WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] kernel panic when enable x2apic

To: "jbeulich@xxxxxxxxxx" <jbeulich@xxxxxxxxxx>
Subject: [Xen-devel] kernel panic when enable x2apic
From: "Zhang, Yang Z" <yang.z.zhang@xxxxxxxxx>
Date: Wed, 17 Nov 2010 16:59:22 +0800
Accept-language: en-US
Acceptlanguage: en-US
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, "Han, Weidong" <weidong.han@xxxxxxxxx>
Delivery-date: Wed, 17 Nov 2010 01:03:35 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcuGNbnxxIf6x9WiQNeLz0Q5z0XNTw==
Thread-topic: kernel panic when enable x2apic
Hi jan.
Did your test your patch with x2apic enabled? We always see kernel panic when 
enable x2apic since 22375? And without your patch or set x2apic=0 in xen 
command line, it works fine.
Any suggestions?

(XEN) ----[ Xen-4.1-unstable  x86_64  debug=y  Tainted:    C ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff82c48013cac9>] pci_get_pdev_by_domain+0x49/0x5b
(XEN) RFLAGS: 0000000000010207   CONTEXT: hypervisor
(XEN) rax: 0000000000000000   rbx: ffff83007f034000   rcx: 0000000000000000
(XEN) rdx: 00000000ffffffff   rsi: 00000000ffffffff   rdi: ffff83007f034000
(XEN) rbp: ffff82c480297d38   rsp: ffff82c480297d38   r8:  0000000000000000
(XEN) r9:  ffff82c4802525b0   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: ffff83007f034000   r13: 0000000000000004   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026f0
(XEN) cr3: 000000007f29c000   cr2: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen stack trace from rsp=ffff82c480297d38:
(XEN)    ffff82c480297d78 ffff82c48013cec5 ffff82c480297d58 ffff83007f034000
(XEN)    ffff83007f034000 0000000000000004 0000000000000000 0000000000000000
(XEN)    ffff82c480297d98 ffff82c480152fd4 ffff83007f034000 000000000000003f
(XEN)    ffff82c480297dd8 ffff82c480104e1d ffff82c48028a298 0000000000000080
(XEN)    0000000000000080 0000000000000007 0000000000000008 0000000000000007
(XEN)    ffff82c480297f08 ffff82c48027802b 0000000000000000 0000000000000000
(XEN)    ffff82c4802596a5 0000000000259640 00f1400000000000 0000000000000000
(XEN)    ffff83000007bc50 ffff83000007bfb0 ffff83000007bef0 0000000000f14000
(XEN)    0000000000000000 0000000000000000 0000000020000000 0000000000000000
(XEN)    0000000000000000 ffffffffffffffff ffff83000007bef0 000000000007bef0
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    ffff82c480287cc8 0000000001000000 ffffffff00000000 ffff82c480259640
(XEN)    0000000800000000 000000010000006e 0000000000000003 00000000000002f8
(XEN)    0000000000000000 0000000000000000 000000007c223900 000000007de55018
(XEN)    0000000000000000 0000000000000001 0000000000067ebc ffff82c4801000b5
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) Xen call trace:
(XEN)    [<ffff82c48013cac9>] pci_get_pdev_by_domain+0x49/0x5b
(XEN)    [<ffff82c48013cec5>] pci_release_devices+0x200/0x230
(XEN)    [<ffff82c480152fd4>] arch_domain_destroy+0x28/0x2c9
(XEN)    [<ffff82c480104e1d>] domain_create+0x3cb/0x46e
(XEN)    [<ffff82c48027802b>] __start_xen+0x5660/0x5935
(XEN)    
(XEN) Pagetable walk from 0000000000000000:
(XEN)  L4[0x000] = 000000007f2d4063 5555555555555555
(XEN)  L3[0x000] = 000000007f0fb063 5555555555555555
(XEN)  L2[0x000] = 000000007f0fa063 5555555555555555 
(XEN)  L1[0x000] = 0000000000000000 ffffffffffffffff
(XEN) 
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0000]
(XEN) Faulting linear address: 0000000000000000
(XEN) ****************************************
(XEN) 
(XEN) Reboot in five seconds...
(XEN) Resetting with ACPI MEMORY or I/O RESET_REG.

best regards
yang



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel