828c80113372>] free_domheap_pages+0x238/0x412
> (XEN)    [<ffff828c8013d93a>] put_page+0x46/0x4d
> (XEN)    [<ffff828c80131705>] relinquish_memory+0x153/0x262
> (XEN)    [<ffff828c80131a94>] domain_relinquish_resources+0xd1/0x1b0
> (XEN)    [<ffff828c80105638>] domain_kill+0x77/0x164
> (XEN)    [<ffff828c8010479f>] do_domctl+0x4dd/0xc1e
> (XEN)    [<ffff828c801bdd50>] compat_tracing_off+0xb/0x64
> (XEN)
> (XEN)
> (XEN) ****************************************
> (XEN) Panic on CPU 7:
> (XEN) Xen BUG at page_alloc.c:859
> (XEN) ****************************************
> (XEN)
> (XEN) Reboot in five seconds...
> 
> -Chris
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.