[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] [Patch] Fix the dom0 crash issue when "vcpus=0" in HVM guest configuration file


  • To: "Keir Fraser" <keir@xxxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: "Han, Weidong" <weidong.han@xxxxxxxxx>
  • Date: Fri, 9 Mar 2007 18:58:57 +0800
  • Delivery-date: Fri, 09 Mar 2007 02:58:11 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AcbhNpSgnLlsyleeR3aZurd/xO5mYAAmjw1QAHpYsZANUy+bAAJgfbvQAB+8dxAPutbv8AAAEP1QAA8qc9UAAeTuUA==
  • Thread-topic: [Xen-devel] [Patch] Fix the dom0 crash issue when "vcpus=0" in HVM guest configuration file

Keir Fraser wrote:
> On 9/3/07 02:47, "Han, Weidong" <weidong.han@xxxxxxxxx> wrote:
> 
>> Dom0 would crash when "vcpus=0" in HVM guest configuration file. The
>> attached patch fixes the issue.
> 
> If there is an underlying crash then I think this papers over it
> rather than fixing it. Do you have a backtrace? If it's the BUG in
> page_alloc.c then it's already fixed.
> 

I think Xen assumes existence of vcpu0, and don't check whether the vcpu

number is equal to 0.

The trace information is as follows:
CPU:    0
(XEN) RIP:    e008:[<ffff830000162424>] set_p2m_entry+0x174/0x1c0
(XEN) RFLAGS: 0000000000010206   CONTEXT: hypervisor
(XEN) rax: ffff8300001dbf28   rbx: ffff830000f88080   rcx:
0000000237b4e067
(XEN) rdx: ffff830237b4b000   rsi: ffff8300001dbd58   rdi:
0000000000000000
(XEN) rbp: 0000000000000000   rsp: ffff8300001dbd38   r8:
0000000000106800
(XEN) r9:  0000000000000000   r10: 0000000000008ded   r11:
ffff8300001b82ac
(XEN) r12: 0000000000237b4e   r13: 0000000000000000   r14:
0000000000237b4e
(XEN) r15: 0000000000002000   cr0: 000000008005003b   cr4:
00000000000026f0
(XEN) cr3: 000000022ab4c000   cr2: 00000000000018a0
(XEN) ds: 0000   es: 0000   fs: 0063   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff8300001dbd38:
(XEN)    0000000000000200 0000000020000000 0000000000237b4b
ffff830237b4b000
(XEN)    0000000000000000 ffff830000f88080 000000000000e59e
ffff8300001dbf28
(XEN)    0000000000000000 ffff830000162b6e ffff88000ec83c40
0000000000000001
(XEN)    0000000000000006 0000000043800210 0000000000000000
ffff830000f88080
(XEN)    ffff8300001dbe98 ffff8300001117c4 ffff88000f171268
0000000000009791
(XEN)    000000022f191105 ffff88000ec83cb8 0000000000009791
0000000e00000007
(XEN)    ffffffff80266da6 0000000000000001 ffff8300001dbf28
0000000080000002
(XEN)    0000000000231713 8000000231713167 ffff8284057b9af8
ffff83000013200e
(XEN)    0000000000000000 000000022dcbc067 ffff830000fb0080
ffff830000fb0080
(XEN)    0000000000237b4e 0000000000000000 8000000231713167
8000000231713067
(XEN)    ffff811555559840 0000000000000004 8000000231713167
ffff830000132574
(XEN)    ffff830000f88080 00002aaaaab08010 00000000000000a0
0000000000000000
(XEN)    0000000000000000 0000000000000206 00002aaaaab08010
00000000000000a0
(XEN)    0000000000000000 0000000000000001 0000000000000206
ffff830000fac080
(XEN)    ffff880008a7fef8 ffff880005bb6a80 0000000000000000
0000000000305000
(XEN)    00000000fffffff7 ffff830000178102 00000000fffffff7
0000000000305000
(XEN)    0000000000000000 ffff880005bb6a80 ffff880008a7fef8
00000000ffffffda
(XEN)    0000000000000282 0000000000000400 ffffffff80409860
0000000000000009
(XEN)    000000000000000c ffffffff8020618a 0000000000000000
0000000043800210
(XEN)    0000000000000006 0000010000000000 ffffffff8020618a
000000000000e033
(XEN) Xen call trace:
(XEN)    [<ffff830000162424>] set_p2m_entry+0x174/0x1c0
(XEN)    [<ffff830000162b6e>] guest_physmap_add_page+0x26e/0x2f0
(XEN)    [<ffff8300001117c4>] do_memory_op+0x834/0xe80
(XEN)    [<ffff83000013200e>] get_page_from_l1e+0x30e/0x4b0
(XEN)    [<ffff830000132574>] mod_l1_entry+0x3c4/0x3f0
(XEN)    [<ffff830000178102>] syscall_enter+0x62/0x67
(XEN)
(XEN) Pagetable walk from 00000000000018a0:
(XEN)  L4[0x000] = 000000022a7d3067 000000000000e1d3
(XEN)  L3[0x000] = 000000022a512067 000000000000e312
(XEN)  L2[0x000] = 0000000000000000 ffffffffffffffff
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0000]
(XEN) Faulting linear address: 00000000000018a0
(XEN) ****************************************


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.