Displaying 20 results from an estimated 165 matches for "e033".
Did you mean:
033
2010 Aug 05
0
No subject
...lass firewire_core crc_itu_t libata =
thermal_sys ehci_hcd scsi_mod e1000e usbcore nls_base [last unloaded: scsi_=
wait_scan]
Aug 21 09:08:49 BUBBLE kernel: [ 32.126863] Pid: 1723=2C comm: Xorg Taint=
ed: P 2.6.32-5-xen-amd64 #1 8919W1B
Aug 21 09:08:49 BUBBLE kernel: [ 32.126867] RIP: e033:[<00007ff88e2ecc22>=
] [<00007ff88e2ecc22>] 0x7ff88e2ecc22
Aug 21 09:08:49 BUBBLE kernel: [ 32.126875] RSP: e02b:00007fff2738f110 E=
FLAGS: 00010203
Aug 21 09:08:49 BUBBLE kernel: [ 32.126878] RAX: 0000000000000000 RBX: 00=
0000000151c440 RCX: 0000000000000001
Aug 21 09:08:49 BUBB...
2009 Feb 08
1
Unhandled invalid opcode fault/trap
...y.
(XEN) mm.c:1482:d1 Bad L1 flags 800000
(XEN) traps.c:437:d1 Unhandled invalid opcode fault/trap [#6] on VCPU
0 [ec=0000]
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 1 (vcpu#0) crashed on cpu#7:
(XEN) ----[ Xen-3.3.1 x86_64 debug=n Not tainted ]----
(XEN) CPU: 7
(XEN) RIP: e033:[<ffffffff8020aa1a>]
(XEN) RFLAGS: 0000000000000282 EM: 1 CONTEXT: pv guest
(XEN) rax: 00000000ffffffea rbx: 8000000000000161 rcx:
00000000007ff000
(XEN) rdx: 0000000000000000 rsi: 80000008053e2061 rdi:
ffffffff804f0000
(XEN) rbp: ffffffff8048ffa8 rsp: ffffffff8048ff58 r8:...
2018 Jan 30
2
kernel-ml-4.15.0-1.el7.elrepo.x86_64 doesn't boot as Xen PV domU
...000000000000028:
(XEN) L4[0x000] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S: fault at ffff82d08022a472
create_bounce_frame+0x12b/0x13a
(XEN) Domain 8 (vcpu#0) crashed on cpu#6:
(XEN) ----[ Xen-4.6.6-9.el7 x86_64 debug=n Not tainted ]----
(XEN) CPU: 6
(XEN) RIP: e033:[<ffffffff8103f261>]
(XEN) RFLAGS: 0000000000000292 EM: 1 CONTEXT: pv guest (d8v0)
(XEN) rax: 0000000000000000 rbx: ffffffff81e05720 rcx: 0000000000000000
(XEN) rdx: 0000000000000030 rsi: ffffffff82203efc rdi: ffffffff8241d460
(XEN) rbp: ffffffff82203ec8 rsp: ffffffff82203e10 r8: 000000000000...
2019 Nov 01
2
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
...fbe:
(XEN) L4[0x1f7] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S: fault at ffff82d080348a06 entry.o#create_bounce_frame+0x135/0x15f
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.9.2 x86_64 debug=n Not tainted ]----
(XEN) CPU: 0
(XEN) RIP: e033:[<ffffffff82b9f731>]
(XEN) RFLAGS: 0000000000000296 EM: 1 CONTEXT: pv guest (d0v0)
(XEN) rax: fffffbfff0480fbe rbx: 0000000000000000 rcx: 00000000c0000101
(XEN) rdx: 00000000ffffffff rsi: ffffffff84026000 rdi: ffffffff82cb4a20
(XEN) rbp: ffffffff82407ff8 rsp: ffffffff82407da0...
2017 Dec 12
5
Xen PV DomU running Kernel 4.14.5-1.el7.elrepo.x86_64: xl -v vcpu-set <domU> <val> triggers domU kernel WARNING, then domU becomes unresponsive
...: ffff88026b072800
RBP: ffffc90041af7c68 R08: ffffc90041af7eb8 R09: ffff8802711a2810
R10: 0000000000007ff0 R11: 0000000000000001 R12: ffff88026b072800
R13: ffffe8ffffd04d00 R14: 0000000000000000 R15: ffffe8ffffd04d05
FS: 00002b7b7c89b700(0000) GS:ffff880273500000(0000)
knlGS:0000000000000000
CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffff600400 CR3: 000000026d953000 CR4: 0000000000042660
Call Trace:
blk_mq_run_work_fn+0x31/0x40
process_one_work+0x174/0x440
? xen_mc_flush+0xad/0x1b0
? schedule+0x3a/0xa0
worker_thread+0x6b/0x410
? default_wake_function+0x12/0x20
? _...
2017 Dec 14
1
Xen PV DomU running Kernel 4.14.5-1.el7.elrepo.x86_64: xl -v vcpu-set <domU> <val> triggers domU kernel WARNING, then domU becomes unresponsive
...: ffff8800069ea020
RBP: ffffc90040393d18 R08: 0000000000000000 R09: ffffc90040393a08
R10: 0000000000000000 R11: 000000000000005f R12: 0000000000000000
R13: ffff8800069ea000 R14: ffff88007f60a040 R15: 0000000000000000
FS: 00007f685ca0a700(0000) GS:ffff88007f600000(0000)
knlGS:0000000000000000
CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000010 CR3: 000000000683a000 CR4: 0000000000042660
Call Trace:
? coretemp_add_core+0x50/0x50 [coretemp]
cpuhp_invoke_callback+0xe9/0x700
? put_prev_task_fair+0x26/0x40
? __schedule+0x2d0/0x6e0
? __wake_up_common+0x84/0x130
? __wake_...
2011 Aug 31
3
CPU soft lockup XEN 4.1rc
...utton ata_generic soundcore snd_page_alloc libata thermal scsi_mod processor thermal_sys acpi_processo
r
> Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348318] Pid: 2767, comm: xend Not tainted 2.6.32-5-xen-amd64 #1
> Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348322] RIP: e033:[<00007fa4064c0289>] [<00007fa4064c0289>] 0x7fa4064c0289
> Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348330] RSP: e02b:00007fa402ee54a0 EFLAGS: 00000206
> Aug 31 13:05:41 nwsc-xen-Q45 kernel: [ 4039.348334] RAX: 0000000001c3a320 RBX: 0000000001f8ace0 RCX: 00007fa40650f844
>...
2006 Oct 01
4
Kernel BUG at arch/x86_64/mm/../../i386/mm/hypervisor.c:197
...R09: ffff88001c05cff8
1 20:53:48 waff R10: 0000000000007ff0 R11: ffff88000ecbcff8 R12: 0000000000000000
1 20:53:48 waff R13: ffff8800000ca840 R14: 0000000001200011 R15: ffff8800000ca840
1 20:53:48 waff FS: 00002b3887c7ce30(0000) GS:ffffffff80773180(0000) knlGS:0000000000000000
1 20:53:48 waff CS: e033 DS: 0000 ES: 0000
1 20:53:48 waff Process ebuild.sh (pid: 31297, threadinfo ffff8800210e8000, task ffff88001f331080)
1 20:53:48 waff Stack: 0000000000000003 0000000000098718 0000000001200011 ffff88000ecbcff8
1 20:53:48 waff ffff8800210e9dc8 ffffffff80285573 0000000000000000 ffff88000c1263d8...
2017 Dec 19
1
Xen PV DomU running Kernel 4.14.5-1.el7.elrepo.x86_64: xl -v vcpu-set <domU> <val> triggers domU kernel WARNING, then domU becomes unresponsive
...ffffc90041af7c68 R08: ffffc90041af7eb8 R09: ffff8802711a2810
> R10: 0000000000007ff0 R11: 0000000000000001 R12: ffff88026b072800
> R13: ffffe8ffffd04d00 R14: 0000000000000000 R15: ffffe8ffffd04d05
> FS:? 00002b7b7c89b700(0000) GS:ffff880273500000(0000)
> knlGS:0000000000000000
> CS:? e033 DS: 0000 ES: 0000 CR0: 0000000080050033
> CR2: ffffffffff600400 CR3: 000000026d953000 CR4: 0000000000042660
> Call Trace:
> ?blk_mq_run_work_fn+0x31/0x40
> ?process_one_work+0x174/0x440
> ?? xen_mc_flush+0xad/0x1b0
> ?? schedule+0x3a/0xa0
> ?worker_thread+0x6b/0x410
> ?? def...
2019 Nov 01
0
[PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert
...000000000000000 ffffffffffffffff
> (XEN) domain_crash_sync called from entry.S: fault at ffff82d080348a06 entry.o#create_bounce_frame+0x135/0x15f
> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
> (XEN) ----[ Xen-4.9.2 x86_64 debug=n Not tainted ]----
> (XEN) CPU: 0
> (XEN) RIP: e033:[<ffffffff82b9f731>]
> (XEN) RFLAGS: 0000000000000296 EM: 1 CONTEXT: pv guest (d0v0)
> (XEN) rax: fffffbfff0480fbe rbx: 0000000000000000 rcx: 00000000c0000101
> (XEN) rdx: 00000000ffffffff rsi: ffffffff84026000 rdi: ffffffff82cb4a20
> (XEN) rbp: ffffffff82407ff8 rsp:...
2008 Feb 24
7
Using SYSCALL/SYSRET with a minios kernel
...*/
wrmsrl(MSR_STAR, ((uint64_t)__USER_CS)<<48 | ((uint64_t)__KERNEL_CS)<<32);
wrmsrl(MSR_LSTAR, system_call);
But all that does is give a message on the xen console:
(XEN) traps.c:1467:d137 Domain attempted WRMSR 00000000c0000081 from e023e010:00000000 to e033e033:00000000.
(XEN) traps.c:1467:d137 Domain attempted WRMSR 00000000c0000082 from ffff8300:001e0800 to 00000000:001054c0.
A later
__asm__ __volatile__("syscall"::);
does nothing while a
__asm__ __volatile__("sysret"::);
causes a general protection fault:
(XEN) traps.c:405:...
2018 Jan 31
0
kernel-ml-4.15.0-1.el7.elrepo.x86_64 doesn't boot as Xen PV domU
...00000000000028:
(XEN) L4[0x000] = 0000000000000000 ffffffffffffffff
(XEN) domain_crash_sync called from entry.S: fault at ffff82d080230983
create_bounce_frame+0x12b/0x13a
(XEN) Domain 38 (vcpu#0) crashed on cpu#2:
(XEN) ----[ Xen-4.6.6-8.el6 x86_64 debug=n Not tainted ]----
(XEN) CPU: 2
(XEN) RIP: e033:[<ffffffff8103f261>]
(XEN) RFLAGS: 0000000000000292 EM: 1 CONTEXT: pv guest (d38v0)
(XEN) rax: 0000000000000000 rbx: ffffffff81e05720 rcx: 0000000000000000
(XEN) rdx: 0000000000000030 rsi: ffffffff82203efc rdi: ffffffff8241d460
(XEN) rbp: ffffffff82203ec8 rsp: ffffffff82203e10 r8: 00000000000...
2012 Sep 04
1
[PATCH] xen/p2m: Fix one by off error in checking the P2M tree directory.
...ortunately for us the p2m_top_index
has a check for this:
BUG_ON(pfn >= MAX_P2M_PFN);
which we hit and saw this:
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.1.2-OVM x86_64 debug=n Tainted: C ]----
(XEN) CPU: 0
(XEN) RIP: e033:[<ffffffff819cadeb>]
(XEN) RFLAGS: 0000000000000212 EM: 1 CONTEXT: pv guest
(XEN) rax: ffffffff81db5000 rbx: ffffffff81db4000 rcx: 0000000000000000
(XEN) rdx: 0000000000480211 rsi: 0000000000000000 rdi: ffffffff81db4000
(XEN) rbp: ffffffff81793db8 rsp: ffffffff81793d38 r8: 00...
2017 Apr 14
4
Xen C6 kernel 4.9.13 and testing 4.9.15 only reboots.
...I: 0000000000000005
RBP: ffffc900400b7f18 R08: 00000000000000cb R09: 0000000000000004
R10: 0000000000000000 R11: 0000000000000006 R12: 0000000000000008
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff88005d800000(0000) knlGS:0000000000000000
CS: e033 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 0000000000000000 CR3: 0000000001c07000 CR4: 0000000000042660
Stack:
0000000000000008 0000000000000000 ffffc900400b7f28 ffffffff8104e94e
ffffc900400b7f40 ffffffff81029925 0000000000000000 ffffc900400b7f50
ffffffff810299a0 0000000000000000 0000000000000...
2017 Apr 14
4
Xen C6 kernel 4.9.13 and testing 4.9.15 only reboots.
...0ce R09: 0000000000000000
[ 6.348738] R10: 0000000000000005 R11: 0000000000000006 R12: 0000000000000008
[ 6.355873] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 6.363006] FS: 0000000000000000(0000) GS:ffff88005d800000(0000) knlGS:0000000000000000
[ 6.371090] CS: e033 DS: 002b ES: 002b CR0: 0000000080050033
[ 6.376837] CR2: 0000000000000000 CR3: 0000000001e07000 CR4: 0000000000042660
[ 6.383970] Stack:
[ 6.386004] 0000000000000008 0000000000000000 ffffc900400c3f28 ffffffff8104ebce
[ 6.393483] ffffc900400c3f40 ffffffff81029855 0000000000000000 ffffc...
2018 Jan 23
2
Xen 4.6.6-9 (with XPTI meltdown mitigation) packages making their way to centos-virt-xen-testing
On Mon, Jan 22, 2018 at 10:38 PM, Nathan March <nathan at gt.net> wrote:
> Just a heads up that I'm seeing major stability problems on these builds.
> Didn't have console capture setup unfortunately, but have seen my test
> hypervisor hard lock twice over the weekend.
>
> This is with xpti being used, rather than the shim.
Thanks for the heads-up. It's been
2017 May 21
2
Crash in CentOS 7 kernel-3.10.0-514.16.1.el7.x86_64 in Xen PV mode
...b78 R09: ffffffff813d50f9
[ 32.304771] R10: ffff88001e801e00 R11: ffffea0000093dc0 R12: ffffc900000c9000
[ 32.304777] R13: ffffc900000c8000 R14: 0000000000000000 R15: ffff88001d150340
[ 32.304787] FS: 00007f64425b0740(0000) GS:ffff88001f800000(0000) knlGS:0000000000000000
[ 32.304796] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 32.304801] CR2: 00000000006de2c8 CR3: 000000001b405000 CR4: 0000000000002660
[ 32.304807] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 32.304813] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 32.304818] S...
2009 Jan 31
14
[PATCH 2/3] xen: make direct versions of irq_enable/disable/save/restore to common code
Now that x86-64 has directly accessible percpu variables, it can also
implement the direct versions of these operations, which operate on a
vcpu_info structure directly embedded in the percpu area.
In fact, the 64-bit versions are more or less identical, and so can be
shared. The only two differences are:
1. xen_restore_fl_direct takes its argument in eax on 32-bit, and rdi on 64-bit.
2017 Oct 16
4
[Xen-devel] [PATCH 11/13] x86/paravirt: Add paravirt alternatives infrastructure
...2c0000 R12:
>>> 00007fcfc958ad60
>>> [ 1.317300] R13: 0000000000000000 R14: 000055f550185954 R15:
>>> 0000000000001000
>>> [ 1.317801] FS: 0000000000000000(0000) GS:ffff88003f800000(0000)
>>> knlGS:0000000000000000
>>> [ 1.318267] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033
>>> [ 1.318750] CR2: 00007fcfc97ab218 CR3: 000000003c88e000 CR4:
>>> 0000000000042660
>>> [ 1.319235] Call Trace:
>>> [ 1.319700] Code: 51 50 57 56 52 51 6a da 41 50 41 51 41 52 41 53 48
>>> 83 ec 30 65 4c...
2017 Oct 16
4
[Xen-devel] [PATCH 11/13] x86/paravirt: Add paravirt alternatives infrastructure
...2c0000 R12:
>>> 00007fcfc958ad60
>>> [ 1.317300] R13: 0000000000000000 R14: 000055f550185954 R15:
>>> 0000000000001000
>>> [ 1.317801] FS: 0000000000000000(0000) GS:ffff88003f800000(0000)
>>> knlGS:0000000000000000
>>> [ 1.318267] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033
>>> [ 1.318750] CR2: 00007fcfc97ab218 CR3: 000000003c88e000 CR4:
>>> 0000000000042660
>>> [ 1.319235] Call Trace:
>>> [ 1.319700] Code: 51 50 57 56 52 51 6a da 41 50 41 51 41 52 41 53 48
>>> 83 ec 30 65 4c...