Port-xen archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: xen-4.15.0 / NetBSD 9.2 dom0 crash
On Fri, 27 Aug 2021 06:43:07 -0000 (UTC),
> This seems to be a very early crash (GPF) in Dom0. Do you also have
> the trap frame / backtrace data from Dom0 that should follow these
> messages ?
Here is the complete boot log. After the crash it automatically reboot
after 5s. We have a stack, but I am not sure I read it correctly (using gdb on
vanilla NetBSD-9.2/amd64 XEN3_DOM0 kernel
0xffffffff8021d36c <pat_init+25>: wrmsr
0xffffffff80208fc3 <init_x86_64+193>: callq 0xffffffff8021a620 <consinit>
Reading the sources, I could work around but disabling the CPU flag CPUID_PAT.
Perhaps the cpuid xen boot option could help, but the documentation does not
tell about PAT.
(XEN) Xen version 4.15.0nb0 (root@) (gcc (nb3 20190319) 7.4.0) debug=n Thu Jul
1 09:45:54 UTC 2021
(XEN) Latest ChangeSet:
(XEN) Bootloader: unknown
(XEN) Command line: dom0_mem=1024M console=com1 com1=115200,8n1
(XEN) Xen image load base address: 0
(XEN) Video information:
(XEN) VGA is text mode 80x25, font 8x16
(XEN) VBE/DDC methods: V2; EDID transfer time: 1 seconds
(XEN) Disc information:
(XEN) Found 3 MBR signatures
(XEN) Found 4 EDD information structures
(XEN) Xen-e820 RAM map:
(XEN) [0000000000000000, 0000000000098bff] (usable)
(XEN) [0000000000098c00, 000000000009ffff] (reserved)
(XEN) [00000000000e0000, 00000000000fffff] (reserved)
(XEN) [0000000000100000, 000000009707efff] (usable)
(XEN) [000000009707f000, 000000009707ffff] (ACPI NVS)
(XEN) [0000000097080000, 0000000097080fff] (reserved)
(XEN) [0000000097081000, 000000009dc50fff] (usable)
(XEN) [000000009dc51000, 000000009dfe5fff] (reserved)
(XEN) [000000009dfe6000, 000000009e121fff] (usable)
(XEN) [000000009e122000, 000000009e829fff] (ACPI NVS)
(XEN) [000000009e82a000, 000000009effefff] (reserved)
(XEN) [000000009efff000, 000000009effffff] (usable)
(XEN) [000000009f000000, 000000009fffffff] (reserved)
(XEN) [00000000e0000000, 00000000efffffff] (reserved)
(XEN) [00000000fe000000, 00000000fe010fff] (reserved)
(XEN) [00000000fec00000, 00000000fec00fff] (reserved)
(XEN) [00000000fed00000, 00000000fed00fff] (reserved)
(XEN) [00000000fee00000, 00000000fee00fff] (reserved)
(XEN) [00000000ff000000, 00000000ffffffff] (reserved)
(XEN) [0000000100000000, 000000045dffffff] (usable)
(XEN) New Xen image base address: 0x9d600000
(XEN) ACPI: RSDP 000F05B0, 0024 (r2 SUPERM)
(XEN) ACPI Warning (tbutils-0421): BIOS XSDT has NULL entry, using RSDT
[20070126]
(XEN) ACPI: RSDT 9E122028, 007C (r1 SUPERM SUPERM 1072009 MSFT 10013)
(XEN) ACPI: FACP 9E122190, 0084 (r2 1072009 AMI 10013)
(XEN) ACPI: DSDT 9E122218, 28659 (r2 SUPERM SMCI--MB 1072009 INTL 20160422)
(XEN) ACPI: FACS 9E829C00, 0040
(XEN) ACPI: APIC 9E14A990, 0084 (r3 1072009 AMI 10013)
(XEN) ACPI: FPDT 9E14AA18, 0044 (r1 1072009 AMI 10013)
(XEN) ACPI: MCFG 9E14AA60, 003C (r1 SUPERM SMCI--MB 1072009 MSFT 97)
(XEN) ACPI: SSDT 9E14AAA0, 0224 (r1 SataRe SataTabl 1000 INTL 20160422)
(XEN) ACPI: FIDT 9E14ACC8, 009C (r1 SUPERM SMCI--MB 1072009 AMI 10013)
(XEN) ACPI: SSDT 9E14AD68, 3159 (r2 SaSsdt SaSsdt 3000 INTL 20160422)
(XEN) ACPI: SSDT 9E14DEC8, 255F (r2 PegSsd PegSsdt 1000 INTL 20160422)
(XEN) ACPI: HPET 9E150428, 0038 (r1 INTEL KBL 1 MSFT 5F)
(XEN) ACPI: SSDT 9E150460, 0DE5 (r2 INTEL Ther_Rvp 1000 INTL 20160422)
(XEN) ACPI: SSDT 9E151248, 0AB9 (r2 INTEL xh_rvp08 0 INTL 20160422)
(XEN) ACPI: UEFI 9E151D08, 0042 (r1 INTEL EDK2 2 1000013)
(XEN) ACPI: SSDT 9E151D50, 0EDE (r2 CpuRef CpuSsdt 3000 INTL 20160422)
(XEN) ACPI: LPIT 9E152C30, 0094 (r1 INTEL KBL 0 MSFT 5F)
(XEN) ACPI: WSMT 9E152CC8, 0028 (r1 INTEL KBL 0 MSFT 5F)
(XEN) ACPI: SSDT 9E152CF0, 029F (r2 INTEL sensrhub 0 INTL 20160422)
(XEN) ACPI: SSDT 9E152F90, 3002 (r2 INTEL PtidDevc 1000 INTL 20160422)
(XEN) ACPI: DBGP 9E155F98, 0034 (r1 INTEL 2 MSFT 5F)
(XEN) ACPI: DBG2 9E155FD0, 0054 (r0 INTEL 2 MSFT 5F)
(XEN) ACPI: DMAR 9E156028, 00B8 (r1 INTEL KBL 1 INTL 1)
(XEN) ACPI: ASF! 9E1560E0, 00A0 (r32 INTEL HCG 1 TFSM F4240)
(XEN) ACPI Error (tbutils-0253): Null physical address for ACPI table [<NULL>]
[20070126]
(XEN) System RAM: 16317MB (16708752kB)
(XEN) Domain heap initialised
(XEN) IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
(XEN) Enabling APIC mode: Flat. Using 1 I/O APICs
(XEN) Switched to APIC driver x2apic_cluster
(XEN) CPU0: TSC: ratio: 250 / 2
(XEN) CPU0: bus: 100 MHz base: 3000 MHz max: 3500 MHz
(XEN) CPU0: 800 ... 3000 MHz
(XEN) xstate: size: 0x440 and states: 0x1f
(XEN) Speculative mitigation facilities:
(XEN) Hardware features:
(XEN) Compiled-in support: INDIRECT_THUNK SHADOW_PAGING
(XEN) Xen settings: BTI-Thunk RETPOLINE, SPEC_CTRL: No, Other: BRANCH_HARDEN
(XEN) L1TF: believed vulnerable, maxphysaddr L1D 46, CPUID 39, Safe address
8000000000
(XEN) Support for HVM VMs: RSB EAGER_FPU
(XEN) Support for PV VMs: RSB EAGER_FPU
(XEN) XPTI (64-bit PV only): Dom0 enabled, DomU enabled (with PCID)
(XEN) PV L1TF shadowing: Dom0 disabled, DomU enabled
(XEN) Using scheduler: SMP Credit Scheduler rev2 (credit2)
(XEN) Initializing Credit2 scheduler
(XEN) Platform timer is 24.000MHz HPET
(XEN) Detected 3000.204 MHz processor.
(XEN) Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB
(XEN) Intel VT-d Snoop Control enabled.
(XEN) Intel VT-d Dom0 DMA Passthrough not enabled.
(XEN) Intel VT-d Queued Invalidation enabled.
(XEN) Intel VT-d Interrupt Remapping enabled.
(XEN) Intel VT-d Posted Interrupt not enabled.
(XEN) Intel VT-d Shared EPT tables enabled.
(XEN) I/O virtualisation enabled
(XEN) - Dom0 mode: Relaxed
(XEN) Interrupt remapping enabled
(XEN) Enabled directed EOI with ioapic_ack_old on!
(XEN) ENABLING IO-APIC IRQs
(XEN) -> Using old ACK method
(XEN) Allocated console ring of 16 KiB.
(XEN) VMX: Supported advanced features:
(XEN) - APIC MMIO access virtualisation
(XEN) - APIC TPR shadow
(XEN) - Extended Page Tables (EPT)
(XEN) - Virtual-Processor Identifiers (VPID)
(XEN) - Virtual NMI
(XEN) - MSR direct-access bitmap
(XEN) - Unrestricted Guest
(XEN) - VMCS shadowing
(XEN) - VM Functions
(XEN) - Virtualisation Exceptions
(XEN) - Page Modification Logging
(XEN) HVM: ASIDs enabled.
(XEN) VMX: Disabling executable EPT superpages due to CVE-2018-12207
(XEN) HVM: VMX enabled
(XEN) HVM: Hardware Assisted Paging (HAP) detected
(XEN) HVM: HAP page sizes: 4kB, 2MB, 1GB
(XEN) Brought up 4 CPUs
(XEN) Scheduling granularity: cpu, 1 CPU per sched-resource
(XEN) Dom0 has maximum 744 PIRQs
(XEN) Xen kernel: 64-bit, lsb, compat32
(XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0xffffffff80200000 ->
0xffffffff80f16000
(XEN) Dom0 symbol map 0xffffffff80f16000 -> 0xffffffff8106a568
(XEN) PHYSICAL MEMORY ARRANGEMENT:
(XEN) Dom0 alloc.: 000000044e000000->0000000450000000 (253952 pages to be
allocated)
(XEN) VIRTUAL MEMORY ARRANGEMENT:
(XEN) Loaded kernel: ffffffff80200000->ffffffff8106a568
(XEN) Init. ramdisk: ffffffff8106b000->ffffffff8106b000
(XEN) Phys-Mach map: ffffffff8106b000->ffffffff8126b000
(XEN) Start info: ffffffff8126b000->ffffffff8126b4b8
(XEN) Xenstore ring: 0000000000000000->0000000000000000
(XEN) Console ring: 0000000000000000->0000000000000000
(XEN) Page tables: ffffffff8126c000->ffffffff81279000
(XEN) Boot stack: ffffffff81279000->ffffffff8127a000
(XEN) TOTAL: ffffffff80000000->ffffffff81400000
(XEN) ENTRY ADDRESS: ffffffff80200000
(XEN) Dom0 has maximum 4 VCPUs
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Scrubbing Free RAM in background
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
(XEN) Freed 604kB init memory
(XEN) d0v0 Unhandled general protection fault fault/trap [#13, ec=0000]
(XEN) domain_crash_sync called from entry.S: fault at ffff82d0402fcfb8
x86_64/entry.S#create_bounce_frame+0x14f/0x167
(XEN) Domain 0 (vcpu#0) crashed on cpu#3:
(XEN) ----[ Xen-4.15.0nb0 x86_64 debug=n Not tainted ]----
(XEN) CPU: 3
(XEN) RIP: e033:[<ffffffff8021d36c>]
(XEN) RFLAGS: 0000000000000202 EM: 1 CONTEXT: pv guest (d0v0)
(XEN) rax: 0000000000070106 rbx: 00000000012a6000 rcx: 0000000000000277
(XEN) rdx: 0000000000070106 rsi: ffffffff80bc12e0 rdi: ffffffff80cf3dc0
(XEN) rbp: ffffffff812a4eb0 rsp: ffffffff812a4e70 r8: 0000000000000000
(XEN) r9: 0000000000000008 r10: 0000000000000000 r11: 0000000000000001
(XEN) r12: 0000000000000000 r13: ffffffff812a1000 r14: 0000000000000000
(XEN) r15: 0000000000000000 cr0: 0000000080050033 cr4: 0000000000362660
(XEN) cr3: 000000044f26c000 cr2: 0000000000000000
(XEN) fsb: 0000000000000000 gsb: ffffffff80cf3dc0 gss: 0000000000000000
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033
(XEN) Guest stack trace from rsp=ffffffff812a4e70:
(XEN) 0000000000000277 0000000000000001 0000000000000000 ffffffff8021d36c
(XEN) 000000010000e030 0000000000010002 ffffffff812a4eb0 000000000000e02b
(XEN) ffffffff812a4f00 ffffffff80208fc3 00000000756e6547 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 00000000756e6547
(XEN) 0000000000000000 0000000000000000 0000000000000000 ffffffff802000a6
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) 0000000000000000 0000000000000000 0000000000000000 0000000000000000
--
Emmanuel Dreyfus
http://hcpnet.free.fr/pubz
manu%netbsd.org@localhost
Home |
Main Index |
Thread Index |
Old Index