[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [BUG] xen-mceinj tool testing cause dom0 crash



(CC Jan and Andrew)

On 22/05/17 09:39, Hao, Xudong wrote:
Bug detailed description:

----------------

Xen has a MCE soft injection tool xen-mceinj to test RAS, testing with
this tool cause dom0 crash and system reboot. Attach the whole log.



Environment :

----------------

HW: Skylake/Broadwell server

Xen: Xen 4.9.0 RC5

Dom0: Linux 4.11.0



Reproduce steps:

----------------

1.      Compiling xen-mceinj in xen : xen/tools/tests/mce-test/tools

2.      Run the commond:  xen/tools/tests/mce-test/tools/xen-mceinj -t 0



Current result:

----------------

VM Migration fail.



Base error log:

----------------

(XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds.

(XEN) ----[ Xen-4.9-rc  x86_64  debug=y   Tainted: MCE  ]----

(XEN) CPU:    0

(XEN) RIP:    e008:[<0000000065eb1e13>] 0000000065eb1e13

(XEN) RFLAGS: 0000000000010246   CONTEXT: hypervisor

(XEN) rax: 0000000000000000   rbx: ffff83005f827bb0   rcx: 00000000682ab000

(XEN) rdx: 0000000000000000   rsi: 0000000000000381   rdi: ffff83005f827b90

(XEN) rbp: ffff83005f827c88   rsp: ffff83005f827ae0   r8:  ffff83005f827bb0

(XEN) r9:  ffff83005f827b90   r10: 0000000065eb3258   r11: 0000ffff0000ffff

(XEN) r12: 00000000fffffffe   r13: 0000000000000000   r14: 0000000000000065

(XEN) r15: ffff83102bca5000   cr0: 0000000080050033   cr4: 00000000003526e0

(XEN) cr3: 000000102c962000   cr2: 00000000682ab009

(XEN) ds: 002b   es: 002b   fs: 0000   gs: 0000   ss: 0000   cs: e008

(XEN) Xen code around <0000000065eb1e13> (0000000065eb1e13):

(XEN)  ff 00 00 48 8b 4c 24 28 <0f> b6 49 09 3b c1 72 18 4c 8d 05 06 20
00 00 ba

(XEN) Xen stack trace from rsp=ffff83005f827ae0:

(XEN)    ffff82d08026dd12 ffff83005f827b38 ffff82d08026e1df 0000000400000093

(XEN)    0000000000000004 00000000682ab000 000000000000000d 0000000000000002

(XEN)    0000000000000017 0000000065eb0ee8 ffff83005f827bb0 0000000000000046

(XEN)    020000000001a0d1 ffff83005f827b98 0000000000000000 0000000065eaf77c

(XEN)    0000000000000000 ffff83005f827bb8 ffff82d08026fe70 0000000000000010

(XEN)    000000000000001e 0000000065e4de0b ffff83102bca5000 ffff83005f827ba8

(XEN)    ffff82d08025f2f2 ffff83005f827bb8 00000000000b0000 682ab00000000200

(XEN)    ffff82d080270b47 0000000065e4e1cc ffff83005f827c00 0000000000000206

(XEN)    ffff83005f827c60 ffff83005f827c40 ffff83102bca5000 0000000065e4d7c9

(XEN)    0000000000000000 0000000000000381 000000102c962000 0000000000000065

(XEN)    0000000000000000 00000000fffffffe 000000102c962000 ffff82d080356618

(XEN)    0000000000000000 0000000000000000 ffff82d080808780 ffff83005f827c68

(XEN)    000000005f819000 ffff83005f827c88 ffff82d08029796c 0000000000000000

(XEN)    0000000000000000 ffff83005f827cd8 ffff82d080297307 ffff83005f827cf8

(XEN)    000013888024855e 000083005f827d08 0000000000000000 0000000000000000

(XEN)    ffff83005f827db8 00000000000000fb ffff83005f827fff ffff83005f827ce8

(XEN)    ffff82d0802973a5 ffff83005f827d08 ffff82d080232e22 ffff83005f827d08

(XEN)    0000000000000000 ffff83005f827d18 ffff82d080297a08 ffff83005f827da8

(XEN)    ffff82d080276efe ffff83005f827db8 ffff82d080276efe 0000000000000286

(XEN)    ffff83005f827d58 ffff83102bc61cd0 ffff83102bc7ae40 80000000000000d4

(XEN) Xen call trace:

(XEN)    [<ffff82d08026dd12>] sync_local_execstate+0x9/0xb

(XEN)    [<ffff82d080297307>] machine_restart+0x1c6/0x259

(XEN)    [<ffff82d0802973a5>] shutdown.c#__machine_restart+0xb/0x16

(XEN)    [<ffff82d080232e22>] smp_call_function_interrupt+0x8f/0xbd

(XEN)    [<ffff82d080297a08>] call_function_interrupt+0x35/0x3d

(XEN)    [<ffff82d080276efe>] do_IRQ+0x8c/0x61e

(XEN)    [<ffff82d0803537b7>] common_interrupt+0x67/0x70

(XEN)    [<ffff82d0802d1a5f>] mce_panic_check+0/0x21

(XEN)    [<ffff82d0802cd950>] mce.c#mce_softirq+0x140/0x183

(XEN)    [<ffff82d08023265f>] softirq.c#__do_softirq+0x7f/0x8a

(XEN)    [<ffff82d0802326b4>] do_softirq+0x13/0x15

(XEN)    [<ffff82d080268b4a>] domain.c#idle_loop+0x55/0x62

(XEN)

(XEN) Pagetable walk from 00000000682ab009:

(XEN)  L4[0x000] = 000000102c961063 ffffffffffffffff

(XEN)  L3[0x001] = 000000005f812063 ffffffffffffffff

(XEN)  L2[0x141] = 0000000000000000 ffffffffffffffff

(XEN)

(XEN) ****************************************

(XEN) Panic on CPU 0:

(XEN) FATAL PAGE FAULT

(XEN) [error_code=0000]

(XEN) Faulting linear address: 00000000682ab009

(XEN) ****************************************

(XEN)

(XEN) Reboot in five seconds...

(XEN) Resetting with ACPI MEMORY or I/O RESET_REG.

Force an S5 exit path.

[SIO] Current system SIO exist bit:1





Best Regards,

Xudong




--
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.