[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [BUG] xen-mceinj tool testing cause dom0 crash
(CC Jan and Andrew) On 22/05/17 09:39, Hao, Xudong wrote: Bug detailed description: ---------------- Xen has a MCE soft injection tool xen-mceinj to test RAS, testing with this tool cause dom0 crash and system reboot. Attach the whole log. Environment : ---------------- HW: Skylake/Broadwell server Xen: Xen 4.9.0 RC5 Dom0: Linux 4.11.0 Reproduce steps: ---------------- 1. Compiling xen-mceinj in xen : xen/tools/tests/mce-test/tools 2. Run the commond: xen/tools/tests/mce-test/tools/xen-mceinj -t 0 Current result: ---------------- VM Migration fail. Base error log: ---------------- (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds. (XEN) ----[ Xen-4.9-rc x86_64 debug=y Tainted: MCE ]---- (XEN) CPU: 0 (XEN) RIP: e008:[<0000000065eb1e13>] 0000000065eb1e13 (XEN) RFLAGS: 0000000000010246 CONTEXT: hypervisor (XEN) rax: 0000000000000000 rbx: ffff83005f827bb0 rcx: 00000000682ab000 (XEN) rdx: 0000000000000000 rsi: 0000000000000381 rdi: ffff83005f827b90 (XEN) rbp: ffff83005f827c88 rsp: ffff83005f827ae0 r8: ffff83005f827bb0 (XEN) r9: ffff83005f827b90 r10: 0000000065eb3258 r11: 0000ffff0000ffff (XEN) r12: 00000000fffffffe r13: 0000000000000000 r14: 0000000000000065 (XEN) r15: ffff83102bca5000 cr0: 0000000080050033 cr4: 00000000003526e0 (XEN) cr3: 000000102c962000 cr2: 00000000682ab009 (XEN) ds: 002b es: 002b fs: 0000 gs: 0000 ss: 0000 cs: e008 (XEN) Xen code around <0000000065eb1e13> (0000000065eb1e13): (XEN) ff 00 00 48 8b 4c 24 28 <0f> b6 49 09 3b c1 72 18 4c 8d 05 06 20 00 00 ba (XEN) Xen stack trace from rsp=ffff83005f827ae0: (XEN) ffff82d08026dd12 ffff83005f827b38 ffff82d08026e1df 0000000400000093 (XEN) 0000000000000004 00000000682ab000 000000000000000d 0000000000000002 (XEN) 0000000000000017 0000000065eb0ee8 ffff83005f827bb0 0000000000000046 (XEN) 020000000001a0d1 ffff83005f827b98 0000000000000000 0000000065eaf77c (XEN) 0000000000000000 ffff83005f827bb8 ffff82d08026fe70 0000000000000010 (XEN) 000000000000001e 0000000065e4de0b ffff83102bca5000 ffff83005f827ba8 (XEN) ffff82d08025f2f2 ffff83005f827bb8 00000000000b0000 682ab00000000200 (XEN) ffff82d080270b47 0000000065e4e1cc ffff83005f827c00 0000000000000206 (XEN) ffff83005f827c60 ffff83005f827c40 ffff83102bca5000 0000000065e4d7c9 (XEN) 0000000000000000 0000000000000381 000000102c962000 0000000000000065 (XEN) 0000000000000000 00000000fffffffe 000000102c962000 ffff82d080356618 (XEN) 0000000000000000 0000000000000000 ffff82d080808780 ffff83005f827c68 (XEN) 000000005f819000 ffff83005f827c88 ffff82d08029796c 0000000000000000 (XEN) 0000000000000000 ffff83005f827cd8 ffff82d080297307 ffff83005f827cf8 (XEN) 000013888024855e 000083005f827d08 0000000000000000 0000000000000000 (XEN) ffff83005f827db8 00000000000000fb ffff83005f827fff ffff83005f827ce8 (XEN) ffff82d0802973a5 ffff83005f827d08 ffff82d080232e22 ffff83005f827d08 (XEN) 0000000000000000 ffff83005f827d18 ffff82d080297a08 ffff83005f827da8 (XEN) ffff82d080276efe ffff83005f827db8 ffff82d080276efe 0000000000000286 (XEN) ffff83005f827d58 ffff83102bc61cd0 ffff83102bc7ae40 80000000000000d4 (XEN) Xen call trace: (XEN) [<ffff82d08026dd12>] sync_local_execstate+0x9/0xb (XEN) [<ffff82d080297307>] machine_restart+0x1c6/0x259 (XEN) [<ffff82d0802973a5>] shutdown.c#__machine_restart+0xb/0x16 (XEN) [<ffff82d080232e22>] smp_call_function_interrupt+0x8f/0xbd (XEN) [<ffff82d080297a08>] call_function_interrupt+0x35/0x3d (XEN) [<ffff82d080276efe>] do_IRQ+0x8c/0x61e (XEN) [<ffff82d0803537b7>] common_interrupt+0x67/0x70 (XEN) [<ffff82d0802d1a5f>] mce_panic_check+0/0x21 (XEN) [<ffff82d0802cd950>] mce.c#mce_softirq+0x140/0x183 (XEN) [<ffff82d08023265f>] softirq.c#__do_softirq+0x7f/0x8a (XEN) [<ffff82d0802326b4>] do_softirq+0x13/0x15 (XEN) [<ffff82d080268b4a>] domain.c#idle_loop+0x55/0x62 (XEN) (XEN) Pagetable walk from 00000000682ab009: (XEN) L4[0x000] = 000000102c961063 ffffffffffffffff (XEN) L3[0x001] = 000000005f812063 ffffffffffffffff (XEN) L2[0x141] = 0000000000000000 ffffffffffffffff (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) FATAL PAGE FAULT (XEN) [error_code=0000] (XEN) Faulting linear address: 00000000682ab009 (XEN) **************************************** (XEN) (XEN) Reboot in five seconds... (XEN) Resetting with ACPI MEMORY or I/O RESET_REG. Force an S5 exit path. [SIO] Current system SIO exist bit:1 Best Regards, Xudong -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |