Port-xen archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: xen-4.15.0 / NetBSD 9.2 dom0 crash



On Fri, 27 Aug 2021 06:43:07 -0000 (UTC), 
> This seems to be a very early crash (GPF) in Dom0. Do you also have
> the trap frame / backtrace data from Dom0 that should follow these
> messages ?

Here is the complete boot log. After the crash it automatically reboot 
after 5s. We have a stack, but I am not sure I read it correctly (using gdb on
vanilla NetBSD-9.2/amd64 XEN3_DOM0  kernel

0xffffffff8021d36c <pat_init+25>:        wrmsr 
0xffffffff80208fc3 <init_x86_64+193>:    callq  0xffffffff8021a620 <consinit>

Reading the sources, I could work around but disabling the CPU flag CPUID_PAT.
Perhaps the cpuid xen boot option could help, but the documentation does not 
tell about PAT.

(XEN) Xen version 4.15.0nb0 (root@) (gcc (nb3 20190319) 7.4.0) debug=n Thu Jul
1 09:45:54 UTC 2021
(XEN) Latest ChangeSet:
(XEN) Bootloader: unknown
(XEN) Command line: dom0_mem=1024M console=com1 com1=115200,8n1
(XEN) Xen image load base address: 0
(XEN) Video information:
(XEN)  VGA is text mode 80x25, font 8x16
(XEN)  VBE/DDC methods: V2; EDID transfer time: 1 seconds
(XEN) Disc information:
(XEN)  Found 3 MBR signatures
(XEN)  Found 4 EDD information structures
(XEN) Xen-e820 RAM map:
(XEN)  [0000000000000000, 0000000000098bff] (usable)
(XEN)  [0000000000098c00, 000000000009ffff] (reserved)
(XEN)  [00000000000e0000, 00000000000fffff] (reserved)
(XEN)  [0000000000100000, 000000009707efff] (usable)
(XEN)  [000000009707f000, 000000009707ffff] (ACPI NVS)
(XEN)  [0000000097080000, 0000000097080fff] (reserved)
(XEN)  [0000000097081000, 000000009dc50fff] (usable)
(XEN)  [000000009dc51000, 000000009dfe5fff] (reserved)
(XEN)  [000000009dfe6000, 000000009e121fff] (usable)
(XEN)  [000000009e122000, 000000009e829fff] (ACPI NVS)
(XEN)  [000000009e82a000, 000000009effefff] (reserved)
(XEN)  [000000009efff000, 000000009effffff] (usable)
(XEN)  [000000009f000000, 000000009fffffff] (reserved)
(XEN)  [00000000e0000000, 00000000efffffff] (reserved)
(XEN)  [00000000fe000000, 00000000fe010fff] (reserved)
(XEN)  [00000000fec00000, 00000000fec00fff] (reserved)
(XEN)  [00000000fed00000, 00000000fed00fff] (reserved)
(XEN)  [00000000fee00000, 00000000fee00fff] (reserved)
(XEN)  [00000000ff000000, 00000000ffffffff] (reserved)
(XEN)  [0000000100000000, 000000045dffffff] (usable)
(XEN) New Xen image base address: 0x9d600000
(XEN) ACPI: RSDP 000F05B0, 0024 (r2 SUPERM)
(XEN) ACPI Warning (tbutils-0421): BIOS XSDT has NULL entry, using RSDT
[20070126]
(XEN) ACPI: RSDT 9E122028, 007C (r1 SUPERM   SUPERM  1072009 MSFT    10013)
(XEN) ACPI: FACP 9E122190, 0084 (r2                  1072009 AMI     10013)
(XEN) ACPI: DSDT 9E122218, 28659 (r2 SUPERM SMCI--MB  1072009 INTL 20160422)
(XEN) ACPI: FACS 9E829C00, 0040
(XEN) ACPI: APIC 9E14A990, 0084 (r3                  1072009 AMI     10013)
(XEN) ACPI: FPDT 9E14AA18, 0044 (r1                  1072009 AMI     10013)
(XEN) ACPI: MCFG 9E14AA60, 003C (r1 SUPERM SMCI--MB  1072009 MSFT       97)
(XEN) ACPI: SSDT 9E14AAA0, 0224 (r1 SataRe SataTabl     1000 INTL 20160422)
(XEN) ACPI: FIDT 9E14ACC8, 009C (r1 SUPERM SMCI--MB  1072009 AMI     10013)
(XEN) ACPI: SSDT 9E14AD68, 3159 (r2 SaSsdt  SaSsdt      3000 INTL 20160422)
(XEN) ACPI: SSDT 9E14DEC8, 255F (r2 PegSsd  PegSsdt     1000 INTL 20160422)
(XEN) ACPI: HPET 9E150428, 0038 (r1 INTEL       KBL        1 MSFT       5F)
(XEN) ACPI: SSDT 9E150460, 0DE5 (r2 INTEL  Ther_Rvp     1000 INTL 20160422)
(XEN) ACPI: SSDT 9E151248, 0AB9 (r2  INTEL xh_rvp08        0 INTL 20160422)
(XEN) ACPI: UEFI 9E151D08, 0042 (r1 INTEL  EDK2            2       1000013)
(XEN) ACPI: SSDT 9E151D50, 0EDE (r2 CpuRef  CpuSsdt     3000 INTL 20160422)
(XEN) ACPI: LPIT 9E152C30, 0094 (r1 INTEL       KBL        0 MSFT       5F)
(XEN) ACPI: WSMT 9E152CC8, 0028 (r1 INTEL       KBL        0 MSFT       5F)
(XEN) ACPI: SSDT 9E152CF0, 029F (r2 INTEL  sensrhub        0 INTL 20160422)
(XEN) ACPI: SSDT 9E152F90, 3002 (r2 INTEL  PtidDevc     1000 INTL 20160422)
(XEN) ACPI: DBGP 9E155F98, 0034 (r1 INTEL                  2 MSFT       5F)
(XEN) ACPI: DBG2 9E155FD0, 0054 (r0 INTEL                  2 MSFT       5F)
(XEN) ACPI: DMAR 9E156028, 00B8 (r1 INTEL      KBL         1 INTL        1)
(XEN) ACPI: ASF! 9E1560E0, 00A0 (r32 INTEL       HCG        1 TFSM    F4240)
(XEN) ACPI Error (tbutils-0253): Null physical address for ACPI table [<NULL>]
[20070126]
(XEN) System RAM: 16317MB (16708752kB)
(XEN) Domain heap initialised
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) Enabling APIC mode:  Flat.  Using 1 I/O APICs
(XEN) Switched to APIC driver x2apic_cluster
(XEN) CPU0: TSC: ratio: 250 / 2
(XEN) CPU0: bus: 100 MHz base: 3000 MHz max: 3500 MHz
(XEN) CPU0: 800 ... 3000 MHz
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) Speculative mitigation facilities:
(XEN)   Hardware features:
(XEN)   Compiled-in support: INDIRECT_THUNK SHADOW_PAGING
(XEN)   Xen settings: BTI-Thunk RETPOLINE, SPEC_CTRL: No, Other: BRANCH_HARDEN
(XEN)   L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address
8000000000
(XEN)   Support for HVM VMs: RSB EAGER_FPU
(XEN)   Support for PV VMs: RSB EAGER_FPU
(XEN)   XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN)   PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 24.000MHz HPET
(XEN) Detected 3000.204 MHz processor.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB
(XEN) Intel VT-d Snoop Control enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN)  - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN)  -> Using old ACK method
(XEN) Allocated console ring of 16 KiB.
(XEN) VMX: Supported advanced features:
(XEN)  - APIC MMIO access virtualisation
(XEN)  - APIC TPR shadow
(XEN)  - Extended Page Tables (EPT)
(XEN)  - Virtual-Processor Identifiers (VPID)
(XEN)  - Virtual NMI
(XEN)  - MSR direct-access bitmap
(XEN)  - Unrestricted Guest
(XEN)  - VMCS shadowing
(XEN)  - VM Functions
(XEN)  - Virtualisation Exceptions
(XEN)  - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) VMX: Disabling executable EPT superpages due to CVE-2018-12207
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) Brought up 4 CPUs
(XEN) Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) Dom0 has maximum 744 PIRQs
(XEN)  Xen  kernel: 64-bit, lsb, compat32
(XEN)  Dom0 kernel: 64-bit, PAE, lsb, paddr 0xffffffff80200000 ->
0xffffffff80f16000
(XEN)  Dom0 symbol map 0xffffffff80f16000 -> 0xffffffff8106a568
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN)  Dom0 alloc.:   000000044e000000->0000000450000000 (253952 pages to be
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN)  Loaded kernel: ffffffff80200000->ffffffff8106a568
(XEN)  Init. ramdisk: ffffffff8106b000->ffffffff8106b000
(XEN)  Phys-Mach map: ffffffff8106b000->ffffffff8126b000
(XEN)  Start info:    ffffffff8126b000->ffffffff8126b4b8
(XEN)  Xenstore ring: 0000000000000000->0000000000000000
(XEN)  Console ring:  0000000000000000->0000000000000000
(XEN)  Page tables:   ffffffff8126c000->ffffffff81279000
(XEN)  Boot stack:    ffffffff81279000->ffffffff8127a000
(XEN)  TOTAL:         ffffffff80000000->ffffffff81400000
(XEN)  ENTRY ADDRESS: ffffffff80200000
(XEN) Dom0 has maximum 4 VCPUs
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 604kB init memory
(XEN) d0v0 Unhandled general protection fault fault/trap [#13, ec=0000]
(XEN) domain_crash_sync called from entry.S: fault at ffff82d0402fcfb8
x86_64/entry.S#create_bounce_frame+0x14f/0x167
(XEN) Domain 0 (vcpu#0) crashed on cpu#3:
(XEN) ----[ Xen-4.15.0nb0  x86_64  debug=n  Not tainted ]----
(XEN) CPU:    3
(XEN) RIP:    e033:[<ffffffff8021d36c>]
(XEN) RFLAGS: 0000000000000202   EM: 1   CONTEXT: pv guest (d0v0)
(XEN) rax: 0000000000070106   rbx: 00000000012a6000   rcx: 0000000000000277
(XEN) rdx: 0000000000070106   rsi: ffffffff80bc12e0   rdi: ffffffff80cf3dc0
(XEN) rbp: ffffffff812a4eb0   rsp: ffffffff812a4e70   r8:  0000000000000000
(XEN) r9:  0000000000000008   r10: 0000000000000000   r11: 0000000000000001
(XEN) r12: 0000000000000000   r13: ffffffff812a1000   r14: 0000000000000000
(XEN) r15: 0000000000000000   cr0: 0000000080050033   cr4: 0000000000362660
(XEN) cr3: 000000044f26c000   cr2: 0000000000000000
(XEN) fsb: 0000000000000000   gsb: ffffffff80cf3dc0   gss: 0000000000000000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e02b   cs: e033
(XEN) Guest stack trace from rsp=ffffffff812a4e70:
(XEN)    0000000000000277 0000000000000001 0000000000000000 ffffffff8021d36c
(XEN)    000000010000e030 0000000000010002 ffffffff812a4eb0 000000000000e02b
(XEN)    ffffffff812a4f00 ffffffff80208fc3 00000000756e6547 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 00000000756e6547
(XEN)    0000000000000000 0000000000000000 0000000000000000 ffffffff802000a6
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000



-- 
Emmanuel Dreyfus
http://hcpnet.free.fr/pubz
manu%netbsd.org@localhost


Home | Main Index | Thread Index | Old Index