From mboxrd@z Thu Jan 1 00:00:00 1970 From: George Dunlap Subject: Re: Re: So I tried to use xentrace... Date: Mon, 3 May 2010 13:36:28 -0700 Message-ID: References: <4BDB4CCC.3080405@goop.org> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Keir Fraser Cc: Jeremy Fitzhardinge , Xen-devel List-Id: xen-devel@lists.xenproject.org FYI, this is on my radar, but it may be a few days before I get to it. -George On Fri, Apr 30, 2010 at 2:43 PM, Keir Fraser wr= ote: > New xentrace patches have gone in without being tested with a debug=3Dy b= uild, > I expect. This is probably an irq-safe lock being taken with irqs enabled= , > or vice versa. > > =A0-- Keir > > On 30/04/2010 14:34, "Jeremy Fitzhardinge" wrote: > >> When I ran "xentrace -D -S 256 -e all /tmp/test.trace" from the >> xenanalyze documentation, Xen immediately crashed with: >> >> (XEN) tbuf_size 256 >> (XEN) p0 mfn 106a00 offset 64 >> (XEN) p1 mfn 115700 offset 320 >> (XEN) p2 mfn 113f00 offset 576 >> (XEN) p3 mfn 113e00 offset 832 >> (XEN) Xen trace buffers: initialized >> (XEN) ----[ Xen-4.1-unstable =A0x86_64 =A0debug=3Dy =A0Not tainted ]---- >> (XEN) CPU: =A0 =A01 >> (XEN) RIP: =A0 =A0e008:[] check_lock+0x1b/0x45 >> (XEN) RFLAGS: 0000000000010246 =A0 CONTEXT: hypervisor >> (XEN) rax: 0000000000000001 =A0 rbx: 0000000000000028 =A0 rcx: 000000000= 0000000 >> (XEN) rdx: 0000000000000000 =A0 rsi: 00000000c3fc8050 =A0 rdi: 000000000= 000002c >> (XEN) rbp: ffff83013ff2fc60 =A0 rsp: ffff83013ff2fc60 =A0 r8: =A0ffff830= 0bf78a000 >> (XEN) r9: =A0ffff83013ff60000 =A0 r10: 0080000000000001 =A0 r11: ffff82f= 60164b930 >> (XEN) r12: 00000000c3fc8050 =A0 r13: 00000000c3fc8050 =A0 r14: 000000000= 0000028 >> (XEN) r15: 0000000000800627 =A0 cr0: 000000008005003b =A0 cr4: 000000000= 00026f0 >> (XEN) cr3: 00000000b2fa0000 =A0 cr2: 000000000000002c >> (XEN) ds: 0000 =A0 es: 0000 =A0 fs: 0000 =A0 gs: 0000 =A0 ss: e010 =A0 c= s: e008 >> (XEN) Xen stack trace from rsp=3Dffff83013ff2fc60: >> (XEN) =A0 =A0ffff83013ff2fc78 ffff82c480121993 0000000000000000 ffff8301= 3ff2fca8 >> (XEN) =A0 =A0ffff82c480117fe0 ffff83013fee0000 80000c3fc8050627 00000000= c3fc8050 >> (XEN) =A0 =A0ffff83013ff60000 ffff83013ff2fd28 ffff82c48016538c ffff8800= aec97b08 >> (XEN) =A0 =A0ffff83013ff2fcf0 00000000000b25c9 0000000000000100 ffff8300= bf78a000 >> (XEN) =A0 =A00000000000000206 0000000000000000 ffff830e7f900a00 ffff8301= 3ff2fd28 >> (XEN) =A0 =A0ffff8300b25c9228 ffff8300bf78a000 0000000000800627 00000000= 00000000 >> (XEN) =A0 =A00000000000000000 ffff83013ff2fdb8 ffff82c48016a9f7 ffff8301= 3fee0018 >> (XEN) =A0 =A000007ff03ff2ff28 0000000000000000 00000000000b25c9 ffff8301= 3fee0000 >> (XEN) =A0 =A080000c3fc8050627 80000c3fc8050627 ffff83013ff60000 ffff8301= 3ff2fdb8 >> (XEN) =A0 =A00000000180162c10 ffff83013ff2fdd8 0000000000000000 00000000= 00000000 >> (XEN) =A0 =A0ffff8800aec97bb8 ffff83013ff2ff28 ffff83013ff2ff28 ffff8301= 3ff2ff08 >> (XEN) =A0 =A0ffff82c48016b2a9 0000000000000000 0000000000000000 00000000= 00000000 >> (XEN) =A0 =A000000000bf78a000 0000000000000006 00000000b2e55067 ffff8301= 3ff2ff28 >> (XEN) =A0 =A0ffff83013ff2ff28 ffff83013ff2ff28 ffff83013ff2ff28 ffff8301= 3ff2ff28 >> (XEN) =A0 =A0ffff83013ff2ff28 ffff83013ff2ff28 ffff83013ff2ff28 00000000= 00000000 >> (XEN) =A0 =A000007ff200000082 ffff83013ff2fe68 80000c3fc8050627 ffff8300= bf78a000 >> (XEN) =A0 =A0ffff8300b25c9228 ffff83013ff2fee8 ffff82f60164b920 ffff8301= 3fee0000 >> (XEN) =A0 =A0000000000003e6b8 00000000000b25c9 00000001032cc060 ffff8301= 3ff60000 >> (XEN) =A0 =A00000000000000000 aaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaa 00000001= aaaaaaaa >> (XEN) =A0 =A00000000000000001 00000000b25c9228 80000c3fc8050627 ffff8800= aec97bb8 >> (XEN) Xen call trace: >> (XEN) =A0 =A0[] check_lock+0x1b/0x45 >> (XEN) =A0 =A0[] _spin_lock+0x11/0x3f >> (XEN) =A0 =A0[] rangeset_contains_range+0x44/0x82 >> (XEN) =A0 =A0[] get_page_from_l1e+0x24c/0x47f >> (XEN) =A0 =A0[] mod_l1_entry+0x47f/0x64e >> (XEN) =A0 =A0[] do_mmu_update+0x6e3/0x1962 >> (XEN) =A0 =A0[] syscall_enter+0xef/0x149 >> (XEN) >> (XEN) Pagetable walk from 000000000000002c: >> (XEN) =A0L4[0x000] =3D 00000000b2c3a067 00000000000aecc5 >> (XEN) =A0L3[0x000] =3D 00000000b2c70067 00000000000aec8f >> (XEN) =A0L2[0x000] =3D 0000000000000000 ffffffffffffffff >> (XEN) >> (XEN) **************************************** >> (XEN) Panic on CPU 1: >> (XEN) FATAL PAGE FAULT >> (XEN) [error_code=3D0000] >> (XEN) Faulting linear address: 000000000000002c >> (XEN) **************************************** >> (XEN) >> (XEN) Reboot in five seconds... >> >> J >> > > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xensource.com > http://lists.xensource.com/xen-devel >