[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] 4.11.0 RC1 panic
On Tue, Jun 12, 2018 at 01:39:05PM +0200, Manuel Bouyer wrote: > I applied this patch to 4.11rc4 (let's not change too much things at the > same time) and rebooted my test host. Hopefully I'll have some data to report > soon Got the first panic (still from a i386 domU): login: (XEN) d4v0 Hit #DB in Xen context: e008:ffff82d08036eb00 [overflow], stk 0000:ffff8301bf117f78, dr6 ffff0ff0 (XEN) d4v0 Hit #DB in Xen context: e008:ffff82d08036eb00 [overflow], stk 0000:ffff8301bf117f78, dr6 ffff0ff0 (XEN) d4v0 Hit #DB in Xen context: e008:ffff82d08036eb00 [overflow], stk 0000:ffff8301bf117f78, dr6 ffff0ff0 (XEN) d4v0 Hit #DB in Xen context: e008:ffff82d08036eb00 [overflow], stk 0000:ffff8301bf117f78, dr6 ffff0ff0 (XEN) d4v0 Hit #DB in Xen context: e008:ffff82d08036eb00 [overflow], stk 0000:ffff8301bf117f78, dr6 ffff0ff0 (XEN) d4v2 Hit #DB in Xen context: e008:ffff82d08036eb00 [overflow], stk 0000:ffff8301bf077f78, dr6 ffff0ff0 (XEN) d4: 1a3942:4000000000000001:-1 -> 1a0f40:4000000000000001:0 (XEN) Assertion '!page->linear_pt_count || page_get_owner(page)->is_dying' failed at mm.c:2518 (XEN) ----[ Xen-4.11-rcnb1 x86_64 debug=y Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<ffff82d080289408>] mm.c#_put_page_type+0x208/0x480 (XEN) RFLAGS: 0000000000210246 CONTEXT: hypervisor (d4v0) (XEN) rax: 000000000000ffff rbx: 4100000000000001 rcx: 00000001b98f1000 (XEN) rdx: ffff8301b98f1000 rsi: 000000000000000b rdi: 000000000000000b (XEN) rbp: ffff82e003472840 rsp: ffff8300bfc77ca8 r8: ffff814100200058 (XEN) r9: 0000000000000200 r10: 0000000000000000 r11: 0000000000000000 (XEN) r12: 0000000000000000 r13: 0000000000000000 r14: 10ffffffffffffff (XEN) r15: 1000000000000000 cr0: 000000008005003b cr4: 00000000000026e4 (XEN) cr3: 00000001b98be000 cr2: 00000000ccbec000 (XEN) fsb: 00000000c0636dc0 gsb: 0000000000000000 gss: 0000000000000000 (XEN) ds: 0011 es: 0011 fs: 0031 gs: 0011 ss: 0000 cs: e008 (XEN) Xen code around <ffff82d080289408> (mm.c#_put_page_type+0x208/0x480): (XEN) ba 20 01 00 00 00 75 02 <0f> 0b f6 45 0f 20 74 28 8b 4d 18 ba 00 00 00 00 (XEN) Xen stack trace from rsp=ffff8300bfc77ca8: (XEN) 1000000000000000 ffff82d080289494 000000010128d429 ffff8300bfc77fff (XEN) ffff8300bfc77d20 ffff8300bff40000 ffff8300bff40000 0000000000000000 (XEN) ffff8301b98f1000 0000000000000000 00000000deadf00d ffff82d080289b52 (XEN) ffff8300bfc77ef8 ffff8300bff40000 ffff82d0802906b6 ffff8300bff40000 (XEN) 80000000802a8542 ffff8301b98f1000 0000000000000000 ffff8301b98f1000 (XEN) 0000000000000007 ffff8300bff40000 0000000000000000 0000000000000000 (XEN) ffff8301b98f1000 ffff82e003502a80 ffff82d0804b0058 ffff82d000000018 (XEN) ffff8300bfc77de8 00000000bfc77d98 0000000100000004 00000000001a3942 (XEN) 00000000ce32f7ac ffff8300bfc77ef8 ffff8300bff40000 0000000000000000 (XEN) 00000000deadf00d 0000000000000004 00000000deadf00d ffff82d080295470 (XEN) ffff8300bfc77e14 00000001cc7d0f2c ffff82d08036be34 0000000000000000 (XEN) 000000008036be34 ffff82d08036be28 ffff82d08036be34 ffff8300bfc77ef8 (XEN) ffff8300bff40000 00000000000001a0 00000000deadf00d 0000000000000004 (XEN) 00000000deadf00d ffff82d080367f8a ffff82d000000000 ffff82d000000000 (XEN) ffff82d080000000 ffff82d000000000 ffff82d08036be34 ffff82d08036be28 (XEN) ffff82d08036be34 ffff82d08036be28 ffff82d08036be34 ffff82d08036be28 (XEN) ffff82d08036be34 ffff8300bfc77ef8 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 0000000000000000 ffff82d0803697be (XEN) ffff8300bff40000 ffff82d08036be71 0000000000000000 0000000000000000 (XEN) 0000000000000000 0000000000000000 00000000ce32f5a4 0000000000000000 (XEN) Xen call trace: (XEN) [<ffff82d080289408>] mm.c#_put_page_type+0x208/0x480 (XEN) [<ffff82d080289494>] mm.c#_put_page_type+0x294/0x480 (XEN) [<ffff82d080289b52>] put_old_guest_table+0x22/0x60 (XEN) [<ffff82d0802906b6>] do_mmuext_op+0x46/0x1810 (XEN) [<ffff82d080295470>] compat_mmuext_op+0x30/0x450 (XEN) [<ffff82d08036be34>] entry_int82+0x74/0xc0 (XEN) [<ffff82d08036be28>] entry_int82+0x68/0xc0 (XEN) [<ffff82d08036be34>] entry_int82+0x74/0xc0 (XEN) [<ffff82d080367f8a>] pv_hypercall+0x3aa/0x430 (XEN) [<ffff82d08036be34>] entry_int82+0x74/0xc0 (XEN) [<ffff82d08036be28>] entry_int82+0x68/0xc0 (XEN) [<ffff82d08036be34>] entry_int82+0x74/0xc0 (XEN) [<ffff82d08036be28>] entry_int82+0x68/0xc0 (XEN) [<ffff82d08036be34>] entry_int82+0x74/0xc0 (XEN) [<ffff82d08036be28>] entry_int82+0x68/0xc0 (XEN) [<ffff82d08036be34>] entry_int82+0x74/0xc0 (XEN) [<ffff82d0803697be>] do_entry_int82+0x1e/0x20 (XEN) [<ffff82d08036be71>] entry_int82+0xb1/0xc0 (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) Assertion '!page->linear_pt_count || page_get_owner(page)->is_dying' failed at mm.c:2518 (XEN) **************************************** (XEN) I put the build files at ftp://asim.lip6.fr/outgoing/bouyer/xen-debug/0612/ -- Manuel Bouyer <bouyer@xxxxxxxxxxxxxxx> NetBSD: 26 ans d'experience feront toujours la difference -- _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |