lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1203457858.26910.11.camel@cthulhu.hellion.org.uk>
Date:	Tue, 19 Feb 2008 21:50:58 +0000
From:	Ian Campbell <ijc@...lion.org.uk>
To:	Joel Becker <Joel.Becker@...cle.com>
Cc:	Jeremy Fitzhardinge <jeremy@...p.org>,
	Jody Belka <lists-lkml@...b.org>, linux-kernel@...r.kernel.org,
	Ingo Molnar <mingo@...e.hu>,
	Thomas Gleixner <tglx@...utronix.de>,
	"H. Peter Anvin" <hpa@...or.com>,
	"Eric W. Biederman" <ebiederm@...ssion.com>,
	Andi Kleen <andi@...stfloor.org>,
	Mika Penttila <mika.penttila@...umbus.fi>
Subject: Re: 2.6.25-rc1 xen pvops regression


On Mon, 2008-02-18 at 02:40 -0800, Joel Becker wrote:
> On Sun, Feb 17, 2008 at 06:49:21PM +0000, Ian Campbell wrote:
> > I've been seeing similar attempts to map 0xf0 but so far I was the only
> > one (although that made no sense to me). Does the patch below help at
> > all? The problem seems to be that the kernel is trying to map pages at
> > 0xf0000 but these are not reserved in the guest E820 map so they could
> > contain a page table page etc.
> > 
> > A useful tip for getting a backtrace out of a crashed Xen guest is to
> > set "on_crash=preserve" in your domain config. Then once the crash has
> > happened you can use "/usr/lib/xen/bin/xenctx -s System.map <domid>"
> > where System.map is the guest kernel System.map.
> 
> 	That didn't work for me - it gave me "can't trace dom0" for
> whatever reason.  But...

Strange. You gave it the domid of the guest not dom0 I assume. Might be
an older buggy version but it works ok in newer versions:

        # /usr/lib/xen/bin/xenctx -s /boot/System.map-2.6.18.8-x86_32p-xenU 2
        eip: c01013a7 hypercall_page+0x3a7 flags: 00001246 i z p
        esp: c0361f64
        eax: 00000000   ebx: deadbeef   ecx: deadbeef   edx: 00000001
        esi: 00000000   edi: 00000000   ebp: c0361f84
         cs: 00000061    ds: 0000007b    fs: 00000000    gs: 00000000
        
        Stack:
         c01089eb 02d8e984 5cec4d7d 0001f3ea 00000000 000008f1 ffffffff 00000000
         c0361f8c c010436c c0361fa8 c0103263 c03880c0 c03880a0 000008f1 c038a464
         c184f3c4 c0361fbc c0102415 c0102060 00000000 00000a00 c0361ff8 c036687f
         c02ed19c c038e120 c031f000 00000022 c03662a0 c184d000 000023c4 00000000
        
        Code:
        cc cc cc cc cc cc cc cc cc cc cc cc cc cc b8 1d 00 00 00 cd 82 <c3> cc cc cc cc cc cc cc cc cc cc 
        
        Call Trace:
          [<c01013a7>] hypercall_page+0x3a7  <--
          [<c01089eb>] raw_safe_halt+0x9b 
          [<c010436c>] xen_idle+0x2c 
          [<c0103263>] cpu_idle+0x83 
          [<c0102415>] rest_init+0x35 
          [<c0102060>] _stext+0x60 
          [<c036687f>] start_kernel+0x36f 
          [<c03662a0>] parse_early_param+0x70 
        
Ian.

-- 
Ian Campbell

94% of the women in America are beautiful and the rest hang out around
here.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ