Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath

2020-03-05 Thread Sander Eikelenboom
On 05/03/2020 12:06, Jürgen Groß wrote:
> On 05.03.20 12:04, Sander Eikelenboom wrote:
>> On 05/03/2020 11:18, Jürgen Groß wrote:
>>> On 04.03.20 18:52, Sander Eikelenboom wrote:
 Hi Juergen,

 Just tested a 5.6.0-rc4'ish kernel 
 (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes 
 from x86 trees).
 Xen is the latest xen-unstable, dom0 kernel is 5.5.7.

 During boot of the PVH guest I got the splat below.
 With a 5.5.7 kernel the guest boots fine.
>>>
>>> There were 2 bugs. I have sent the patches.
>>
>> Sure ?
>> Haven't seen them coming in ...
> 
> https://patchew.org/Xen/20200305100331.16790-1-jgr...@suse.com/
> https://patchew.org/Xen/20200305100323.16736-1-jgr...@suse.com/
> 
> 
> Juergen
> 
Ah I was not CC'ed.

Will give them a test, thanks.

--
Sander

___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath

2020-03-05 Thread Jürgen Groß

On 05.03.20 12:04, Sander Eikelenboom wrote:

On 05/03/2020 11:18, Jürgen Groß wrote:

On 04.03.20 18:52, Sander Eikelenboom wrote:

Hi Juergen,

Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, 
so it includes the xen fixes from x86 trees).
Xen is the latest xen-unstable, dom0 kernel is 5.5.7.

During boot of the PVH guest I got the splat below.
With a 5.5.7 kernel the guest boots fine.


There were 2 bugs. I have sent the patches.


Sure ?
Haven't seen them coming in ...


https://patchew.org/Xen/20200305100331.16790-1-jgr...@suse.com/
https://patchew.org/Xen/20200305100323.16736-1-jgr...@suse.com/


Juergen

___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath

2020-03-05 Thread Sander Eikelenboom
On 05/03/2020 11:18, Jürgen Groß wrote:
> On 04.03.20 18:52, Sander Eikelenboom wrote:
>> Hi Juergen,
>>
>> Just tested a 5.6.0-rc4'ish kernel 
>> (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from 
>> x86 trees).
>> Xen is the latest xen-unstable, dom0 kernel is 5.5.7.
>>
>> During boot of the PVH guest I got the splat below.
>> With a 5.5.7 kernel the guest boots fine.
> 
> There were 2 bugs. I have sent the patches.

Sure ?
Haven't seen them coming in ...

--
Sander


> Interesting, though, that you did see only one of them (I hit the
> same bug as you did only after fixing the xenbus problem).
> 
> 
> Juergen




___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath

2020-03-05 Thread Jürgen Groß

On 04.03.20 18:52, Sander Eikelenboom wrote:

Hi Juergen,

Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, 
so it includes the xen fixes from x86 trees).
Xen is the latest xen-unstable, dom0 kernel is 5.5.7.

During boot of the PVH guest I got the splat below.
With a 5.5.7 kernel the guest boots fine.


There were 2 bugs. I have sent the patches.

Interesting, though, that you did see only one of them (I hit the
same bug as you did only after fixing the xenbus problem).


Juergen

___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath

2020-03-05 Thread Jürgen Groß

On 04.03.20 18:52, Sander Eikelenboom wrote:

Hi Juergen,

Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, 
so it includes the xen fixes from x86 trees).
Xen is the latest xen-unstable, dom0 kernel is 5.5.7.

During boot of the PVH guest I got the splat below.
With a 5.5.7 kernel the guest boots fine.


I think I have found the problem. Testing a patch now...


Juergen



--
Sander


[1.921031] general protection fault, probably for non-canonical address 
0x344a3feab7bf8:  [#1] SMP NOPTI
[1.921090] CPU: 1 PID: 1686 Comm: systemd-udevd Tainted: GW 
5.6.0-rc4-20200304-doflr-mac80211debug+ #1
[1.921134] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0
[1.921160] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 42 ff 
49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 24 b8 
00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84
[1.921229] RSP: 0018:c9213958 EFLAGS: 00010002
[1.921249] RAX: 327f RBX: 888005ce00e0 RCX: 0001
[1.921278] RDX: 3280 RSI:  RDI: 
[1.921307] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80
[1.921335] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8
[1.921365] R13: 88801f52c394 R14: 0001 R15: 0008
[1.921402] FS:  7f771d762d40() GS:88801f50() 
knlGS:
[1.921438] CS:  0010 DS:  ES:  CR0: 80050033
[1.921461] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0
[1.921608] Call Trace:
[1.921628]  ? ktime_get+0x31/0x90
[1.921646]  _raw_spin_lock_irqsave+0x2b/0x30
[1.921669]  blkif_queue_rq+0x6e/0x7c0
[1.921685]  ? wait_woken+0x80/0x80
[1.921701]  ? xen_clocksource_get_cycles+0x11/0x20
[1.921720]  ? ktime_get+0x31/0x90
[1.921737]  ? blk_mq_get_request+0x195/0x3b0
[1.921757]  ? blk_account_io_start+0xd4/0x150
[1.921776]  __blk_mq_try_issue_directly+0x10e/0x1c0
[1.921798]  blk_mq_request_issue_directly+0x43/0xe0
[1.921819]  blk_mq_try_issue_list_directly+0x3c/0xb0
[1.921840]  blk_mq_sched_insert_requests+0xa0/0xf0
[1.921860]  blk_mq_flush_plug_list+0x122/0x1e0
[1.921879]  blk_flush_plug_list+0xc1/0xf0
[1.921897]  blk_finish_plug+0x1c/0x29
[1.921914]  read_pages+0x7a/0x140
[1.921931]  __do_page_cache_readahead+0x188/0x1a0
[1.921952]  force_page_cache_readahead+0x8b/0xf0
[1.921972]  generic_file_read_iter+0x7e1/0xae0
[1.921993]  ? mem_cgroup_throttle_swaprate+0x1f/0x145
[1.922014]  ? _copy_to_user+0x26/0x30
[1.922031]  ? cp_new_stat+0x127/0x160
[1.922048]  new_sync_read+0x10f/0x1a0
[1.922064]  vfs_read+0x8c/0x140
[1.922081]  ksys_read+0x54/0xd0
[1.922098]  do_syscall_64+0x49/0x130
[1.922114]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[1.922138] RIP: 0033:0x7f771df43461
[1.922154] Code: fe ff ff 50 48 8d 3d fe d0 09 00 e8 e9 03 02 00 66 0f 1f 84 00 
00 00 00 00 48 8d 05 99 62 0d 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff 
ff 77 57 c3 66 0f 1f 44 00 00 41 54 49 89 d4 55 48
[1.95] RSP: 002b:7fffaae1a0c8 EFLAGS: 0246 ORIG_RAX: 

[1.922255] RAX: ffda RBX: 55d4cca138f0 RCX: 7f771df43461
[1.922284] RDX: 0040 RSI: 55d4cca164f8 RDI: 000c
[1.922313] RBP: 55d4cca13940 R08: 55d4cca164d0 R09: 0005
[1.922342] R10: 55d4cc9fe010 R11: 0246 R12: 00013fff
[1.922370] R13: 0040 R14: 55d4cca164e8 R15: 55d4cca164d0
[1.922398] Modules linked in:
[1.922415] ---[ end trace baa27c3655b1ea59 ]---
[1.922435] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0
[1.922459] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 42 ff 
49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 24 b8 
00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84
[1.922526] RSP: 0018:c9213958 EFLAGS: 00010002
[1.922545] RAX: 327f RBX: 888005ce00e0 RCX: 0001
[1.922574] RDX: 3280 RSI:  RDI: 
[1.924268] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80
[1.924302] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8
[1.924333] R13: 88801f52c394 R14: 0001 R15: 0008
[1.924377] FS:  7f771d762d40() GS:88801f50() 
knlGS:
[1.924409] CS:  0010 DS:  ES:  CR0: 80050033
[1.924434] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0
[1.924967] BUG: unable to handle page fault for address: 0013fff8
[1.924999] #PF: supervisor write access in kernel mode
[1.925020] #PF: error_code(0x0002) - not-present page
[1.925042] PGD 0 P4D 0
[1.925

[Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath

2020-03-04 Thread Sander Eikelenboom
Hi Juergen,

Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, 
so it includes the xen fixes from x86 trees).
Xen is the latest xen-unstable, dom0 kernel is 5.5.7.

During boot of the PVH guest I got the splat below.
With a 5.5.7 kernel the guest boots fine.

--
Sander


[1.921031] general protection fault, probably for non-canonical address 
0x344a3feab7bf8:  [#1] SMP NOPTI
[1.921090] CPU: 1 PID: 1686 Comm: systemd-udevd Tainted: GW 
5.6.0-rc4-20200304-doflr-mac80211debug+ #1
[1.921134] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0
[1.921160] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 
42 ff 49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 
24 b8 00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84
[1.921229] RSP: 0018:c9213958 EFLAGS: 00010002
[1.921249] RAX: 327f RBX: 888005ce00e0 RCX: 0001
[1.921278] RDX: 3280 RSI:  RDI: 
[1.921307] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80
[1.921335] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8
[1.921365] R13: 88801f52c394 R14: 0001 R15: 0008
[1.921402] FS:  7f771d762d40() GS:88801f50() 
knlGS:
[1.921438] CS:  0010 DS:  ES:  CR0: 80050033
[1.921461] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0
[1.921608] Call Trace:
[1.921628]  ? ktime_get+0x31/0x90
[1.921646]  _raw_spin_lock_irqsave+0x2b/0x30
[1.921669]  blkif_queue_rq+0x6e/0x7c0
[1.921685]  ? wait_woken+0x80/0x80
[1.921701]  ? xen_clocksource_get_cycles+0x11/0x20
[1.921720]  ? ktime_get+0x31/0x90
[1.921737]  ? blk_mq_get_request+0x195/0x3b0
[1.921757]  ? blk_account_io_start+0xd4/0x150
[1.921776]  __blk_mq_try_issue_directly+0x10e/0x1c0
[1.921798]  blk_mq_request_issue_directly+0x43/0xe0
[1.921819]  blk_mq_try_issue_list_directly+0x3c/0xb0
[1.921840]  blk_mq_sched_insert_requests+0xa0/0xf0
[1.921860]  blk_mq_flush_plug_list+0x122/0x1e0
[1.921879]  blk_flush_plug_list+0xc1/0xf0
[1.921897]  blk_finish_plug+0x1c/0x29
[1.921914]  read_pages+0x7a/0x140
[1.921931]  __do_page_cache_readahead+0x188/0x1a0
[1.921952]  force_page_cache_readahead+0x8b/0xf0
[1.921972]  generic_file_read_iter+0x7e1/0xae0
[1.921993]  ? mem_cgroup_throttle_swaprate+0x1f/0x145
[1.922014]  ? _copy_to_user+0x26/0x30
[1.922031]  ? cp_new_stat+0x127/0x160
[1.922048]  new_sync_read+0x10f/0x1a0
[1.922064]  vfs_read+0x8c/0x140
[1.922081]  ksys_read+0x54/0xd0
[1.922098]  do_syscall_64+0x49/0x130
[1.922114]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[1.922138] RIP: 0033:0x7f771df43461
[1.922154] Code: fe ff ff 50 48 8d 3d fe d0 09 00 e8 e9 03 02 00 66 0f 1f 
84 00 00 00 00 00 48 8d 05 99 62 0d 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 
f0 ff ff 77 57 c3 66 0f 1f 44 00 00 41 54 49 89 d4 55 48
[1.95] RSP: 002b:7fffaae1a0c8 EFLAGS: 0246 ORIG_RAX: 

[1.922255] RAX: ffda RBX: 55d4cca138f0 RCX: 7f771df43461
[1.922284] RDX: 0040 RSI: 55d4cca164f8 RDI: 000c
[1.922313] RBP: 55d4cca13940 R08: 55d4cca164d0 R09: 0005
[1.922342] R10: 55d4cc9fe010 R11: 0246 R12: 00013fff
[1.922370] R13: 0040 R14: 55d4cca164e8 R15: 55d4cca164d0
[1.922398] Modules linked in:
[1.922415] ---[ end trace baa27c3655b1ea59 ]---
[1.922435] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0
[1.922459] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 
42 ff 49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 
24 b8 00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84
[1.922526] RSP: 0018:c9213958 EFLAGS: 00010002
[1.922545] RAX: 327f RBX: 888005ce00e0 RCX: 0001
[1.922574] RDX: 3280 RSI:  RDI: 
[1.924268] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80
[1.924302] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8
[1.924333] R13: 88801f52c394 R14: 0001 R15: 0008
[1.924377] FS:  7f771d762d40() GS:88801f50() 
knlGS:
[1.924409] CS:  0010 DS:  ES:  CR0: 80050033
[1.924434] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0
[1.924967] BUG: unable to handle page fault for address: 0013fff8
[1.924999] #PF: supervisor write access in kernel mode
[1.925020] #PF: error_code(0x0002) - not-present page
[1.925042] PGD 0 P4D 0 
[1.925056] Oops: 0002 [#2] SMP NOPTI
[1.925073] CPU: 1 PID: 1686 Comm: systemd-udevd Tainted: G  D W 
5.6.0