|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 358] New: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=358
Summary: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on cpu#0:
Product: Xen
Version: unstable
Platform: x86-64
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Guest-OS
AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
ReportedBy: dbarrera@xxxxxxxxxx
CC: hohnbaum@xxxxxxxxxx,pl@xxxxxxxxxx
I am seeing '(XEN) Domain 131 (vcpu#1) crashed on cpu#0:' on an x86_64, FC4
based box, IBM HS20 Blade. Per Ian Pratt's comment (#7) on Bugzilla #267
(http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=267#c7), I am treating
this as a different issue.
(XEN) Domain 133 (vcpu#1) crashed on cpu#0:
(XEN) CPU: 0
(XEN) RIP: e030:[<ffffffff8013d1bd>] ???
(XEN) RFLAGS: 0000000000010246 CONTEXT: hypervisor
(XEN) rax: ffffffff8011ac59 rbx: 0000000000000000 rcx: 0000000000000000
(XEN) rdx: ffff88000082f0c8 rsi: 000000000000000d rdi: ffffffff80392d98
(XEN) rbp: 0000000000000000 rsp: ffff88000082f000 r8: 0000000000000000
(XEN) r9: 0000000000000000 r10: 0000000000000000 r11: 0000000000000000
(XEN) r12: ffff88000082f128 r13: 0000000000000000 r14: 0000000000000034
(XEN) r15: 0000000000000000 cr0: 000000008005003b cr3: 000000003ff33000
(XEN) Xen stack trace from rsp=ffff88000082f000:
(XEN) 0000000000000000 ffff88000082f128 ffffffff8011accb ffffffff80330100
(XEN) 0000000000000711 ffff880000008990 0000000000000711 ffff88000117a950
(XEN) 0000000000000711 ffff880000008190 0000000000000702 ffffffff8033001f
(XEN) 0000000000000711 ffff880000008590 0000000000000711 ffff880000008d90
(XEN) 0000000000000712 ffff88000117d690 0000000000000700 ffffffff8033000a
(XEN) 0000000000000711 ffff880000008790 0000000000000711 ffff880000008f90
(XEN) 0000000000000712 ffff88000082f128 ffffffff802f0116 0000000000000000
(XEN) 0000000b0000000e ffff880000008390 0000000000000000 0000000000000000
(XEN) ffff88000082f2e8 0000000000000000 0000000000000034 0000000000000000
(XEN) ffffffff80112997 0000000000000000 0000000000000034 0000000000000000
(XEN) ffff88000082f2e8 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 ffffffffff5fd000 000000000000000d ffffffff80392d98
(XEN) ffffffffffffffff ffffffff8011ace8 000000010000e030 0000000000010202
(XEN) ffff88000082f1d8 000000000000e02b ffffffff8011accb ffff88000117aa50
(XEN) 0000000000000711 ffff880000008290 0000000000000711 ffff880000008a90
(XEN) 0000000000000712 ffff880000009d90 0000000000000700 ffffffff80330004
(XEN) 0000000000000711 ffff880000008910 0000000000000711 ffff88000117a8d0
(XEN) 0000000000000711 ffff880000008110 0000000000000703 ffffffff8033002b
(XEN) 0000000000000711 ffff880000008510 0000000000000711 ffff880000008d10
(XEN) Xen call trace:
(XEN) [<ffffffff8013d1bd>] ???
(XEN)
(XEN) (file=traps.c, line=968) Non-priv domain attempted
RDMSR(00000000c0000080,00004000,00004000).
(XEN) (file=traps.c, line=960) Non-priv domain attempted
WRMSR(00000000c0000100,00000000,00000000).
(XEN) (file=traps.c, line=960) Non-priv domain attempted
WRMSR(00000000c0000102,00000000,00000000).
(XEN) (file=traps.c, line=968) Non-priv domain attempted
RDMSR(00000000c0000080,00000000,00000000).
--------
[root@bl2-10 boot]# objdump -d vmlinux-syms-2.6.12.5-xenU | grep ffffff8013d1bd
ffffffff8013d1bd: 53 push %rbx
[root@bl2-10 boot]# objdump -d vmlinux-syms-2.6.12.5-xenU | grep ffffff8013d1b
ffffffff8011363d: e8 78 9b 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff801137e4: e8 d1 99 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff801138c4: e8 f1 98 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113938: e8 7d 98 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113a26: e8 8f 97 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113c71: e8 44 95 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113e1b: e8 9a 93 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113e8a: e8 2b 93 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113ef9: e8 bc 92 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80113f68: e8 4d 92 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8011400f: e8 a6 91 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114081: e8 34 91 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff801140f0: e8 c5 90 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8011415f: e8 56 90 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff801141ce: e8 e7 8f 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114278: e8 3d 8f 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff801142ea: e8 cb 8e 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114359: e8 5c 8e 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114403: e8 b2 8d 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80114496: e8 1f 8d 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8011acc6: e8 ef 24 02 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8012faa6: e8 0f d7 00 00 callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013d18a: eb 27 jmp ffffffff8013d1b3
<notifier_chain_unregister+0x65>
ffffffff8013d1aa: eb 07 jmp ffffffff8013d1b3
<notifier_chain_unregister+0x65>
ffffffff8013d1b1: eb c2 jmp ffffffff8013d175
<notifier_chain_unregister+0x27>
ffffffff8013d1b3: 48 83 c4 08 add $0x8,%rsp
ffffffff8013d1b7: 5b pop %rbx
ffffffff8013d1b8: 5d pop %rbp
ffffffff8013d1b9: c3 retq
ffffffff8013d1ba <notifier_call_chain>:
ffffffff8013d1ba: 41 54 push %r12
ffffffff8013d1bc: 55 push %rbp
ffffffff8013d1bd: 53 push %rbx
ffffffff8013d1be: 49 89 f4 mov %rsi,%r12
ffffffff8013d21e: e8 97 ff ff ff callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013e9a0: e8 15 e8 ff ff callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013e9fa: e8 bb e7 ff ff callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013ea3b: e8 7a e7 ff ff callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff8013eaa9: e8 0c e7 ff ff callq ffffffff8013d1ba
<notifier_call_chain>
ffffffff80147ae3: e8 d2 56 ff ff callq ffffffff8013d1ba
<notifier_call_chain>
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-bugs] [Bug 358] New: x86_64 - (XEN) Domain 131 (vcpu#1) crashed on cpu#0:,
bugzilla-daemon <=
|
|
|
|
|