[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] Test report for Xen-3.3.0-rc4 (#18314)
On Thursday, August 14, 2008 3:27 PM Keir Fraser wrote: > Thanks Jiajun, > > That's disappointing. :-( I think the second of your crashes > is the one that > I've been able to reproduce (but infrequently -- maybe one > time in 100). The > symptoms are a bit different for me since I run a debug build and > crash earlier, well before domain destruction. > > There's a chance that Gianluca's new patch will fix your first > host crash > (although the domain crash would probably still remain). Yes. We tried the patch, still got xen crash. ######### (XEN) sh error: sh_remove_write_access(): can't remove write access to mfn 2291b5: guest has 67108863 special-use mappings of it (XEN) domain_crash called from common.c:2396 (XEN) Domain 1 (vcpu#1) crashed on cpu#0: (XEN) ----[ Xen-3.3.0-rc5-pre x86_32p debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) EIP: 0158:[<fe817811>] (XEN) EFLAGS: 00010282 CONTEXT: hvm guest (XEN) eax: da0cd300 ebx: 00000000 ecx: 80000000 edx: 00000000 (XEN) esi: 00000000 edi: 00000000 ebp: d8213bb4 esp: d8213bb0 (XEN) cr0: 8005003b cr4: 000006b8 cr3: 023cb040 cr2: 08046fdc (XEN) ds: 0160 es: 0160 fs: 0000 gs: 01b0 ss: 0160 cs: 0158 (XEN) Xen BUG at page_alloc.c:839 (XEN) ----[ Xen-3.3.0-rc5-pre x86_32p debug=n Not tainted ]---- (XEN) CPU: 2 (XEN) EIP: e008:[<ff10f81d>] free_domheap_pages+0x9d/0x250 (XEN) EFLAGS: 00210206 CONTEXT: hypervisor (XEN) eax: 00000002 ebx: 00000000 ecx: f9bda8f8 edx: 00000002 (XEN) esi: 00000001 edi: ff1c4080 ebp: f9bda8f8 esp: ffbf3d5c (XEN) cr0: 8005003b cr4: 000026f0 cr3: 00bd8d20 cr2: 082bfef0 (XEN) ds: e010 es: e010 fs: 0000 gs: 0033 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ffbf3d5c: (XEN) ff10ef33 00000015 00000000 f9bda910 f9bda8f8 00000001 ff1c5504 ff1395ac (XEN) f9bda8f8 00000000 ffbf3e44 f9bda8f8 f9bda910 f9bda8f8 68000000 ff12fc57 (XEN) f9bda8f8 ff1c4080 ffbf3e44 ff186515 60000000 ff1c4090 ff1c4080 ff1c4090 (XEN) ff1c4080 ff1c4080 ffbf3e44 ff12ff2c ffbca080 00000200 ffbf3e44 fffffff3 (XEN) ff1c4080 00000000 ffbf3e44 ff104171 ff1c4080 00a261a4 00000000 15901a37 (XEN) 00000001 0b200494 0000000b fffffff3 fffffff3 b34f62d8 0000007b ff1030ad (XEN) ff1c4080 b34f62d8 00000090 ff13c005 f9880070 e0000000 00000020 ff1c4080 (XEN) ff13ad7b f95b2908 00000002 00000005 b7a10001 b7a42554 b7a4b4dc 447c7f77 (XEN) b34f630c 46257b48 b7f836a0 0000007f 00000000 b8b08ac8 08121598 447c7f77 (XEN) b7f836a0 b7bcbd74 b34f6338 447c77d3 b7bcbd74 a5dba1ee b7c291e0 0000001f (XEN) a5dba1ee 00000000 0836b320 448738e4 b7c291e0 b5573824 b34f6368 447c77d3 (XEN) b5573824 b7c291e0 a5dba1ee 448738e4 b7c291e0 b7c291e0 43841a1c 000000fb (XEN) 000000fb 0000005c 43841a15 ffbd4080 00000003 00000004 ffbf3fb4 ffbf3f5c (XEN) ff14a64d ffbf3fb4 43841a16 00000001 0000f800 00000004 fed1f030 00000030 (XEN) ff1f6080 ffbd4080 ff1f6080 00000000 0000005d 00000002 ffbd8080 ffbd8080 (XEN) b587215b 0000005d 00000004 00000033 0000d3a0 b5b50665 00000004 43841a17 (XEN) 5a9d8fe8 909090ff 90909090 c3900390 ff1f9a00 ff116bbc b5b50665 0000005d (XEN) ffbf3fb4 ff1e1003 ff1dd180 ffbd8080 0000007b 0000007b 00305000 ff19d614 (XEN) b34f62d8 52ab9700 b7fbb430 b34f63a8 00000000 00305000 b34f62d8 52ab9700 (XEN) b7fbb430 b34f63a8 00000000 00305000 00000024 000d0000 c0101487 00000061 (XEN) Xen call trace: (XEN) [<ff10f81d>] free_domheap_pages+0x9d/0x250 (XEN) [<ff10ef33>] free_heap_pages+0xc3/0x1d0 (XEN) [<ff1c5504>] nokey+0xc/0x10 (XEN) [<ff1395ac>] put_page+0x5c/0x60 (XEN) [<ff12fc57>] relinquish_memory+0xe7/0x290 (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff186515>] paging_log_dirty_teardown+0x55/0xa0 (XEN) [<ff1c4090>] __start+0x25/0x1ef (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff1c4090>] __start+0x25/0x1ef (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff12ff2c>] domain_relinquish_resources+0x12c/0x190 (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff104171>] domain_kill+0x71/0x160 (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff1030ad>] do_domctl+0x10d/0xc40 (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff13c005>] get_page_from_l1e+0x1b5/0x480 (XEN) [<ff1c4080>] __start+0x15/0x1ef (XEN) [<ff13ad7b>] put_page_from_l1e+0x9b/0xf0 (XEN) [<ff14a64d>] do_general_protection+0x42d/0x1310 (XEN) [<ff116bbc>] timer_softirq_action+0x10c/0x130 (XEN) [<ff19d614>] hypercall+0x94/0x9b (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 2: (XEN) Xen BUG at page_alloc.c:839 (XEN) **************************************** ######### Best Regards Jiajun _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |