|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [bug]xen 4.10 + dom0 4.15 couldn't boot up
>>> On 01.02.18 at 08:29, <jgross@xxxxxxxx> wrote:
> On 01/02/18 07:20, Zhang, Xiong Y wrote:
>> (XEN) Domain 0 (vcpu#0) crashed on cpu#0:
>> (XEN) ----[ Xen-4.11-unstable x86_64 debug=y Not tainted ]----
>> (XEN) CPU: 0
>> (XEN) RIP: e033:[<ffffffff8103ca29>]
>> (XEN) RFLAGS: 0000000000000292 EM: 1 CONTEXT: pv guest (d0v0)
>> (XEN) rax: 0000000000000000 rbx: ffffffff81e05fe0 rcx: 0000000000000000
>> (XEN) rdx: 0000000000000030 rsi: ffffffff82203f04 rdi: ffffffff82451f60
>> (XEN) rbp: ffffffff82203f08 rsp: ffffffff82203e20 r8: ffffffff82203f08
>> (XEN) r9: 00000000ffffffff r10: ffffffff82203f0c r11: 0000000000000000
>> (XEN) r12: ffffffff82203f0c r13: ffffffff82203e88 r14: ffffffff82203f00
>> (XEN) r15: ffffffff82203e98 cr0: 000000008005003b cr4: 00000000003526e0
>> (XEN) cr3: 00000003facc5000 cr2: 0000000000000028
>> (XEN) fsb: 0000000000000000 gsb: 0000000000000000 gss: 0000000000000000
>> (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033
>> (XEN) Guest stack trace from rsp=ffffffff82203e20:
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 ffffffff8103ca29
>> (XEN) 000000010000e030 0000000000010092 ffffffff82203e68 000000000000e02b
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) ffffffff82451f60 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 ffffffff82451f60 ffffffff82203f08
>> (XEN) ffffffff82203f0c ffffffff82203f04 ffffffff82203f00 ffffffff82203f1c
>> (XEN) ffffffff8103d611 ffffffff82203f10 ffffffff82203f14 ffffffff82203f18
>> (XEN) 0000000000003027 0000000000000000 0000000080000008 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 ffffffff8281ba11 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
>> (XEN) 0f00000060c0c748 ccccccccccccc305 cccccccccccccccc cccccccccccccccc
>> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>> (XEN) cccccccccccccccc cccccccccccccccc cccccccccccccccc cccccccccccccccc
>> (XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds.
>> (XEN) APIC error on CPU0: 40(00)
>> (XEN) Resetting with ACPI MEMORY or I/O RESET_REG.
>>
>> addr2line -f -e vmlinux ffffffff8103ca29
>> init_scattered_cpuid_features
>> arch/x86/kernel/cpu/scattered.c:38
>
> And this is the problem: it seems as if the compiler now generates an
> access via %gs in this function, but this segment hasn't been setup at
> this stage of the boot process.
>
> I'm trying to move up initialization of the %gs segment.
This can be done _really_ early, as our old XenoLinux kernel shows
(4.4 based):
startup_64:
movq $(init_thread_union+THREAD_SIZE-8),%rsp
/* rsi is pointer to startup info structure.
pass it to C */
movq %rsi,%rdi
/* Set up %gs.
*
* The base of %gs always points to the bottom of the irqstack
* union. If the stack protector canary is enabled, it is
* located at %gs:40. Note that, on SMP, the boot cpu uses
* init data section till per cpu areas are set up.
*/
movl $MSR_GS_BASE,%ecx
movq $INIT_PER_CPU_VAR(irq_stack_union),%rax
cdq
wrmsr
I won't make any guarantees on the applicability of everything the
comment says, though.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |