WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] Test results on Unisys ES7000 64x 256gbusingunstablec/s

To: "Keir Fraser" <Keir.Fraser@xxxxxxxxxxxx>, "Bill Burns" <bburns@xxxxxxxxxx>, "Brian A Carb" <Brian.Carb@xxxxxxxxxx>
Subject: RE: [Xen-devel] Test results on Unisys ES7000 64x 256gbusingunstablec/s 16693 on 3.2.0 Release Candidate
From: "Jan Beulich" <jbeulich@xxxxxxxxxx>
Date: Tue, 29 Jan 2008 08:44:40 +0000
Cc: Ian Pratt <Ian.Pratt@xxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Tue, 29 Jan 2008 00:44:38 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <089B0D75973E1241B941D0A9854F23FC0AA478CA@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <479DE086.9020206@xxxxxxxxxx> <C3C39267.1B7C8%Keir.Fraser@xxxxxxxxxxxx> <089B0D75973E1241B941D0A9854F23FC0AA478CA@xxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
>...
>(XEN) traps.c:414:d0 Unhandled invalid opcode fault/trap [#6] on VCPU 0
>[ec=0000]
>(XEN) domain_crash_sync called from entry.S
>(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
>(XEN) ----[ Xen-3.3-unstable  x86_64  debug=y  Not tainted ]----
>(XEN) CPU:    0
>(XEN) RIP:    e033:[<ffffffff804fe6f4>]
>(XEN) RFLAGS: 0000000000000282   CONTEXT: guest
>(XEN) rax: 00000000ffffffea   rbx: ffffffffc0125000   rcx:
>00000004a0582920
>(XEN) rdx: 00000000deadbeef   rsi: 00000000deadbeef   rdi:
>00000000deadbeef
>(XEN) rbp: ffffffffa0582000   rsp: ffffffff804ebe78   r8:
>0000000003f14537
>(XEN) r9:  0000000000000000   r10: 00000000deadbeef   r11:
>0000000000001000
>(XEN) r12: ffffffff80205000   r13: 0000003f14537000   r14:
>000000001f9a1000
>(XEN) r15: ffffffff80205000   cr0: 000000008005003b   cr4:
>00000000000026f0
>(XEN) cr3: 0000000480201000   cr2: 0000000000000000
>(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
>(XEN) Guest stack trace from rsp=ffffffff804ebe78:
>...

This looks like a failed hypercall (and a BUG() following it), but without
having the kernel binary it's impossible to tell which one. You should
be able to find out, though. With that information, if it doesn't directly
provide a clue, it should then be possible to instrument the respective
hypercall handler to find out what's going wrong.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>