[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Unknown interrupt on x86_64 Xen on ES7000 x86_64



Here is the disassembly output from vmlinux-syms-2.6.12.3-xen0. I am
wondering if I have a bad stack. The EIP points to 0xffffffff8011e4a1
<xen_l1_entry_update+113>:   ud2a

What does ud2a do?

Aravindh

Dump of assembler code from 0xffffffff8011e410 to 0xffffffff8011e4b0:
0xffffffff8011e410 <xen_l2_entry_update+112>:   (bad)
0xffffffff8011e411 <xen_l2_entry_update+113>:   ud2a
0xffffffff8011e413 <xen_l2_entry_update+115>:   enterq $0x3f30,$0x80
0xffffffff8011e417 <xen_l2_entry_update+119>:   (bad)
0xffffffff8011e418 <xen_l2_entry_update+120>:   (bad)
0xffffffff8011e419 <xen_l2_entry_update+121>:   (bad)
0xffffffff8011e41a <xen_l2_entry_update+122>:   decl   0x0(%rax)
0xffffffff8011e41d <xen_l2_entry_update+125>:   data16
0xffffffff8011e41e <xen_l2_entry_update+126>:   data16
0xffffffff8011e41f <xen_l2_entry_update+127>:   nop
0xffffffff8011e420 <xen_l2_entry_update+128>:   add    $0x18,%rsp
0xffffffff8011e424 <xen_l2_entry_update+132>:   retq
0xffffffff8011e425 <xen_l2_entry_update+133>:   data16
0xffffffff8011e426 <xen_l2_entry_update+134>:   data16
0xffffffff8011e427 <xen_l2_entry_update+135>:   data16
0xffffffff8011e428 <xen_l2_entry_update+136>:   nop
0xffffffff8011e429 <xen_l2_entry_update+137>:   data16
0xffffffff8011e42a <xen_l2_entry_update+138>:   data16
0xffffffff8011e42b <xen_l2_entry_update+139>:   data16
0xffffffff8011e42c <xen_l2_entry_update+140>:   nop
0xffffffff8011e42d <xen_l2_entry_update+141>:   data16
0xffffffff8011e42e <xen_l2_entry_update+142>:   data16
0xffffffff8011e42f <xen_l2_entry_update+143>:   nop
0xffffffff8011e430 <xen_l1_entry_update+0>:     mov
$0xffffffff7fffffff,%rax
0xffffffff8011e43a <xen_l1_entry_update+10>:    sub    $0x18,%rsp
0xffffffff8011e43e <xen_l1_entry_update+14>:    cmp    %rax,%rdi
0xffffffff8011e441 <xen_l1_entry_update+17>:    jbe
0xffffffff8011e450 <xen_l1_entry_update+32>
0xffffffff8011e443 <xen_l1_entry_update+19>:    mov    $0x80000000,%eax
0xffffffff8011e448 <xen_l1_entry_update+24>:    jmp
0xffffffff8011e45a <xen_l1_entry_update+42>
0xffffffff8011e44a <xen_l1_entry_update+26>:    data16
0xffffffff8011e44b <xen_l1_entry_update+27>:    data16
0xffffffff8011e44c <xen_l1_entry_update+28>:    nop
0xffffffff8011e44d <xen_l1_entry_update+29>:    data16
0xffffffff8011e44e <xen_l1_entry_update+30>:    data16
0xffffffff8011e44f <xen_l1_entry_update+31>:    nop
0xffffffff8011e450 <xen_l1_entry_update+32>:    mov
$0x780000000000,%rax
0xffffffff8011e45a <xen_l1_entry_update+42>:    lea
(%rax,%rdi,1),%rcx
0xffffffff8011e45e <xen_l1_entry_update+46>:    mov
4102811(%rip),%rdx        # 0xffffffff80507f00 <phys_to_machine_mapping>
0xffffffff8011e465 <xen_l1_entry_update+53>:    mov    %rsp,%rdi
0xffffffff8011e468 <xen_l1_entry_update+56>:    mov    %rcx,%rax
0xffffffff8011e46b <xen_l1_entry_update+59>:    and    $0xfff,%ecx
0xffffffff8011e471 <xen_l1_entry_update+65>:    shr    $0xc,%rax
0xffffffff8011e475 <xen_l1_entry_update+69>:    mov    %eax,%eax
0xffffffff8011e477 <xen_l1_entry_update+71>:    mov
(%rdx,%rax,4),%eax
0xffffffff8011e47a <xen_l1_entry_update+74>:    mov    %rsi,0x8(%rsp)
0xffffffff8011e47f <xen_l1_entry_update+79>:    mov    $0x1,%esi
0xffffffff8011e484 <xen_l1_entry_update+84>:    xor    %edx,%edx
0xffffffff8011e486 <xen_l1_entry_update+86>:    shl    $0xc,%rax
0xffffffff8011e48a <xen_l1_entry_update+90>:    or     %rcx,%rax
0xffffffff8011e48d <xen_l1_entry_update+93>:    mov    %rax,(%rsp)
0xffffffff8011e491 <xen_l1_entry_update+97>:    mov    %rsi,%rax
0xffffffff8011e494 <xen_l1_entry_update+100>:   mov    $0x7ff0,%r10
0xffffffff8011e49b <xen_l1_entry_update+107>:   syscall
0xffffffff8011e49d <xen_l1_entry_update+109>:   test   %eax,%eax
0xffffffff8011e49f <xen_l1_entry_update+111>:   jns
0xffffffff8011e4b0 <xen_l1_entry_update+128>
0xffffffff8011e4a1 <xen_l1_entry_update+113>:   ud2a
0xffffffff8011e4a3 <xen_l1_entry_update+115>:   enterq $0x3f30,$0x80
0xffffffff8011e4a7 <xen_l1_entry_update+119>:   (bad)
0xffffffff8011e4a8 <xen_l1_entry_update+120>:   (bad)
0xffffffff8011e4a9 <xen_l1_entry_update+121>:   (bad)
0xffffffff8011e4aa <xen_l1_entry_update+122>:   incl   0x0(%rax)
0xffffffff8011e4ad <xen_l1_entry_update+125>:   data16
0xffffffff8011e4ae <xen_l1_entry_update+126>:   data16
0xffffffff8011e4af <xen_l1_entry_update+127>:   nop


> -----Original Message-----
> From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-
> bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Puthiyaparambil, Aravindh
> Sent: Wednesday, August 10, 2005 2:36 PM
> To: Nakajima, Jun; Keir Fraser
> Cc: xen-devel@xxxxxxxxxxxxxxxxxxx; Davis, Jason; Magolan, John F;
> Subrahmanian, Raj; Vessey, Bruce A
> Subject: RE: [Xen-devel] Unknown interrupt on x86_64 Xen on ES7000
x86_64
> 
> With mem=3g dom0_mem=512M this is what happens...
> 
> Aravindh
> 
> (XEN) Truncating memory map to 3145728kB
> (XEN) Physical RAM map:
> (XEN)  0000000000000000 - 000000000009dc00 (usable)
> (XEN)  000000000009dc00 - 00000000000a0000 (reserved)
> (XEN)  00000000000ce000 - 0000000000100000 (reserved)
> (XEN)  0000000000100000 - 0000000037ea0000 (usable)
> (XEN)  0000000037ea0000 - 0000000037edf000 (ACPI data)
> (XEN)  0000000037edf000 - 0000000037f00000 (ACPI NVS)
> (XEN)  0000000037f00000 - 00000000c0000000 (usable)
> (XEN) System RAM: 3071MB (3144948kB)
> (XEN) Xen heap: 14MB (14580kB)
> 
> ...................................
> 
> (XEN) *** LOADING DOMAIN 0 ***
> (XEN) Xen-ELF header found:
>
'GUEST_OS=linux,GUEST_VER=2.6,XEN_VER=3.0,VIRT_BASE=0xffffffff80000000,L
> OADER=generic'
> (XEN) PHYSICAL MEMORY ARRANGEMENT:
> (XEN)  Dom0 alloc.:   0000000060000000->0000000080000000
> (XEN) VIRTUAL MEMORY ARRANGEMENT:
> (XEN)  Loaded kernel: ffffffff80100000->ffffffff805cc086
> (XEN)  Init. ramdisk: ffffffff805cd000->ffffffff805cd000
> (XEN)  Phys-Mach map: ffffffff805cd000->ffffffff8064d000
> (XEN)  Page tables:   ffffffff8064d000->ffffffff80654000
> (XEN)  Start info:    ffffffff80654000->ffffffff80655000
> (XEN)  Boot stack:    ffffffff80655000->ffffffff80656000
> (XEN)  TOTAL:         ffffffff80000000->ffffffff80800000
> (XEN)  ENTRY ADDRESS: ffffffff80100000
> (XEN) Scrubbing Free RAM: ...............................done.
> (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch
> input to Xen).
> (XEN) (file=/root/xen/xen-unstable.hg/xen/include/asm/mm.h, line=204)
> Error pfn 7ffff: rd=ffff8300001c8080, od=0000000000000000,
caf=00000000,
> taf=0000000000000000
> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
> (XEN) CPU:    0
> (XEN) EIP:    e033:[<ffffffff8011e4a1>] ???
> (XEN) EFLAGS: 0000000000000282
> (XEN) rax: 00000000ffffffea   rbx: 00000000000001fe   rcx:
> ffffffff8011e49d   rdx: 0000000000000000
> (XEN) rsi: 0000000000000001   rdi: ffffffff80567e90   rbp:
> 0000000000802000   rsp: ffffffff80567e58
> (XEN) r8:  0000000000000004   r9:  0000000000000000   r10:
> 0000000000007ff0   r11: 0000000000000202
> (XEN) r12: ffffffff80802000   r13: ffffffff80568000   r14:
> ffffffff80105020   r15: ffffffff80105000
> (XEN) Guest stack trace from rsp=ffffffff80567e58:
> (XEN)    ffffffff8011e49d 0000000000000202 ffffffff8011e4a1
> 000000010000e030 0000000000010282 ffffffff80567e90 000000000000e02b
> 0000000060568008
> (XEN)    000000007ffff067 0000000000800000 ffffffff80592686
> 0000000000568000 0000000000000000 000000000000001b 0000000000000000
> 0000000020000000
> (XEN)    0000ffffffff8010 ffffffff80567fb0 ffffffff80592cd3
> 0000000000000000 0000000000000000 000000000000001b ffffffff805093bb
> ffffffff80567fa0
> (XEN)    0000ffffffff8010 ffffffff80567fb0 ffffffff8058eada
> 000000006064e830 ffffffff80502dbc 0000000000000001 0000000000060105
> 0000000000000000
> (XEN)    ffffffff80103000 ffffffff0000000f 0000000000010800
> ffffffff80452900 ffffffff80100038 00000000ffffffff 0000ffffffff8010
> ffffffff80567fb0
> (XEN)    ffffffff805884f8 ffffffff805093a0 ffffffff80588190
> 80108e0000100038 00000000ffffffff 0000000000000000 0000000000000000
> 0000000000000000
> (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000 0000000000000000
> (XEN) Domain 0 shutdown: rebooting machine.
> 
> 
> 
> > -----Original Message-----
> > From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-
> > bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Nakajima, Jun
> > Sent: Wednesday, August 10, 2005 2:25 PM
> > To: Puthiyaparambil, Aravindh; Keir Fraser
> > Cc: xen-devel@xxxxxxxxxxxxxxxxxxx; Davis, Jason; Magolan, John F;
> > Subrahmanian, Raj; Vessey, Bruce A
> > Subject: RE: [Xen-devel] Unknown interrupt on x86_64 Xen on ES7000
> x86_64
> >
> > Puthiyaparambil, Aravindh wrote:
> > > Xen and Dom0 boots successfully on the Dell PowerEdge x86_64 box
> with
> > > Keir's new time fix. I did have to comment out the printk as
> suggested
> > > by Jun as the serial was getting flooded otherwise.
> > >
> > > Jun, are you going to submit a patch for the map_alloc() function?
> > >
> > > On the ES7000 x86_64 I no longer see the "Assertion 'tsc_elapsed32
> !=
> > > 0'". But the system dies on the error shown at the end of the
email.
> > > This is with changeset 6081 + Jun's map_alloc fix + Jerone's rm_nx
> > > patch. Any suggestions as to how to proceed?
> >
> > Can you try to add mem=3g for the xen boot entry?
> >
> > Jun
> > ---
> > Intel Open Source Technology Center
> >
> > >
> > > Thanks
> > > Aravindh
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.