Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 327842 Details for
Bug 440340
after some time of running xen panics when the dom0 kernel is 3.X
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Minicom-Capture
minicom.cap (text/plain), 29.56 KB, created by
Konstantin Agouros
on 2012-10-30 23:11:10 UTC
(
hide
)
Description:
Minicom-Capture
Filename:
MIME Type:
Creator:
Konstantin Agouros
Created:
2012-10-30 23:11:10 UTC
Size:
29.56 KB
patch
obsolete
>(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 4 >(XEN) RIP: e008:[<ffff82c48014f3bd>] get_page_sid+0x7d/0xb0 >(XEN) RFLAGS: 0000000000010282 CONTEXT: hypervisor >(XEN) rax: 0000000000000006 rbx: 0000000000000001 rcx: 0000000000000000 >(XEN) rdx: cdf8890003bedb31 rsi: ffff83021dec7d94 rdi: ffff82f6000e1e80 >(XEN) rbp: ffff83021df4dcd0 rsp: ffff83021dec7d78 r8: 0000000000000000 >(XEN) r9: ffff83021deacb80 r10: 00000000001ba1d6 r11: 0000000000000282 >(XEN) r12: 0000000000000000 r13: ffff83021dec7f18 r14: ffff83021dec7f18 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 000000013b188000 cr2: ffff8801f70d0c58 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff83021dec7d78: >(XEN) ffff83021df4dcd0 ffff82c48014f622 0000000000000005 ffff880200000001 >(XEN) 0000000000000000 0000000000000006 ffff88021200b970 ffff82c48017ed0f >(XEN) ffff83021deae000 ffff83021dec7f18 ffff88021200b910 00000000001ba1d6 >(XEN) ffff83021dec7f18 0000000000000000 ffff83021df00b80 ffff82c48017432d >(XEN) 000000060000001f ffff83021dec7ea8 ffff83021deae000 ffff83021deae000 >(XEN) ffff82f603743ac0 ffff83021deae000 ffff8300cff94000 00007ff01deae000 >(XEN) 0000000000000000 ffff8301ba1d68c0 0000000000000000 ffff83021dec7f18 >(XEN) ffff83021dec7ec0 ffff83021dec7ec8 ffff83021dec7f18 ffff83021dec7f18 >(XEN) ffff83021dec7f18 ffff83021dec7f18 ffff83021dec7f18 ffff83021dec7f18 >(XEN) 801000013b1a7065 ffff82c48020d4a6 00000001ba1d6900 00000000070f4e00 >(XEN) ffff8801f70d0c58 ffff83021deae000 0000000000000007 0000000000000001 >(XEN) 0000000000000206 ffff8300cff94000 ffff8801f70a1ad0 0000000000000000 >(XEN) 0000000000000010 0000000000000000 00000000000001f0 ffff82c480208c08 >(XEN) 00000000000001f0 0000000000000000 0000000000000010 0000000000000000 >(XEN) ffff8801f70a1ad0 ffff88021200b100 0000000000000282 0000000000007ff0 >(XEN) ffff8800a6c564b0 0000000000000000 0000000000000001 ffffffff8100102a >(XEN) 0000000000000000 000000000000001f ffff88021200b910 0000010000000000 >(XEN) ffffffff8100102a 000000000000e033 0000000000000282 ffff8801f70a1a78 >(XEN) 000000000000e02b 000163fd000163ff 8000000000000003 7400000000000002 >(XEN) 00039f8000218762 000163fe00000004 ffff8300cff94000 0000003d9dbf7c80 >(XEN) Xen call trace: >(XEN) [<ffff82c48014f3bd>] get_page_sid+0x7d/0xb0 >(XEN) [<ffff82c48014f622>] flask_mmu_normal_update+0xc2/0x120 >(XEN) [<ffff82c48017ed0f>] do_mmu_update+0x32f/0x2130 >(XEN) [<ffff82c48017432d>] get_page+0x2d/0x100 >(XEN) [<ffff82c48020d4a6>] do_iret+0xb6/0x1a0 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) >(XEN) **************************************** >(XEN) Panic on CPU 4: >(XEN) GENERAL PROTECTION FAULT >(XEN) [error_code=0000] >(XEN) **************************************** >(XEN) >(XEN) Reboot in five seconds... >ÿÿ __ __ _ _ _ _ > \ \/ /___ _ __ | || | / | / | > \ // _ \ '_ \ | || |_ | | | | > / \ __/ | | | |__ _|| |_| | > /_/\_\___|_| |_| |_|(_)_(_)_| > >(XEN) Xen version 4.1.1 (@localnet) (gcc version 4.5.3 (Gentoo 4.5.3-r2 p1.1, pie-0.4.7) ) Wed Jun 20 11:06:06 CEST 2012 >(XEN) Latest ChangeSet: unavailable >(XEN) Bootloader: GNU GRUB 0.97 >(XEN) Command line: com1=38400,8n1 console=com1 >(XEN) Video information: >(XEN) VGA is text mode 80x25, font 8x16 >(XEN) VBE/DDC methods: V2; EDID transfer time: 1 seconds >(XEN) Disc information: >(XEN) Found 3 MBR signatures >(XEN) Found 3 EDD information structures >(XEN) Xen-e820 RAM map: >(XEN) 0000000000000000 - 000000000009f800 (usable) >(XEN) 000000000009f800 - 00000000000a0000 (reserved) >(XEN) 00000000000e6000 - 0000000000100000 (reserved) >(XEN) 0000000000100000 - 00000000cffa0000 (usable) >(XEN) 00000000cffa0000 - 00000000cffb0000 (ACPI data) >(XEN) 00000000cffb0000 - 00000000cffe0000 (ACPI NVS) >(XEN) 00000000cffe0000 - 00000000d0000000 (reserved) >(XEN) 00000000fff00000 - 0000000100000000 (reserved) >(XEN) 0000000100000000 - 0000000220000000 (usable) >(XEN) ACPI: RSDP 000FB7E0, 0014 (r0 ACPIAM) >(XEN) ACPI: RSDT CFFA0000, 0040 (r1 062410 RSDT1556 20100624 MSFT 97) >(XEN) ACPI: FACP CFFA0200, 0084 (r1 A_M_I OEMFACP 12000601 MSFT 97) >(XEN) ACPI Warning (tbfadt-0444): Optional field "Pm2ControlBlock" has zero address or length: 0000000000000000/1 [20070126] >(XEN) ACPI: DSDT CFFA0450, 9195 (r1 AS386 AS386112 112 INTL 20051117) >(XEN) ACPI: FACS CFFB0000, 0040 >(XEN) ACPI: APIC CFFA0390, 007C (r1 062410 APIC1556 20100624 MSFT 97) >(XEN) ACPI: MCFG CFFA0410, 003C (r1 062410 OEMMCFG 20100624 MSFT 97) >(XEN) ACPI: OEMB CFFB0040, 0072 (r1 062410 OEMB1556 20100624 MSFT 97) >(XEN) ACPI: SRAT CFFAA450, 0108 (r3 AMD FAM_F_10 2 AMD 1) >(XEN) ACPI: AAFT CFFAA560, 0027 (r1 062410 OEMAAFT 20100624 MSFT 97) >(XEN) ACPI: SSDT CFFAA590, 0DA4 (r1 A M I POWERNOW 1 AMD 1) >(XEN) System RAM: 7935MB (8125692kB) >(XEN) Domain heap initialised >(XEN) Processor #0 0:10 APIC version 16 >(XEN) Processor #1 0:10 APIC version 16 >(XEN) Processor #2 0:10 APIC version 16 >(XEN) Processor #3 0:10 APIC version 16 >(XEN) Processor #4 0:10 APIC version 16 >(XEN) Processor #5 0:10 APIC version 16 >(XEN) IOAPIC[0]: apic_id 6, version 33, address 0xfec00000, GSI 0-23 >(XEN) Enabling APIC mode: Flat. Using 1 I/O APICs >(XEN) Table is not found! >(XEN) XSM Framework v1.0.0 initialized >(XEN) Flask: Initializing. >(XEN) AVC INITIALIZED >(XEN) Flask: Starting in permissive mode. >(XEN) Using scheduler: SMP Credit Scheduler (credit) >(XEN) Detected 3206.368 MHz processor. >(XEN) Initing memory sharing. >(XEN) AMD-Vi: IOMMU not found! >(XEN) I/O virtualisation disabled >(XEN) ENABLING IO-APIC IRQs >(XEN) -> Using new ACK method >(XEN) Platform timer is 3.579MHz ACPI PM Timer >ÿ(XEN) Allocated console ring of 16 KiB. >(XEN) HVM: ASIDs enabled. >(XEN) SVM: Supported advanced features: >(XEN) - Nested Page Tables (NPT) >(XEN) - Last Branch Record (LBR) Virtualisation >(XEN) - Next-RIP Saved on #VMEXIT >(XEN) - Pause-Intercept Filter >(XEN) HVM: SVM enabled >(XEN) HVM: Hardware Assisted Paging detected. >(XEN) Brought up 6 CPUs >(XEN) Xenoprofile: Failed to setup IBS LVT offset, IBSCTL = 0xffffffff >(XEN) *** LOADING DOMAIN 0 *** >(XEN) Xen kernel: 64-bit, lsb, compat32 >(XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x1b4c000 >(XEN) PHYSICAL MEMORY ARRANGEMENT: >(XEN) Dom0 alloc.: 0000000214000000->0000000218000000 (1954048 pages to be allocated) >(XEN) Init. ramdisk: 000000021ef49000->000000021ffff400 >(XEN) VIRTUAL MEMORY ARRANGEMENT: >(XEN) Loaded kernel: ffffffff81000000->ffffffff81b4c000 >(XEN) Init. ramdisk: ffffffff81b4c000->ffffffff82c02400 >(XEN) Phys-Mach map: ffffffff82c03000->ffffffff83b13db8 >(XEN) Start info: ffffffff83b14000->ffffffff83b144b4 >(XEN) Page tables: ffffffff83b15000->ffffffff83b36000 >(XEN) Boot stack: ffffffff83b36000->ffffffff83b37000 >(XEN) TOTAL: ffffffff80000000->ffffffff83c00000 >(XEN) ENTRY ADDRESS: ffffffff815cd210 >(XEN) Dom0 has maximum 6 VCPUs >(XEN) Scrubbing Free RAM: .done. >(XEN) Xen trace buffers: disabled >(XEN) Std. Loglevel: Errors and warnings >(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings) >(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen) >(XEN) Freed 216kB init memory. >mapping kernel into physical memory >about to get started... >(XEN) domain.c:652:d0 Attempt to change CR4 flags 00000660 -> 00000760 >(XEN) traps.c:2388:d0 Domain attempted WRMSR 00000000c0010004 from 0x000000000000abcd to 0x0000fff888db1200. >(XEN) traps.c:2388:d0 Domain attempted WRMSR 00000000c0010000 from 0x000001008316fe69 to 0x0000000000530076. >(XEN) domain.c:652:d0 Attempt to change CR4 flags 00000660 -> 00000760 >(XEN) traps.c:2388:d0 Domain attempted WRMSR 00000000c0010004 from 0x00004dcce3857e19 to 0x0000fff888db1200. >(XEN) traps.c:2388:d0 Domain attempted WRMSR 00000000c0010000 from 0x0000030ffe91f78f to 0x0000000000530076. >(XEN) domain.c:652:d0 Attempt to change CR4 flags 00000660 -> 00000760 >(XEN) traps.c:2388:d0 Domain attempted WRMSR 00000000c0010004 from 0x0000ce0bc53a3329 to 0x0000fff888db1200. >(XEN) traps.c:2388:d0 Domain attempted WRMSR 00000000c0010000 from 0x0000000c869e609f to 0x0000000000530076. >(XEN) domain.c:652:d0 Attempt to change CR4 flags 00000660 -> 00000760 >(XEN) Xen WARN at msi.c:659 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe3dc >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d010 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 000000000000000c r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83012847dce0 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 0000000215552000 cr2: ffff880203f4a330 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) ffff83021df6f5a0 0000000000000001 0000000000000149 00000000fe3dc000 >(XEN) 0000000000000000 0000000000000001 0000006000000004 00000000000fe3dc >(XEN) 0000006200000112 00000000fe3dc000 ffff830200000003 0000000000000112 >(XEN) 0000000000000112 00000000000fe3dc ffff83012847d0a8 000982c4801828ae >(XEN) 0000000000000cfc 0000000000000112 000000000000001d ffff83021deae000 >(XEN) 00000000ffffffed 0000000000000112 000000000000001d ffff82c480170955 >(XEN) ffff82c4802d5740 ffff82c480297ea8 ffff83021df00f00 ffff83012847d010 >(XEN) ffff83021deae000 000000000000001d 0000000000000296 00000000ffffffff >(XEN) fffffffffffffff2 ffff880203bb5bb0 ffff82c480297e78 000000000000001d >(XEN) 0000000000000112 ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000000000004 0000000000000000 00000000fe3dc000 ffff82c4801137c6 >(XEN) 0000000000000004 000000000000001d 00000000fe3dc000 0000000000000000 >(XEN) ffff83021deae000 00a0fb00801907c6 0000000000000202 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff8802022251c0 ffff880200fd0bc0 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff880200fd0bc0 >(XEN) ffff8802022251c0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036f4000 >(XEN) 0000000000000246 0000000000000000 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:662 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe3de >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d010 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 000000000000000c r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83012847dce0 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 0000000215552000 cr2: ffff880203f4a330 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) ffff83021df6f5a0 0000000000000001 0000000000000149 00000000fe3dc000 >(XEN) 0000000000000000 0000000000000001 0000006000000004 00000000000fe3dc >(XEN) 0000006200000112 00000000fe3dc000 ffff830200000003 0000000000000112 >(XEN) 0000000000000112 00000000000fe3dc ffff83012847d0a8 000982c4801828ae >(XEN) 0000000000000cfc 0000000000000112 000000000000001d ffff83021deae000 >(XEN) 00000000ffffffed 0000000000000112 000000000000001d ffff82c480170955 >(XEN) ffff82c4802d5740 ffff82c480297ea8 ffff83021df00f00 ffff83012847d010 >(XEN) ffff83021deae000 000000000000001d 0000000000000296 00000000ffffffff >(XEN) fffffffffffffff2 ffff880203bb5bb0 ffff82c480297e78 000000000000001d >(XEN) 0000000000000112 ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000000000004 0000000000000000 00000000fe3dc000 ffff82c4801137c6 >(XEN) 0000000000000004 000000000000001d 00000000fe3dc000 0000000000000000 >(XEN) ffff83021deae000 00a0fb00801907c6 0000000000000202 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff8802022251c0 ffff880200fd0bc0 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff880200fd0bc0 >(XEN) ffff8802022251c0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036f4000 >(XEN) 0000000000000246 0000000000000000 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:659 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe3d8 >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d0e0 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 0000000000000014 r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83021f7fd010 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 0000000215552000 cr2: ffff8802011750a0 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) 0000000000000000 0000000000000001 000000000000014a 00000000fe3d8000 >(XEN) 0000000000000000 0000000100000001 0000006000000004 00000000000fe3d8 >(XEN) 0000006200000108 00000000fe3d8000 ffff830200000003 0000000000000108 >(XEN) 0000000000000108 00000000000fe3d8 ffff83012847d178 000982c4801828ae >(XEN) 0000000000000cfc 0000000000000108 0000000000000027 ffff83021deae000 >(XEN) 00000000ffffffed 0000000000000108 0000000000000027 ffff82c480170955 >(XEN) ffff82c4802d5740 ffff82c480297ea8 ffff83021df01400 ffff83012847d0e0 >(XEN) ffff83021deae000 0000000000000027 0000000000000296 00000000ffffffff >(XEN) fffffffffffffff2 ffff880203bb5bb0 ffff82c480297e78 0000000000000027 >(XEN) 0000000000000108 ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000100000004 0000000000000000 00000000fe3d8000 ffff82c4801137c6 >(XEN) 0000000100000004 0000000000000027 00000000fe3d8000 0000000000000000 >(XEN) ffff83021deae000 00a0fb00801907c6 0000000000000246 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff8802023c49c0 ffff8802023c4840 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff8802023c4840 >(XEN) ffff8802023c49c0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036f5000 >(XEN) 0000000000000246 0000000000000001 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:662 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe3da >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d0e0 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 0000000000000014 r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83021f7fd010 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 0000000215552000 cr2: ffff8802011750a0 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) 0000000000000000 0000000000000001 000000000000014a 00000000fe3d8000 >(XEN) 0000000000000000 0000000100000001 0000006000000004 00000000000fe3d8 >(XEN) 0000006200000108 00000000fe3d8000 ffff830200000003 0000000000000108 >(XEN) 0000000000000108 00000000000fe3d8 ffff83012847d178 000982c4801828ae >(XEN) 0000000000000cfc 0000000000000108 0000000000000027 ffff83021deae000 >(XEN) 00000000ffffffed 0000000000000108 0000000000000027 ffff82c480170955 >(XEN) ffff82c4802d5740 ffff82c480297ea8 ffff83021df01400 ffff83012847d0e0 >(XEN) ffff83021deae000 0000000000000027 0000000000000296 00000000ffffffff >(XEN) fffffffffffffff2 ffff880203bb5bb0 ffff82c480297e78 0000000000000027 >(XEN) 0000000000000108 ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000100000004 0000000000000000 00000000fe3d8000 ffff82c4801137c6 >(XEN) 0000000100000004 0000000000000027 00000000fe3d8000 0000000000000000 >(XEN) ffff83021deae000 00a0fb00801907c6 0000000000000246 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff8802023c49c0 ffff8802023c4840 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff8802023c4840 >(XEN) ffff8802023c49c0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036f5000 >(XEN) 0000000000000246 0000000000000001 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:659 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe8dc >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d1b0 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 0000000000000014 r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83021f7fd2e0 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 0000000215552000 cr2: ffff8802011750b0 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) ffff83021df6f5a0 0000000000000001 000000000000014b 00000000fe8dc000 >(XEN) 0000000000000000 0000000000000001 0000006000000005 00000000000fe8dc >(XEN) 00000062000000ff 00000000fe8dc000 ffff830200000003 00000000000000ff >(XEN) 00000000000000ff 00000000000fe8dc ffff83012847d248 000982c480184c02 >(XEN) ffff880203bb5bb0 00000000000000ff 0000000000000030 ffff83021deae000 >(XEN) 00000000ffffffed 00000000000000ff 0000000000000030 ffff82c480170955 >(XEN) 0000000000000246 ffff82c480297ea8 ffff83021df01880 ffff83012847d1b0 >(XEN) 0000000000000000 0000000000000000 0000000000000001 0000000000000296 >(XEN) ffff83021deae188 ffff880203bb5bb0 ffff82c480297e78 0000000000000030 >(XEN) 00000000000000ff ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000000000005 0000000000000000 00000000fe8dc000 ffff82c4801137c6 >(XEN) 0000000000000005 0000000000000030 00000000fe8dc000 0000000000000000 >(XEN) ffff83021deae000 00a0fb0000000000 0000000000000000 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff88020264f2c0 ffff8802026ebac0 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff8802026ebac0 >(XEN) ffff88020264f2c0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036ca000 >(XEN) 0000000000000246 0000000000000000 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:662 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe8de >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d1b0 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 0000000000000014 r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83021f7fd2e0 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 0000000215552000 cr2: ffff8802011750b0 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) ffff83021df6f5a0 0000000000000001 000000000000014b 00000000fe8dc000 >(XEN) 0000000000000000 0000000000000001 0000006000000005 00000000000fe8dc >(XEN) 00000062000000ff 00000000fe8dc000 ffff830200000003 00000000000000ff >(XEN) 00000000000000ff 00000000000fe8dc ffff83012847d248 000982c480184c02 >(XEN) ffff880203bb5bb0 00000000000000ff 0000000000000030 ffff83021deae000 >(XEN) 00000000ffffffed 00000000000000ff 0000000000000030 ffff82c480170955 >(XEN) 0000000000000246 ffff82c480297ea8 ffff83021df01880 ffff83012847d1b0 >(XEN) 0000000000000000 0000000000000000 0000000000000001 0000000000000296 >(XEN) ffff83021deae188 ffff880203bb5bb0 ffff82c480297e78 0000000000000030 >(XEN) 00000000000000ff ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000000000005 0000000000000000 00000000fe8dc000 ffff82c4801137c6 >(XEN) 0000000000000005 0000000000000030 00000000fe8dc000 0000000000000000 >(XEN) ffff83021deae000 00a0fb0000000000 0000000000000000 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff88020264f2c0 ffff8802026ebac0 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff8802026ebac0 >(XEN) ffff88020264f2c0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036ca000 >(XEN) 0000000000000246 0000000000000000 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:659 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe8d8 >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d280 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 0000000000000014 r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83021f7fd5b0 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 000000013020d000 cr2: ffff8802011750c0 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) 000000000000ffff 0000000000000001 000000000000014c 00000000fe8d8000 >(XEN) 0000000000000000 0000000100000001 0000006000000005 00000000000fe8d8 >(XEN) 00000062000000f6 00000000fe8d8000 ffff830200000003 00000000000000f6 >(XEN) 00000000000000f6 00000000000fe8d8 ffff83012847d318 000982c4801828ae >(XEN) 0000000000000cfc 00000000000000f6 0000000000000039 ffff83021deae000 >(XEN) 00000000ffffffed 00000000000000f6 0000000000000039 ffff82c480170955 >(XEN) ffff82c4802d5740 ffff82c480297ea8 ffff83021df01d00 ffff83012847d280 >(XEN) ffff83021deae000 0000000000000039 0000000000000296 00000000ffffffff >(XEN) fffffffffffffff2 ffff880203bb5bb0 ffff82c480297e78 0000000000000039 >(XEN) 00000000000000f6 ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000100000005 0000000000000000 00000000fe8d8000 ffff82c4801137c6 >(XEN) 0000000100000005 0000000000000039 00000000fe8d8000 0000000000000000 >(XEN) ffff83021deae000 00a0fb0000000000 0000000000000246 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff880201aa1cc0 ffff880201aa1dc0 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff880201aa1dc0 >(XEN) ffff880201aa1cc0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036cb000 >(XEN) 0000000000000246 0000000000000001 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d95c>] pci_enable_msi+0x6fc/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) Xen WARN at msi.c:662 >(XEN) ----[ Xen-4.1.1 x86_64 debug=n Not tainted ]---- >(XEN) CPU: 0 >(XEN) RIP: e008:[<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) RFLAGS: 0000000000010286 CONTEXT: hypervisor >(XEN) rax: 00000000ffffffff rbx: 0000000000002003 rcx: 00000000000fe8da >(XEN) rdx: 0000000000000029 rsi: ffff82c4802380d6 rdi: ffff83021df4dc9c >(XEN) rbp: ffff83012847d280 rsp: ffff82c480297d28 r8: 0000000000000001 >(XEN) r9: 0000000000000000 r10: 0000000000000014 r11: 0000000000000000 >(XEN) r12: ffff82c480297e20 r13: 000000000000000a r14: ffff83021f7fd5b0 >(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 >(XEN) cr3: 000000013020d000 cr2: ffff8802011750c0 >(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 >(XEN) Xen stack trace from rsp=ffff82c480297d28: >(XEN) 000000000000ffff 0000000000000001 000000000000014c 00000000fe8d8000 >(XEN) 0000000000000000 0000000100000001 0000006000000005 00000000000fe8d8 >(XEN) 00000062000000f6 00000000fe8d8000 ffff830200000003 00000000000000f6 >(XEN) 00000000000000f6 00000000000fe8d8 ffff83012847d318 000982c4801828ae >(XEN) 0000000000000cfc 00000000000000f6 0000000000000039 ffff83021deae000 >(XEN) 00000000ffffffed 00000000000000f6 0000000000000039 ffff82c480170955 >(XEN) ffff82c4802d5740 ffff82c480297ea8 ffff83021df01d00 ffff83012847d280 >(XEN) ffff83021deae000 0000000000000039 0000000000000296 00000000ffffffff >(XEN) fffffffffffffff2 ffff880203bb5bb0 ffff82c480297e78 0000000000000039 >(XEN) 00000000000000f6 ffff82c480297ea8 0000000000000000 ffff82c480183bda >(XEN) ffff8300cff94000 0000000000000002 0000000000007ff0 ffffffffffffffff >(XEN) 0000000100000005 0000000000000000 00000000fe8d8000 ffff82c4801137c6 >(XEN) 0000000100000005 0000000000000039 00000000fe8d8000 0000000000000000 >(XEN) ffff83021deae000 00a0fb0000000000 0000000000000246 ffff8300cff94000 >(XEN) ffff880203bb5c50 ffff880203bb5bb0 ffff880201aa1cc0 ffff880201aa1dc0 >(XEN) 0000000000007ff0 ffff82c480208c08 0000000000007ff0 ffff880201aa1dc0 >(XEN) ffff880201aa1cc0 ffff880203bb5bb0 ffff880203bb5c50 ffff8802036cb000 >(XEN) 0000000000000246 0000000000000001 ffff880203bb5b6c 0000000000000004 >(XEN) 0000000000000021 ffffffff8100142a ffff88020312a7b0 ffff880203bb5bb0 >(XEN) 000000000000000d 0000010000000000 ffffffff8100142a 000000000000e033 >(XEN) Xen call trace: >(XEN) [<ffff82c48016d97e>] pci_enable_msi+0x71e/0x910 >(XEN) [<ffff82c480170955>] map_domain_pirq+0x1e5/0x330 >(XEN) [<ffff82c480183bda>] do_physdev_op+0x106a/0x14c0 >(XEN) [<ffff82c4801137c6>] do_multicall+0x106/0x360 >(XEN) [<ffff82c480208c08>] syscall_enter+0x88/0x8d >(XEN) >(XEN) printk: 9 messages suppressed. >(XEN) traps.c:2388:d1 Domain attempted WRMSR 00000000c0010004 from 0x00001ee1a08f9c48 to 0x000000000000abcd. >(XEN) traps.c:2388:d2 Domain attempted WRMSR 00000000c0010004 from 0x00004dcce3857e19 to 0x000000000000abcd.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 440340
: 327842