|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Crash in acpi_ps_peek_opcode when booting kernel 3.19 as Xen dom0
On 05.02.2015 15:33, Stefan Bader wrote:
> While experimenting/testing various kernel versions I discovered that trying
> to
> boot a Haswell based hosts will always crash when booting as Xen dom0
> (Xen-4.4.1). The same crash happens since v3.19-rc1 and still does happen with
> v3.19-rc7. A bare metal boot is having no issues and also an Opteron based
> host
> is having no issues (dom0 and bare metal).
> Could be a table that the other host does not have and since its only
> happening
> in dom0 maybe some cpu capability that needs to be passed on?
I think I may have some more data here. I tried some patches which Juergen sent
me, but those were not changing much. I found that the problem is related on
that host to the use of dom0_mem= and may be a crash like below or a hang or
"weird state" in general.
When not using dom0_mem, I can boot with a 3.19 kernel, otherwise (trying 512M
and 1G) there is trouble. What is special about this host is that is has more
"holes" than the other machine I usually use.
(XEN) Xen-e820 RAM map:
(XEN) 0000000000000000 - 000000000009a400 (usable)
(XEN) 000000000009a400 - 00000000000a0000 (reserved)
(XEN) 00000000000e0000 - 0000000000100000 (reserved)
The first hole is common
(XEN) 0000000000100000 - 0000000030a48000 (usable)
(XEN) 0000000030a48000 - 0000000030a49000 (reserved)
(XEN) 0000000030a49000 - 00000000a27f4000 (usable)
But then normally there is only one usable area up to
around ACPI_NVS
(XEN) 00000000a27f4000 - 00000000a2ab4000 (reserved)
(XEN) 00000000a2ab4000 - 00000000a2fb4000 (ACPI NVS)
(XEN) 00000000a2fb4000 - 00000000a2feb000 (ACPI data)
(XEN) 00000000a2feb000 - 00000000a3000000 (usable)
(XEN) 00000000a3000000 - 00000000afa00000 (reserved)
(XEN) 00000000e0000000 - 00000000f0000000 (reserved)
(XEN) 00000000fec00000 - 00000000fec01000 (reserved)
(XEN) 00000000fed00000 - 00000000fed04000 (reserved)
(XEN) 00000000fed10000 - 00000000fed1a000 (reserved)
(XEN) 00000000fed1c000 - 00000000fed20000 (reserved)
(XEN) 00000000fed84000 - 00000000fed85000 (reserved)
(XEN) 00000000fee00000 - 00000000fee01000 (reserved)
(XEN) 00000000ffc00000 - 0000000100000000 (reserved)
(XEN) 0000000100000000 - 000000024e600000 (usable)
Also after ACPI data there is some usable, and then another
hole (area) which is unuasual.
So I added a bit more debug printk's: Here a boot with dom0_mem=512M:max=512M:
[ 0.000000] SMB: remap 154(0x9A)-256(0x100) -> 131072(0x20000)
==> 0x09A000-0x100000 -> 0x20000000 (@512M+)
==> 0x09A000-0x09A3FF was usable but partial
The first hole is supposed to be remapped as it is below the 512M which are in
the initial MFN list. I suppose this works but Juergen, I really would love to
understand how and I am not sure I grasp things. To me it looks like the remap
info is stored in the memory area to be mapped... which is reserved(?!)
I think the problem comes from these other holes (which are beyond 512M). When
not using dom0_mem those are remapped (like the first one), while with the clamp
they supposedly should be identity mapped...
[ 0.000000] SMB: prange id 199240(0x30A48) - 199241(0x30A49)
==> 0x30A48000(~778M)
[ 0.000000] SMB: prange id 665588(0xA27F4) - 667627(0xA2FEB)
==> 0xA27F4000(~2599M)
[ 0.000000] SMB: prange id 667648(0xA3000) - 1048576(0x100000)
==> 0xA3000000(~2608M)-0x100000000(=4G) id mapped
[ 0.000000] Released 0 page(s)
[ 0.000000] Remapped 102 page(s)
So here is xen_set_identity_and_remap_chunk():
...
while (i < n) {
...
/* Do not remap pages beyond the current allocation */
if (cur_pfn >= nr_pages) {
/* Identity map remaining pages */
set_phys_range_identity(cur_pfn, cur_pfn + size);
break;
}
...
Now, I think the call to set_phys_range_identity() is really doing nothing
because nr_pages really is the same (or mostly beside of an 512 alignment) as
xen_p2m_size, so it just returns 0.
...
/*
* If the PFNs are currently mapped, the VA mapping also needs
* to be updated to be 1:1.
*/
for (pfn = start_pfn; pfn <= max_pfn_mapped && pfn < end_pfn; pfn++)
(void)HYPERVISOR_update_va_mapping(
(unsigned long)__va(pfn << PAGE_SHIFT),
mfn_pte(pfn, PAGE_KERNEL_IO), 0);
I cannot make my head up about this one. Before this all changed, there was code
that resembled this loop but was rather clearing the mapping (except for a range
below 1M). Ok, that was done then in a different order which set identity
mapping after...
My feeling is that the problem comes from assuming identity mapping for holes
after the initial mapping. I might miss something but I cannot really see where
this could be recovered.
-Stefan
>
> [ 2.108038] ACPI: Core revision 20141107
> [ 2.108153] ACPI Warning: Unsupported module-level executable opcode 0x91
> at
> table offset 0x002B (20141107/psloop-225)
> [ 2.108264] ACPI Warning: Unsupported module-level executable opcode 0x91
> at
> table offset 0x0033 (20141107/psloop-225)
> [ 2.108375] ACPI Warning: Unsupported module-level executable opcode 0x95
> at
> table offset 0x0038 (20141107/psloop-225)
> [ 2.108489] ACPI Warning: Unsupported module-level executable opcode 0x95
> at
> table offset 0x0041 (20141107/psloop-225)
> [ 2.108613] ACPI Warning: Unsupported module-level executable opcode 0x7D
> at
> table offset 0x040D (20141107/psloop-225)
> [ 2.108751] BUG: unable to handle kernel paging request at ffffc90000ee74e0
> [ 2.108835] IP: [<ffffffff814573db>] acpi_ps_peek_opcode+0xd/0x1f
> [ 2.108902] PGD 1f4be067 PUD 1f4bd067 PMD 1488f067 PTE 0
> [ 2.109018] Oops: 0000 [#1] SMP
> [ 2.109094] Modules linked in:
> [ 2.109153] CPU: 0 PID: 0 Comm: swapper/0 Not tainted
> 3.19.0-031900rc7-generi
> c #201502020035
> [ 2.109220] Hardware name: Intel Corporation Shark Bay Client
> platform/Flathe
> ad Creek Crb, BIOS HSWLPTU1.86C.0109.R03.1301282055 01/28/2013
> [ 2.109295] task: ffffffff81c1c500 ti: ffffffff81c00000 task.ti:
> ffffffff81c0
> 0000
> [ 2.109360] RIP: e030:[<ffffffff814573db>] [<ffffffff814573db>]
> acpi_ps_peek
> _opcode+0xd/0x1f
> [ 2.109445] RSP: e02b:ffffffff81c03ce8 EFLAGS: 00010283
> [ 2.109490] RAX: 000000000000000c RBX: ffff880014887000 RCX:
> ffffffff81c03d50
> [ 2.109539] RDX: ffffc90000ee74e0 RSI: ffff880014887030 RDI:
> ffff880014887030
> [ 2.109587] RBP: ffffffff81c03ce8 R08: ffffea0000522600 R09:
> ffffffff81432c4f
> [ 2.109635] R10: ffff880014899090 R11: 00000000000000ba R12:
> ffff880014887030
> [ 2.109684] R13: ffff880014887000 R14: ffffffff81c03d50 R15:
> 000000000000000d
> [ 2.109735] FS: 0000000000000000(0000) GS:ffff880018c00000(0000)
> knlGS:00000
> 00000000000
> [ 2.109836] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 2.109881] CR2: ffffc90000ee74e0 CR3: 0000000001c15000 CR4:
> 0000000000042660
> [ 2.109930] Stack:
> [ 2.109968] ffffffff81c03d38 ffffffff81456537 ffffffff81c03d28
> ffffffff81457
> a40
> [ 2.110104] ffff880014887000 ffff880014887000 ffff8800148990c0
> ffffc90000ee7
> 4e0
> [ 2.110238] ffff880014887030 0000000000000000 ffffffff81c03d78
> ffffffff81456
> 760
> [ 2.110373] Call Trace:
> [ 2.110413] [<ffffffff81456537>] acpi_ps_get_next_arg+0x114/0x1f9
> [ 2.110461] [<ffffffff81457a40>] ? acpi_ps_pop_scope+0x54/0x72
> [ 2.110508] [<ffffffff81456760>] acpi_ps_get_arguments+0x91/0x228
> [ 2.110555] [<ffffffff81456ad2>] acpi_ps_parse_loop+0x1db/0x311
> [ 2.110602] [<ffffffff81457705>] acpi_ps_parse_aml+0x96/0x275
> [ 2.110649] [<ffffffff8145322f>] acpi_ns_one_complete_parse+0xf7/0x114
> [ 2.110698] [<ffffffff817d149a>] ? _raw_spin_lock_irqsave+0x1a/0x60
> [ 2.110746] [<ffffffff8145326c>] acpi_ns_parse_table+0x20/0x38
> [ 2.110792] [<ffffffff81452c20>] acpi_ns_load_table+0x4c/0x90
> [ 2.110840] [<ffffffff817c50b5>] acpi_tb_load_namespace+0xa6/0x14a
> [ 2.110889] [<ffffffff81d83269>] acpi_load_tables+0xc/0x35
> [ 2.110935] [<ffffffff81454bf6>] ? acpi_ns_get_node+0xb7/0xc9
> [ 2.110982] [<ffffffff81d825cf>] acpi_early_init+0x73/0x105
> [ 2.111029] [<ffffffff81d3b083>] start_kernel+0x348/0x3f0
> [ 2.111075] [<ffffffff81d3abcd>] ? set_init_arg+0x56/0x56
> [ 2.111121] [<ffffffff81d3a5f8>] x86_64_start_reservations+0x2a/0x2c
> [ 2.111169] [<ffffffff81d3e88c>] xen_start_kernel+0x4f5/0x4f7
> [ 2.111215] Code: 8a 87 60 05 87 81 5d c3 e8 73 cc 37 00 55 81 ff 00 01 00
> 00
> 19 c0 48 89 e5 83 c0 02 5d c3 e8 5d cc 3
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel
>
Attachment:
signature.asc _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |