[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction emulationtoVMXAssist decoder



 >Can you please check the vcpu status? I suspect one of the 
>vcpu is blocked by halt instruction.

As Yunhong mentioned, this is caused by the hlt emulation issue in current xen 
unstable.
Attached patch can make it pass.
thanks
-Xin


>
>Thanks
>Yunhong Jiang
>
>>-----Original Message-----
>>From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
>>[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Tim Deegan
>>Sent: 2006年10月5日 23:55
>>To: Li, Xin B
>>Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
>>Subject: Re: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction 
>>emulationtoVMXAssist decoder
>>
>>This bug is fixed by xen-unstable 11713:79b56c02b836 -- the 
>>VMX code was
>>not tracking writes to CR4 that happen when CR0.PE=0, so the 
>>second vcpu
>>was being shadowed in the wrong paging mode, and going into a PF loop.
>>
>>Win2k3 (ee sp1 pae=1 acpi=1 apic=1 vcpus=2) doesn't complete 
>>the install
>>process yet, but gets as far as "Installing Devices" in the GUI
>>installer now.
>>
>>Tim.
>>
>>At 13:07 +0800 on 30 Sep (1159621646), Li, Xin B wrote:
>>> After applying this patch, while booting a 2 vCPUs PAE SMP 
>>Windows 2003 server in VMX, I got:
>>> 
>>> (XEN) sh error: sh_remove_shadows(): can't find all shadows 
>>of mfn 23ecf7 (shadow_flags=80000008)
>>> (XEN) domain_crash called from common.c:2197
>>> (XEN) Domain 1 (vcpu#0) crashed on cpu#3:
>>> (XEN) ----[ Xen-3.0-unstable  x86_64  debug=n  Not tainted ]----
>>> (XEN) CPU:    3
>>> (XEN) RIP:    0008:[<000000008086bf9b>]
>>> (XEN) RFLAGS: 0000000000010283   CONTEXT: hvm
>>> (XEN) rax: 0000000000000002   rbx: 00000000821a57a8   rcx: 
>>00000000821a3008
>>> (XEN) rdx: 0000000000000002   rsi: 00000000821a3020   rdi: 
>>00000000821a54d0
>>> (XEN) rbp: 00000000f885ebd8   rsp: 00000000f885ea98   r8:  
>>0000000000000000
>>> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 
>>0000000000000000
>>> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 
>>0000000000000000
>>> (XEN) r15: 0000000000000000   cr0: 000000008001003b   cr4: 
>>0000000000000671
>>> (XEN) cr3: 00000000002677a0   cr2: 00000000e1005004
>>> (XEN) ds: 0023   es: 0023   fs: 0030   gs: 0000   ss: 0010  
> cs: 0008
>>> 
>>> -Xin
>>> 
>>> >-----Original Message-----
>>> >From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
>>> >[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of 
>>Li, Xin B
>>> >Sent: 2006?$BG/9?$B7n30?$BF| 12:55
>>> >To: xen-devel@xxxxxxxxxxxxxxxxxxx
>>> >Subject: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction 
>>> >emulation toVMXAssist decoder
>>> >
>>> >add RDMSR/WRMSR instruction emulation to VMXAssist decoder
>>> >
>>> >AP of PAE SMP windows will use it to set NX bit in EFER.
>>> >
>>> >Signed-off-by: Xin Li <xin.b.li@xxxxxxxxx>
>>> >
>>> 
>>> _______________________________________________
>>> Xen-devel mailing list
>>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>>> http://lists.xensource.com/xen-devel
>>
>>_______________________________________________
>>Xen-devel mailing list
>>Xen-devel@xxxxxxxxxxxxxxxxxxx
>>http://lists.xensource.com/xen-devel
>>
>

Attachment: win2003_halt_workaround_for_xen_3.0.3.patch
Description: win2003_halt_workaround_for_xen_3.0.3.patch

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.