|
|
|
|
|
|
|
|
|
|
xen-devel
RE: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction emulationtoVMXAssist
>Can you please check the vcpu status? I suspect one of the
>vcpu is blocked by halt instruction.
As Yunhong mentioned, this is caused by the hlt emulation issue in current xen
unstable.
Attached patch can make it pass.
thanks
-Xin
>
>Thanks
>Yunhong Jiang
>
>>-----Original Message-----
>>From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
>>[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Tim Deegan
>>Sent: 2006年10月5日 23:55
>>To: Li, Xin B
>>Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
>>Subject: Re: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction
>>emulationtoVMXAssist decoder
>>
>>This bug is fixed by xen-unstable 11713:79b56c02b836 -- the
>>VMX code was
>>not tracking writes to CR4 that happen when CR0.PE=0, so the
>>second vcpu
>>was being shadowed in the wrong paging mode, and going into a PF loop.
>>
>>Win2k3 (ee sp1 pae=1 acpi=1 apic=1 vcpus=2) doesn't complete
>>the install
>>process yet, but gets as far as "Installing Devices" in the GUI
>>installer now.
>>
>>Tim.
>>
>>At 13:07 +0800 on 30 Sep (1159621646), Li, Xin B wrote:
>>> After applying this patch, while booting a 2 vCPUs PAE SMP
>>Windows 2003 server in VMX, I got:
>>>
>>> (XEN) sh error: sh_remove_shadows(): can't find all shadows
>>of mfn 23ecf7 (shadow_flags=80000008)
>>> (XEN) domain_crash called from common.c:2197
>>> (XEN) Domain 1 (vcpu#0) crashed on cpu#3:
>>> (XEN) ----[ Xen-3.0-unstable x86_64 debug=n Not tainted ]----
>>> (XEN) CPU: 3
>>> (XEN) RIP: 0008:[<000000008086bf9b>]
>>> (XEN) RFLAGS: 0000000000010283 CONTEXT: hvm
>>> (XEN) rax: 0000000000000002 rbx: 00000000821a57a8 rcx:
>>00000000821a3008
>>> (XEN) rdx: 0000000000000002 rsi: 00000000821a3020 rdi:
>>00000000821a54d0
>>> (XEN) rbp: 00000000f885ebd8 rsp: 00000000f885ea98 r8:
>>0000000000000000
>>> (XEN) r9: 0000000000000000 r10: 0000000000000000 r11:
>>0000000000000000
>>> (XEN) r12: 0000000000000000 r13: 0000000000000000 r14:
>>0000000000000000
>>> (XEN) r15: 0000000000000000 cr0: 000000008001003b cr4:
>>0000000000000671
>>> (XEN) cr3: 00000000002677a0 cr2: 00000000e1005004
>>> (XEN) ds: 0023 es: 0023 fs: 0030 gs: 0000 ss: 0010
> cs: 0008
>>>
>>> -Xin
>>>
>>> >-----Original Message-----
>>> >From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
>>> >[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of
>>Li, Xin B
>>> >Sent: 2006?$BG/9?$B7n30?$BF| 12:55
>>> >To: xen-devel@xxxxxxxxxxxxxxxxxxx
>>> >Subject: [Xen-devel] [PATCH] add RDMSR/WRMSR instruction
>>> >emulation toVMXAssist decoder
>>> >
>>> >add RDMSR/WRMSR instruction emulation to VMXAssist decoder
>>> >
>>> >AP of PAE SMP windows will use it to set NX bit in EFER.
>>> >
>>> >Signed-off-by: Xin Li <xin.b.li@xxxxxxxxx>
>>> >
>>>
>>> _______________________________________________
>>> Xen-devel mailing list
>>> Xen-devel@xxxxxxxxxxxxxxxxxxx
>>> http://lists.xensource.com/xen-devel
>>
>>_______________________________________________
>>Xen-devel mailing list
>>Xen-devel@xxxxxxxxxxxxxxxxxxx
>>http://lists.xensource.com/xen-devel
>>
>
win2003_halt_workaround_for_xen_3.0.3.patch
Description: win2003_halt_workaround_for_xen_3.0.3.patch
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|