[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCHv9 0/9] Xen: extend kexec hypercall for use with pv-ops kernels



On Tue, Oct 08, 2013 at 05:55:01PM +0100, David Vrabel wrote:
> The series (for Xen 4.4) improves the kexec hypercall by making Xen
> responsible for loading and relocating the image.  This allows kexec
> to be usable by pv-ops kernels and should allow kexec to be usable
> from a HVM or PVH privileged domain.

I could not load panic image because Xen crashes in following way:

(XEN) ----[ Xen-4.4-unstable  x86_64  debug=y  Tainted:    C ]----
(XEN) CPU:    3
(XEN) RIP:    e008:[<ffff82d080114ef2>] kimage_free+0x67/0xd2
(XEN) RFLAGS: 0000000000010286   CONTEXT: hypervisor
(XEN) rax: ffff820040037000   rbx: f000ff53f000e2c3   rcx: 0000000000000037
(XEN) rdx: ffff820040000000   rsi: 0000000000000040   rdi: ffff83007faea1d8
(XEN) rbp: ffff83007fae7d48   rsp: ffff83007fae7d28   r8: fffffffffffffe31
(XEN) r9:  0000000000000009   r10: 0000000000000282   r11: 0000000000bfd000
(XEN) r12: ffff820040037000   r13: f000ff53f000e2c3   r14: ffff830076b1df20
(XEN) r15: 0000000013bfd000   cr0: 0000000080050033   cr4: 00000000000026f0
(XEN) cr3: 0000000076389000   cr2: ffff820040037000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff83007fae7d28:
(XEN)    ffff830076b1df20 00000000ffffff9d ffff830076b1de50 0000000000000001
(XEN)    ffff83007fae7d98 ffff82d0801151f9 0000000000000010 ffff83007fae7de0
(XEN)    00000000000000c0 ffff83007fae7de0 000000000000003e 0000000013f4f720
(XEN)    ffff880039c56b50 0000000000000000 ffff83007fae7dc8 ffff82d0801152fe
(XEN)    ffff83007fae7dc8 00000000fffffff2 ffff830076b1de50 00007fff4a4391f0
(XEN)    ffff83007fae7ee8 ffff82d0801144c0 ffff83007fae7ef8 0000000000000000
(XEN)    ffff83007fae7e48 ffff82d08011d7d2 ffff83007fae7e18 ffff82d080270d20
(XEN)    ffff83007fad9060 0000000000075a0c 0000000000000000 ffff83007fad9000
(XEN)    ffff820040035000 00007ff000000003 00000006003e0001 00007fbf8d9b0004
(XEN)    0000000013f4f720 ffff83007faea000 ffff83007fae7e68 ffff82d08016fa43
(XEN)    ffff83007fae7e88 ffff82d080221348 ffff83007faea000 ffff83007fae7f18
(XEN)    ffff83007fae7ef8 ffff82d0802214a8 000000000af2f749 0000000000000000
(XEN)    0000000000000217 00007fbf8cfd5577 0000000000000100 00007fbf8cfd5577
(XEN)    ffff83007fae7ed8 ffff82d08016fa43 ffff83007fad9000 0000000000000003
(XEN)    ffff83007fae7ef8 ffff82d0801145c9 00007cff805180c7 ffff82d0802268cb
(XEN)    ffffffff810014aa 0000000000000025 0000000000000000 00007fff4a439270
(XEN)    00000000000000a0 00007fbf8d9b1000 ffff88003951dea8 ffff880039912c00
(XEN)    0000000000000286 000000000155d850 0000000000200000 0000000013f4f720
(XEN)    0000000000000025 ffffffff810014aa 00007fbf8d8faa55 00007fbf8d9af004
(XEN)    0000000000000004 0001010000000000 ffffffff810014aa 000000000000e033
(XEN) Xen call trace:
(XEN)    [<ffff82d080114ef2>] kimage_free+0x67/0xd2
(XEN)    [<ffff82d0801151f9>] do_kimage_alloc+0x29c/0x2f0
(XEN)    [<ffff82d0801152fe>] kimage_alloc+0xb1/0xe6
(XEN)    [<ffff82d0801144c0>] do_kexec_op_internal+0x68e/0x789
(XEN)    [<ffff82d0801145c9>] do_kexec_op+0xe/0x12
(XEN)    [<ffff82d0802268cb>] syscall_enter+0xeb/0x145
(XEN)
(XEN) Pagetable walk from ffff820040037000:
(XEN)  L4[0x104] = 000000007ffd0063 ffffffffffffffff
(XEN)  L3[0x001] = 000000007ffce063 ffffffffffffffff
(XEN)  L2[0x000] = 000000007ffc5063 ffffffffffffffff
(XEN)  L1[0x037] = f000ff53f000e063 ffffffffffffffff
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 3:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0009]
(XEN) Faulting linear address: ffff820040037000
(XEN) ****************************************

Normal kernel could be loaded but when it is executed something
crashes very early. Following message is displayed

I'm in purgatory
early console in decompress_kernel

and machine is restarted shortly.

I have done tests with latest kexec-tools and Xen versions.

Daniel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.