WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] RE: kernel panic when enable x2apic

To: Jan Beulich <JBeulich@xxxxxxxxxx>
Subject: [Xen-devel] RE: kernel panic when enable x2apic
From: "Zhang, Yang Z" <yang.z.zhang@xxxxxxxxx>
Date: Wed, 17 Nov 2010 21:16:58 +0800
Accept-language: en-US
Acceptlanguage: en-US
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, "Han, Weidong" <weidong.han@xxxxxxxxx>
Delivery-date: Wed, 17 Nov 2010 05:18:22 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4CE3B1640200007800022BA5@xxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <749B9D3DBF0F054390025D9EAFF47F22301755C5@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <4CE3B1640200007800022BA5@xxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcuGO6YX5cVN4W7PS5KzL6Kc1HdqnwAHXSzA
Thread-topic: kernel panic when enable x2apic
> -----Original Message-----
> From: Jan Beulich [mailto:JBeulich@xxxxxxxxxx]
> Sent: Wednesday, November 17, 2010 5:42 PM
> To: Zhang, Yang Z
> Cc: Han, Weidong; xen-devel@xxxxxxxxxxxxxxxxxxx
> Subject: Re: kernel panic when enable x2apic
> 
> >>> On 17.11.10 at 09:59, "Zhang, Yang Z" <yang.z.zhang@xxxxxxxxx> wrote:
> > Did your test your patch with x2apic enabled? We always see kernel panic
> 
> No, due to there not being a suitable box accessible to me.
> 
> > when enable x2apic since 22375? And without your patch or set x2apic=0 in
> xen
> > command line, it works fine.
> > Any suggestions?
> 
> Not immediately.
> 
> > (XEN) ----[ Xen-4.1-unstable  x86_64  debug=y  Tainted:    C ]----
> > (XEN) CPU:    0
> > (XEN) RIP:    e008:[<ffff82c48013cac9>]
> pci_get_pdev_by_domain+0x49/0x5b
> > (XEN) RFLAGS: 0000000000010207   CONTEXT: hypervisor
> > (XEN) rax: 0000000000000000   rbx: ffff83007f034000   rcx:
> 0000000000000000
> > (XEN) rdx: 00000000ffffffff   rsi: 00000000ffffffff   rdi: ffff83007f034000
> > (XEN) rbp: ffff82c480297d38   rsp: ffff82c480297d38   r8:
> 0000000000000000
> > (XEN) r9:  ffff82c4802525b0   r10: 0000000000000000   r11:
> 0000000000000000
> > (XEN) r12: ffff83007f034000   r13: 0000000000000004   r14:
> 0000000000000000
> > (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4:
> 00000000000026f0
> > (XEN) cr3: 000000007f29c000   cr2: 0000000000000000
> > (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
> > (XEN) Xen stack trace from rsp=ffff82c480297d38:
> > (XEN)    ffff82c480297d78 ffff82c48013cec5 ffff82c480297d58
> ffff83007f034000
> > (XEN)    ffff83007f034000 0000000000000004 0000000000000000
> 0000000000000000
> > (XEN)    ffff82c480297d98 ffff82c480152fd4 ffff83007f034000
> 000000000000003f
> > (XEN)    ffff82c480297dd8 ffff82c480104e1d ffff82c48028a298
> 0000000000000080
> > (XEN)    0000000000000080 0000000000000007 0000000000000008
> 0000000000000007
> > (XEN)    ffff82c480297f08 ffff82c48027802b 0000000000000000
> 0000000000000000
> > (XEN)    ffff82c4802596a5 0000000000259640 00f1400000000000
> 0000000000000000
> > (XEN)    ffff83000007bc50 ffff83000007bfb0 ffff83000007bef0
> 0000000000f14000
> > (XEN)    0000000000000000 0000000000000000 0000000020000000
> 0000000000000000
> > (XEN)    0000000000000000 ffffffffffffffff ffff83000007bef0
> 000000000007bef0
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    ffff82c480287cc8 0000000001000000 ffffffff00000000
> ffff82c480259640
> > (XEN)    0000000800000000 000000010000006e 0000000000000003
> 00000000000002f8
> > (XEN)    0000000000000000 0000000000000000 000000007c223900
> 000000007de55018
> > (XEN)    0000000000000000 0000000000000001 0000000000067ebc
> ffff82c4801000b5
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN) Xen call trace:
> > (XEN)    [<ffff82c48013cac9>] pci_get_pdev_by_domain+0x49/0x5b
> > (XEN)    [<ffff82c48013cec5>] pci_release_devices+0x200/0x230
> > (XEN)    [<ffff82c480152fd4>] arch_domain_destroy+0x28/0x2c9
> > (XEN)    [<ffff82c480104e1d>] domain_create+0x3cb/0x46e
> > (XEN)    [<ffff82c48027802b>] __start_xen+0x5660/0x5935
> 
> With arch_domain_destroy() on the call stack, things went wrong
> earlier (and the crash likely is in some error path, where I'd expect
> the problem has always existed, just that it was never hit). Was
> there no other relevant output prior to the actual crash?
> 

In fact, there have other error info before the crash and I didn't see it 
before:
(XEN) traps.c:2938: GPF (0000): ffff82c4801a0a73 -> ffff82c48020f0d2
(XEN) MTRR: CPU 0: Writing MSR 200 to ffff83007f0f7670 failed
(XEN) traps.c:2938: GPF (0000): ffff82c4801a0a73 -> ffff82c48020f0d2
(XEN) MTRR: CPU 0: Writing MSR 201 to f00000010 failed

best regards
yang
> Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel