WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 358] New: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 358] New: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on cpu#0:
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Fri, 21 Oct 2005 16:12:32 +0000
Delivery-date: Fri, 21 Oct 2005 16:12:41 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=358

           Summary: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on cpu#0:
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Guest-OS
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: dbarrera@xxxxxxxxxx
                CC: hohnbaum@xxxxxxxxxx,pl@xxxxxxxxxx


I am seeing '(XEN) Domain 131 (vcpu#1) crashed on cpu#0:' on an x86_64, FC4
based box, IBM HS20 Blade. Per Ian Pratt's comment (#7) on Bugzilla #267
(http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=267#c7), I am treating
this as a different issue.

(XEN) Domain 133 (vcpu#1) crashed on cpu#0:
(XEN) CPU:    0
(XEN) RIP:    e030:[<ffffffff8013d1bd>] ???
(XEN) RFLAGS: 0000000000010246   CONTEXT: hypervisor
(XEN) rax: ffffffff8011ac59   rbx: 0000000000000000   rcx: 0000000000000000
(XEN) rdx: ffff88000082f0c8   rsi: 000000000000000d   rdi: ffffffff80392d98
(XEN) rbp: 0000000000000000   rsp: ffff88000082f000   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: ffff88000082f128   r13: 0000000000000000   r14: 0000000000000034
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr3: 000000003ff33000
(XEN) Xen stack trace from rsp=ffff88000082f000:
(XEN)    0000000000000000 ffff88000082f128 ffffffff8011accb ffffffff80330100
(XEN)    0000000000000711 ffff880000008990 0000000000000711 ffff88000117a950
(XEN)    0000000000000711 ffff880000008190 0000000000000702 ffffffff8033001f
(XEN)    0000000000000711 ffff880000008590 0000000000000711 ffff880000008d90
(XEN)    0000000000000712 ffff88000117d690 0000000000000700 ffffffff8033000a
(XEN)    0000000000000711 ffff880000008790 0000000000000711 ffff880000008f90
(XEN)    0000000000000712 ffff88000082f128 ffffffff802f0116 0000000000000000
(XEN)    0000000b0000000e ffff880000008390 0000000000000000 0000000000000000
(XEN)    ffff88000082f2e8 0000000000000000 0000000000000034 0000000000000000
(XEN)    ffffffff80112997 0000000000000000 0000000000000034 0000000000000000
(XEN)    ffff88000082f2e8 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 ffffffffff5fd000 000000000000000d ffffffff80392d98
(XEN)    ffffffffffffffff ffffffff8011ace8 000000010000e030 0000000000010202
(XEN)    ffff88000082f1d8 000000000000e02b ffffffff8011accb ffff88000117aa50
(XEN)    0000000000000711 ffff880000008290 0000000000000711 ffff880000008a90
(XEN)    0000000000000712 ffff880000009d90 0000000000000700 ffffffff80330004
(XEN)    0000000000000711 ffff880000008910 0000000000000711 ffff88000117a8d0
(XEN)    0000000000000711 ffff880000008110 0000000000000703 ffffffff8033002b
(XEN)    0000000000000711 ffff880000008510 0000000000000711 ffff880000008d10
(XEN) Xen call trace:
(XEN)    [<ffffffff8013d1bd>] ???
(XEN)
(XEN) (file=traps.c, line=968) Non-priv domain attempted
RDMSR(00000000c0000080,00004000,00004000).
(XEN) (file=traps.c, line=960) Non-priv domain attempted
WRMSR(00000000c0000100,00000000,00000000).
(XEN) (file=traps.c, line=960) Non-priv domain attempted
WRMSR(00000000c0000102,00000000,00000000).
(XEN) (file=traps.c, line=968) Non-priv domain attempted
RDMSR(00000000c0000080,00000000,00000000).


--------
[root@bl2-10 boot]# objdump -d vmlinux-syms-2.6.12.5-xenU  | grep ffffff8013d1bd
ffffffff8013d1bd:       53                      push   %rbx

[root@bl2-10 boot]# objdump -d vmlinux-syms-2.6.12.5-xenU  | grep ffffff8013d1b
ffffffff8011363d:       e8 78 9b 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff801137e4:       e8 d1 99 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff801138c4:       e8 f1 98 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113938:       e8 7d 98 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113a26:       e8 8f 97 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113c71:       e8 44 95 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113e1b:       e8 9a 93 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113e8a:       e8 2b 93 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113ef9:       e8 bc 92 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113f68:       e8 4d 92 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8011400f:       e8 a6 91 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114081:       e8 34 91 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff801140f0:       e8 c5 90 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8011415f:       e8 56 90 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff801141ce:       e8 e7 8f 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114278:       e8 3d 8f 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff801142ea:       e8 cb 8e 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114359:       e8 5c 8e 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114403:       e8 b2 8d 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114496:       e8 1f 8d 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8011acc6:       e8 ef 24 02 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8012faa6:       e8 0f d7 00 00          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013d18a:       eb 27                   jmp    ffffffff8013d1b3
<notifier_chain_unregister+0x65>
ffffffff8013d1aa:       eb 07                   jmp    ffffffff8013d1b3
<notifier_chain_unregister+0x65>
ffffffff8013d1b1:       eb c2                   jmp    ffffffff8013d175
<notifier_chain_unregister+0x27>
ffffffff8013d1b3:       48 83 c4 08             add    $0x8,%rsp
ffffffff8013d1b7:       5b                      pop    %rbx
ffffffff8013d1b8:       5d                      pop    %rbp
ffffffff8013d1b9:       c3                      retq
ffffffff8013d1ba <notifier_call_chain>:
ffffffff8013d1ba:       41 54                   push   %r12
ffffffff8013d1bc:       55                      push   %rbp
ffffffff8013d1bd:       53                      push   %rbx
ffffffff8013d1be:       49 89 f4                mov    %rsi,%r12
ffffffff8013d21e:       e8 97 ff ff ff          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013e9a0:       e8 15 e8 ff ff          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013e9fa:       e8 bb e7 ff ff          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013ea3b:       e8 7a e7 ff ff          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013eaa9:       e8 0c e7 ff ff          callq  ffffffff8013d1ba
<notifier_call_chain>
ffffffff80147ae3:       e8 d2 56 ff ff          callq  ffffffff8013d1ba
<notifier_call_chain>

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-bugs] [Bug 358] New: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on cpu#0:, bugzilla-daemon <=