[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] Xen 3.4.2 dump registers triggers watchdog


  • To: xen-users List <xen-users@xxxxxxxxxxxxxxxxxxx>
  • From: Andrew Lyon <andrew.lyon@xxxxxxxxx>
  • Date: Thu, 10 Dec 2009 11:01:37 +0000
  • Delivery-date: Thu, 10 Dec 2009 03:02:27 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=J8X67lHygMf02wAe3HXkSlp6ZkbU2L7CTTtVa9vyr6vXhizoh/nNI6oCwWSelLWGxz gD61GBC9nfQnK6lM3ztG6x6kU2mq1E5/hinxuH2c0OPdRphiSPUHjrOdOr8xiEmDgkka B8dz9qrkuFPn6knppNd0guPR/UbCXie4ZL39c=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

Hi,

I have two systems running Xen 3.4.2 both with opensuse/novell forward
ported dom0 kernel, one 2.6.29 the other 2.6.32, on both of them
dumping Xen registers using 'd' with the xen watchdog enabled triggers
the watchdog and reboot, is this normal?

(XEN) 'd' pressed -> dumping registers
(XEN)
(XEN) *** Dumping CPU0 host state: ***
(XEN) ----[ Xen-3.4.2  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff828c8010d201>] __dump_execstate+0x1/0x60
(XEN) RFLAGS: 0000000000010246   CONTEXT: hypervisor
(XEN) rax: 0000000000000000   rbx: 0000000000000064   rcx: 0000000000000046
(XEN) rdx: 000000000000000a   rsi: 000000000000000a   rdi: 0000000000000000
(XEN) rbp: ffff828c8024ff28   rsp: ffff828c8024fdb0   r8:  0000000000000001
(XEN) r9:  0000000000000001   r10: 00000000fffffffc   r11: ffff828c80125800
(XEN) r12: ffff828c8025c8a0   r13: ffff828c8024ff28   r14: ffff828c8024ff28
(XEN) r15: ffff830237df5f10   cr0: 000000008005003b   cr4: 00000000000026f0
(XEN) cr3: 0000000226723000   cr2: ffff8801dee8c3e8
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff828c8024fdb0:
(XEN)    0000000000000064 ffff828c8010d3dc 0000000000001900 0000000000000064
(XEN)    ffff828c8025c8a0 ffff828c8024ff28 ffff828c8024ff28 ffff828c8010d33c
(XEN)    ffff828c00000008 ffff828c801eb060 ffff828c80125020 ffff828c801eb0d8
(XEN)    0000000000000282 ffff828c80126455 0000000000000000 640000000040bd83
(XEN)    ffff828c801eb060 ffff828c8026c360 ffff828c8024ff28 ffff828c80125b70
(XEN)    ffff830237df5f10 ffff828c80125b9b ffff828c80222180 0000002a03fe0c0f
(XEN)    ffff828c801eb060 ffff828c8011a28c ffff828c802667c0 ffff828c80222180
(XEN)    ffff830237df5f18 ffff828c8011a36d ffff83022eb92340 0000000000000000
(XEN)    ffff828c8024ff28 ffff828c80267900 ffff828c80266900 0000000000000000
(XEN)    ffff828c80222100 ffff828c80118768 ffff828c8024ff28 ffff828c8024ff28
(XEN)    ffff828c80266900 ffff828c802225b0 00000029faf42a16 ffff828c80139f8c
(XEN)    0000000000000000 ffff8300bf8fc000 ffff8300bfa40000 0000000000000000
(XEN)    ffffffff807d2550 ffffffff807d00d0 ffffffffffffffff ffffffff80795988
(XEN)    0000000000000000 0000000000000246 00000000fffe2630 0000000000fffe26
(XEN)    0000000000000246 0000000000000000 ffffffff802013aa ffffffff8071bf68
(XEN)    0000000000000000 0000000000000001 0000010000000000 ffffffff802013aa
(XEN)    000000000000e033 0000000000000246 ffffffff8071bf50 000000000000e02b
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 ffff8300bf8fc000
(XEN) Xen call trace:
(XEN)    [<ffff828c8010d201>] __dump_execstate+0x1/0x60
(XEN)    [<ffff828c8010d3dc>] dump_registers+0x4c/0x110
(XEN)    [<ffff828c8010d33c>] handle_keypress+0x9c/0xf0
(XEN)    [<ffff828c80125020>] serial_rx+0x0/0xa0
(XEN)    [Watchdog timer detects that CPU0 is stuck!
(XEN) ----[ Xen-3.4.2  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff828c801257b0>] ns_read_reg+0x20/0x30
(XEN) RFLAGS: 0000000000000002   CONTEXT: hypervisor
(XEN) rax: ffff828c801fd401   rbx: ffff828c801eb060   rcx: 0000000000000001
(XEN) rdx: 000000000000ec9d   rsi: 0000000000000005   rdi: ffff828c8026c360
(XEN) rbp: ffff828c80267ea1   rsp: ffff828c8024fa98   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 00000000ffffffff   r11: ffff828c80125800
(XEN) r12: 000000000000003c   r13: 0000000000000000   r14: 0000000000000000
(XEN) r15: 0000000000000008   cr0: 000000008005003b   cr4: 00000000000026f0
(XEN) cr3: 0000000226723000   cr2: ffff8801dee8c3e8
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff828c8024fa98:
(XEN)    ffff828c801257ee ffff828c80125c8f 000000000000003c ffff828c80267ea1
(XEN)    ffff828c801eb060 ffff828c8012626e ffff828c00000001 ffff828c801eb0dc
(XEN)    0000000000000086 ffff828c80267ea0 ffff828c8024fb40 0000000000000282
(XEN)    ffff828c80202000 ffff828c801cea6f ffff828c8021aec4 ffff828c801248f9
(XEN)    0000000000000000 ffff828c80124eef 0000003000000010 ffff828c8024fc18
(XEN)    ffff828c8024fb48 ffff828c80267ea0 0000000000000000 ffff828c80126455
(XEN)    ffff828c80266900 0000000000000046 0000000000000004 0000000000000000
(XEN)    ffff828c8010d201 000000000000e008 0000000000010246 ffff828c8024fdb0
(XEN)    000000000000e010 0000000000000000 ffff828c80100000 0000000000000000
(XEN)    ffff828c80125020 0000000000000296 ffff828c80125020 0000000000000296
(XEN)    0000000000000296 ffff828c801196da 00000000000000a0 0000000000000000
(XEN)    ffff828c80126455 ffff828c8024fe18 ffff828c80100000 ffff828c8015aee6
(XEN)    ffff828c8024fd08 ffff828c8010d201 ffff828c8010d206 ffff828c8024fd08
(XEN)    ffff828c80100000 ffff828c8024ff28 0000000000000000 ffff828c8015f610
(XEN)    ffff828c801df677 ffff828c801eb060 ffff828c8012626e 0000000000000002
(XEN)    ffff828c801eb0dc 0000000000000086 ffff828c801df677 ffff828c8024fce8
(XEN)    0000000000c20b0f ffff828c8024ff28 ffff828c8024ff28 0000000000000046
(XEN)    ffff828c801187a0 0000000000000046 0000000000000282 ffff8300bf8fc000
(XEN)    ffff828c8024ff28 ffff828c8025c8a0 ffff828c8024ff28 ffff828c8024ff28
(XEN)    ffff830237df5f10 ffff828c801c1615 ffff830237df5f10 ffff828c8024ff28
(XEN) Xen call trace:
(XEN)    [<ffff828c801257b0>] ns_read_reg+0x20/0x30
(XEN)    [<ffff828c801257ee>] ns16550_tx_empty+0xe/0x20
(XEN)    [<ffff828c80125c8f>] __serial_putc+0x2f/0x130
(XEN)    [<ffff828c8012626e>] serial_puts+0x8e/0x100
(XEN)    [<ffff828c80202000>] _sinittext+0x0/0x38
(XEN)    [<ffff828c801cea6f>] _etext+0x0/0x33591
(XEN)    [<ffff828c8021aec4>] _einittext+0x0/0x0
(XEN)    [<ffff828c801248f9>] __putstr+0x9/0x50
(XEN)    [<ffff828c80124eef>] printk+0x19f/0x1d0
(XEN)    [<ffff828c80126455>] serial_rx_interrupt+0x65/0xd0
(XEN)    [<ffff828c8010d201>] __dump_execstate+0x1/0x60
(XEN)    [<ffff828c80100000>] _stext+0x0/0x14
(XEN)    [<ffff828c80125020>] serial_rx+0x0/0xa0
(XEN)    [<ffff828c80125020>] serial_rx+0x0/0xa0
(XEN)    [<ffff828c801196da>] __print_symbol+0x8a/0xc0
(XEN)    [<ffff828c80126455>] serial_rx_interrupt+0x65/0xd0
(XEN)    [<ffff828c80100000>] _stext+0x0/0x14
(XEN)    [<ffff828c8015aee6>] show_stack+0x146/0x1b0
(XEN)    [<ffff828c8010d201>] __dump_execstate+0x1/0x60
(XEN)    [<ffff828c8010d206>] __dump_execstate+0x6/0x60
(XEN)    [<ffff828c80100000>] _stext+0x0/0x14
(XEN)    [<ffff828c8015f610>] do_invalid_op+0x680/0x690
(XEN)    [<ffff828c8012626e>] serial_puts+0x8e/0x100
(XEN)    [<ffff828c801187a0>] tasklet_schedule+0x10/0xa0
(XEN)    [<ffff828c801c1615>] handle_exception_saved+0x2d/0x6b
(XEN)    [<ffff828c80125800>] ns16550_putc+0x0/0x10
(XEN)    [<ffff828c8010d201>] __dump_execstate+0x1/0x60
(XEN)    [<ffff828c8010d3dc>] dump_registers+0x4c/0x110
(XEN)    [<ffff828c8010d33c>] handle_keypress+0x9c/0xf0
(XEN)    [<ffff828c80125020>] serial_rx+0x0/0xa0
(XEN)    [<ffff828c80126455>] serial_rx_interrupt+0x65/0xd0
(XEN)    [<ffff828c80125b70>] ns16550_poll+0x0/0x80
(XEN)    [<ffff828c80125b9b>] ns16550_poll+0x2b/0x80
(XEN)    [<ffff828c8011a28c>] execute_timer+0x2c/0x50
(XEN)    [<ffff828c8011a36d>] timer_softirq_action+0xbd/0x2e0
(XEN)    [<ffff828c80118768>] do_softirq+0x58/0x80
(XEN)    [<ffff828c80139f8c>] idle_loop+0x4c/0xa0
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) FATAL TRAP: vector = 2 (nmi)
(XEN) [error_code=0000] , IN INTERRUPT CONTEXT
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...

Andy

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.