[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Regression in guest destruction caused by altp2m



On 27/07/2015 19:09, Wei Liu wrote:
> On Mon, Jul 27, 2015 at 04:18:15PM +0100, Wei Liu wrote:
>> Found this when I did "xl destroy" to a hvm guest *without* altp2m turned
>> on.
>>
>> Current staging branch.
>>
>> (XEN) ----[ Xen-4.6-unstable  x86_64  debug=y  Tainted:    C ]----
>> (XEN) CPU:    0
>> (XEN) RIP:    e008:[<ffff82d0801fce0d>] vmx_vmenter_helper+0x263/0x2f3
>> (XEN) RFLAGS: 0000000000010242   CONTEXT: hypervisor (d0v0)
>> (XEN) rax: 000000000000201a   rbx: ffff8300cf5f9000   rcx: 0000000000000000
>> (XEN) rdx: 0000000000000200   rsi: ffff830225fc5000   rdi: ffff8300cf5f9000
>> (XEN) rbp: ffff8300cf30fde8   rsp: ffff8300cf30fdd8   r8:  ffff8300cf0fc5e0
>> (XEN) r9:  00000016e7ea5ca3   r10: 0000000000000000   r11: 00000016f1000b66
>> (XEN) r12: ffff830227b18740   r13: ffff830227bda250   r14: ffff830227bda240
>> (XEN) r15: 0000000000000000   cr0: 0000000080050033   cr4: 00000000000026e0
>> (XEN) cr3: 000000000f03a000   cr2: 00007fb13dc65150
>> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
>> (XEN) Xen stack trace from rsp=ffff8300cf30fdd8:
>> (XEN)    ffff8300cf5f9000 ffff8300cf5f9000 ffff8300cf30fdf8 ffff82d0801d95fb
>> (XEN)    ffff8300cf30fe18 ffff82d0802145eb ffff82d08012d455 ffff830227bda250
>> (XEN)    ffff8300cf30fe48 ffff82d0801d3e0c ffff8300cf5f9000 0000000000000001
>> (XEN)    ffff830227bdaf28 ffff830227bda000 ffff8300cf30fe68 ffff82d080174c6f
>> (XEN)    ffff8300cf5f9000 ffff8300cf5f9000 ffff8300cf30fe98 ffff82d080105e07
>> (XEN)    ffff82d0803545c0 0000000000000000 0000000000000000 ffff8300cf308000
>> (XEN)    ffff8300cf30fec8 ffff82d08012148a ffff82d080328080 ffff82d080328080
>> (XEN)    ffff82d080328080 ffffffffffffffff ffff8300cf30fef8 ffff82d08012cbe7
>> (XEN)    ffff8300ce68e000 00007fb13dc65150 ffffea00000715a0 0000000000000000
>> (XEN)    ffff8300cf30ff08 ffff82d08012cc3f 00007cff30cf00c7 ffff82d08024dd51
>> (XEN)    0000000000000000 0000000000000000 ffffea00000715a0 00007fb13dc65150
>> (XEN)    ffff8800cd4ff3d8 ffffea0000267a50 ffff880000000328 00000000000000a9
>> (XEN)    ffffea00000715a0 ffff8800cd4ff3d8 ffff880207c997b9 0000000000267a50
>> (XEN)    00007fb13dc65150 ffff8800cd4ff3d8 ffffea0000267a50 000000fa00000000
>> (XEN)    ffffffff8113d09d 000000000000e033 0000000000000202 ffff88000b807d68
>> (XEN)    000000000000e02b 000000000000beef 000000000000beef 000000000000beef
>> (XEN)    000000000000beef 0000000000000000 ffff8300ce68e000 0000000000000000
>> (XEN)    0000000000000000
>> (XEN) Xen call trace:
>> (XEN)    [<ffff82d0801fce0d>] vmx_vmenter_helper+0x263/0x2f3
>> (XEN)    [<ffff82d0801d95fb>] altp2m_vcpu_update_p2m+0x12/0x15
>> (XEN)    [<ffff82d0802145eb>] altp2m_vcpu_destroy+0x6b/0x94
>> (XEN)    [<ffff82d0801d3e0c>] hvm_vcpu_destroy+0x5a/0xa7
>> (XEN)    [<ffff82d080174c6f>] vcpu_destroy+0x5d/0x72
>> (XEN)    [<ffff82d080105e07>] complete_domain_destroy+0x49/0x186
>> (XEN)    [<ffff82d08012148a>] rcu_process_callbacks+0x144/0x1a5
>> (XEN)    [<ffff82d08012cbe7>] __do_softirq+0x82/0x8d
>> (XEN)    [<ffff82d08012cc3f>] do_softirq+0x13/0x15
>> (XEN)    [<ffff82d08024dd51>] process_softirqs+0x21/0x30
>> (XEN) 
>> (XEN) 
>> (XEN) ****************************************
>> (XEN) Panic on CPU 0:
>> (XEN) FATAL TRAP: vector = 6 (invalid opcode)
>> (XEN) ****************************************
>> (XEN) 
> This makes me think it doesn't matter if I do "xl destroy" or just
> normal shutdown. And another test to normally shutdown guest confirmed
> that.
>
> The machine I have is quite old and doesn't support EPT. The real issues
> seems to be that you failed to properly disable that feature for old
> machines.

The altp2m feature is designed (and implemented) to be emulated on
systems lacking hardware capabilities.

As such, teardown is necessary even on older systems, but I would agree
that there appears to be a bug.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.