[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Re: [Xen-users] svm.c:83:d917 Bad instruction length 0



Realistically you're not likely to get much help with this type of issue on
3.1 branch since it is no longer being maintained. Reproducing it on tip of
3.2-testing would be more interesting since will be doing another release
from that branch in the next few weeks. We'd also need more details on the
repro scenario.

 -- Keir

On 8/8/08 20:14, "Russ Blaine" <russell.blaine@xxxxxxx> wrote:

> [moving this thread over to xen-devel]
> 
> Debug keys output on the crashed domain is:
> 
> (xVM) svm.c:77:d3 Bad instruction length 0
> (xVM) domain_crash called from svm.c:78
> (xVM) Domain 3 (vcpu#0) crashed on cpu#1:
> (xVM) ----[ Xen-3.1.4-xvm  x86_64  debug=n  Not tainted ]----
> (xVM) CPU:    1
> (xVM) RIP:    001b:[<0000000072bcaffa>]
> (xVM) RFLAGS: 0000000000000246   CONTEXT: hvm
> (xVM) rax: 0000000000040f12   rbx: 0000000001010800   rcx: 0000000000002001
> (xVM) rdx: 00000000078bfbff   rsi: 0000000072bcaf84   rdi: 0000000000000002
> (xVM) rbp: 000000000075f1b0   rsp: 000000000075f190   r8:  0000000000000000
> (xVM) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (xVM) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (xVM) r15: 0000000000000000   cr0: 000000008001003b   cr4: 00000000000006b9
> (xVM) cr3: 000000007fab7280   cr2: 0000000072c353bc
> (xVM) ds: 732f   es: ffff   fs: ffff   gs: bbff   ss: 0023   cs: 001b
> (xVM) Guest stack trace from rbp=000000000075f1b0:
> (xVM)  72c333d472bcac5f ????????????????
> (xVM) Xen stack trace from rsp=0000000089b8cb48:
> (xVM)    9090f460841b6124 000004a080000000 0000000084e2b1f8
> (xVM)    0000000000000005 89b8cbbc00000001 00000000816a1632
> (xVM)    72c353bc84ab51f0 000000006b12f225 c03961a800000000
> (xVM)    0000000089b8cd64 841b613089b8cbc8 00000000845bf368
> (xVM)    0000000000000000 800000006b12f225 89b8cc08841b3fe4
> (xVM)    00000000816a250d 9090f46072c353bc 0000000084ab51f0
> (xVM)    89b8cc6089b8cd64 c03961a884ab9a90 000000019090f460
> (xVM)    0000000500000000 000007d06b12f8a4 9090f46000000800
> (xVM)    8169f99f89b8ccd0 72c353bc00000000 84ab51f0c03961a8
> (xVM)    9090f46000000000 89b8cc6089b8cd64 0000010000000000
> (xVM)    00000110c03961a8 9090f46000000000 81713802c0484878
> (xVM)    9090f4606b12f8a4 0000000089b8cd4c c03961a880354000
> (xVM)    0000000000000000 8443ee008166e9be 89b8cd4c000000b2
> (xVM)    badb0d00816c12c9 8f27d19000000000 8f27d17884ab9a90
> (xVM)    000201e08f280418 0000000084ab9a90 8183873f00000000
> (xVM)    89b8ccc80000020c 84ab523000000000 84e2d3186a7fd867
> (xVM)    0000001889b8cce0 816c1fff89b8cd4c 9090f46072c353bc
> (xVM)    84ab51f000000000 84e2d31889b8cd64 0000000072c353bc
> (xVM)    89b8ccfc0075f23c 0000000000000110 84ab5020c03961a8
> (xVM)    0000010084e2d318 000000209090f460 84ab9a9084ab5230
> (xVM) Xen call trace:
> (xVM)    [<00000000816a272d>] ???
> (xVM)
> 
> 
> Trolle Selander wrote:
>> The easiest (*cough*) way is usually to put in some code before the
>> domain_crash(curr->domain) that dumps the bytes around the eip, but of
>> course that requires that you rebuild xen from source. One fairly
>> painless thing that you could do to at least get a hint of what might be
>> going on is to set on_crash = 'preserve' in the VM configuration file.
>> That way, after it's crashed, you can do an "xm debug-key v" and get
>> some information about the last vmexit, which will at least tell us what
>> type of instruction it was that caused the vmexit.
>> 
>> On Tue, Aug 5, 2008 at 1:39 AM, James Harper
>> <james.harper@xxxxxxxxxxxxxxxx <mailto:james.harper@xxxxxxxxxxxxxxxx>>
>> wrote:
>> 
>>> 
>>> In 3.2.2-rc2-pre, an instruction length of 0 doesn't cause a guest
>>     crash,
>>> but rather a retry of the instruction. This was introduced in cs
>>     16898.
>>> That said,  in 3.2 and older svm.c has a bunch of special case
>>     emulation
>>> code for system instructions, some of which is quite
>>     incomplete/incorrect.
>>> 3.3 will be much improved in this regard. In any case, a dump of the
>>> instruction bytes surrounding the eip would be necessary to determine
>>     what
>>> the cause was in this particular case.
>>> 
>> 
>>     How easy is it to get that information?
>> 
>>     The annoying thing in this case is that it worked under 3.1.[12].
>> 
>>     Thanks
>> 
>>     James
>> 
>> 
>> 
>> ------------------------------------------------------------------------
>> 
>> _______________________________________________
>> Xen-users mailing list
>> Xen-users@xxxxxxxxxxxxxxxxxxx
>> http://lists.xensource.com/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.