[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] d0v0 Unhandled general protection fault with 4.9.x on brand new hardware
On 02/11/17 08:56, Francesco De Francesco wrote: > Hi everyone, > > I need to address an issue that prevents me from running Xen on new > hardware. It's an HPE DL360 Gen10 with double Xeon Silver 4108 CPU and > 256GB ECC DDR4 RDIMM. It happens with both CentOS6 and CentOS7. > > When I try to boot with Xen kernel 4.9.58-29.el6, I get the following > error at boot time (I can read it from the serial console): > > (XEN) Brought up 32 CPUs > (XEN) ACPI sleep modes: S3 > (XEN) VPMU: disabled > (XEN) mcheck_poll: Machine check polling timer started. > (XEN) Dom0 has maximum 1240 PIRQs > (XEN) NX (Execute Disable) protection active > (XEN) *** LOADING DOMAIN 0 *** > (XEN) Xen kernel: 64-bit, lsb, compat32 > (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x26a0000 > (XEN) PHYSICAL MEMORY ARRANGEMENT: > (XEN) Dom0 alloc.: 0000003fdc000000->0000003fe0000000 (1012299 pages > to be allocated) > (XEN) Init. ramdisk: 000000403b04b000->000000403fdff200 > (XEN) VIRTUAL MEMORY ARRANGEMENT: > (XEN) Loaded kernel: ffffffff81000000->ffffffff826a0000 > (XEN) Init. ramdisk: 0000000000000000->0000000000000000 > (XEN) Phys-Mach map: 0000008000000000->0000008000800000 > (XEN) Start info: ffffffff826a0000->ffffffff826a04b4 > (XEN) Page tables: ffffffff826a1000->ffffffff826b8000 > (XEN) Boot stack: ffffffff826b8000->ffffffff826b9000 > (XEN) TOTAL: ffffffff80000000->ffffffff82800000 > (XEN) ENTRY ADDRESS: ffffffff821a9180 > (XEN) Dom0 has maximum 32 VCPUs > (XEN) Scrubbing Free RAM on 2 nodes using 16 CPUs > (XEN) > .................................................................................................................................done. > (XEN) Initial low memory virq threshold set at 0x4000 pages. > (XEN) Std. Loglevel: All > (XEN) Guest Loglevel: All > (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch > input to Xen) > (XEN) Freed 300kB init memory. > mapping kernel into physical memory > about to get started... > (XEN) d0v0 Unhandled general protection fault fault/trap [#13, ec=0000] > (XEN) domain_crash_sync called from entry.S: fault at ffff82d08022f983 > create_bounce_frame+0x12b/0x13a > (XEN) Domain 0 (vcpu#0) crashed on cpu#0: > (XEN) ----[ Xen-4.6.6-3.el6 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 0 > (XEN) RIP: e033:[<ffffffff8103cf38>] > (XEN) RFLAGS: 0000000000000246 EM: 1 CONTEXT: pv guest (d0v0) > (XEN) rax: 00000000000002ff rbx: ffffffff8217a1a0 rcx: 0000000000000000 > (XEN) rdx: 0000000000000000 rsi: 00000000000002ff rdi: 0000000000042660 > (XEN) rbp: ffffffff82003dc8 rsp: ffffffff82003d80 r8: ffffffff82003e0c > (XEN) r9: ffffffff82003e08 r10: 00000000ffffffff r11: 00000000ffffffff > (XEN) r12: ffffffff82003e04 r13: ffffffff82003e00 r14: ffffffff82003dfc > (XEN) r15: ffffffff82003df8 cr0: 0000000080050033 cr4: 00000000003526e0 > (XEN) cr3: 0000003fde007000 cr2: 0000000000000000 > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 > (XEN) Guest stack trace from rsp=ffffffff82003d80: > (XEN) 0000000000000000 00000000ffffffff 0000000000000000 ffffffff8103cf38 > (XEN) 000000010000e030 0000000000010046 ffffffff82003dc8 000000000000e02b > (XEN) ffffffff8103cf28 ffffffff82003e48 ffffffff821bbd3e ffffffff82199890 > (XEN) ffffffff8219a090 ffffffff82199890 ffffffff8219a090 ffffffff82003e38 > (XEN) 0000000000100800 00000a8800000000 000002ff00000240 ffffffff8217a1a0 > (XEN) ffffffff8217a1a0 ffffffff82673000 ffffffff82003f20 0000000000000000 > (XEN) 0000000000000000 ffffffff82003e78 ffffffff821bb684 0000000001000000 > (XEN) 0000037f82673000 ffffffff82003f20 0000000001000000 ffffffff82003e88 > (XEN) ffffffff821bc371 ffffffff82003e98 ffffffff821bc3a7 ffffffff82003ef8 > (XEN) ffffffff821b73e7 ffffffff00000010 ffffffff82003f08 ffffffff82003ec8 > (XEN) ffffffff82003e88 ffffffff8114b100 0000000000000000 0000000000000000 > (XEN) 0000000000000000 0000000000000000 0000000000000000 ffffffff82003f28 > (XEN) ffffffff821aa0c6 0000000000000000 0000000000000000 b013b3f5b0133a3e > (XEN) ffffffff821a97ac ffffffff82003f38 ffffffff821a9386 ffffffff82003ff8 > (XEN) ffffffff821b0dc6 0300000100000032 0000000000000005 0000000000000000 > (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 > (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 > (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 > (XEN) 0000000000000000 0000000000000000 0000000000000000 ffd83a831fc9cbf5 > (XEN) 0005065400100800 0000000000000001 0000000000000000 0000000000000000 > (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds. So your dom0 crashed very early before trap handlers have been set up. Can you please try to find matching source lines for suspected kernel addresses in above stack trace and for the guest's RIP: for all addresses starting with "ffffffff81" you should try the addr2line tool to obtain that information. This will help to have an idea what happened. Juergen _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |