On Wed, Jan 14, 2009 at 09:00:38PM -0700, Bruce Rogers wrote: > The "change" to the format is as follows: Now the file format for a cross-bit configuration will be the same as would have been produced by a same-bitness configuration, which crash of course already handles. So crash should be fine with this change. In fact that was part of how I determined that it was working right. > I consider that the cross-bitness format was simply not valid as there is no reason for there to be a different format for the file simply because the host was a different bitsize than the guest (and it didn't work with crash & gdb-xenserver as it was). > Yes, I agree with you. However for FV case, e_ident[EI_DATA] is set according to the host configuration because XEN_DOMCTL_[sg]et_address_bits doesn't make sense. And there is no easy way to determine the guest OS mode. The following patch looks okay? dump-core: update the documentation This patch updates the document on dump-core file format. Signed-off-by: Isaku Yamahata <yamahata@xxxxxxxxxxxxx> diff --git a/docs/misc/dump-core-format.txt b/docs/misc/dump-core-format.txt --- a/docs/misc/dump-core-format.txt +++ b/docs/misc/dump-core-format.txt @@ -30,8 +30,13 @@ The elf header members are set as follow e_ident[EI_OSABI] = ELFOSABI_SYSV = 0 e_type = ET_CORE = 4 ELFCLASS64 is always used independent of architecture. -e_ident[EI_DATA] and e_flags are set according to the dumping system's -architecture. Other members are set as usual. +e_ident[EI_DATA] is set as follows + For x86 PV domain case, it is set according to the guest configuration + (i.e. if guest is 32bit it is set to EM_386 even when the dom0 is 64 bit.) + For other domain case (x86 HVM domain case and ia64 domain case), + it is set according to the dumping system's architecture. +e_flags is set according to the dumping system's architecture. +Other members are set as usual. Sections -------- @@ -241,3 +246,7 @@ Currently only (major, minor) = (0, 1) i The format version isn't bumped because analysis tools can distinguish it. - .xen_ia64_mapped_regs section was made only for ia64 PV domain. In case of IA64 HVM domain, this section doesn't exist. +- elf header e_ident[EI_DATA] + On x86 PV domain case, it is set according to the guest configuration. + I.e. 32-on-64 case, the file will be set EM_386 instead of EM_X86_64. + This is the same as 32-on-32 case, so there is no impact on analysis tools. > - Bruce > > >>> Isaku Yamahata <yamahata@xxxxxxxxxxxxx> 01/14/09 8:17 PM >>> > [CCed to Anderson, Oda and crash-utility ml] > Hi Bruce. Nice patch. > > Could you please update the documentation about its format too? > docs/misc/dump-core-format.txt > - Elf header section, and > - revision history at the end of the file. > > And what is the impact on the crash utility? > > thanks, > > On Wed, Jan 14, 2009 at 04:47:41PM -0700, Bruce Rogers wrote: > > This patch allows core-dumping to work on a cross-bit host/guest configuration, whereas previously that was not supported. It supports both PV and FV guests. The core file format generated by the host, needs to match that of the guest, so an alignment issue is addressed, along with the p2m frame list handling being done according to the guest size. > > > > Signed-off-by: Bruce Rogers <brogers@xxxxxxxxxx> > > > > > diff -r 77476eeb8c42 tools/libxc/xc_core.c > > --- a/tools/libxc/xc_core.c Wed Jan 14 11:39:01 2009 +0000 > > +++ b/tools/libxc/xc_core.c Wed Jan 14 16:40:17 2009 -0700 > > @@ -57,9 +57,6 @@ > > > > /* number of pages to write at a time */ > > #define DUMP_INCREMENT (4 * 1024) > > - > > -/* Don't yet support cross-address-size core dump */ > > -#define guest_width (sizeof (unsigned long)) > > > > /* string table */ > > struct xc_core_strtab { > > @@ -240,7 +237,7 @@ xc_core_ehdr_init(Elf64_Ehdr *ehdr) > > ehdr->e_ident[EI_ABIVERSION] = EV_CURRENT; > > > > ehdr->e_type = ET_CORE; > > - ehdr->e_machine = ELF_ARCH_MACHINE; > > + /* e_machine will be filled in later */ > > ehdr->e_version = EV_CURRENT; > > ehdr->e_entry = 0; > > ehdr->e_phoff = 0; > > @@ -359,7 +356,8 @@ elfnote_dump_core_header( > > } > > > > static int > > -elfnote_dump_xen_version(void *args, dumpcore_rtn_t dump_rtn, int xc_handle) > > +elfnote_dump_xen_version(void *args, dumpcore_rtn_t dump_rtn, int xc_handle, > > + unsigned int guest_width) > > { > > int sts; > > struct elfnote elfnote; > > @@ -371,6 +369,12 @@ elfnote_dump_xen_version(void *args, dum > > elfnote.descsz = sizeof(xen_version); > > elfnote.type = XEN_ELFNOTE_DUMPCORE_XEN_VERSION; > > elfnote_fill_xen_version(xc_handle, &xen_version); > > + if (guest_width < sizeof(unsigned long)) > > + { > > + // 32 bit elf file format differs in pagesize's alignment > > + char *p = (char *)&xen_version.pagesize; > > + memmove(p - 4, p, sizeof(xen_version.pagesize)); > > + } > > sts = dump_rtn(args, (char*)&elfnote, sizeof(elfnote)); > > if ( sts != 0 ) > > return sts; > > @@ -396,6 +400,24 @@ elfnote_dump_format_version(void *args, > > return dump_rtn(args, (char*)&format_version, sizeof(format_version)); > > } > > > > +static int > > +get_guest_width(int xc_handle, > > + uint32_t domid, > > + unsigned int *guest_width) > > +{ > > + DECLARE_DOMCTL; > > + > > + memset(&domctl, 0, sizeof(domctl)); > > + domctl.domain = domid; > > + domctl.cmd = XEN_DOMCTL_get_address_size; > > + > > + if ( do_domctl(xc_handle, &domctl) != 0 ) > > + return 1; > > + > > + *guest_width = domctl.u.address_size.size / 8; > > + return 0; > > +} > > + > > int > > xc_domain_dumpcore_via_callback(int xc_handle, > > uint32_t domid, > > @@ -403,7 +425,8 @@ xc_domain_dumpcore_via_callback(int xc_h > > dumpcore_rtn_t dump_rtn) > > { > > xc_dominfo_t info; > > - shared_info_t *live_shinfo = NULL; > > + shared_info_any_t *live_shinfo = NULL; > > + unsigned int guest_width; > > > > int nr_vcpus = 0; > > char *dump_mem, *dump_mem_start = NULL; > > @@ -437,6 +460,12 @@ xc_domain_dumpcore_via_callback(int xc_h > > uint16_t strtab_idx; > > struct xc_core_section_headers *sheaders = NULL; > > Elf64_Shdr *shdr; > > + > > + if ( get_guest_width(xc_handle, domid, &guest_width) != 0 ) > > + { > > + PERROR("Could not get address size for domain"); > > + return sts; > > + } > > > > xc_core_arch_context_init(&arch_ctxt); > > if ( (dump_mem_start = malloc(DUMP_INCREMENT*PAGE_SIZE)) == NULL ) > > @@ -500,7 +529,7 @@ xc_domain_dumpcore_via_callback(int xc_h > > goto out; > > } > > > > - sts = xc_core_arch_map_p2m(xc_handle, &info, live_shinfo, > > + sts = xc_core_arch_map_p2m(xc_handle, guest_width, &info, live_shinfo, > > &p2m, &p2m_size); > > if ( sts != 0 ) > > goto out; > > @@ -676,6 +705,7 @@ xc_domain_dumpcore_via_callback(int xc_h > > /* write out elf header */ > > ehdr.e_shnum = sheaders->num; > > ehdr.e_shstrndx = strtab_idx; > > + ehdr.e_machine = ELF_ARCH_MACHINE; > > sts = dump_rtn(args, (char*)&ehdr, sizeof(ehdr)); > > if ( sts != 0 ) > > goto out; > > @@ -697,7 +727,7 @@ xc_domain_dumpcore_via_callback(int xc_h > > goto out; > > > > /* elf note section: xen version */ > > - sts = elfnote_dump_xen_version(args, dump_rtn, xc_handle); > > + sts = elfnote_dump_xen_version(args, dump_rtn, xc_handle, guest_width); > > if ( sts != 0 ) > > goto out; > > > > @@ -757,9 +787,21 @@ xc_domain_dumpcore_via_callback(int xc_h > > > > if ( !auto_translated_physmap ) > > { > > - gmfn = p2m[i]; > > - if ( gmfn == INVALID_P2M_ENTRY ) > > - continue; > > + if ( guest_width >= sizeof(unsigned long) ) > > + { > > + if ( guest_width == sizeof(unsigned long) ) > > + gmfn = p2m[i]; > > + else > > + gmfn = ((uint64_t *)p2m)[i]; > > + if ( gmfn == INVALID_P2M_ENTRY ) > > + continue; > > + } > > + else > > + { > > + gmfn = ((uint32_t *)p2m)[i]; > > + if ( gmfn == (uint32_t)INVALID_P2M_ENTRY ) > > + continue; > > + } > > > > p2m_array[j].pfn = i; > > p2m_array[j].gmfn = gmfn; > > @@ -802,7 +844,7 @@ copy_done: > > /* When live dump-mode (-L option) is specified, > > * guest domain may reduce memory. pad with zero pages. > > */ > > - IPRINTF("j (%ld) != nr_pages (%ld)", j , nr_pages); > > + IPRINTF("j (%ld) != nr_pages (%ld)", j, nr_pages); > > memset(dump_mem_start, 0, PAGE_SIZE); > > for (; j < nr_pages; j++) { > > sts = dump_rtn(args, dump_mem_start, PAGE_SIZE); > > @@ -891,7 +933,7 @@ xc_domain_dumpcore(int xc_handle, > > struct dump_args da; > > int sts; > > > > - if ( (da.fd = open(corename, O_CREAT|O_RDWR, S_IWUSR|S_IRUSR)) < 0 ) > > + if ( (da.fd = open(corename, O_CREAT|O_RDWR|O_TRUNC, S_IWUSR|S_IRUSR)) < 0 ) > > { > > PERROR("Could not open corefile %s", corename); > > return -errno; > > diff -r 77476eeb8c42 tools/libxc/xc_core.h > > --- a/tools/libxc/xc_core.h Wed Jan 14 11:39:01 2009 +0000 > > +++ b/tools/libxc/xc_core.h Wed Jan 14 16:40:17 2009 -0700 > > @@ -136,12 +136,12 @@ struct xc_core_arch_context; > > struct xc_core_arch_context; > > int xc_core_arch_memory_map_get(int xc_handle, > > struct xc_core_arch_context *arch_ctxt, > > - xc_dominfo_t *info, shared_info_t *live_shinfo, > > + xc_dominfo_t *info, shared_info_any_t *live_shinfo, > > xc_core_memory_map_t **mapp, > > unsigned int *nr_entries); > > -int xc_core_arch_map_p2m(int xc_handle, xc_dominfo_t *info, > > - shared_info_t *live_shinfo, xen_pfn_t **live_p2m, > > - unsigned long *pfnp); > > +int xc_core_arch_map_p2m(int xc_handle, unsigned int guest_width, > > + xc_dominfo_t *info, shared_info_any_t *live_shinfo, > > + xen_pfn_t **live_p2m, unsigned long *pfnp); > > > > > > #if defined (__i386__) || defined (__x86_64__) > > diff -r 77476eeb8c42 tools/libxc/xc_core_ia64.c > > --- a/tools/libxc/xc_core_ia64.c Wed Jan 14 11:39:01 2009 +0000 > > +++ b/tools/libxc/xc_core_ia64.c Wed Jan 14 16:40:17 2009 -0700 > > @@ -235,7 +235,7 @@ old: > > } > > > > int > > -xc_core_arch_map_p2m(int xc_handle, xc_dominfo_t *info, > > +xc_core_arch_map_p2m(int xc_handle, unsigned int guest_width, xc_dominfo_t *info, > > shared_info_t *live_shinfo, xen_pfn_t **live_p2m, > > unsigned long *pfnp) > > { > > diff -r 77476eeb8c42 tools/libxc/xc_core_x86.c > > --- a/tools/libxc/xc_core_x86.c Wed Jan 14 11:39:01 2009 +0000 > > +++ b/tools/libxc/xc_core_x86.c Wed Jan 14 16:40:17 2009 -0700 > > @@ -20,9 +20,25 @@ > > > > #include "xg_private.h" > > #include "xc_core.h" > > +#include "xc_e820.h" > > > > -/* Don't yet support cross-address-size core dump */ > > -#define guest_width (sizeof (unsigned long)) > > +#define GET_FIELD(_p, _f) ((guest_width==8) ? ((_p)->x64._f) : ((_p)->x32._f)) > > + > > +#ifndef MAX > > +#define MAX(_a, _b) ((_a) >= (_b) ? (_a) : (_b)) > > +#endif > > + > > +int > > +xc_core_arch_gpfn_may_present(struct xc_core_arch_context *arch_ctxt, > > + unsigned long pfn) > > +{ > > + if ((pfn >= 0xa0 && pfn < 0xc0) /* VGA hole */ > > + || (pfn >= (HVM_BELOW_4G_MMIO_START >> PAGE_SHIFT) > > + && pfn < (1ULL<<32) >> PAGE_SHIFT)) /* MMIO */ > > + return 0; > > + return 1; > > +} > > + > > > > static int nr_gpfns(int xc_handle, domid_t domid) > > { > > @@ -37,7 +53,7 @@ xc_core_arch_auto_translated_physmap(con > > > > int > > xc_core_arch_memory_map_get(int xc_handle, struct xc_core_arch_context *unused, > > - xc_dominfo_t *info, shared_info_t *live_shinfo, > > + xc_dominfo_t *info, shared_info_any_t *live_shinfo, > > xc_core_memory_map_t **mapp, > > unsigned int *nr_entries) > > { > > @@ -60,17 +76,22 @@ xc_core_arch_memory_map_get(int xc_handl > > } > > > > int > > -xc_core_arch_map_p2m(int xc_handle, xc_dominfo_t *info, > > - shared_info_t *live_shinfo, xen_pfn_t **live_p2m, > > +xc_core_arch_map_p2m(int xc_handle, unsigned int guest_width, xc_dominfo_t *info, > > + shared_info_any_t *live_shinfo, xen_pfn_t **live_p2m, > > unsigned long *pfnp) > > { > > /* Double and single indirect references to the live P2M table */ > > xen_pfn_t *live_p2m_frame_list_list = NULL; > > xen_pfn_t *live_p2m_frame_list = NULL; > > + /* Copies of the above. */ > > + xen_pfn_t *p2m_frame_list_list = NULL; > > + xen_pfn_t *p2m_frame_list = NULL; > > + > > uint32_t dom = info->domid; > > unsigned long p2m_size = nr_gpfns(xc_handle, info->domid); > > int ret = -1; > > int err; > > + int i; > > > > if ( p2m_size < info->nr_pages ) > > { > > @@ -80,7 +101,7 @@ xc_core_arch_map_p2m(int xc_handle, xc_d > > > > live_p2m_frame_list_list = > > xc_map_foreign_range(xc_handle, dom, PAGE_SIZE, PROT_READ, > > - live_shinfo->arch.pfn_to_mfn_frame_list_list); > > + GET_FIELD(live_shinfo, arch.pfn_to_mfn_frame_list_list)); > > > > if ( !live_p2m_frame_list_list ) > > { > > @@ -88,9 +109,28 @@ xc_core_arch_map_p2m(int xc_handle, xc_d > > goto out; > > } > > > > + /* Get a local copy of the live_P2M_frame_list_list */ > > + if ( !(p2m_frame_list_list = malloc(PAGE_SIZE)) ) > > + { > > + ERROR("Couldn't allocate p2m_frame_list_list array"); > > + goto out; > > + } > > + memcpy(p2m_frame_list_list, live_p2m_frame_list_list, PAGE_SIZE); > > + > > + /* Canonicalize guest's unsigned long vs ours */ > > + if ( guest_width > sizeof(unsigned long) ) > > + for ( i = 0; i < PAGE_SIZE/sizeof(unsigned long); i++ ) > > + if ( i < PAGE_SIZE/guest_width ) > > + p2m_frame_list_list[i] = ((uint64_t *)p2m_frame_list_list)[i]; > > + else > > + p2m_frame_list_list[i] = 0; > > + else if ( guest_width < sizeof(unsigned long) ) > > + for ( i = PAGE_SIZE/sizeof(unsigned long) - 1; i >= 0; i-- ) > > + p2m_frame_list_list[i] = ((uint32_t *)p2m_frame_list_list)[i]; > > + > > live_p2m_frame_list = > > xc_map_foreign_pages(xc_handle, dom, PROT_READ, > > - live_p2m_frame_list_list, > > + p2m_frame_list_list, > > P2M_FLL_ENTRIES); > > > > if ( !live_p2m_frame_list ) > > @@ -99,8 +139,25 @@ xc_core_arch_map_p2m(int xc_handle, xc_d > > goto out; > > } > > > > + /* Get a local copy of the live_P2M_frame_list */ > > + if ( !(p2m_frame_list = malloc(P2M_TOOLS_FL_SIZE)) ) > > + { > > + ERROR("Couldn't allocate p2m_frame_list array"); > > + goto out; > > + } > > + memset(p2m_frame_list, 0, P2M_TOOLS_FL_SIZE); > > + memcpy(p2m_frame_list, live_p2m_frame_list, P2M_GUEST_FL_SIZE); > > + > > + /* Canonicalize guest's unsigned long vs ours */ > > + if ( guest_width > sizeof(unsigned long) ) > > + for ( i = 0; i < P2M_FL_ENTRIES; i++ ) > > + p2m_frame_list[i] = ((uint64_t *)p2m_frame_list)[i]; > > + else if ( guest_width < sizeof(unsigned long) ) > > + for ( i = P2M_FL_ENTRIES - 1; i >= 0; i-- ) > > + p2m_frame_list[i] = ((uint32_t *)p2m_frame_list)[i]; > > + > > *live_p2m = xc_map_foreign_pages(xc_handle, dom, PROT_READ, > > - live_p2m_frame_list, > > + p2m_frame_list, > > P2M_FL_ENTRIES); > > > > if ( !*live_p2m ) > > @@ -122,6 +179,12 @@ out: > > if ( live_p2m_frame_list ) > > munmap(live_p2m_frame_list, P2M_FLL_ENTRIES * PAGE_SIZE); > > > > + if ( p2m_frame_list_list ) > > + free(p2m_frame_list_list); > > + > > + if ( p2m_frame_list ) > > + free(p2m_frame_list); > > + > > errno = err; > > return ret; > > } > > diff -r 77476eeb8c42 tools/libxc/xc_core_x86.h > > --- a/tools/libxc/xc_core_x86.h Wed Jan 14 11:39:01 2009 +0000 > > +++ b/tools/libxc/xc_core_x86.h Wed Jan 14 16:40:17 2009 -0700 > > @@ -21,15 +21,8 @@ > > #ifndef XC_CORE_X86_H > > #define XC_CORE_X86_H > > > > -#if defined(__i386__) || defined(__x86_64__) > > #define ELF_ARCH_DATA ELFDATA2LSB > > -#if defined (__i386__) > > -# define ELF_ARCH_MACHINE EM_386 > > -#else > > -# define ELF_ARCH_MACHINE EM_X86_64 > > -#endif > > -#endif /* __i386__ or __x86_64__ */ > > - > > +#define ELF_ARCH_MACHINE (guest_width == 8 ? EM_X86_64 : EM_386) > > > > struct xc_core_arch_context { > > /* nothing */ > > @@ -40,8 +33,10 @@ struct xc_core_arch_context { > > #define xc_core_arch_context_get(arch_ctxt, ctxt, xc_handle, domid) \ > > (0) > > #define xc_core_arch_context_dump(arch_ctxt, args, dump_rtn) (0) > > -#define xc_core_arch_gpfn_may_present(arch_ctxt, i) (1) > > > > +int > > +xc_core_arch_gpfn_may_present(struct xc_core_arch_context *arch_ctxt, > > + unsigned long pfn); > > static inline int > > xc_core_arch_context_get_shdr(struct xc_core_arch_context *arch_ctxt, > > struct xc_core_section_headers *sheaders, > > > _______________________________________________ > > Xen-devel mailing list > > Xen-devel@xxxxxxxxxxxxxxxxxxx > > http://lists.xensource.com/xen-devel > > -- yamahata -- Crash-utility mailing list Crash-utility@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/crash-utility