[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Random crash during guest start on x86
- To: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Date: Mon, 25 Jul 2022 16:03:04 +0000
- Accept-language: en-GB, en-US
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pNMvH64AehGK7iKjyFr51c29wHGMsDTBdiji2K2xWlA=; b=Fg8Ova7gCayvIDklFf3M0Q6NG8qXl3pWayP9cmoNBJzdcRisfSSbh6zIbOBk1MxEwTcRZ7OSxI9F7EvbiNKYe9umpqJFRTthEfqTWKgGC5V8ZTGN0Y72UJrqHApRXYFLO6WxZW2e6nQV/J3fst5hnP//E5R1J8fMkZ7Xoy27rX+8UyOUqHWghybBfDIgkAMsM9jwp3LN/Im2kkmaUSvFuxbrN0Gl6YUu/Fdg7R6RxC39ITTE4vjkW2MoUHn/UBw+IoRUh13u1qhvRkYvy5YF3CQhVduw85yl7dhG09LTSdJ4xtJnlGA6dQpjtt3PZgMm1ZGlAAavuOO88NDUi5ieZQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZuyiPnc1IVttW+HyxaL7KXpyAd5ePU2PUk6Jacj8p+CpKdd9OBRfIaNmYkGiPGzuR78bz47lzsLAPkLmf9cT7KCygwKz0cRw0l7i+0W4Lzv1QOw58dveI1Rfh8I5wbtPC5s0G5++ES2rcATkm+DFj6Zx5Kg4CDYw7lE5oAciv5DAfcfJdpUInV/h11WZjFIFLol5QsA/AcalbDMXma1gjMNWbf79veJG3iIozyK/+JGOxOAiNwtlr7hw+5akTDTOqyMajpeTJ4ORMbRl5TorcbNeWrIcOmcMrJRj2xyFisDKNwTGmO3UyzzYlseJXoFCve7wRwLpAZCgNYMVTHLSAQ==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
- Cc: Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>
- Delivery-date: Mon, 25 Jul 2022 16:03:39 +0000
- Ironport-data: A9a23:9ZKI9Kl6QEIoWj97yQyaRejo5gy/J0RdPkR7XQ2eYbSJt1+Wr1Gzt xIcXjvVPqrcNzbxctogPoXj80sP757QyNdnGQs5qXsxHiMWpZLJC+rCIxarNUt+DCFioGGLT Sk6QoOdRCzhZiaE/n9BCpC48T8mk/ngqoPUUIbsIjp2SRJvVBAvgBdin/9RqoNziJ2yDhjlV ena+qUzA3f4nW8vWo4ow/jb8kk3466v4GlwUmEWPpingnePzxH5M7pHTU2BByOQapVZGOe8W 9HCwNmRlo8O105wYj8Nuu+TnnwiGtY+DyDX4pZlc/HKbix5jj4zys4G2M80Mi+7vdkrc+dZk 72hvbToIesg0zaldO41C3G0GAkmVUFKFSOuzdFSfqV/wmWfG0YAzcmCA2k5Iqo44btJBlhB0 qMmARw1ZAmnuuy5lefTpulE3qzPLeHNFaZG4zRL6micCvwrB5feX6/N+NlUmi8qgdxDFurfY MxfbidzaBPHYFtEPVJ/5JAWxb/0wCWgNWAG7gvK+8Lb4ECKpOB1+JHrPMDYZZqhQsJNk1zDj mnH4374ElcRM9n3JT+trSz32beVw3KTtIQ6DK+y3/Nt3n2ox2FUUAAHVV22q+b+lRvrMz5YA wlOksY0loAY+Va3VND7U1udqWSdox8Hc9NKFqsx7wTl4rrZ5UOVC3YJShZFacc6r4kmSDoyz FiLktj1Qzt1v9W9S3iQ67OVpjOaIjUOICkJYipsZQkK+d74u6kokwnCCN1kFcaIYsbdHDjxx 3WBq3E4jrBK1MoTjfzkoxbAni6moYXPQkgt/ALLU2m57wR/Iom4e4iv7lud5vFFRGqEcmS8U LE/s5D2xIgz4VulzURhnM1l8GmV2su4
- Ironport-hdrordr: A9a23:3bPdAqMh5podeMBcT2L155DYdb4zR+YMi2TDiHoddfUFSKalfp 6V98jzjSWE8wr4WBkb6LO90DHpewKQyXcH2/hqAV7EZnirhILIFvAp0WKG+VHd8kLFh4lgPM tbEpSWTeeAdWSS7vyKrzVQcexQpuVvmZrA7Yix854ud3ASV0gK1XYaNu/vKDwTeOAwP+tdKH Pz3Kp6jgvlXU5SQtWwB3EDUeSGjcbMjojabRkPAANiwBWSjBuzgYSKUiSw71M7aXdi0L0i+W /Kn0jS/aO4qcy2zRfayiv684lWot380dFObfb8yvT9aw+cyTpAVr4RHoFqjwpF5N1HL2xa1+ Ukli1QffibLUmhOF1d7yGdgjUImwxelkMKgWXo/UcL5/aJCg7SQvAx+76wOHHimjUdlcA536 RR022DsZ1LSRvGgSTm/tDNEwpnj0yuvBMZ4KcuZlFkIPwjgYVq3Poi1VIQFI1FEDPx6YghHu UrBMbA5OxOeVffa3zCpGFgzNGlQ3x2R369MwM/k93Q1yITkGFyzkMeysBalnAc9IglQ50B4+ jfKKxnmLxHU8dTZ6NgA+UKR9exFwX2MFrxGXPXJU6iGLAMOnrLpZKy6LIp5PuycJhN15c2kI SpaiItiYfzQTOaNSSj5uw6zvmWehTNYd3E8LAs27Fp/rvhWbHsLSqPDFgzjsrImYRsPvHm
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
- Thread-index: AQHYoD5xlH8T1cfPDEKhJmKe7Gw5BK2PP42A
- Thread-topic: Random crash during guest start on x86
On 25/07/2022 16:51, Bertrand Marquis wrote:
> Hi,
>
> On our CI we have randomly a crash during guest boot on x86.
>
> We are running on qemu x86_64 using Xen staging.
> The crash is happening randomly (something like 1 out of 20 times).
>
> This is always happening on the first guest we start, we never got it after
> first guest was successfully started.
>
> Please tell me if you need any other info.
>
> Here is the guest kernel log:
> <snip>
> [ 0.000000] Hypervisor detected: Xen PV
> <snip>
> [ 6.679020] general protection fault, maybe for address 0x8800: 0000 [#1]
> PREEMPT SMP NOPTI
> [ 6.679020] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.6 #1
> [ 6.679020] RIP: e030:error_entry+0xaf/0xe0
> [ 6.679020] Code: 29 89 c8 48 39 84 24 88 00 00 00 74 15 48 81 bc 24 88 00
> 00 00 63 10 e0 81 75 03 0f 01 f8 90 90 90 c3 48 89 8c 24 88 00 00 00 <0f> 01
> f8 90 90 90 eb 11 0f 20 d8 90 90 90 90 90 48 25 ff e7 ff ff
> [ 6.679020] RSP: e02b:ffffffff82803a90 EFLAGS: 00000046
> [ 6.679020] RAX: 0000000000008800 RBX: 0000000000000000 RCX:
> ffffffff81e00fa7
> [ 6.679020] RDX: 0000000000000000 RSI: ffffffff81e009f8 RDI:
> 00000000000000eb
> [ 6.679020] RBP: 0000000000000000 R08: 0000000000000000 R09:
> 0000000000000000
> [ 6.679020] R10: 0000000000000000 R11: 0000000000000000 R12:
> 0000000000000000
> [ 6.679020] R13: 0000000000000000 R14: 0000000000000000 R15:
> 0000000000000000
> [ 6.679020] FS: 0000000000000000(0000) GS:ffff88801f200000(0000)
> knlGS:0000000000000000
> [ 6.679020] CS: 10000e030 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 6.679020] CR2: 0000000000000000 CR3: 000000000280c000 CR4:
> 0000000000050660
> [ 6.679020] Call Trace:
> [ 6.679020] <TASK>
>
0f 01 f8 is SWAPGS
This is a privileged instruction, and has never been permitted under Xen
PV. This should have been excluded by pvops.
This is a Linux bug, not a Xen bug.
I can't explain why you're only seeing it intermittently. Perhaps
error_entry is broken by default, and pvops fixes things up, but an
error early enough takes a non-fixed-up path :-/
~Andrew
|