On 09/04/2018 08:49, Al Slater wrote:
> Has the fix for 7186 (xnf: panic on Xen 4.x) been integrated into
> r151022 since the initial CE release?
> 
> I have an instance in AWS that they required me to stop and start again
> due to host patching.  When I started it again the instance went into a
> panic/reboot loop.  The stack dump looked similar to the one in the
> error report.
> 
> I managed to get the instance started by changing the instance type from
> m4.large to t2.large.  Presumably AWS are migrating towards Xen versions
>> 4 in london region.  I don't know how long until the t2 hosts are updated.

Repeatable on any m4 instance type I tried.

Technical Director
SCL

Phone : +44 (0)1273 666607
Fax   : +44 (0)1273 666601
email : al.sla...@scluk.com

Stanton Consultancy Ltd

Park Gate, 161 Preston Road, Brighton, East Sussex, BN1 6AU

Registered in England Company number: 1957652 VAT number: GB 760 2433 55
panic[cpu0]/thread=ffffff000f4e6c40: BAD TRAP: type=e (#pf Page fault)
rp=ffffff000f4e69b0 addr=40 occurred in module "xnf" due to a NULL
pointer dereference

sched: #pf Page fault

Bad kernel fault at addr=0x40

pid=0, pc=0xfffffffff79b6e67, sp=0xffffff000f4e6aa0, eflags=0x10206

cr0: 8005003b<pg,wp,ne,et,ts,mp,pe> cr4:
1406b8<smep,osxsav,xmme,fxsr,pge,pae,pse,de>


cr2: 40cr3: c400000cr8: c
        rdi:              286 rsi:                6 rdx:                c
        rcx: ffffff03d5dbf064  r8:                0  r9:                0
        rax:              150 rbx:                3 rbp: ffffff000f4e6af0
        r10:                0 r11: fffffffffb800983 r12: ffffff03d5d90000
        r13:                0 r14:               15 r15:                9
        fsb:                0 gsb: fffffffffbc397e0  ds:               4b
         es:               4b  fs:                0  gs:              1c3
        trp:                e err:                0 rip: fffffffff79b6e67
         cs:               30 rfl:            10206 rsp: ffffff000f4e6aa0
         ss:               38

Warning - stack not written to the dump buffer
ffffff000f4e6890 unix:die+df ()
ffffff000f4e69a0 unix:trap+e18 ()
ffffff000f4e69b0 unix:cmntrap+e6 ()
ffffff000f4e6af0 xnf:xnf_tx_clean_ring+c7 ()
ffffff000f4e6b60 xnf:tx_slots_get+95 ()
ffffff000f4e6ba0 xnf:xnf_intr+15b ()
ffffff000f4e6bf0 unix:av_dispatch_softvect+78 ()
ffffff000f4e6c20 unix:dispatch_softint+39 ()
ffffff000f635460 unix:switch_sp_and_call+13 ()
ffffff000f6354a0 unix:dosoftint+44 ()
ffffff000f635500 unix:do_interrupt+ba ()
ffffff000f635510 unix:cmnint+ba ()
fffffffff7c6aec0 sha2:SHA256TransformBlocks+109f ()


-- 
Al Slater

_______________________________________________
OmniOS-discuss mailing list
OmniOS-discuss@lists.omniti.com
http://lists.omniti.com/mailman/listinfo/omnios-discuss

Reply via email to