[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 1726] New: Dom0 crashes on Core2 when dom0_mem is no more than 1972MB



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1726

           Summary: Dom0 crashes on Core2 when dom0_mem is no more than
                    1972MB
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: Windows
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: shaohui.zheng@xxxxxxxxx


Environment:
------------
Service Arch (ia32/ia32e/IA64): 
Guest Arch (ia32/ia32e/IA64): 
Guest OS Type (Linux/Windows):
Change Set: 
Hardware: 
Other:


Bug detailed description:
--------------------------
Dom0 kernel bug and crash on Core2 E6750 platform when dom0_mem is set no more
than 1972MB. The platform that shows the bug is HP 7800p minitower with one
E6750 processor, 4GB memory and one 250GB SATA disk.


Reproduce steps:
----------------
1. Use Core2 processor, use xen-unstable revision 22653.
2. Boot Xen with dom0_mem less or equal to 1972MB.

Current result:
----------------
Xen failed to get l1e in ptwr_emulate. Dom0 crash.

Expected result:
----------------
Dom0 boots successfully.

Basic root-causing log:
----------------------

[    0.235838] Linux agpgart interface v0.103
[    0.235877] agpgart-intel 0000:00:00.0: Intel Q35 Chipset
[    0.237152] agpgart-intel 0000:00:00.0: detected 6140K stolen memory
(XEN) mm.c:889:d0 Error getting mfn 40900 (pfn 5555555555555555) from L1 entry
8000000040900473 for                           l1e_owner=0, pg_owner=0
(XEN) mm.c:889:d0 Error getting mfn 40900 (pfn 5555555555555555) from L1 entry
8000000040900473 for                           l1e_owner=0, pg_owner=0
(XEN) mm.c:4958:d0 ptwr_emulate: could not get_page_from_l1e()
[    0.280076] BUG: unable to handle kernel paging request at ffff88003fc56360
[    0.280092] IP: [<ffffffff810370e5>] xen_set_pte+0x3e/0x4b
[    0.280107] PGD 1002067 PUD 1006067 PMD 2e8067 PTE 801000003fc56065
[    0.280127] Oops: 0003 [#1] SMP
[    0.280138] last sysfs file:
[    0.280145] CPU 1
[    0.280153] Modules linked in:
[    0.280163] Pid: 1, comm: swapper Not tainted 2.6.32.26 #1 HP Compaq dc7800p
Convertible Minitow                          er
[    0.280171] RIP: e030:[<ffffffff810370e5>]  [<ffffffff810370e5>]
xen_set_pte+0x3e/0x4b
[    0.280183] RSP: e02b:ffff88003fc89ab0  EFLAGS: 00010246
[    0.280189] RAX: 0000000000000000 RBX: 0000000000000000 RCX:
8000000040900473
[    0.280197] RDX: 0000000000000000 RSI: 8000000040900473 RDI:
ffff88003fc56360
[    0.280204] RBP: ffff88003fc89ad0 R08: 0000000000000000 R09:
ffffffff818720d0
[    0.280211] R10: 8000000000000573 R11: 800000000000056b R12:
8000000040900473
[    0.280218] R13: ffff88003fc56360 R14: ffffc9000006c000 R15:
ffff88003fc56360
[    0.280228] FS:  0000000000000000(0000) GS:ffff88002806c000(0000)
knlGS:0000000000000000
[    0.280236] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[    0.280243] CR2: ffff88003fc56360 CR3: 0000000001001000 CR4:
0000000000002660
[    0.280250] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[    0.280258] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[    0.280265] Process swapper (pid: 1, threadinfo ffff88003fc88000, task
ffff88003fc80000)
[    0.280272] Stack:
[    0.280277]  ffffffff811e4e11 ffff88003fc80000 ffffffff817c2c80
8000000040900473
[    0.280293] <0> ffff88003fc89b30 ffffffff81038a09 ffff88003fc89b30
ffffffff8103620f
[    0.280303] <0> 800000000000056b 8000000000000573 ffffffff818720d0
ffff88003fc56360
[    0.280303] Call Trace:
[    0.280303]  [<ffffffff811e4e11>] ? rb_insert_color+0xb9/0xe3
[    0.280303]  [<ffffffff81038a09>] xen_set_pte_at+0xdb/0xea
[    0.280303]  [<ffffffff8103620f>] ? __raw_callee_save_xen


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.