[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020



>>> On 14.12.16 at 14:15, <andrew.cooper3@xxxxxxxxxx> wrote:
> On 14/12/16 12:58, Jan Beulich wrote:
>>>>> On 14.12.16 at 12:12, <ross.lagerwall@xxxxxxxxxx> wrote:
>>> When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the
>>> EFI runtime instead of rebooting.
>> Has it been understood what the #GP is due to? I.e. is it namely
>> not because of a mis-aligned SSE instruction memory reference?
> 
> (XEN) [  349.551011] Hardware Dom0 shutdown: rebooting machine
> (XEN) [  349.553668] APIC error on CPU0: 40(00)
> (XEN) [  349.553675] ----[ Xen-4.7.0-xs128737-d  x86_64  debug=y  Not tainted 
> ]----
> (XEN) [  349.553676] CPU:    0
> (XEN) [  349.553677] RIP:    e008:[<00000000db7aa368>] 00000000db7aa368
> (XEN) [  349.553678] RFLAGS: 0000000000010246   CONTEXT: hypervisor
> (XEN) [  349.553680] rax: 00000000d48595e0   rbx: 0000000000000000   rcx: 
> 000000005a5a5a5a
> (XEN) [  349.553681] rdx: 0000000000001830   rsi: 0000000000000000   rdi: 
> ffff8300ded37bb8
> (XEN) [  349.553682] rbp: 0000000000000021   rsp: ffff8300ded37b68   r8:  
> 0000000000000000
> (XEN) [  349.553682] r9:  0000000000000001   r10: 0000000000000004   r11: 
> 0000000000000200
> (XEN) [  349.553683] r12: 0000000000000000   r13: 0000000000001830   r14: 
> 0000000000000065
> (XEN) [  349.553684] r15: 0000000000000010   cr0: 0000000080050033   cr4: 
> 00000000001526e0
> (XEN) [  349.553685] cr3: 000000040df7c000   cr2: 00007f7186aa1a40
> (XEN) [  349.553686] ds: 002b   es: 002b   fs: 0000   gs: 0000   ss: e010   
> cs: e008
> (XEN) [  349.553687] Xen code around <00000000db7aa368> (00000000db7aa368):
> (XEN) [  349.553688]  08 00 00 b9 5a 5a 5a 5a <ff> 50 18 48 8b d8 48 83 f8 1f 
> 74 0f 48 8b 15 dd
> (XEN) [  349.553692] Xen stack trace from rsp=ffff8300ded37b68:
> (XEN) [  349.553693]    00000700ded37bb8 0000000080022023 ffff83041b92b914 
> ffff83041b800000
> (XEN) [  349.553694]    0000000000000000 00000000db79f348 0000000000000000 
> 0000000000000000
> (XEN) [  349.553696]    0000000000000000 0000000000000000 000000000000000d 
> 00000000db7ff870
> (XEN) [  349.553697]    0000000000000000 0000000000000000 0000005162b3bf76 
> 0000000000000000
> (XEN) [  349.553698]    00007cff212c83e7 ffff82d080244f57 0000000000000010 
> 00000000db7fe671
> (XEN) [  349.553699]    ffff8300ded37c38 0000000000000206 00000000ded28000 
> 0000000000000000
> (XEN) [  349.553701]    0000000000000000 00000000db7e0311 0000000000000000 
> 0000000000000000
> (XEN) [  349.553702]    0000000000000000 000000000000080f 0000000000000000 
> 0000000000000000
> (XEN) [  349.553703]    000000040df7c000 ffff82d080101242 00000000ded28000 
> ffff8300ded37ca8
> (XEN) [  349.553704]    ffff82d080352b00 ffff8300ded37ca0 0000000000000000 
> 00000000fffffffe
> (XEN) [  349.553706]    ffff8300ded37cf8 ffff82d0801956e7 ffff8300ded37cd0 
> 0000000000000046
> (XEN) [  349.553707]    00008300dee1d000 0000000000000000 0000000000000000 
> ffff8300ded37dd8
> (XEN) [  349.553709]    00000000000000fb 0000005162b3bf76 ffff8300ded37d08 
> ffff82d080195785
> (XEN) [  349.553710]    ffff8300ded37d28 ffff82d080137482 0000000000000016 
> 0000000000000000
> (XEN) [  349.553711]    ffff8300ded37d38 ffff82d080195de7 ffff8300ded37dc8 
> ffff82d08017532c
> (XEN) [  349.553713]    0000000000000000 0000000000000000 0000000000000000 
> 0000000000000000
> (XEN) [  349.553714]    ffff83040df78c50 ffff8300ded97000 80000000dee1d000 
> 0000000000000000
> (XEN) [  349.553715]    0000000000000000 ffff83040defc000 ffff8300ded37dc0 
> 0000005162dd573d
> (XEN) [  349.553717]    ffff83040df77010 ffff83040df770e8 0000005162b3bf76 
> 0000000000000010
> (XEN) [  349.553718]    00007cff212c8207 ffff82d080244f57 0000000000000010 
> 0000005162b3bf76
> (XEN) [  349.553720] Xen call trace:
> (XEN) [  349.553721]    [<00000000db7aa368>] 00000000db7aa368
> (XEN) [  349.553721] 
> (XEN) [  349.553722] 
> (XEN) [  349.553723] ****************************************
> (XEN) [  349.553723] Panic on CPU 0:
> (XEN) [  349.553724] GENERAL PROTECTION FAULT
> (XEN) [  349.553724] [error_code=0000]
> (XEN) [  349.553725] ****************************************
> (XEN) [  349.553725] 
> (XEN) [  349.553726] Reboot in five seconds...
> (XEN) [  349.553727] Executing kexec image on cpu0
> (XEN) [  349.553728] Shot down all CPUs
> 
> 
> This is caused by callq *0x18(%rax)
> 
> The only #GP fault to be have is if the end of that pointer is
> non-canonical.

Thanks for clarifying - I'm fine with the patch then.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.