[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [bug]xen 4.10 + dom0 4.15 couldn't boot up



On 01/02/18 10:14, Jan Beulich wrote:
>>>> On 01.02.18 at 08:29, <jgross@xxxxxxxx> wrote:
>> On 01/02/18 07:20, Zhang, Xiong Y wrote:
>>> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
>>> (XEN) ----[ Xen-4.11-unstable  x86_64  debug=y   Not tainted ]----
>>> (XEN) CPU:    0
>>> (XEN) RIP:    e033:[<ffffffff8103ca29>]
>>> (XEN) RFLAGS: 0000000000000292   EM: 1   CONTEXT: pv guest (d0v0)
>>> (XEN) rax: 0000000000000000   rbx: ffffffff81e05fe0   rcx: 0000000000000000
>>> (XEN) rdx: 0000000000000030   rsi: ffffffff82203f04   rdi: ffffffff82451f60
>>> (XEN) rbp: ffffffff82203f08   rsp: ffffffff82203e20   r8:  ffffffff82203f08
>>> (XEN) r9:  00000000ffffffff   r10: ffffffff82203f0c   r11: 0000000000000000
>>> (XEN) r12: ffffffff82203f0c   r13: ffffffff82203e88   r14: ffffffff82203f00
>>> (XEN) r15: ffffffff82203e98   cr0: 000000008005003b   cr4: 00000000003526e0
>>> (XEN) cr3: 00000003facc5000   cr2: 0000000000000028
>>> (XEN) fsb: 0000000000000000   gsb: 0000000000000000   gss: 0000000000000000
>>> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
>>> (XEN) Guest stack trace from rsp=ffffffff82203e20:
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 ffffffff8103ca29
>>> (XEN)    000000010000e030 0000000000010092 ffffffff82203e68 000000000000e02b
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    ffffffff82451f60 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 ffffffff82451f60 ffffffff82203f08
>>> (XEN)    ffffffff82203f0c ffffffff82203f04 ffffffff82203f00 ffffffff82203f1c
>>> (XEN)    ffffffff8103d611 ffffffff82203f10 ffffffff82203f14 ffffffff82203f18
>>> (XEN)    0000000000003027 0000000000000000 0000000080000008 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 ffffffff8281ba11 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
>>> (XEN)    0f00000060c0c748 ccccccccccccc305 cccccccccccccccc cccccccccccccccc
>>> (XEN)    cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>>> (XEN)    cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>>> (XEN)    cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>>> (XEN)    cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>>> (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds.
>>> (XEN) APIC error on CPU0: 40(00)
>>> (XEN) Resetting with ACPI MEMORY or I/O RESET_REG.
>>>
>>> addr2line -f -e vmlinux ffffffff8103ca29
>>> init_scattered_cpuid_features
>>> arch/x86/kernel/cpu/scattered.c:38
>>
>> And this is the problem: it seems as if the compiler now generates an
>> access via %gs in this function, but this segment hasn't been setup at
>> this stage of the boot process.
>>
>> I'm trying to move up initialization of the %gs segment.
> 
> This can be done _really_ early, as our old XenoLinux kernel shows
> (4.4 based):
> 
> startup_64:
>       movq $(init_thread_union+THREAD_SIZE-8),%rsp
> 
>       /* rsi is pointer to startup info structure.
>          pass it to C */
>       movq %rsi,%rdi
> 
>       /* Set up %gs.
>        *
>        * The base of %gs always points to the bottom of the irqstack
>        * union.  If the stack protector canary is enabled, it is
>        * located at %gs:40.  Note that, on SMP, the boot cpu uses
>        * init data section till per cpu areas are set up.
>        */
>       movl    $MSR_GS_BASE,%ecx
>       movq    $INIT_PER_CPU_VAR(irq_stack_union),%rax
>       cdq
>       wrmsr
> 
> I won't make any guarantees on the applicability of everything the
> comment says, though.

Thanks for the confirmation that I'm on the right track. :-)


Juergen

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.