[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [Xen EFI] Impossible to limit the dom0 memory



On 25/01/18 11:40, Jan Beulich wrote:
>>>> On 25.01.18 at 11:25, <msd+xen-devel@xxxxxx> wrote:
>>>  Xen doesn't crash at all.
> 
> Did you read the above? it is being confirmed by ...
> 
>> With this file, it works, Xen boots :
>>
>> ```
>> [global]
>> default=xen
>>
>> [xen]
>> options=loglvl=all com1=115200,8n1 console=com1,vga
>> kernel=vmlinuz root=/dev/md2 ro rootdelay=10 noquiet nosplash 
>> earlyprintk=xen
>> ramdisk=initrd.img
>> ```
>>
>> With this file, I have just added "dom0_mem=1G,max:1G", Xen crashes :
>>
>> ```
>> [global]
>> default=xen
>>
>> [xen]
>> options=loglvl=all com1=115200,8n1 console=com1,vga dom0_mem=1G,max:1G
>> kernel=vmlinuz root=/dev/md2 ro rootdelay=10 noquiet nosplash 
>> earlyprintk=xen
>> ramdisk=initrd.img
>> ```
>>
>> I attached the boot logs "dom0_crash_with_dom0_memory.txt". The last 
>> line is "(XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds."
> 
> ... this line you observe. Taking further lines from the log you've
> provided subsequently:
> 
> (XEN) d0v0: unhandled page fault (ec=0003)                                    
>                                                                               
>                                   
> 
> This tells us that Dom0 didn't install a page fault handler yet.
> 
> (XEN) Pagetable walk from ffffffff82565200:                                   
>                                                                               
>                                   
> (XEN)  L4[0x1ff] = 000000084600e067 000000000000200e                          
>                                                                               
>                                   
> (XEN)  L3[0x1fe] = 000000084600f067 000000000000200f                          
>                                                                               
>                                   
> (XEN)  L2[0x012] = 0000000846647067 0000000000002647                          
>                                                                               
>                                   
> (XEN)  L1[0x165] = 0010000846565065 0000000000002565                          
>                                                                               
>                                   
> 
> This tells us (together with the page fault error code) that the
> Dom0 kernel tried to provide memory as kernel stack which
> can't be written. This may be a Dom0 kernel stack overflow,

Really? Why do you think this is related to the stack?

The error code just tells us it was a write access. %rsp is
ffffffff82003cb0, while %cr2 is ffffffff82565200.

To me it seems as if the access was via %rbx.

It would really help to know which function caused the access. As the
stack contains some parts of the last messages issued I suspect this
is related to EFI code.

> but there may also be other reasons. At this point I can't
> exclude there being some root cause in Xen, but the issue
> needs to be investigated from the Dom0 kernel side.

So having a more readable backtrace would really help.

Guillaume, can you try to get symbol+offset for the values on the stack
looking like kernel code addresses (e.g. everything starting with
"ffffffff82")?


Juergen

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.