[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [BUG] Serial port prevents PVH dom0 boot



On July 26, 2018 4:03 AM, Roger Pau Monné <roger.pau@xxxxxxxxxx> wrote:

> On Wed, Jul 25, 2018 at 04:10:59PM -0400, Connor Davis wrote:
>
> > When booting into dom0=pvh, using the serial console prevents
> > dom0 from booting. Serial works until Xen tries to hand off to dom0.
> > The specific crash varies with the arguments passed to iommu:
> > iommu=1,debug console=com1 com1=115200,8n1
> > Xen goes into an infinite loop
>
> You don't need iommu=1, PVH Dom0 already requires an iommu and won't
> boot without it.
>
> > iommu=1 console=com1 com1=115200,8n1
> > Xen either receives an NMI in process_pending_softirqs or gets
>
> According to the logs below you are manually injecting an NMI by
> pressing the 'N' debug key.
>
> > stuck in __sync_local_execstate
> > iommu=1
> > dom0 boots fine, but USB doesn't work (as others have recently
> > posted about). I'm using xen staging and linux xen/tip.
> > Example logs for the first two cases are attached.
>
> You also seem to be using UEFI, I have to admit I haven't tried PVH
> Dom0 on UEFI yet.
>
> > (XEN) Latest ChangeSet: Wed Jul 25 15:38:23 2018 +0100 git:f776264532
> > (XEN) Bootloader: EFI
> > (XEN) Command line: dom0_mem=1G,max:1G iommu=1 console=com1 com1=115200,8n1 
> > dom0=pvh x2apic=1 nosmp=1
>
> Can you try to boot without the x2apic=1 and nosmp=1 options? Also
> please set iommu=debug only.

I'm not pressing any keys. I tried again with iommu=debug and made sure not
to press anything. Still getting an infinite loop. I attached the log for
reference.

>
> [...]
>
> > (XEN) WARNING: PVH is an experimental mode with limited functionality
> > (XEN) Initial low memory virq threshold set at 0x4000 pages.
> > (XEN) Scrubbing Free RAM on 1 nodes using 1 CPUs
>
> So it gets stuck here while scrubbing the free RAM? It would be good
> to dump the CPU state at this point.
>
> > (XEN) ...'A' pressed -> using normal key handling
> > (XEN) 'R' pressed -> rebooting machine
>
> [...]
>
> > (XEN) *** Building a PVH Dom0 ***
> > (XEN) Triggering NMI on APIC ID 0
>
> This is AFAICT a result of pressing the 'N' debug key. Or at least Xen
> thinks the 'N' debug key has been pressed an injects and NMI using
> do_nmi_trigger. Can you please confirm whether you have pressed any
> debug key?
>
> > (XEN) Uhhuh. NMI received for unknown reason 2c.
> > (XEN) Do you have a strange power saving mode enabled?
> > (XEN) ----[ Xen-4.12-unstable x86_64 debug=y Not tainted ]----
> > (XEN) RIP: e008:[<ffff82d08023b0c2>] _spin_lock+0x1e/0x5c
> > (XEN) RFLAGS: 0000000000000006 CONTEXT: hypervisor
> > (XEN) rax: 00000000030a030a rbx: ffff82d080817800 rcx: 0000000000000000
> > (XEN) rdx: 0000000000000001 rsi: 0000000000000001 rdi: ffff82d080817806
> > (XEN) rbp: ffff82d080827808 rsp: ffff82d0808277f8 r8: ffff83081bc28000
> > (XEN) r9: 0000000000000030 r10: 0000000000000000 r11: 0000000000000010
> > (XEN) r12: 0000000000000000 r13: ffff82d080817780 r14: ffff82d080817800
> > (XEN) r15: 0000000000000292 cr0: 000000008005003b cr4: 00000000001526e0
> > (XEN) cr3: 00000000be616000 cr2: 0000000000000000
> > (XEN) fsb: 0000000000000000 gsb: 0000000000000000 gss: 0000000000000000
> > (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: e008
> > (XEN) Xen code around <ffff82d08023b0c2> (_spin_lock+0x1e/0x5c):
> > (XEN) 00 00 01 00 f0 0f c1 03 <89> c2 c1 e8 10 66 8b 33 66 39 c6 74 12 48 
> > 89 d9
> > (XEN) Xen stack trace from rsp=ffff82d0808277f8:
> > (XEN) ffff82d080827858 0000000000000296 ffff82d080827828 ffff82d08023b126
> > (XEN) ffff82d080827868 0000000000000000 ffff82d080827858 ffff82d080253789
> > (XEN) 000000000000004e ffff82d0808279b8 ffff82d080250a89 ffff82d0808279b8
> > (XEN) ffff82d080827868 ffff82d08025056e ffff82d080827888 ffff82d080216fae
> > (XEN) ffff82d0808279b8 000000000000004e ffff82d080827898 ffff82d08025036a
> > (XEN) ffff82d0808278b8 ffff82d080250aeb ffff82d080817780 ffff82d0808177f8
> > (XEN) ffff82d080827908 ffff82d080252fcb ffff82d080380969 4eff82d08038095d
> > (XEN) ffff82d080380969 ffff82d08093c7a0 ffff82d080817780 ffff82d0808279b8
> > (XEN) 0000000000000000 ffff82d0802514d8 ffff82d080827938 ffff82d080251af9
> > (XEN) ffff82d080380969 ffff82d0808279b8 ffff82d080251a9a ffff82d0802514d8
> > (XEN) ffff82d0808279a8 ffff82d0802a87e3 ffff82d080380969 ffff82d0802514da
> > (XEN) ffff82d080380969 ffff82d08038095d ffff82d080380969 0b0f82d08038095d
> > (XEN) ffff82d080380969 ffff8300c03fe000 0000000000000000 0000000000000000
> > (XEN) ffff82d080827fff 0000000000000000 00007d2f7f7d8627 ffff82d080380a2d
> > (XEN) ffff82d08093bc00 00000005c8c55821 ffff82d080817780 ffff82d0802514bb
> > (XEN) ffff82d080827a60 ffff82d08095f300 0000000000000002 0000000601d38f5d
> > (XEN) 0000001a9b8e17db ffff82d08095c1c0 ffff82d08095f3a8 0000000000000002
> > (XEN) 0000000000000000 ffff82d08093c808 ffff82d080817780 0000000600000000
> > (XEN) ffff82d0802514d8 000000000000e008 0000000000010286 ffff82d080827a60
> > (XEN) 0000000000000000 ffff82d080827a90 ffff82d08023df14 0000000000000010
> > (XEN) Xen call trace:
> > (XEN) [<ffff82d08023b0c2>] _spin_lock+0x1e/0x5c
> > (XEN) [<ffff82d08023b126>] _spin_lock_irqsave+0x11/0x1b
> > (XEN) [<ffff82d080253789>] serial_end_log_everything+0x37/0x5d
> > (XEN) [<ffff82d08025056e>] console_end_log_everything+0xf/0x18
> > (XEN) [<ffff82d080216fae>] handle_keypress+0x93/0xc9
> > (XEN) [<ffff82d08025036a>] console.c#__serial_rx+0x4f/0x51
> > (XEN) [<ffff82d080250aeb>] console.c#serial_rx+0x62/0x8c
> > (XEN) [<ffff82d080252fcb>] serial_rx_interrupt+0x60/0xb2
> > (XEN) [<ffff82d080251af9>] ns16550.c#__ns16550_poll+0x5f/0xae
> > (XEN) [<ffff82d0802a87e3>] do_invalid_op+0x2b4/0x384
> > (XEN) [<ffff82d080380a2d>] x86_64/entry.S#handle_exception_saved+0x68/0x94
> > (XEN) [<ffff82d0802514d8>] ns16550.c#ns16550_poll+0x1d/0x21
> > (XEN) [<ffff82d08023df14>] timer.c#execute_timer+0x49/0x64
> > (XEN) [<ffff82d08023df9c>] timer.c#timer_softirq_action+0x6d/0x242
> > (XEN) [<ffff82d08023a7a5>] softirq.c#__do_softirq+0x78/0x9a
> > (XEN) [<ffff82d08023a7fa>] process_pending_softirqs+0x33/0x37
> > (XEN) [<ffff82d080613cbd>] pci.c#_setup_hwdom_pci_devices+0x130/0x14b
> > (XEN) [<ffff82d08025b22d>] pci.c#pci_segments_iterate+0x43/0x69
> > (XEN) [<ffff82d080613f93>] setup_hwdom_pci_devices+0x25/0x2c
> > (XEN) [<ffff82d080613fd3>] iommu.c#intel_iommu_hwdom_init+0x39/0x17d
> > (XEN) [<ffff82d0806135bb>] iommu_hwdom_init+0x1b5/0x1d0
> > (XEN) [<ffff82d080631162>] dom0_construct_pvh+0x4a/0x1132
> > (XEN) [<ffff82d0806381e3>] construct_dom0+0x8c/0xcc
> > (XEN) [<ffff82d080628003>] __start_xen+0x21bf/0x26ed
> > (XEN) ****************************************
> > (XEN) Panic on CPU 0:
> > (XEN) FATAL TRAP: vector = 2 (nmi)
> > (XEN) [error_code=0000] , IN INTERRUPT CONTEXT
> > (XEN) ****************************************
>
> > Xen-devel mailing list
> > Xen-devel@xxxxxxxxxxxxxxxxxxxx
> > https://lists.xenproject.org/mailman/listinfo/xen-devel
>
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxx
> https://lists.xenproject.org/mailman/listinfo/xen-devel


Attachment: xen-iommu-debug-nokeys.txt
Description: Text document

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.