|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] HVM domains crash after upgrade from XEN 4.5.1 to 4.5.2
Am 15.11.15 um 21:12 schrieb Doug Goldstein: On 11/14/15 6:14 PM, Atom2 wrote:Am 14.11.15 um 21:32 schrieb Andrew Cooper:On 14/11/2015 00:16, Atom2 wrote:Am 13.11.15 um 11:09 schrieb Andrew Cooper:On 13/11/15 07:25, Jan Beulich wrote:On 13.11.15 at 00:00, <ariel.atom2@xxxxxxxxxx> wrote:Am 12.11.15 um 17:43 schrieb Andrew Cooper:On 12/11/15 14:29, Atom2 wrote:Hi Andrew, thanks for your reply. Answers are inline further down. Am 12.11.15 um 14:01 schrieb Andrew Cooper:On 12/11/15 12:52, Jan Beulich wrote:On 12.11.15 at 02:08, <ariel.atom2@xxxxxxxxxx> wrote:After the upgrade HVM domUs appear to no longer work - regardless of the dom0 kernel (tested with both 3.18.9 and 4.1.7 as the dom0 kernel); PV domUs, however, work just fine as before on both dom0 kernels. xl dmesg shows the following information after the first crashed HVM domU which is started as part of the machine booting up: [...] (XEN) Failed vm entry (exit reason 0x80000021) caused by invalid guest state (0). (XEN) ************* VMCS Area ************** (XEN) *** Guest State *** (XEN) CR0: actual=0x0000000000000039, shadow=0x0000000000000011, gh_mask=ffffffffffffffff (XEN) CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffffff (XEN) CR3: actual=0x0000000000800000, target_count=0 (XEN) target0=0000000000000000, target1=0000000000000000 (XEN) target2=0000000000000000, target3=0000000000000000 (XEN) RSP = 0x0000000000006fdc (0x0000000000006fdc) RIP = 0x0000000100000000 (0x0000000100000000)Other than RIP looking odd for a guest still in non-paged protected mode I can't seem to spot anything wrong with guest state.odd? That will be the source of the failure. Out of long mode, the upper 32bit of %rip should all be zero, and it should not be possible to set any of them. I suspect that the guest has exited for emulation, and there has been a bad update to %rip. The alternative (which I hope is not the case) is that there is a hardware errata which allows the guest to accidentally get it self into this condition. Are you able to rerun with a debug build of the hypervisor?[big snip] Hi Doug, here you go: USE flags:app-emulation/xen-4.5.2-r1::gentoo USE="-custom-cflags -debug -efi -flask -xsm" app-emulation/xen-tools-4.5.2::gentoo USE="hvm pam pygrub python qemu screen system-seabios -api -custom-cflags -debug -doc -flask (-ocaml) -ovmf -static-libs -system-qemu" PYTHON_TARGETS="python2_7" sys-firmware/seabios-1.7.5::gentoo USE="binary" emerge --info: Please see the attached file You are right, it's xen-tools that builds hvmloader. If I remember correctly, the "system-seabios" USE flag (for xen-tools) specifies whether sys-firmware/seabios is used and the latter downloads SeaBIOS in it's binary form provided its "binary" USE flag is set. At least that's my understanding.I'm not too familiar with the xen ebuilds but I was pretty sure that xen-tools is what builds hvmloader and it downloads a copy of SeaBIOS and builds it so that it remains consistent. But obviously your experience shows otherwise. Great. Whatever makes gentoo and xen stronger will be awesome. What immediately springs to mind is to create a separate hvmloader package and slot that (that's just an idea and probably not fully thought through, but ss far as I understood Andrew, it would then be possible to specify the specific firmware version [i.e. hvmloader] to use on xl's command line by using firmware_override="full/path/to/firmware").I'm looking at some ideas to improve SeaBIOS packaging on Gentoo and your info would be helpful. I also found out that an upgrade to sys-firmware/seabios obviously does not trigger an automatic re-emerge of xen-tools and thus hvmloader. Shouldn't this also happen automatically as xen-tools depends on seabios? Thanks and best regards Atom2 P.S. If you prefer to take this off-list, just reply to my mail address. Attachment:
info _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |