From owner-freebsd-xen@FreeBSD.ORG Fri May 22 16:27:16 2015 Return-Path: Delivered-To: freebsd-xen@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9F7E3A50; Fri, 22 May 2015 16:27:16 +0000 (UTC) Received: from SMTP02.CITRIX.COM (smtp02.citrix.com [66.165.176.63]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "mail.citrix.com", Issuer "Cybertrust Public SureServer SV CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 40CC01B65; Fri, 22 May 2015 16:27:16 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.13,476,1427760000"; d="scan'208";a="267798384" Message-ID: <555F58DC.2040807@citrix.com> Date: Fri, 22 May 2015 18:27:08 +0200 From: =?windows-1252?Q?Roger_Pau_Monn=E9?= User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: Roman Bogorodskiy CC: "Eggert, Lars" , "freebsd-xen@freebsd.org" Subject: Re: Xen dom0 crash References: <7CB114B9-B666-4764-86B6-B94F07973389@netapp.com> <5559EB2E.6080609@citrix.com> <20150522161117.GA59488@kloomba> In-Reply-To: <20150522161117.GA59488@kloomba> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-DLP: MIA1 X-BeenThere: freebsd-xen@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Discussion of the freebsd port to xen - implementation and usage List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 22 May 2015 16:27:16 -0000 Hello, El 22/05/15 a les 18.11, Roman Bogorodskiy ha escrit: > H, > > I'm observing a crash that looks similar to me: > > (XEN) ----[ Xen-4.5.0 x86_64 debug=n Not tainted ]---- > (XEN) CPU: 0 > (XEN) RIP: 0020:[] > (XEN) RFLAGS: 0000000000010246 CONTEXT: hvm guest > (XEN) rax: fffff800d887c1b0 rbx: fffff8000ed85100 rcx: 0000000000000000 > (XEN) rdx: ffffffff81788560 rsi: 0000000000000008 rdi: fffff8000ed85100 > (XEN) rbp: fffffe023956a850 rsp: fffffe023956a850 r8: ffffffff815056f8 > (XEN) r9: ffffffff8178857c r10: fffff8000ea9e0f0 r11: ffffffff81664200 > (XEN) r12: 0000000000000004 r13: ffffffff80ee832b r14: fffff8000ed85118 > (XEN) r15: fffff8000ed85100 cr0: 000000008005003b cr4: 00000000000406e0 > (XEN) cr3: 0000000002cca000 cr2: 000000080a8da140 > (XEN) ds: 003b es: 003b fs: 0013 gs: 001b ss: 0028 cs: 0020 > (XEN) Guest stack trace from rsp=fffffe023956a850: > (XEN) Fault while accessing guest memory. > (XEN) Domain 0 crashed: rebooting machine in 5 seconds. > (XEN) Resetting with ACPI MEMORY or I/O RESET_REG. > > I'm wondering if it's related to the same issue? The issue mentioned in this thread has been fixed in the xen-kernel port with the following commit: https://svnweb.freebsd.org/ports?view=revision&revision=386935 Not sure if binary packages in pkg have been updated or not. > It's triggered only when I try to reboot/poweroff the guest. I'm not sure if it's the same issue. In this case the crash happened when booting Dom0 (well even before booting Dom0). Can you please provide the full log (including Xen and FreeBSD boot output)? With just this chunk it's impossible to guess what's going on. Also, if I understand it correctly, the crash you are seeing happens when trying to shutdown/reboot a running DomU? Roger.