do I have to run addr2line on my vmlinux image?

2017-11-02 10:31 GMT+01:00 Juergen Gross <jgr...@suse.com>:

> On 02/11/17 08:56, Francesco De Francesco wrote:
> > Hi everyone,
> >
> > I need to address an issue that prevents me from running Xen on new
> > hardware. It's an HPE DL360 Gen10 with double Xeon Silver 4108 CPU and
> > 256GB ECC DDR4 RDIMM. It happens with both CentOS6 and CentOS7.
> >
> > When I try to boot with Xen kernel 4.9.58-29.el6, I get the following
> > error at boot time (I can read it from the serial console):
> >
> > (XEN) Brought up 32 CPUs
> > (XEN) ACPI sleep modes: S3
> > (XEN) VPMU: disabled
> > (XEN) mcheck_poll: Machine check polling timer started.
> > (XEN) Dom0 has maximum 1240 PIRQs
> > (XEN) NX (Execute Disable) protection active
> > (XEN) *** LOADING DOMAIN 0 ***
> > (XEN)  Xen  kernel: 64-bit, lsb, compat32
> > (XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x26a0000
> > (XEN) PHYSICAL MEMORY ARRANGEMENT:
> > (XEN)  Dom0 alloc.:   0000003fdc000000->0000003fe0000000 (1012299 pages
> > to be allocated)
> > (XEN)  Init. ramdisk: 000000403b04b000->000000403fdff200
> > (XEN) VIRTUAL MEMORY ARRANGEMENT:
> > (XEN)  Loaded kernel: ffffffff81000000->ffffffff826a0000
> > (XEN)  Init. ramdisk: 0000000000000000->0000000000000000
> > (XEN)  Phys-Mach map: 0000008000000000->0000008000800000
> > (XEN)  Start info:    ffffffff826a0000->ffffffff826a04b4
> > (XEN)  Page tables:   ffffffff826a1000->ffffffff826b8000
> > (XEN)  Boot stack:    ffffffff826b8000->ffffffff826b9000
> > (XEN)  TOTAL:         ffffffff80000000->ffffffff82800000
> > (XEN)  ENTRY ADDRESS: ffffffff821a9180
> > (XEN) Dom0 has maximum 32 VCPUs
> > (XEN) Scrubbing Free RAM on 2 nodes using 16 CPUs
> > (XEN)
> > ............................................................
> .....................................................................done.
> > (XEN) Initial low memory virq threshold set at 0x4000 pages.
> > (XEN) Std. Loglevel: All
> > (XEN) Guest Loglevel: All
> > (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch
> > input to Xen)
> > (XEN) Freed 300kB init memory.
> > mapping kernel into physical memory
> > about to get started...
> > (XEN) d0v0 Unhandled general protection fault fault/trap [#13, ec=0000]
> > (XEN) domain_crash_sync called from entry.S: fault at ffff82d08022f983
> > create_bounce_frame+0x12b/0x13a
> > (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
> > (XEN) ----[ Xen-4.6.6-3.el6  x86_64  debug=n  Not tainted ]----
> > (XEN) CPU:    0
> > (XEN) RIP:    e033:[<ffffffff8103cf38>]
> > (XEN) RFLAGS: 0000000000000246   EM: 1   CONTEXT: pv guest (d0v0)
> > (XEN) rax: 00000000000002ff   rbx: ffffffff8217a1a0   rcx:
> 0000000000000000
> > (XEN) rdx: 0000000000000000   rsi: 00000000000002ff   rdi:
> 0000000000042660
> > (XEN) rbp: ffffffff82003dc8   rsp: ffffffff82003d80   r8:
> ffffffff82003e0c
> > (XEN) r9:  ffffffff82003e08   r10: 00000000ffffffff   r11:
> 00000000ffffffff
> > (XEN) r12: ffffffff82003e04   r13: ffffffff82003e00   r14:
> ffffffff82003dfc
> > (XEN) r15: ffffffff82003df8   cr0: 0000000080050033   cr4:
> 00000000003526e0
> > (XEN) cr3: 0000003fde007000   cr2: 0000000000000000
> > (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
> > (XEN) Guest stack trace from rsp=ffffffff82003d80:
> > (XEN)    0000000000000000 00000000ffffffff 0000000000000000
> ffffffff8103cf38
> > (XEN)    000000010000e030 0000000000010046 ffffffff82003dc8
> 000000000000e02b
> > (XEN)    ffffffff8103cf28 ffffffff82003e48 ffffffff821bbd3e
> ffffffff82199890
> > (XEN)    ffffffff8219a090 ffffffff82199890 ffffffff8219a090
> ffffffff82003e38
> > (XEN)    0000000000100800 00000a8800000000 000002ff00000240
> ffffffff8217a1a0
> > (XEN)    ffffffff8217a1a0 ffffffff82673000 ffffffff82003f20
> 0000000000000000
> > (XEN)    0000000000000000 ffffffff82003e78 ffffffff821bb684
> 0000000001000000
> > (XEN)    0000037f82673000 ffffffff82003f20 0000000001000000
> ffffffff82003e88
> > (XEN)    ffffffff821bc371 ffffffff82003e98 ffffffff821bc3a7
> ffffffff82003ef8
> > (XEN)    ffffffff821b73e7 ffffffff00000010 ffffffff82003f08
> ffffffff82003ec8
> > (XEN)    ffffffff82003e88 ffffffff8114b100 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> ffffffff82003f28
> > (XEN)    ffffffff821aa0c6 0000000000000000 0000000000000000
> b013b3f5b0133a3e
> > (XEN)    ffffffff821a97ac ffffffff82003f38 ffffffff821a9386
> ffffffff82003ff8
> > (XEN)    ffffffff821b0dc6 0300000100000032 0000000000000005
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> > (XEN)    0000000000000000 0000000000000000 0000000000000000
> ffd83a831fc9cbf5
> > (XEN)    0005065400100800 0000000000000001 0000000000000000
> 0000000000000000
> > (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds.
>
> So your dom0 crashed very early before trap handlers have been set up.
>
> Can you please try to find matching source lines for suspected kernel
> addresses in above stack trace and for the guest's RIP: for all
> addresses starting with "ffffffff81" you should try the addr2line tool
> to obtain that information. This will help to have an idea what
> happened.
>
>
> Juergen
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

Reply via email to