WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1160] New: Xen BUG at io_apic.c:127

http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1160

           Summary: Xen BUG at io_apic.c:127
           Product: Xen
           Version: unspecified
          Platform: x86-64
        OS/Version: Linux-2.6
            Status: NEW
          Severity: major
          Priority: P2
         Component: HVM
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: tmacmd@xxxxxxxxx


Description of problem:
During some reboots, the OS fails to boot with a bug at io_api.c:127

This is using RHEL5.1
xen 3.1.0-53.1.6el5


This is on an Intel S5000PSL board with two Quad-Core E5345 CPUs
16GB of RAM and a Seagate 250GB SATA disk.

This is not easily reproducible. When the problem happens though, the only
workaround has been to boot a non-xen kernel (like PXE boot and start a kernel
off the net)

More Info (serial console output)
 __  __            _____  _   ___    ____ _____  _   __        _ ____
 \ \/ /___ _ __   |___ / / | / _ \  | ___|___ / / | / /_   ___| | ___|
  \  // _ \ '_ \    |_ \ | || | | |_|___ \ |_ \ | || '_ \ / _ \ |___ \
  /  \  __/ | | |  ___) || || |_| |__|__) |__) || || (_) |  __/ |___) |
 /_/\_\___|_| |_| |____(_)_(_)___/  |____/____(_)_(_)___(_)___|_|____/

 http://www.cl.cam.ac.uk/netos/xen
 University of Cambridge Computer Laboratory

 Xen version 3.1.0-53.1.6.el5 (brewbuilder@xxxxxxxxxxxxxxxx) (gcc version 4.1.2
20070626 (Red Hat 4.1.2-14)) Wed Jan 16 03:52:53 EST 208 Latest ChangeSet:
unavailable

(XEN) Command line: /xen.gz-2.6.18-53.1.6.el5 com1=9600,8n1
(XEN)  0000000000000000 - 000000000009e000 (usable)
(XEN)  000000000009ec00 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 000000009e25e000 (usable)
(XEN)  000000009e25e000 - 000000009e320000 (ACPI NVS)
(XEN)  000000009e320000 - 000000009fa32000 (usable)
(XEN)  000000009fa32000 - 000000009fa9a000 (reserved)
(XEN)  000000009fa9a000 - 000000009faac000 (usable)
(XEN)  000000009faac000 - 000000009fb1a000 (ACPI NVS)
(XEN)  000000009fb1a000 - 000000009fb26000 (usable)
(XEN)  000000009fb26000 - 000000009fb3a000 (ACPI data)
(XEN)  000000009fb3a000 - 000000009fc00000 (usable)
(XEN)  000000009fc00000 - 00000000b0000000 (reserved)
(XEN)  00000000ffe00000 - 00000000ffe0c000 (reserved)
(XEN)  0000000100000000 - 0000000460000000 (usable)
(XEN) System RAM: 16377MB (16771016kB)
(XEN) Xen heap: 13MB (13712kB)
(XEN) Domain heap initialised: DMA width 32 bits
(XEN) Processor #0 6:15 APIC version 20
(XEN) Processor #2 6:15 APIC version 20
(XEN) Processor #4 6:15 APIC version 20
(XEN) Processor #6 6:15 APIC version 20
(XEN) Processor #1 6:15 APIC version 20
(XEN) Processor #3 6:15 APIC version 20
(XEN) Processor #5 6:15 APIC version 20
(XEN) Processor #7 6:15 APIC version 20
(XEN) IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23
(XEN) IOAPIC[1]: apic_id 9, version 32, address 0xfec80000, GSI 24-47
(XEN) Enabling APIC mode:  Flat.  Using 2 I/O APICs
(XEN) Using scheduler: SMP Credit Scheduler (credit)
(XEN) Detected 2327.550 MHz processor.
(XEN) HVM: VMX enabled
(XEN) VMX: MSR intercept bitmap enabled
(XEN) CPU0: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Mapping cpu 0 to node 255
(XEN) Booting processor 1/2 eip 90000
(XEN) Mapping cpu 1 to node 255
(XEN) CPU1: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Booting processor 2/4 eip 90000
(XEN) Mapping cpu 2 to node 255
(XEN) CPU2: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Booting processor 3/6 eip 90000
(XEN) Mapping cpu 3 to node 255
(XEN) CPU3: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Booting processor 4/1 eip 90000
(XEN) Mapping cpu 4 to node 255
(XEN) CPU4: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Booting processor 5/3 eip 90000
(XEN) Mapping cpu 5 to node 255
(XEN) CPU5: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Booting processor 6/5 eip 90000
(XEN) Mapping cpu 6 to node 255
(XEN) CPU6: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Booting processor 7/7 eip 90000
(XEN) Mapping cpu 7 to node 255
(XEN) CPU7: Intel(R) Xeon(R) CPU           E5345  @ 2.33GHz stepping 07
(XEN) Total of 8 processors activated.
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using new ACK method
(XEN) Platform timer is 14.318MHz HPET
(XEN) Brought up 8 CPUs
(XEN) *** LOADING DOMAIN 0 ***
(XEN) elf_parse_binary: phdr: paddr=0xffffffff80200000 memsz=0x2c3c58
(XEN) elf_parse_binary: phdr: paddr=0xffffffff804c3c80 memsz=0x113270
(XEN) elf_parse_binary: phdr: paddr=0xffffffff805d7000 memsz=0xc08
(XEN) elf_parse_binary: phdr: paddr=0xffffffff805d8000 memsz=0x10af04
(XEN) elf_parse_binary: memory: 0xffffffff80200000 -> 0xffffffff806e2f04
(XEN) elf_xen_parse_note: GUEST_OS = "linux"
(XEN) elf_xen_parse_note: GUEST_VERSION = "2.6"
(XEN) elf_xen_parse_note: XEN_VERSION = "xen-3.0"
(XEN) elf_xen_parse_note: VIRT_BASE = 0xffffffff80000000
(XEN) elf_xen_parse_note: PADDR_OFFSET = 0xffffffff80000000
(XEN) elf_xen_parse_note: ENTRY = 0xffffffff80200000
(XEN) elf_xen_parse_note: HYPERCALL_PAGE = 0xffffffff80206000
(XEN) elf_xen_parse_note: FEATURES =
"writable_page_tables|writable_descriptor_tables|auto_translated_physmap|pae_pgdir_above_4gb|super"(XEN)
elf_xen_parse_note: LOADER = "generic"
(XEN) elf_xen_addr_calc_check: addresses:
(XEN)     virt_base        = 0xffffffff80000000
(XEN)     elf_paddr_offset = 0xffffffff80000000
(XEN)     virt_offset      = 0x0
(XEN)     virt_kstart      = 0xffffffff80200000
(XEN)     virt_kend        = 0xffffffff806e2f04
(XEN)     virt_entry       = 0xffffffff80200000
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, lsb, paddr 0xffffffff80200000 -> 0xffffffff806e2f04
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   000000044c000000->0000000450000000 (4080949 pages to be
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff80200000->ffffffff806e2f04
(XEN)  Init. ramdisk: ffffffff806e3000->ffffffff80e5fe00
(XEN)  Phys-Mach map: ffffffff80e60000->ffffffff82da29a8
(XEN)  Start info:    ffffffff82da3000->ffffffff82da349c
(XEN)  Page tables:   ffffffff82da4000->ffffffff82dbf000
(XEN)  Boot stack:    ffffffff82dbf000->ffffffff82dc0000
(XEN)  TOTAL:         ffffffff80000000->ffffffff83000000
(XEN)  ENTRY ADDRESS: ffffffff80200000
(XEN) Dom0 has maximum 8 VCPUs
(XEN) elf_load_binary: phdr 0 at 0xffffffff80200000 -> 0xffffffff804c3c58
(XEN) elf_load_binary: phdr 1 at 0xffffffff804c3c80 -> 0xffffffff805d6ef0
(XEN) elf_load_binary: phdr 2 at 0xffffffff805d7000 -> 0xffffffff805d7c08
(XEN) elf_load_binary: phdr 3 at 0xffffffff805d8000 -> 0xffffffff80611388
(XEN) Initrd len 0x77ce00, start at 0xffffffff806e3000
(XEN) Scrubbing Free RAM: .done.
(XEN) Xen trace buffers: disabled
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) Xen is relinquishing VGA console.
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to
Xen).
kernel direct mapping tables up to 3e8d35000 @ 2dce000-6c7e000
PCI: BIOS Bug: MCFG area at a0000000 is not E820-reserved
PCI: Not using MMCONFIG.
(XEN) ioapic_guest_write: apic=0, pin=4, old_irq=4, new_irq=4
(XEN) ioapic_guest_write: old_entry=000009f1, new_entry=000109f1
(XEN) ioapic_guest_write: Attempt to modify IO-APIC pin for in-use IRQ!
(XEN) Xen BUG at io_apic.c:127
(XEN) ----[ Xen-3.1.0-53.1.6.el5  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff830000130147>] ioapic_guest_write+0x2c7/0x5c0
(XEN) RFLAGS: 0000000000010046   CONTEXT: hypervisor
(XEN) rax: 0000000000000000   rbx: 0000000000000000   rcx: ffff8300001f70c8
(XEN) rdx: ffff8300001f8900   rsi: 0000000000000001   rdi: ffff8300001f7080
(XEN) rbp: 0000000000000000   rsp: ffff8300001e3e28   r8:  ffff8300001f70c8
(XEN) r9:  0000000000000001   r10: 0000000000000010   r11: 0000000000000006
(XEN) r12: 000000000001a998   r13: 0000000000000010   r14: 0000000000001000
(XEN) r15: 0000000000000206   cr0: 000000008005003b   cr4: 00000000000026b0
(XEN) cr3: 000000044c201000   cr2: ffff8803e852a0b8
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff8300001e3e28:
(XEN)    0000000000000000 0000000000000000 ffff830000fc4080 ffff8300001e3eb4
(XEN)    ffff8300001ca080 000083000010947c 0000000800000002 ffffffff803f382b
(XEN)    90ed66fff9f193e8 ffff8300001e3e88 ffff8300001e3e98 0000003000000020
(XEN)    ff0000000001a998 00000000000002ed 0000000000010a40 0000000000000000
(XEN)    ffff8300001be180 ffff8803e8509d30 0000000000000010 0000000000000000
(XEN)    0000000000000000 0000000000000010 0000000000000001 ffff83000013a8b2
(XEN)    00000000fec00000 0001a99800000030 0000000000001000 ffff8300001ca080
(XEN)    0000000000000010 0000000000000000 0000000000000000 ffff83000017d102
(XEN)    0000000000000001 0000000000000010 0000000000000000 0000000000000000
(XEN)    0000000000000010 ffff8803e8509cd0 0000000000000213 00000000fec00000
(XEN)    ffff8803e8509d30 0000000000000009 0000000000000021 ffffffff8020642a
(XEN)    ffffffffff578000 ffff8803e8509d30 0000000000000009 0000010000000000
(XEN)    ffffffff8020642a 000000000000e033 0000000000000213 ffff8803e8509c88
(XEN)    000000000000e02b 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 ffff8300001ca080
(XEN) Xen call trace:
(XEN)    [<ffff830000130147>] ioapic_guest_write+0x2c7/0x5c0
(XEN)    [<ffff83000013a8b2>] do_physdev_op+0x2f2/0x56c
(XEN)    [<ffff83000017d102>] syscall_enter+0x62/0x67
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Xen BUG at io_apic.c:127
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>