|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Clarifying PVH mode requirements
>>> On 01.02.16 at 15:54, <boris.ostrovsky@xxxxxxxxxx> wrote:
> On 02/01/2016 08:38 AM, PGNet Dev wrote:
>>
>> Loading Xen 4.6.0_08-405 with Linux 4.4.0-8.g9f68b90-default
>> ...Loading Xen 4.6.0_08-405 with Linux 4.4.0-8.g9f68b90-default ...
>>
>> /EndEntire
>> /EndEntire
>> file path: file path:
>>
> /ACPI(a0341d0,0)/ACPI(a0341d0,0)/PCI(1,1c)/PCI(1,1c)/PCI(0,0)/PCI(0,0)/PCI(0,
> 1)/PCI(0,1)/PCI(0,0)/PCI(0,0)/HardwareVendor
>> (cf31fac5-c24e-11d2-85f3-00a0c93ec93b)[1:
>> /HardwareVendor(cf31fac5-c24e-11d2-85f3-00a0c93ec93b)[1: 88 88
>> ]]/HD(2,1000,96000,c5cc9661271ee648
>> ,2,2)/HD(2,1000,96000,c5cc9661271ee648,2,2)/File(\EFI\OPENSUSE)
>>
> /File(\EFI\OPENSUSE)/File(xen-4.6.0_08-405.efi)/File(xen-4.6.0_08-405.efi)/EndEnt
> ire
>>
>> /EndEntire
>> Xen 4.6.0_08-405 (c/s ) EFI loader
>> Using configuration file 'xen-4.6.0_08-405.cfg'
>> vmlinuz-4.4.0-8.g9f68b90-default: 0x000000008bf22000-0x000000008c507000
>> initrd-4.4.0-8.g9f68b90-default: 0x000000008afbc000-0x000000008bf21da8
>> 0x0000:0x00:0x19.0x0: ROM: 0x10000 bytes at 0x92a26018
>> 0x0000:0x03:0x00.0x0: ROM: 0x8000 bytes at 0x92a1d018
>> 0x0000:0x0f:0x00.0x0: ROM: 0x10800 bytes at 0x929fc018
>> __ __ _ _ __ ___ ___ ___ _ _ ___ ____
>> \ \/ /___ _ __ | || | / /_ / _ \ / _ \ ( _ ) | || | / _ \| ___|
>> \ // _ \ '_ \ | || |_| '_ \| | | | | | | |/ _ \ __| || |_| | | |___ \
>> / \ __/ | | | |__ _| (_) | |_| | | |_| | (_) |__|__ _| |_|
>> |___) |
>> /_/\_\___|_| |_| |_|(_)___(_)___/___\___/ \___/ |_| \___/|____/
>> |_____|
>> (XEN) Xen version 4.6.0_08-405 (abuild@xxxxxxx) (gcc (SUSE Linux)
>> 4.8.5) debug=n Wed Jan 27 15:23:26 UTC 2016
>>
>
> ....
>
>> (XEN) [2016-02-01 05:28:29] d0v0 EPT violation 0x1aa (-w-/r-x) gpa
>> 0x000000f100054c mfn 0xf1000 type 5
>> (XEN) [2016-02-01 05:28:29] d0v0 Walking EPT tables for GFN f1000:
>> (XEN) [2016-02-01 05:28:29] d0v0 epte 800000084510c107
>> (XEN) [2016-02-01 05:28:29] d0v0 epte 800000085b684107
>> (XEN) [2016-02-01 05:28:29] d0v0 epte 8000000844afb107
>> (XEN) [2016-02-01 05:28:29] d0v0 epte 80500000f1000905
>> (XEN) [2016-02-01 05:28:29] d0v0 --- GLA 0xffffc900006a254c
>> (XEN) [2016-02-01 05:28:29] domain_crash called from vmx.c:2685
>> (XEN) [2016-02-01 05:28:29] Domain 0 (vcpu#0) crashed on cpu#0:
>> (XEN) [2016-02-01 05:28:29] ----[ Xen-4.6.0_08-405 x86_64 debug=n
>> Tainted: C ]----
>> (XEN) [2016-02-01 05:28:29] CPU: 0
>> (XEN) [2016-02-01 05:28:29] RIP: 0010:[<ffffffff8142a4ac>]
>> (XEN) [2016-02-01 05:28:29] RFLAGS: 0000000000010246 CONTEXT: hvm
>> guest (d0v0)
>> (XEN) [2016-02-01 05:28:29] rax: 000000000000000d rbx:
>> 00000000f100054c rcx: 000000009e9c4fff
>> (XEN) [2016-02-01 05:28:29] rdx: 0000000000000000 rsi:
>> 0000000000000100 rdi: ffffffff81eaedc0
>> (XEN) [2016-02-01 05:28:29] rbp: ffff880164b57908 rsp:
>> ffff880164b578d8 r8: ffff88016d8c7458
>> (XEN) [2016-02-01 05:28:29] r9: 0000000002400001 r10:
>> 0000000000000000 r11: 0000000000002001
>> (XEN) [2016-02-01 05:28:29] r12: 0000000000000020 r13:
>> ffff88016453aec0 r14: ffffc900006a254c
>> (XEN) [2016-02-01 05:28:29] r15: ffff880164b57a20 cr0:
>> 0000000080050033 cr4: 00000000000406b0
>> (XEN) [2016-02-01 05:28:29] cr3: 0000000001e0b000 cr2: 0000000000000000
>> (XEN) [2016-02-01 05:28:29] ds: 0000 es: 0000 fs: 0000 gs: 0000
>> ss: 0000 cs: 0010
>> (XEN) [2016-02-01 05:28:29] Guest stack trace from rsp=ffff880164b578d8:
>> (XEN) [2016-02-01 05:28:29] Fault while accessing guest memory.
>> (XEN) [2016-02-01 05:28:29] Hardware Dom0 crashed: rebooting machine
>> in 5 seconds.
>
> (+Jan)
>
> This looks very much like it needs backport of 33c19df9a ("x86/PCI:
> intercept accesses to RO MMIO from dom0s in HVM containers") from
> unstable, which fixes PVH regression introduced by 9256f66c1606
> ("x86/PCI: intercept all PV Dom0 MMCFG writes")
I don't really understand: The former was needed to fix an issue
introduced by the latter, but the latter isn't in 4.6 iirc.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |