This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-bugs] [Bug 1393] New: SMP 64bit Solaris10u5 cause Xen crash

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1393] New: SMP 64bit Solaris10u5 cause Xen crash
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Sat, 6 Dec 2008 02:58:57 -0800
Delivery-date: Sat, 06 Dec 2008 02:59:05 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx

           Summary: SMP 64bit Solaris10u5 cause Xen crash
           Product: Xen
           Version: unstable
          Platform: Other
        OS/Version: other
            Status: NEW
          Severity: critical
          Priority: P1
         Component: Hypervisor
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: haicheng.li@xxxxxxxxx

Service Arch (ia32/ia32e/IA64): ia32e
Guest Arch (ia32/ia32e/IA64): ia32e
Guest OS Type (Linux/Windows): Solaris10u5
Change Set: 18809
Hardware: Weybridge, Nehalem

Bug detailed description:
With Xen unstable, booting SMP 64bit Solaris10u5 will cause Xen crash. Booting
UP 64 bit Solaris10u5 or SMP 32 bit Solaris10u5 has no such issue.

BTW, to boot up 64 bit Solaris10u5 on unstable xen, we should set PSE36=1 by
cpuid=[ '1:edx=xxxxxxxxxxxxxx1xxxxxxxxxxxxxxxxx' ] in hvm guest config file.

Serial output following:

(XEN) HVM1: HVM Loader
(XEN) HVM1: Detected Xen v3.4-unstable
(XEN) HVM1: CPU speed is 2826 MHz
(XEN) HVM1: Multiprocessor initialisation:
(XEN) HVM1:  - CPU0 ... 36-bit phys ... fixed MTRRs ... var MTRRs ... done.
(XEN) HVM1:  - CPU1 ... 36-bit phys ... fixed MTRRs ... var MTRRs ... done.
(XEN) HVM1: Testing HVM environment:
(XEN) HVM1:  - REP INSB across page boundaries ... passed
(XEN) HVM1: Passed 1/1 tests
(XEN) HVM1: Writing SMBIOS tables ...
(XEN) HVM1: Loading ROMBIOS ...
(XEN) HVM1: 9132 bytes of ROMBIOS high-memory extensions:
(XEN) HVM1:   Relocating to 0x1fff8c00-0x1fffafac ... done
(XEN) irq.c:235: Dom1 PCI link 0 changed 0 -> 5
(XEN) HVM1: PCI-ISA link 0 routed to IRQ5
(XEN) irq.c:235: Dom1 PCI link 1 changed 0 -> 10
(XEN) HVM1: PCI-ISA link 1 routed to IRQ10
(XEN) irq.c:235: Dom1 PCI link 2 changed 0 -> 11
(XEN) HVM1: PCI-ISA link 2 routed to IRQ11
(XEN) irq.c:235: Dom1 PCI link 3 changed 0 -> 5
(XEN) HVM1: PCI-ISA link 3 routed to IRQ5
(XEN) HVM1: pci dev 01:2 INTD->IRQ5
(XEN) HVM1: pci dev 01:3 INTA->IRQ10
(XEN) HVM1: pci dev 03:0 INTA->IRQ5
(XEN) HVM1: pci dev 04:0 INTA->IRQ5
(XEN) HVM1: pci dev 02:0 bar 10 size 02000000: f0000008
(XEN) HVM1: pci dev 03:0 bar 14 size 01000000: f2000008
(XEN) HVM1: pci dev 02:0 bar 14 size 00001000: f3000000
(XEN) HVM1: pci dev 03:0 bar 10 size 00000100: 0000c001
(XEN) HVM1: pci dev 04:0 bar 10 size 00000100: 0000c101
(XEN) HVM1: pci dev 04:0 bar 14 size 00000100: f3001000
(XEN) HVM1: pci dev 01:2 bar 20 size 00000020: 0000c201
(XEN) HVM1: pci dev 01:1 bar 20 size 00000010: 0000c221
(XEN) HVM1: Creating MP tables ...
(XEN) HVM1: Loading Cirrus VGABIOS ...
(XEN) HVM1: VGA RAM at 1f7f8000
(XEN) HVM1: Loading PCI Option ROM ...
(XEN) HVM1:  - Manufacturer: http://etherboot.org
(XEN) HVM1:  - Product name: gPXE
(XEN) HVM1: Loading ACPI ...
(XEN) HVM1:  - Lo data: 000ea000-000ea03f
(XEN) HVM1:  - Hi data: 1f7f6c00-1f7f7fdf
(XEN) HVM1: BIOS map:
(XEN) HVM1:  c0000-c8fff: VGA BIOS
(XEN) HVM1:  c9000-d57ff: Etherboot ROM
(XEN) HVM1:  e9000-e9175: SMBIOS tables
(XEN) HVM1:  f0000-fffff: Main BIOS
(XEN) HVM1: Invoking ROMBIOS ...
(XEN) HVM1:  rombios.c,v 1.138 2005/05/07 15:55:26 vruppert Exp $
(XEN) stdvga.c:147:d1 entering stdvga and caching modes
(XEN) HVM1: HVMAssist BIOS, 1 cpu, $Revision: 1.138 $ $Date: 2005/05/07
15:55:26 $
(XEN) HVM1: 
(XEN) HVM1: ata0-0: PCHS=16383/16/63 translation=lba LCHS=1024/255/63
(XEN) HVM1: ata0 master: QEMU HARDDISK ATA-7 Hard-Disk (10240 MBytes)
(XEN) HVM1: ata0  slave: Unknown device
(XEN) HVM1: 
(XEN) HVM1: 
(XEN) HVM1: 
(XEN) HVM1: Press F10 to select boot device.
(XEN) HVM1: Booting from Hard Disk...
(XEN) HVM1: int13_harddisk: function 41, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=81
(XEN) HVM1: *** int 15h function AX=00C0, BX=0000 not yet supported!
(XEN) common.c:3623:d0 tracking VRAM f0000 - f0026
(XEN) common.c:3599:d0 stopping tracking VRAM f0000 - f0026
(XEN) HVM1: *** int 15h function AX=EC00, BX=0003 not yet supported!
(XEN) HVM1: unsupported PCI BIOS function 0x0E
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=81
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=82
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=83
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=84
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=85
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=86
(XEN) HVM1: int13_harddisk: function 08, unmapped device for ELDL=87
(XEN) ----[ Xen-3.4-unstable  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff828c801a5e8a>] sh_guess_wrmap__guest_4+0xca/0x140
(XEN) RFLAGS: 0000000000010206   CONTEXT: hypervisor
(XEN) rax: ffff818000000000   rbx: 000000000003210a   rcx: 800000003c50c063
(XEN) rdx: 0000000007f0004a   rsi: ffff81ff0004a850   rdi: ffff83005d4e2080
(XEN) rbp: ffff83005d4e2080   rsp: ffff828c80247b28   r8:  0000000000000000
(XEN) r9:  000000000003210a   r10: 0000000000000001   r11: 000000000003bce5
(XEN) r12: ffff8284007d2990   r13: 0000000000001053   r14: 0000000000000003
(XEN) r15: 000000000950a000   cr0: 0000000080050033   cr4: 00000000000026b0
(XEN) cr3: 000000003c57e000   cr2: ffff81ff0004a850
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen stack trace from rsp=ffff828c80247b28:
(XEN)    0000ffff009b0100 ffff828c801931a8 0000000100000000 ffff828c80200760
(XEN)    000000000000950a ffff828c80200760 0000000100000000 0000000000000000
(XEN)    ffff83005d4e2080 ffff83005d411188 ffff83005d410080 0000000000001053
(XEN)    0000000000000002 ffff828c801a3de9 0000000000000000 ffff828c80247c88
(XEN)    0000000000000000 ffff828c80200760 ffff83005d410080 0000000000050011
(XEN)    ffff828c80247dd8 0000000000000000 0000000000000000 ffff828c80247c88
(XEN)    0000000000000000 ffffffff80252c40 0000000400000003 0000000000050011
(XEN)    0000000000000000 0000000000000000 0000000000000000 ffff828c80247c88
(XEN)    0000000000000000 0000000000000003 0000000000000000 000000000003bce5
(XEN)    0000000000000001 00023cb600000000 000000000003bce5 0000000000000001
(XEN)    ffff828c80247f28 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000050011 0000000000000000 0000000000000f00 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000019 0000000000000000
(XEN)    0000000000000000 0000000100000ffc 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000001 0000000000000001
(XEN)    0000000100000001 ffff828c80247de8 ffff83005d4e2080 0000000000000001
(XEN)    00000000c0000080 ffff828c8018c33e ffff828c8025e900 ffff828c80247f28
(XEN)    00000000c0000080 0000000000000100 0000000000000000 ffff828c80191921
(XEN)    00000000c0000080 000000018018c751 0000000000000003 ffff83005d4e2080
(XEN)    000000000003c57c 0000000000000246 0003d4315d4e2080 0000000000032188
(XEN) Xen call trace:
(XEN)    [<ffff828c801a5e8a>] sh_guess_wrmap__guest_4+0xca/0x140
(XEN)    [<ffff828c801931a8>] sh_remove_write_access+0x568/0x810
(XEN)    [<ffff828c801a3de9>] sh_page_fault__guest_4+0x609/0x1870
(XEN)    [<ffff828c8018c33e>] core2_vpmu_msr_common_check+0xce/0x480
(XEN)    [<ffff828c80191921>] shadow_alloc+0x241/0x2c0
(XEN)    [<ffff828c8018ad59>] vmx_vmexit_handler+0x509/0x14a0
(XEN)    [<ffff828c8017d2d9>] pt_update_irq+0x39/0x190
(XEN)    [<ffff828c801791e9>] hvm_vcpu_has_pending_irq+0x49/0x70
(XEN)    [<ffff828c80185a80>] vmx_intr_assist+0x50/0x170
(XEN)    [<ffff828c80116ebe>] do_softirq+0x5e/0x70
(XEN)    [<ffff828c80185903>] vmx_asm_do_vmentry+0x0/0xbd
(XEN) Pagetable walk from ffff81ff0004a850:
(XEN)  L4[0x103] = 000000003c57c063 000000000001f57c
(XEN)  L3[0x1fc] = 000000003c50f067 000000000001f50f
(XEN)  L2[0x000] = 000000003c50e067 000000000001f50e 
(XEN)  L1[0x04a] = 800000003c50c063 000000000001f50c
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) [error_code=0009]
(XEN) Faulting linear address: ffff81ff0004a850
(XEN) ****************************************
(XEN) Reboot in five seconds...
(XEN) ACPI MEMORY or I/O RESET_REG.Press any key to continue.

Configure bugmail: 
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Xen-bugs mailing list

<Prev in Thread] Current Thread [Next in Thread>