search for: e033

Displaying 20 results from an estimated 165 matches for "e033".

Did you mean: 033
2010 Aug 05
0
No subject
...lass firewire_core crc_itu_t libata = thermal_sys ehci_hcd scsi_mod e1000e usbcore nls_base [last unloaded: scsi_= wait_scan] Aug 21 09:08:49 BUBBLE kernel: [ 32.126863] Pid: 1723=2C comm: Xorg Taint= ed: P 2.6.32-5-xen-amd64 #1 8919W1B Aug 21 09:08:49 BUBBLE kernel: [ 32.126867] RIP: e033:[<00007ff88e2ecc22>= ] [<00007ff88e2ecc22>] 0x7ff88e2ecc22 Aug 21 09:08:49 BUBBLE kernel: [ 32.126875] RSP: e02b:00007fff2738f110 E= FLAGS: 00010203 Aug 21 09:08:49 BUBBLE kernel: [ 32.126878] RAX: 0000000000000000 RBX: 00= 0000000151c440 RCX: 0000000000000001 Aug 21 09:08:49 BUBB...
2009 Feb 08
1
Unhandled invalid opcode fault/trap
...y. (XEN) mm.c:1482:d1 Bad L1 flags 800000 (XEN) traps.c:437:d1 Unhandled invalid opcode fault/trap [#6] on VCPU 0 [ec=0000] (XEN) domain_crash_sync called from entry.S (XEN) Domain 1 (vcpu#0) crashed on cpu#7: (XEN) ----[ Xen-3.3.1 x86_64 debug=n Not tainted ]---- (XEN) CPU: 7 (XEN) RIP: e033:[<ffffffff8020aa1a>] (XEN) RFLAGS: 0000000000000282 EM: 1 CONTEXT: pv guest (XEN) rax: 00000000ffffffea rbx: 8000000000000161 rcx: 00000000007ff000 (XEN) rdx: 0000000000000000 rsi: 80000008053e2061 rdi: ffffffff804f0000 (XEN) rbp: ffffffff8048ffa8 rsp: ffffffff8048ff58 r8:...
2018 Jan 30
2
kernel-ml-4.15.0-1.el7.elrepo.x86_64 doesn't boot as Xen PV domU
...000000000000028: (XEN) L4[0x000] = 0000000000000000 ffffffffffffffff (XEN) domain_crash_sync called from entry.S: fault at ffff82d08022a472 create_bounce_frame+0x12b/0x13a (XEN) Domain 8 (vcpu#0) crashed on cpu#6: (XEN) ----[ Xen-4.6.6-9.el7 x86_64 debug=n Not tainted ]---- (XEN) CPU: 6 (XEN) RIP: e033:[<ffffffff8103f261>] (XEN) RFLAGS: 0000000000000292 EM: 1 CONTEXT: pv guest (d8v0) (XEN) rax: 0000000000000000 rbx: ffffffff81e05720 rcx: 0000000000000000 (XEN) rdx: 0000000000000030 rsi: ffffffff82203efc rdi: ffffffff8241d460 (XEN) rbp: ffffffff82203ec8 rsp: ffffffff82203e10 r8: 000000000000...
2019 Nov 01
2
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
...fbe: (XEN) L4[0x1f7] = 0000000000000000 ffffffffffffffff (XEN) domain_crash_sync called from entry.S: fault at ffff82d080348a06 entry.o#create_bounce_frame+0x135/0x15f (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN) ----[ Xen-4.9.2 x86_64 debug=n Not tainted ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<ffffffff82b9f731>] (XEN) RFLAGS: 0000000000000296 EM: 1 CONTEXT: pv guest (d0v0) (XEN) rax: fffffbfff0480fbe rbx: 0000000000000000 rcx: 00000000c0000101 (XEN) rdx: 00000000ffffffff rsi: ffffffff84026000 rdi: ffffffff82cb4a20 (XEN) rbp: ffffffff82407ff8 rsp: ffffffff82407da0...
2017 Dec 12
5
Xen PV DomU running Kernel 4.14.5-1.el7.elrepo.x86_64: xl -v vcpu-set <domU> <val> triggers domU kernel WARNING, then domU becomes unresponsive
...: ffff88026b072800 RBP: ffffc90041af7c68 R08: ffffc90041af7eb8 R09: ffff8802711a2810 R10: 0000000000007ff0 R11: 0000000000000001 R12: ffff88026b072800 R13: ffffe8ffffd04d00 R14: 0000000000000000 R15: ffffe8ffffd04d05 FS: 00002b7b7c89b700(0000) GS:ffff880273500000(0000) knlGS:0000000000000000 CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 000000026d953000 CR4: 0000000000042660 Call Trace: blk_mq_run_work_fn+0x31/0x40 process_one_work+0x174/0x440 ? xen_mc_flush+0xad/0x1b0 ? schedule+0x3a/0xa0 worker_thread+0x6b/0x410 ? default_wake_function+0x12/0x20 ? _...
2017 Dec 14
1
Xen PV DomU running Kernel 4.14.5-1.el7.elrepo.x86_64: xl -v vcpu-set <domU> <val> triggers domU kernel WARNING, then domU becomes unresponsive
...: ffff8800069ea020 RBP: ffffc90040393d18 R08: 0000000000000000 R09: ffffc90040393a08 R10: 0000000000000000 R11: 000000000000005f R12: 0000000000000000 R13: ffff8800069ea000 R14: ffff88007f60a040 R15: 0000000000000000 FS: 00007f685ca0a700(0000) GS:ffff88007f600000(0000) knlGS:0000000000000000 CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000010 CR3: 000000000683a000 CR4: 0000000000042660 Call Trace: ? coretemp_add_core+0x50/0x50 [coretemp] cpuhp_invoke_callback+0xe9/0x700 ? put_prev_task_fair+0x26/0x40 ? __schedule+0x2d0/0x6e0 ? __wake_up_common+0x84/0x130 ? __wake_...
2011 Aug 31
3
CPU soft lockup XEN 4.1rc
...utton ata_generic soundcore snd_page_alloc libata thermal scsi_mod processor thermal_sys acpi_processo r > Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348318] Pid: 2767, comm: xend Not tainted 2.6.32-5-xen-amd64 #1 > Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348322] RIP: e033:[<00007fa4064c0289>] [<00007fa4064c0289>] 0x7fa4064c0289 > Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348330] RSP: e02b:00007fa402ee54a0 EFLAGS: 00000206 > Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348334] RAX: 0000000001c3a320 RBX: 0000000001f8ace0 RCX: 00007fa40650f844 >...
2006 Oct 01
4
Kernel BUG at arch/x86_64/mm/../../i386/mm/hypervisor.c:197
...R09: ffff88001c05cff8 1 20:53:48 waff R10: 0000000000007ff0 R11: ffff88000ecbcff8 R12: 0000000000000000 1 20:53:48 waff R13: ffff8800000ca840 R14: 0000000001200011 R15: ffff8800000ca840 1 20:53:48 waff FS: 00002b3887c7ce30(0000) GS:ffffffff80773180(0000) knlGS:0000000000000000 1 20:53:48 waff CS: e033 DS: 0000 ES: 0000 1 20:53:48 waff Process ebuild.sh (pid: 31297, threadinfo ffff8800210e8000, task ffff88001f331080) 1 20:53:48 waff Stack: 0000000000000003 0000000000098718 0000000001200011 ffff88000ecbcff8 1 20:53:48 waff ffff8800210e9dc8 ffffffff80285573 0000000000000000 ffff88000c1263d8...
2017 Dec 19
1
Xen PV DomU running Kernel 4.14.5-1.el7.elrepo.x86_64: xl -v vcpu-set <domU> <val> triggers domU kernel WARNING, then domU becomes unresponsive
...ffffc90041af7c68 R08: ffffc90041af7eb8 R09: ffff8802711a2810 > R10: 0000000000007ff0 R11: 0000000000000001 R12: ffff88026b072800 > R13: ffffe8ffffd04d00 R14: 0000000000000000 R15: ffffe8ffffd04d05 > FS:? 00002b7b7c89b700(0000) GS:ffff880273500000(0000) > knlGS:0000000000000000 > CS:? e033 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: ffffffffff600400 CR3: 000000026d953000 CR4: 0000000000042660 > Call Trace: > ?blk_mq_run_work_fn+0x31/0x40 > ?process_one_work+0x174/0x440 > ?? xen_mc_flush+0xad/0x1b0 > ?? schedule+0x3a/0xa0 > ?worker_thread+0x6b/0x410 > ?? def...
2019 Nov 01
0
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
...000000000000000 ffffffffffffffff > (XEN) domain_crash_sync called from entry.S: fault at ffff82d080348a06 entry.o#create_bounce_frame+0x135/0x15f > (XEN) Domain 0 (vcpu#0) crashed on cpu#0: > (XEN) ----[ Xen-4.9.2 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 0 > (XEN) RIP: e033:[<ffffffff82b9f731>] > (XEN) RFLAGS: 0000000000000296 EM: 1 CONTEXT: pv guest (d0v0) > (XEN) rax: fffffbfff0480fbe rbx: 0000000000000000 rcx: 00000000c0000101 > (XEN) rdx: 00000000ffffffff rsi: ffffffff84026000 rdi: ffffffff82cb4a20 > (XEN) rbp: ffffffff82407ff8 rsp:...
2008 Feb 24
7
Using SYSCALL/SYSRET with a minios kernel
...*/ wrmsrl(MSR_STAR, ((uint64_t)__USER_CS)<<48 | ((uint64_t)__KERNEL_CS)<<32); wrmsrl(MSR_LSTAR, system_call); But all that does is give a message on the xen console: (XEN) traps.c:1467:d137 Domain attempted WRMSR 00000000c0000081 from e023e010:00000000 to e033e033:00000000. (XEN) traps.c:1467:d137 Domain attempted WRMSR 00000000c0000082 from ffff8300:001e0800 to 00000000:001054c0. A later __asm__ __volatile__("syscall"::); does nothing while a __asm__ __volatile__("sysret"::); causes a general protection fault: (XEN) traps.c:405:...
2018 Jan 31
0
kernel-ml-4.15.0-1.el7.elrepo.x86_64 doesn't boot as Xen PV domU
...00000000000028: (XEN) L4[0x000] = 0000000000000000 ffffffffffffffff (XEN) domain_crash_sync called from entry.S: fault at ffff82d080230983 create_bounce_frame+0x12b/0x13a (XEN) Domain 38 (vcpu#0) crashed on cpu#2: (XEN) ----[ Xen-4.6.6-8.el6 x86_64 debug=n Not tainted ]---- (XEN) CPU: 2 (XEN) RIP: e033:[<ffffffff8103f261>] (XEN) RFLAGS: 0000000000000292 EM: 1 CONTEXT: pv guest (d38v0) (XEN) rax: 0000000000000000 rbx: ffffffff81e05720 rcx: 0000000000000000 (XEN) rdx: 0000000000000030 rsi: ffffffff82203efc rdi: ffffffff8241d460 (XEN) rbp: ffffffff82203ec8 rsp: ffffffff82203e10 r8: 00000000000...
2012 Sep 04
1
[PATCH] xen/p2m: Fix one by off error in checking the P2M tree directory.
...ortunately for us the p2m_top_index has a check for this: BUG_ON(pfn >= MAX_P2M_PFN); which we hit and saw this: (XEN) domain_crash_sync called from entry.S (XEN) Domain 0 (vcpu#0) crashed on cpu#0: (XEN) ----[ Xen-4.1.2-OVM x86_64 debug=n Tainted: C ]---- (XEN) CPU: 0 (XEN) RIP: e033:[<ffffffff819cadeb>] (XEN) RFLAGS: 0000000000000212 EM: 1 CONTEXT: pv guest (XEN) rax: ffffffff81db5000 rbx: ffffffff81db4000 rcx: 0000000000000000 (XEN) rdx: 0000000000480211 rsi: 0000000000000000 rdi: ffffffff81db4000 (XEN) rbp: ffffffff81793db8 rsp: ffffffff81793d38 r8: 00...
2017 Apr 14
4
Xen C6 kernel 4.9.13 and testing 4.9.15 only reboots.
...I: 0000000000000005 RBP: ffffc900400b7f18 R08: 00000000000000cb R09: 0000000000000004 R10: 0000000000000000 R11: 0000000000000006 R12: 0000000000000008 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88005d800000(0000) knlGS:0000000000000000 CS: e033 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000001c07000 CR4: 0000000000042660 Stack: 0000000000000008 0000000000000000 ffffc900400b7f28 ffffffff8104e94e ffffc900400b7f40 ffffffff81029925 0000000000000000 ffffc900400b7f50 ffffffff810299a0 0000000000000000 0000000000000...
2017 Apr 14
4
Xen C6 kernel 4.9.13 and testing 4.9.15 only reboots.
...0ce R09: 0000000000000000 [ 6.348738] R10: 0000000000000005 R11: 0000000000000006 R12: 0000000000000008 [ 6.355873] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 6.363006] FS: 0000000000000000(0000) GS:ffff88005d800000(0000) knlGS:0000000000000000 [ 6.371090] CS: e033 DS: 002b ES: 002b CR0: 0000000080050033 [ 6.376837] CR2: 0000000000000000 CR3: 0000000001e07000 CR4: 0000000000042660 [ 6.383970] Stack: [ 6.386004] 0000000000000008 0000000000000000 ffffc900400c3f28 ffffffff8104ebce [ 6.393483] ffffc900400c3f40 ffffffff81029855 0000000000000000 ffffc...
2018 Jan 23
2
Xen 4.6.6-9 (with XPTI meltdown mitigation) packages making their way to centos-virt-xen-testing
On Mon, Jan 22, 2018 at 10:38 PM, Nathan March <nathan at gt.net> wrote: > Just a heads up that I'm seeing major stability problems on these builds. > Didn't have console capture setup unfortunately, but have seen my test > hypervisor hard lock twice over the weekend. > > This is with xpti being used, rather than the shim. Thanks for the heads-up. It's been
2017 May 21
2
Crash in CentOS 7 kernel-3.10.0-514.16.1.el7.x86_64 in Xen PV mode
...b78 R09: ffffffff813d50f9 [ 32.304771] R10: ffff88001e801e00 R11: ffffea0000093dc0 R12: ffffc900000c9000 [ 32.304777] R13: ffffc900000c8000 R14: 0000000000000000 R15: ffff88001d150340 [ 32.304787] FS: 00007f64425b0740(0000) GS:ffff88001f800000(0000) knlGS:0000000000000000 [ 32.304796] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 32.304801] CR2: 00000000006de2c8 CR3: 000000001b405000 CR4: 0000000000002660 [ 32.304807] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.304813] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 32.304818] S...
2009 Jan 31
14
[PATCH 2/3] xen: make direct versions of irq_enable/disable/save/restore to common code
Now that x86-64 has directly accessible percpu variables, it can also implement the direct versions of these operations, which operate on a vcpu_info structure directly embedded in the percpu area. In fact, the 64-bit versions are more or less identical, and so can be shared. The only two differences are: 1. xen_restore_fl_direct takes its argument in eax on 32-bit, and rdi on 64-bit.
2017 Oct 16
4
[Xen-devel] [PATCH 11/13] x86/paravirt: Add paravirt alternatives infrastructure
...2c0000 R12: >>> 00007fcfc958ad60 >>> [ 1.317300] R13: 0000000000000000 R14: 000055f550185954 R15: >>> 0000000000001000 >>> [ 1.317801] FS: 0000000000000000(0000) GS:ffff88003f800000(0000) >>> knlGS:0000000000000000 >>> [ 1.318267] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [ 1.318750] CR2: 00007fcfc97ab218 CR3: 000000003c88e000 CR4: >>> 0000000000042660 >>> [ 1.319235] Call Trace: >>> [ 1.319700] Code: 51 50 57 56 52 51 6a da 41 50 41 51 41 52 41 53 48 >>> 83 ec 30 65 4c...
2017 Oct 16
4
[Xen-devel] [PATCH 11/13] x86/paravirt: Add paravirt alternatives infrastructure
...2c0000 R12: >>> 00007fcfc958ad60 >>> [ 1.317300] R13: 0000000000000000 R14: 000055f550185954 R15: >>> 0000000000001000 >>> [ 1.317801] FS: 0000000000000000(0000) GS:ffff88003f800000(0000) >>> knlGS:0000000000000000 >>> [ 1.318267] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [ 1.318750] CR2: 00007fcfc97ab218 CR3: 000000003c88e000 CR4: >>> 0000000000042660 >>> [ 1.319235] Call Trace: >>> [ 1.319700] Code: 51 50 57 56 52 51 6a da 41 50 41 51 41 52 41 53 48 >>> 83 ec 30 65 4c...