[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Clarifying PVH mode requirements



>>> On 01.02.16 at 15:54, <boris.ostrovsky@xxxxxxxxxx> wrote:
> On 02/01/2016 08:38 AM, PGNet Dev wrote:
>>
>> Loading Xen 4.6.0_08-405 with Linux 4.4.0-8.g9f68b90-default 
>> ...Loading Xen 4.6.0_08-405 with Linux 4.4.0-8.g9f68b90-default ...
>>
>> /EndEntire
>> /EndEntire
>> file path: file path: 
>> 
> /ACPI(a0341d0,0)/ACPI(a0341d0,0)/PCI(1,1c)/PCI(1,1c)/PCI(0,0)/PCI(0,0)/PCI(0,
> 1)/PCI(0,1)/PCI(0,0)/PCI(0,0)/HardwareVendor
>> (cf31fac5-c24e-11d2-85f3-00a0c93ec93b)[1:
>> /HardwareVendor(cf31fac5-c24e-11d2-85f3-00a0c93ec93b)[1: 88 88 
>> ]]/HD(2,1000,96000,c5cc9661271ee648
>> ,2,2)/HD(2,1000,96000,c5cc9661271ee648,2,2)/File(\EFI\OPENSUSE)
>> 
> /File(\EFI\OPENSUSE)/File(xen-4.6.0_08-405.efi)/File(xen-4.6.0_08-405.efi)/EndEnt
> ire 
>>
>> /EndEntire
>> Xen 4.6.0_08-405 (c/s ) EFI loader
>> Using configuration file 'xen-4.6.0_08-405.cfg'
>> vmlinuz-4.4.0-8.g9f68b90-default: 0x000000008bf22000-0x000000008c507000
>> initrd-4.4.0-8.g9f68b90-default: 0x000000008afbc000-0x000000008bf21da8
>> 0x0000:0x00:0x19.0x0: ROM: 0x10000 bytes at 0x92a26018
>> 0x0000:0x03:0x00.0x0: ROM: 0x8000 bytes at 0x92a1d018
>> 0x0000:0x0f:0x00.0x0: ROM: 0x10800 bytes at 0x929fc018
>>  __  __            _  _    __    ___     ___   ___     _  _ ___  ____
>>  \ \/ /___ _ __   | || |  / /_  / _ \   / _ \ ( _ )   | || |  / _ \| ___|
>>   \  // _ \ '_ \  | || |_| '_ \| | | | | | | |/ _ \ __| || |_| | | |___ \
>>   /  \  __/ | | | |__   _| (_) | |_| | | |_| | (_) |__|__   _| |_| 
>> |___) |
>>  /_/\_\___|_| |_|    |_|(_)___(_)___/___\___/ \___/      |_| \___/|____/
>>                                    |_____|
>> (XEN) Xen version 4.6.0_08-405 (abuild@xxxxxxx) (gcc (SUSE Linux) 
>> 4.8.5) debug=n Wed Jan 27 15:23:26 UTC 2016
>>
> 
> ....
> 
>> (XEN) [2016-02-01 05:28:29] d0v0 EPT violation 0x1aa (-w-/r-x) gpa 
>> 0x000000f100054c mfn 0xf1000 type 5
>> (XEN) [2016-02-01 05:28:29] d0v0 Walking EPT tables for GFN f1000:
>> (XEN) [2016-02-01 05:28:29] d0v0  epte 800000084510c107
>> (XEN) [2016-02-01 05:28:29] d0v0  epte 800000085b684107
>> (XEN) [2016-02-01 05:28:29] d0v0  epte 8000000844afb107
>> (XEN) [2016-02-01 05:28:29] d0v0  epte 80500000f1000905
>> (XEN) [2016-02-01 05:28:29] d0v0  --- GLA 0xffffc900006a254c
>> (XEN) [2016-02-01 05:28:29] domain_crash called from vmx.c:2685
>> (XEN) [2016-02-01 05:28:29] Domain 0 (vcpu#0) crashed on cpu#0:
>> (XEN) [2016-02-01 05:28:29] ----[ Xen-4.6.0_08-405  x86_64 debug=n 
>> Tainted:    C ]----
>> (XEN) [2016-02-01 05:28:29] CPU:    0
>> (XEN) [2016-02-01 05:28:29] RIP: 0010:[<ffffffff8142a4ac>]
>> (XEN) [2016-02-01 05:28:29] RFLAGS: 0000000000010246   CONTEXT: hvm 
>> guest (d0v0)
>> (XEN) [2016-02-01 05:28:29] rax: 000000000000000d   rbx: 
>> 00000000f100054c   rcx: 000000009e9c4fff
>> (XEN) [2016-02-01 05:28:29] rdx: 0000000000000000   rsi: 
>> 0000000000000100   rdi: ffffffff81eaedc0
>> (XEN) [2016-02-01 05:28:29] rbp: ffff880164b57908   rsp: 
>> ffff880164b578d8   r8:  ffff88016d8c7458
>> (XEN) [2016-02-01 05:28:29] r9:  0000000002400001   r10: 
>> 0000000000000000   r11: 0000000000002001
>> (XEN) [2016-02-01 05:28:29] r12: 0000000000000020   r13: 
>> ffff88016453aec0   r14: ffffc900006a254c
>> (XEN) [2016-02-01 05:28:29] r15: ffff880164b57a20   cr0: 
>> 0000000080050033   cr4: 00000000000406b0
>> (XEN) [2016-02-01 05:28:29] cr3: 0000000001e0b000   cr2: 0000000000000000
>> (XEN) [2016-02-01 05:28:29] ds: 0000   es: 0000   fs: 0000   gs: 0000 
>> ss: 0000   cs: 0010
>> (XEN) [2016-02-01 05:28:29] Guest stack trace from rsp=ffff880164b578d8:
>> (XEN) [2016-02-01 05:28:29]   Fault while accessing guest memory.
>> (XEN) [2016-02-01 05:28:29] Hardware Dom0 crashed: rebooting machine 
>> in 5 seconds.
> 
> (+Jan)
> 
> This looks very much like it needs backport of 33c19df9a ("x86/PCI: 
> intercept accesses to RO MMIO from dom0s in HVM containers") from 
> unstable, which fixes PVH regression introduced by 9256f66c1606 
> ("x86/PCI: intercept all PV Dom0 MMCFG writes")

I don't really understand: The former was needed to fix an issue
introduced by the latter, but the latter isn't in 4.6 iirc.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.