[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [bug]xen 4.10 + dom0 4.15 couldn't boot up
>>> On 01.02.18 at 08:29, <jgross@xxxxxxxx> wrote: > On 01/02/18 07:20, Zhang, Xiong Y wrote: >> (XEN) Domain 0 (vcpu#0) crashed on cpu#0: >> (XEN) ----[ Xen-4.11-unstable x86_64 debug=y Not tainted ]---- >> (XEN) CPU: 0 >> (XEN) RIP: e033:[<ffffffff8103ca29>] >> (XEN) RFLAGS: 0000000000000292 EM: 1 CONTEXT: pv guest (d0v0) >> (XEN) rax: 0000000000000000 rbx: ffffffff81e05fe0 rcx: 0000000000000000 >> (XEN) rdx: 0000000000000030 rsi: ffffffff82203f04 rdi: ffffffff82451f60 >> (XEN) rbp: ffffffff82203f08 rsp: ffffffff82203e20 r8: ffffffff82203f08 >> (XEN) r9: 00000000ffffffff r10: ffffffff82203f0c r11: 0000000000000000 >> (XEN) r12: ffffffff82203f0c r13: ffffffff82203e88 r14: ffffffff82203f00 >> (XEN) r15: ffffffff82203e98 cr0: 000000008005003b cr4: 00000000003526e0 >> (XEN) cr3: 00000003facc5000 cr2: 0000000000000028 >> (XEN) fsb: 0000000000000000 gsb: 0000000000000000 gss: 0000000000000000 >> (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 >> (XEN) Guest stack trace from rsp=ffffffff82203e20: >> (XEN) 0000000000000000 0000000000000000 0000000000000000 ffffffff8103ca29 >> (XEN) 000000010000e030 0000000000010092 ffffffff82203e68 000000000000e02b >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) ffffffff82451f60 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 ffffffff82451f60 ffffffff82203f08 >> (XEN) ffffffff82203f0c ffffffff82203f04 ffffffff82203f00 ffffffff82203f1c >> (XEN) ffffffff8103d611 ffffffff82203f10 ffffffff82203f14 ffffffff82203f18 >> (XEN) 0000000000003027 0000000000000000 0000000080000008 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 ffffffff8281ba11 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000 >> (XEN) 0f00000060c0c748 ccccccccccccc305 cccccccccccccccc cccccccccccccccc >> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc >> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc >> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc >> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc >> (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds. >> (XEN) APIC error on CPU0: 40(00) >> (XEN) Resetting with ACPI MEMORY or I/O RESET_REG. >> >> addr2line -f -e vmlinux ffffffff8103ca29 >> init_scattered_cpuid_features >> arch/x86/kernel/cpu/scattered.c:38 > > And this is the problem: it seems as if the compiler now generates an > access via %gs in this function, but this segment hasn't been setup at > this stage of the boot process. > > I'm trying to move up initialization of the %gs segment. This can be done _really_ early, as our old XenoLinux kernel shows (4.4 based): startup_64: movq $(init_thread_union+THREAD_SIZE-8),%rsp /* rsi is pointer to startup info structure. pass it to C */ movq %rsi,%rdi /* Set up %gs. * * The base of %gs always points to the bottom of the irqstack * union. If the stack protector canary is enabled, it is * located at %gs:40. Note that, on SMP, the boot cpu uses * init data section till per cpu areas are set up. */ movl $MSR_GS_BASE,%ecx movq $INIT_PER_CPU_VAR(irq_stack_union),%rax cdq wrmsr I won't make any guarantees on the applicability of everything the comment says, though. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |