All of lore.kernel.org
 help / color / mirror / Atom feed
From: Igor Mammedov <imammedo@redhat.com>
To: xen-devel@lists.xensource.com
Cc: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>,
	jeremy.fitzhardinge@citrix.co, stefano.stabellini@eu.citrix.com
Subject: FC15: 32-bit PV guest crash on restore on x64_86 host
Date: Wed, 04 May 2011 21:58:01 +0200	[thread overview]
Message-ID: <4DC1AFC9.2070407@redhat.com> (raw)

On restore 32bit PV guest crashes on x64_86 host, while  x64_86 PV guest
works as expected.

Bisecting of upstream kernel shows following offending commit:

commit 448f2831934381e9d3c4d93e700ba7bbe14612dc
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Date:   Wed Dec 15 13:19:33 2010 +0000

     xen: add m2p override mechanism


More details from https://bugzilla.redhat.com/show_bug.cgi?id=700752

excerpt from hypervisor.log:

(XEN) mm.c:630:d16 Non-privileged (16) attempt to map I/O space 2712536c5e
(XEN) mm.c:3619:d16 ptwr_emulate: fixing up invalid PAE PTE c082712536c5e063
(XEN) /builddir/build/BUILD/kernel-2.6.18/xen/include/asm/mm.h:225:d16 Error
pfn 36c5b: rd=ffff8300afdca080, od=ffff8300af1f0080, caf=80000002,
taf=00000000e8000001
(XEN) mm.c:654:d16 Error getting mfn 36c5b (pfn 3b325b) from L1 entry
0000000036c5b063 for dom16
(XEN) mm.c:3619:d16 ptwr_emulate: fixing up invalid PAE PTE 0000000036c5b063
(XEN) Pagetable walk from 00000000eb40ff98:
(XEN)  L4[0x000] = 0000000066ad4027 0000000000027494
(XEN)  L3[0x003] = 0000000066eae027 0000000000027492
(XEN)  L2[0x15a] = 0000000237400067 0000000000001600
(XEN)  L1[0x00f] = 80000002373f8061 000000000002b40f
(XEN) domain_crash_sync called from entry.S
(XEN) Domain 16 (vcpu#0) crashed on cpu#1:
(XEN) ----[ Xen-3.1.2-257.el5  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    1
(XEN) RIP:    0061:[<00000000c04047ee>]
(XEN) RFLAGS: 0000000000010213   CONTEXT: guest
(XEN) rax: 00000000f4d78000   rbx: 00000000eb4aea40   rcx: 000000000000007b
(XEN) rdx: 00000000eb4aea40   rsi: 00000000eb410024   rdi: 00000000c0827117
(XEN) rbp: 00000000eb40ffa0   rsp: 00000000eb40ffa0   r8:  0000000000000000
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000006f0
(XEN) cr3: 0000000250002000   cr2: 00000000f4d78008
(XEN) ds: 007b   es: 007b   fs: 00d8   gs: 00e0   ss: 0069   cs: 0061
(XEN) Guest stack trace from esp=eb40ffa0:
(XEN)   eb41001c c0827152 36c5d063 80000002 36c5c063 80000002 36c5b062 00000000
(XEN)   00000008 eb4aea40 00000000 80000002 36c58063 80000002 36c57063 80000002
(XEN)   36c56063 80000002 36c55063 80000002 36c54063 80000002 36c53063 80000002
(XEN) mm.c:630:d0 Non-privileged (16) attempt to map I/O space 00000000

gdb guest kernel stack trace:
#0  0xc04047ee in xen_read_cr2 () at arch/x86/xen/mmu.c:1244
#1  0xc0827152 in read_cr2 (regs=0xeb410024, error_code=0)
     at
/usr/src/debug/kernel-2.6.38.fc15/linux-2.6.38.i686/arch/x86/include/asm/paravirt.h:64
#2  do_page_fault (regs=0xeb410024, error_code=0) at arch/x86/mm/fault.c:974
#3<signal handler called>
...

             reply	other threads:[~2011-05-04 19:58 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-05-04 19:58 Igor Mammedov [this message]
2011-05-04 20:19 ` FC15: 32-bit PV guest crash on restore on x64_86 host Konrad Rzeszutek Wilk
2011-05-04 21:03   ` Igor Mammedov
2011-05-04 21:13     ` Konrad Rzeszutek Wilk
2011-05-05 13:32       ` Stefano Stabellini
2011-05-05 21:28       ` Konrad Rzeszutek Wilk
2011-05-06 16:16         ` Igor Mammedov
2011-05-06 17:12           ` Konrad Rzeszutek Wilk
2011-05-06 17:41             ` Igor Mammedov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4DC1AFC9.2070407@redhat.com \
    --to=imammedo@redhat.com \
    --cc=jeremy.fitzhardinge@citrix.co \
    --cc=konrad.wilk@oracle.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.