lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110317085118.GA11346@router-fw-old.local.net-space.pl>
Date:	Thu, 17 Mar 2011 09:51:18 +0100
From:	Daniel Kiper <dkiper@...-space.pl>
To:	Daniel Kiper <dkiper@...-space.pl>
Cc:	Stefano Stabellini <stefano.stabellini@...citrix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>,
	Ian Campbell <Ian.Campbell@...citrix.com>,
	"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
	"andi.kleen@...el.com" <andi.kleen@...el.com>,
	"haicheng.li@...ux.intel.com" <haicheng.li@...ux.intel.com>,
	"fengguang.wu@...el.com" <fengguang.wu@...el.com>,
	"jeremy@...p.org" <jeremy@...p.org>,
	Dan Magenheimer <dan.magenheimer@...cle.com>,
	"v.tolstov@...fip.ru" <v.tolstov@...fip.ru>,
	"pasik@....fi" <pasik@....fi>,
	"dave@...ux.vnet.ibm.com" <dave@...ux.vnet.ibm.com>,
	"wdauchy@...il.com" <wdauchy@...il.com>,
	"rientjes@...gle.com" <rientjes@...gle.com>,
	"xen-devel@...ts.xensource.com" <xen-devel@...ts.xensource.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"linux-mm@...ck.org" <linux-mm@...ck.org>
Subject: Re: Bootup fix for _brk_end being != _end

On Tue, Mar 15, 2011 at 04:40:24PM +0100, Daniel Kiper wrote:
> On Tue, Mar 15, 2011 at 03:31:47PM +0000, Stefano Stabellini wrote:
> > On Tue, 15 Mar 2011, Daniel Kiper wrote:
> > > On Tue, Mar 15, 2011 at 10:48:21AM -0400, Konrad Rzeszutek Wilk wrote:
> > > > > > > Additionally, I suggest to apply patch prepared by Steffano Stabellini
> > > > > > > (https://lkml.org/lkml/2011/1/31/232) which fixes memory management
> > > > > > > issue in Xen guest. I was not able boot guest machine without
> > > > > > > above mentioned patch.
> > > > > >
> > > > > > after some discussions we came up with a different approach to fix the
> > > > > > issue; I sent a couple of patches a little while ago:
> > > > > >
> > > > > > https://lkml.org/lkml/2011/2/28/410
> > > > >
> > > > > I tested git://xenbits.xen.org/people/sstabellini/linux-pvhvm.git 2.6.38-tip-fixes
> > > > > and it works on x86_64, however, it does not work on i386. Tested as
> > > > > unprivileged guest on Xen Ver. 4.1.0-rc2-pre. On i386 domain crashes
> > > > > silently at early boot stage :-(((.
> > > >
> > > > Details? Can you provide the 'xenctx' output of where it crashed?
> > >
> > > As I wrote above domain is dying and I am not able to connect to it using
> > > xenctx after crash :-(((. I do not know how to do that in another way.
> >
> > try adding:
> >
> > extra = "loglevel=9 debug earlyprintk=xenboot"
>
> (XEN) d55:v0: unhandled page fault (ec=0002)
> (XEN) Pagetable walk from 000000000000000c:
> (XEN)  L4[0x000] = 000000010bebc027 0000000000024d28
> (XEN)  L3[0x000] = 0000000000000000 ffffffffffffffff
> (XEN) domain_crash_sync called from entry.S
> (XEN) Domain 55 (vcpu#0) crashed on cpu#3:
> (XEN) ----[ Xen-4.1.0-rc2-pre  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    3
> (XEN) RIP:    e019:[<00000000c1001180>]
> (XEN) RFLAGS: 0000000000000282   EM: 1   CONTEXT: pv guest
> (XEN) rax: 000000000000000c   rbx: 000000000000000c   rcx: 00000000c1371fd0
> (XEN) rdx: 00000000c1371fd0   rsi: 00000000c1742000   rdi: 00000000a5c03d70
> (XEN) rbp: 00000000c1371fc8   rsp: 00000000c1371fa8   r8: 0000000000000000
> (XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000000   r13: 0000000000000000   r14: 0000000000000000
> (XEN) r15: 0000000000000000   cr0: 000000008005003b   cr4: 00000000000026f4
> (XEN) cr3: 0000000129b6e000   cr2: 000000000000000c
> (XEN) ds: e021   es: e021   fs: e021   gs: e021   ss: e021   cs: e019
> (XEN) Guest stack trace from esp=c1371fa8:
> (XEN)   00000002 c1001180 0001e019 00010082 c10037af deadbeef c1742000 a5c03d70
> (XEN)   c1371fdc c13a4aa8 00000000 00000000 00000000 c1371ffc c13a3ff2 00000000
> (XEN)   00000000 00000000 00000000 00000000 deadbeef c1753000 013fe001 00000000
> (XEN)   00000000 00000000 00000000 00000000 013fe001 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
> (XEN)   00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Any progress ??? Can I help you in something ???

Daniel
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ