|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Resend: Linux 4.11-rc7: kernel BUG at drivers/xen/events/events_base.c:1221
On 25/04/17 13:28, Sander Eikelenboom wrote:
> On 25/04/17 13:00, Juergen Gross wrote:
>> On 25/04/17 12:33, Sander Eikelenboom wrote:
>>> On 25/04/17 09:01, Juergen Gross wrote:
>>>> On 25/04/17 08:57, Sander Eikelenboom wrote:
>>>>> On 25/04/17 08:42, Juergen Gross wrote:
>>>>>> On 25/04/17 08:35, Sander Eikelenboom wrote:
>>>>>>> (XEN) [2017-04-24 21:20:53.203] d0v0 Unhandled invalid opcode
>>>>>>> fault/trap [#6, ec=ffffffff]
>>>>>>> (XEN) [2017-04-24 21:20:53.203] domain_crash_sync called from entry.S:
>>>>>>> fault at ffff82d080358f70 entry.o#create_bounce_frame+0x145/0x154
>>>>>>> (XEN) [2017-04-24 21:20:53.203] Domain 0 (vcpu#0) crashed on cpu#0:
>>>>>>> (XEN) [2017-04-24 21:20:53.203] ----[ Xen-4.9-unstable x86_64 debug=y
>>>>>>> Not tainted ]----
>>>>>>> (XEN) [2017-04-24 21:20:53.203] CPU: 0
>>>>>>> (XEN) [2017-04-24 21:20:53.203] RIP: e033:[<ffffffff8255a485>]
>>>>>>
>>>>>> Can you please tell us symbol+offset for RIP?
>>>>>>
>>>>>> Juergen
>>>>>>
>>>>>
>>>>> Sure:
>>>>> # addr2line -e vmlinux-4.11.0-rc8-20170424-linus-doflr-xennext-boris+
>>>>> ffffffff8255a485
>>>>> linux-linus/arch/x86/xen/enlighten_pv.c:288
>>>>>
>>>>> Which is:
>>>>> static bool __init xen_check_xsave(void)
>>>>> {
>>>>> unsigned int err, eax, edx;
>>>>>
>>>>> /*
>>>>> * Xen 4.0 and older accidentally leaked the host XSAVE flag into
>>>>> guest
>>>>> * view, despite not being able to support guests using the
>>>>> * functionality. Probe for the actual availability of XSAVE by
>>>>> seeing
>>>>> * whether xgetbv executes successfully or raises #UD.
>>>>> */
>>>>> HERE --> asm volatile("1: .byte 0x0f,0x01,0xd0\n\t" /* xgetbv */
>>>>> "xor %[err], %[err]\n"
>>>>> "2:\n\t"
>>>>> ".pushsection .fixup,\"ax\"\n\t"
>>>>> "3: movl $1,%[err]\n\t"
>>>>> "jmp 2b\n\t"
>>>>> ".popsection\n\t"
>>>>> _ASM_EXTABLE(1b, 3b)
>>>>> : [err] "=r" (err), "=a" (eax), "=d" (edx)
>>>>> : "c" (0));
>>>>>
>>>>> return err == 0;
>>>>
>>>> I hoped so. :-)
>>>>
>>>> I posted a patch to repair this some minutes ago. Would you mind to try
>>>> it? See:
>>>>
>>>> https://lists.xen.org/archives/html/xen-devel/2017-04/msg02925.html
>>>>
>>>>
>>>> Juergen
>>>
>>> Hmm next up seems to be a hanging dom0 kernel somewhat later during boot,
>>> with not too many clues.
>>> (any output of xen debug-keys that could be of interest ?)
>>>
>> ...
>>> [ 0.000000] ACPI: Early table checksum verification disabled
>>> [ 0.000000] ACPI: RSDP 0x00000000000FB100 000014 (v00 ACPIAM)
>>> [ 0.000000] ACPI: RSDT 0x00000000AFF90000 000048 (v01 MSI OEMSLIC
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: FACP 0x00000000AFF90200 000084 (v01 7640MS A7640100
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: DSDT 0x00000000AFF905E0 009427 (v01 A7640 A7640100
>>> 00000100 INTL 20051117)
>>> [ 0.000000] ACPI: FACS 0x00000000AFF9E000 000040
>>> [ 0.000000] ACPI: APIC 0x00000000AFF90390 000088 (v01 7640MS A7640100
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: MCFG 0x00000000AFF90420 00003C (v01 7640MS OEMMCFG
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: SLIC 0x00000000AFF90460 000176 (v01 MSI OEMSLIC
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: OEMB 0x00000000AFF9E040 000072 (v01 7640MS A7640100
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: SRAT 0x00000000AFF9A5E0 000108 (v03 AMD FAM_F_10
>>> 00000002 AMD 00000001)
>>> [ 0.000000] ACPI: HPET 0x00000000AFF9A6F0 000038 (v01 7640MS OEMHPET
>>> 20100913 MSFT 00000097)
>>> [ 0.000000] ACPI: IVRS 0x00000000AFF9A730 000110 (v01 AMD RD890S
>>> 00202031 AMD 00000000)
>>> [ 0.000000] ACPI: SSDT 0x00000000AFF9A840 000DA4 (v01 A M I POWERNOW
>>> 00000001 AMD 00000001)
>>> [ 0.000000] ACPI: Local APIC address 0xfee00000
>>> [ 0.000000] Setting APIC ro
>>
>> Hmm, this seems to be only the first part of a message.
>>
>> Could you try debug-key "0" (probably multiple times) and have a look
>> where dom0 vcpu 0 is spending its time?
>>
>>
>> Juergen
>>
>
> Here you are:
>
> [ 0.000000] ACPI: Early table checksum verification disabled
> [ 0.000000] ACPI: RSDP 0x00000000000FB100 000014 (v00 ACPIAM)
> [ 0.000000] ACPI: RSDT 0x00000000AFF90000 000048 (v01 MSI OEMSLIC
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: FACP 0x00000000AFF90200 000084 (v01 7640MS A7640100
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: DSDT 0x00000000AFF905E0 009427 (v01 A7640 A7640100
> 00000100 INTL 20051117)
> [ 0.000000] ACPI: FACS 0x00000000AFF9E000 000040
> [ 0.000000] ACPI: APIC 0x00000000AFF90390 000088 (v01 7640MS A7640100
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: MCFG 0x00000000AFF90420 00003C (v01 7640MS OEMMCFG
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: SLIC 0x00000000AFF90460 000176 (v01 MSI OEMSLIC
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: OEMB 0x00000000AFF9E040 000072 (v01 7640MS A7640100
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: SRAT 0x00000000AFF9A5E0 000108 (v03 AMD FAM_F_10
> 00000002 AMD 00000001)
> [ 0.000000] ACPI: HPET 0x00000000AFF9A6F0 000038 (v01 7640MS OEMHPET
> 20100913 MSFT 00000097)
> [ 0.000000] ACPI: IVRS 0x00000000AFF9A730 000110 (v01 AMD RD890S
> 00202031 AMD 00000000)
> [ 0.000000] ACPI: SSDT 0x00000000AFF9A840 000DA4 (v01 A M I POWERNOW
> 00000001 AMD 00000001)
> [ 0.000000] ACPI: Local APIC address 0xfee00000
> [ 0.000000] Setting AP(XEN) [2017-04-25 11:11:35.568] *** Serial input ->
> Xen (type 'CTRL-a' three times to switch input to DOM0)
> (XEN) [2017-04-25 11:11:37.000] '0' pressed -> dumping Dom0's registers
> (XEN) [2017-04-25 11:11:37.001] *** Dumping Dom0 vcpu#0 state: ***
> (XEN) [2017-04-25 11:11:37.001] RIP: e033:[<ffffffff81cccde9>]
> (XEN) [2017-04-25 11:11:45.422] RIP: e033:[<ffffffff81cccde9>]
> (XEN) [2017-04-25 11:11:56.132] RIP: e033:[<ffffffff81ccc740>]
> (XEN) [2017-04-25 11:12:02.474] RIP: e033:[<ffffffff81cccde9>]
> (XEN) [2017-04-25 11:12:06.224] RIP: e033:[<ffffffff81ccc740>]
Thanks. If you just could translate those again to symbol+offset?
And the suspicious addresses on the stack as well:
ffffffff81023bfd
ffffffff81cc4620
ffffffff81ccb060
Juergen
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |