[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction emulationtoVMXAssist decoder
>Can you please check the vcpu status? I suspect one of the >vcpu is blocked by halt instruction. As Yunhong mentioned, this is caused by the hlt emulation issue in current xen unstable. Attached patch can make it pass. thanks -Xin > >Thanks >Yunhong Jiang > >>-----Original Message----- >>From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx >>[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Tim Deegan >>Sent: 2006年10月5日 23:55 >>To: Li, Xin B >>Cc: xen-devel@xxxxxxxxxxxxxxxxxxx >>Subject: Re: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction >>emulationtoVMXAssist decoder >> >>This bug is fixed by xen-unstable 11713:79b56c02b836 -- the >>VMX code was >>not tracking writes to CR4 that happen when CR0.PE=0, so the >>second vcpu >>was being shadowed in the wrong paging mode, and going into a PF loop. >> >>Win2k3 (ee sp1 pae=1 acpi=1 apic=1 vcpus=2) doesn't complete >>the install >>process yet, but gets as far as "Installing Devices" in the GUI >>installer now. >> >>Tim. >> >>At 13:07 +0800 on 30 Sep (1159621646), Li, Xin B wrote: >>> After applying this patch, while booting a 2 vCPUs PAE SMP >>Windows 2003 server in VMX, I got: >>> >>> (XEN) sh error: sh_remove_shadows(): can't find all shadows >>of mfn 23ecf7 (shadow_flags=80000008) >>> (XEN) domain_crash called from common.c:2197 >>> (XEN) Domain 1 (vcpu#0) crashed on cpu#3: >>> (XEN) ----[ Xen-3.0-unstable x86_64 debug=n Not tainted ]---- >>> (XEN) CPU: 3 >>> (XEN) RIP: 0008:[<000000008086bf9b>] >>> (XEN) RFLAGS: 0000000000010283 CONTEXT: hvm >>> (XEN) rax: 0000000000000002 rbx: 00000000821a57a8 rcx: >>00000000821a3008 >>> (XEN) rdx: 0000000000000002 rsi: 00000000821a3020 rdi: >>00000000821a54d0 >>> (XEN) rbp: 00000000f885ebd8 rsp: 00000000f885ea98 r8: >>0000000000000000 >>> (XEN) r9: 0000000000000000 r10: 0000000000000000 r11: >>0000000000000000 >>> (XEN) r12: 0000000000000000 r13: 0000000000000000 r14: >>0000000000000000 >>> (XEN) r15: 0000000000000000 cr0: 000000008001003b cr4: >>0000000000000671 >>> (XEN) cr3: 00000000002677a0 cr2: 00000000e1005004 >>> (XEN) ds: 0023 es: 0023 fs: 0030 gs: 0000 ss: 0010 > cs: 0008 >>> >>> -Xin >>> >>> >-----Original Message----- >>> >From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx >>> >[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of >>Li, Xin B >>> >Sent: 2006?$BG/9?$B7n30?$BF| 12:55 >>> >To: xen-devel@xxxxxxxxxxxxxxxxxxx >>> >Subject: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction >>> >emulation toVMXAssist decoder >>> > >>> >add RDMSR/WRMSR instruction emulation to VMXAssist decoder >>> > >>> >AP of PAE SMP windows will use it to set NX bit in EFER. >>> > >>> >Signed-off-by: Xin Li <xin.b.li@xxxxxxxxx> >>> > >>> >>> _______________________________________________ >>> Xen-devel mailing list >>> Xen-devel@xxxxxxxxxxxxxxxxxxx >>> http://lists.xensource.com/xen-devel >> >>_______________________________________________ >>Xen-devel mailing list >>Xen-devel@xxxxxxxxxxxxxxxxxxx >>http://lists.xensource.com/xen-devel >> > Attachment:
win2003_halt_workaround_for_xen_3.0.3.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |