Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath
On 05/03/2020 12:06, Jürgen Groß wrote: > On 05.03.20 12:04, Sander Eikelenboom wrote: >> On 05/03/2020 11:18, Jürgen Groß wrote: >>> On 04.03.20 18:52, Sander Eikelenboom wrote: Hi Juergen, Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from x86 trees). Xen is the latest xen-unstable, dom0 kernel is 5.5.7. During boot of the PVH guest I got the splat below. With a 5.5.7 kernel the guest boots fine. >>> >>> There were 2 bugs. I have sent the patches. >> >> Sure ? >> Haven't seen them coming in ... > > https://patchew.org/Xen/20200305100331.16790-1-jgr...@suse.com/ > https://patchew.org/Xen/20200305100323.16736-1-jgr...@suse.com/ > > > Juergen > Ah I was not CC'ed. Will give them a test, thanks. -- Sander ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath
On 05.03.20 12:04, Sander Eikelenboom wrote: On 05/03/2020 11:18, Jürgen Groß wrote: On 04.03.20 18:52, Sander Eikelenboom wrote: Hi Juergen, Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from x86 trees). Xen is the latest xen-unstable, dom0 kernel is 5.5.7. During boot of the PVH guest I got the splat below. With a 5.5.7 kernel the guest boots fine. There were 2 bugs. I have sent the patches. Sure ? Haven't seen them coming in ... https://patchew.org/Xen/20200305100331.16790-1-jgr...@suse.com/ https://patchew.org/Xen/20200305100323.16736-1-jgr...@suse.com/ Juergen ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath
On 05/03/2020 11:18, Jürgen Groß wrote: > On 04.03.20 18:52, Sander Eikelenboom wrote: >> Hi Juergen, >> >> Just tested a 5.6.0-rc4'ish kernel >> (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from >> x86 trees). >> Xen is the latest xen-unstable, dom0 kernel is 5.5.7. >> >> During boot of the PVH guest I got the splat below. >> With a 5.5.7 kernel the guest boots fine. > > There were 2 bugs. I have sent the patches. Sure ? Haven't seen them coming in ... -- Sander > Interesting, though, that you did see only one of them (I hit the > same bug as you did only after fixing the xenbus problem). > > > Juergen ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath
On 04.03.20 18:52, Sander Eikelenboom wrote: Hi Juergen, Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from x86 trees). Xen is the latest xen-unstable, dom0 kernel is 5.5.7. During boot of the PVH guest I got the splat below. With a 5.5.7 kernel the guest boots fine. There were 2 bugs. I have sent the patches. Interesting, though, that you did see only one of them (I hit the same bug as you did only after fixing the xenbus problem). Juergen ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
Re: [Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath
On 04.03.20 18:52, Sander Eikelenboom wrote: Hi Juergen, Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from x86 trees). Xen is the latest xen-unstable, dom0 kernel is 5.5.7. During boot of the PVH guest I got the splat below. With a 5.5.7 kernel the guest boots fine. I think I have found the problem. Testing a patch now... Juergen -- Sander [1.921031] general protection fault, probably for non-canonical address 0x344a3feab7bf8: [#1] SMP NOPTI [1.921090] CPU: 1 PID: 1686 Comm: systemd-udevd Tainted: GW 5.6.0-rc4-20200304-doflr-mac80211debug+ #1 [1.921134] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0 [1.921160] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 42 ff 49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 24 b8 00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84 [1.921229] RSP: 0018:c9213958 EFLAGS: 00010002 [1.921249] RAX: 327f RBX: 888005ce00e0 RCX: 0001 [1.921278] RDX: 3280 RSI: RDI: [1.921307] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80 [1.921335] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8 [1.921365] R13: 88801f52c394 R14: 0001 R15: 0008 [1.921402] FS: 7f771d762d40() GS:88801f50() knlGS: [1.921438] CS: 0010 DS: ES: CR0: 80050033 [1.921461] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0 [1.921608] Call Trace: [1.921628] ? ktime_get+0x31/0x90 [1.921646] _raw_spin_lock_irqsave+0x2b/0x30 [1.921669] blkif_queue_rq+0x6e/0x7c0 [1.921685] ? wait_woken+0x80/0x80 [1.921701] ? xen_clocksource_get_cycles+0x11/0x20 [1.921720] ? ktime_get+0x31/0x90 [1.921737] ? blk_mq_get_request+0x195/0x3b0 [1.921757] ? blk_account_io_start+0xd4/0x150 [1.921776] __blk_mq_try_issue_directly+0x10e/0x1c0 [1.921798] blk_mq_request_issue_directly+0x43/0xe0 [1.921819] blk_mq_try_issue_list_directly+0x3c/0xb0 [1.921840] blk_mq_sched_insert_requests+0xa0/0xf0 [1.921860] blk_mq_flush_plug_list+0x122/0x1e0 [1.921879] blk_flush_plug_list+0xc1/0xf0 [1.921897] blk_finish_plug+0x1c/0x29 [1.921914] read_pages+0x7a/0x140 [1.921931] __do_page_cache_readahead+0x188/0x1a0 [1.921952] force_page_cache_readahead+0x8b/0xf0 [1.921972] generic_file_read_iter+0x7e1/0xae0 [1.921993] ? mem_cgroup_throttle_swaprate+0x1f/0x145 [1.922014] ? _copy_to_user+0x26/0x30 [1.922031] ? cp_new_stat+0x127/0x160 [1.922048] new_sync_read+0x10f/0x1a0 [1.922064] vfs_read+0x8c/0x140 [1.922081] ksys_read+0x54/0xd0 [1.922098] do_syscall_64+0x49/0x130 [1.922114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [1.922138] RIP: 0033:0x7f771df43461 [1.922154] Code: fe ff ff 50 48 8d 3d fe d0 09 00 e8 e9 03 02 00 66 0f 1f 84 00 00 00 00 00 48 8d 05 99 62 0d 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 c3 66 0f 1f 44 00 00 41 54 49 89 d4 55 48 [1.95] RSP: 002b:7fffaae1a0c8 EFLAGS: 0246 ORIG_RAX: [1.922255] RAX: ffda RBX: 55d4cca138f0 RCX: 7f771df43461 [1.922284] RDX: 0040 RSI: 55d4cca164f8 RDI: 000c [1.922313] RBP: 55d4cca13940 R08: 55d4cca164d0 R09: 0005 [1.922342] R10: 55d4cc9fe010 R11: 0246 R12: 00013fff [1.922370] R13: 0040 R14: 55d4cca164e8 R15: 55d4cca164d0 [1.922398] Modules linked in: [1.922415] ---[ end trace baa27c3655b1ea59 ]--- [1.922435] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0 [1.922459] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 42 ff 49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 24 b8 00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84 [1.922526] RSP: 0018:c9213958 EFLAGS: 00010002 [1.922545] RAX: 327f RBX: 888005ce00e0 RCX: 0001 [1.922574] RDX: 3280 RSI: RDI: [1.924268] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80 [1.924302] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8 [1.924333] R13: 88801f52c394 R14: 0001 R15: 0008 [1.924377] FS: 7f771d762d40() GS:88801f50() knlGS: [1.924409] CS: 0010 DS: ES: CR0: 80050033 [1.924434] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0 [1.924967] BUG: unable to handle page fault for address: 0013fff8 [1.924999] #PF: supervisor write access in kernel mode [1.925020] #PF: error_code(0x0002) - not-present page [1.925042] PGD 0 P4D 0 [1.925
[Xen-devel] xen boot PVH guest with linux 5.6.0-rc4-ish kernel: general protection fault, RIP: 0010:__pv_queued_spin_lock_slowpath
Hi Juergen, Just tested a 5.6.0-rc4'ish kernel (8b614cb8f1dcac8ca77cf4dd85f46ef3055f8238, so it includes the xen fixes from x86 trees). Xen is the latest xen-unstable, dom0 kernel is 5.5.7. During boot of the PVH guest I got the splat below. With a 5.5.7 kernel the guest boots fine. -- Sander [1.921031] general protection fault, probably for non-canonical address 0x344a3feab7bf8: [#1] SMP NOPTI [1.921090] CPU: 1 PID: 1686 Comm: systemd-udevd Tainted: GW 5.6.0-rc4-20200304-doflr-mac80211debug+ #1 [1.921134] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0 [1.921160] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 42 ff 49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 24 b8 00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84 [1.921229] RSP: 0018:c9213958 EFLAGS: 00010002 [1.921249] RAX: 327f RBX: 888005ce00e0 RCX: 0001 [1.921278] RDX: 3280 RSI: RDI: [1.921307] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80 [1.921335] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8 [1.921365] R13: 88801f52c394 R14: 0001 R15: 0008 [1.921402] FS: 7f771d762d40() GS:88801f50() knlGS: [1.921438] CS: 0010 DS: ES: CR0: 80050033 [1.921461] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0 [1.921608] Call Trace: [1.921628] ? ktime_get+0x31/0x90 [1.921646] _raw_spin_lock_irqsave+0x2b/0x30 [1.921669] blkif_queue_rq+0x6e/0x7c0 [1.921685] ? wait_woken+0x80/0x80 [1.921701] ? xen_clocksource_get_cycles+0x11/0x20 [1.921720] ? ktime_get+0x31/0x90 [1.921737] ? blk_mq_get_request+0x195/0x3b0 [1.921757] ? blk_account_io_start+0xd4/0x150 [1.921776] __blk_mq_try_issue_directly+0x10e/0x1c0 [1.921798] blk_mq_request_issue_directly+0x43/0xe0 [1.921819] blk_mq_try_issue_list_directly+0x3c/0xb0 [1.921840] blk_mq_sched_insert_requests+0xa0/0xf0 [1.921860] blk_mq_flush_plug_list+0x122/0x1e0 [1.921879] blk_flush_plug_list+0xc1/0xf0 [1.921897] blk_finish_plug+0x1c/0x29 [1.921914] read_pages+0x7a/0x140 [1.921931] __do_page_cache_readahead+0x188/0x1a0 [1.921952] force_page_cache_readahead+0x8b/0xf0 [1.921972] generic_file_read_iter+0x7e1/0xae0 [1.921993] ? mem_cgroup_throttle_swaprate+0x1f/0x145 [1.922014] ? _copy_to_user+0x26/0x30 [1.922031] ? cp_new_stat+0x127/0x160 [1.922048] new_sync_read+0x10f/0x1a0 [1.922064] vfs_read+0x8c/0x140 [1.922081] ksys_read+0x54/0xd0 [1.922098] do_syscall_64+0x49/0x130 [1.922114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [1.922138] RIP: 0033:0x7f771df43461 [1.922154] Code: fe ff ff 50 48 8d 3d fe d0 09 00 e8 e9 03 02 00 66 0f 1f 84 00 00 00 00 00 48 8d 05 99 62 0d 00 8b 00 85 c0 75 13 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 57 c3 66 0f 1f 44 00 00 41 54 49 89 d4 55 48 [1.95] RSP: 002b:7fffaae1a0c8 EFLAGS: 0246 ORIG_RAX: [1.922255] RAX: ffda RBX: 55d4cca138f0 RCX: 7f771df43461 [1.922284] RDX: 0040 RSI: 55d4cca164f8 RDI: 000c [1.922313] RBP: 55d4cca13940 R08: 55d4cca164d0 R09: 0005 [1.922342] R10: 55d4cc9fe010 R11: 0246 R12: 00013fff [1.922370] R13: 0040 R14: 55d4cca164e8 R15: 55d4cca164d0 [1.922398] Modules linked in: [1.922415] ---[ end trace baa27c3655b1ea59 ]--- [1.922435] RIP: 0010:__pv_queued_spin_lock_slowpath+0x195/0x2a0 [1.922459] Code: c4 c1 ea 12 4c 8d 6d 14 41 be 01 00 00 00 41 83 e4 03 8d 42 ff 49 c1 e4 05 48 98 49 81 c4 80 c3 02 00 4c 03 24 c5 20 89 b7 82 <49> 89 2c 24 b8 00 80 00 00 eb 15 84 c0 75 0a 41 0f b6 54 24 14 84 [1.922526] RSP: 0018:c9213958 EFLAGS: 00010002 [1.922545] RAX: 327f RBX: 888005ce00e0 RCX: 0001 [1.922574] RDX: 3280 RSI: RDI: [1.924268] RBP: 88801f52c380 R08: fffea95e R09: 8880192d0c80 [1.924302] R10: 8880192d0cb8 R11: c9213b01 R12: 000344a3feab7bf8 [1.924333] R13: 88801f52c394 R14: 0001 R15: 0008 [1.924377] FS: 7f771d762d40() GS:88801f50() knlGS: [1.924409] CS: 0010 DS: ES: CR0: 80050033 [1.924434] CR2: 7fffaae16ec8 CR3: 04b04000 CR4: 06e0 [1.924967] BUG: unable to handle page fault for address: 0013fff8 [1.924999] #PF: supervisor write access in kernel mode [1.925020] #PF: error_code(0x0002) - not-present page [1.925042] PGD 0 P4D 0 [1.925056] Oops: 0002 [#2] SMP NOPTI [1.925073] CPU: 1 PID: 1686 Comm: systemd-udevd Tainted: G D W 5.6.0