[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: issue with dom0_pvh on Xen 4.20
On Tue, Sep 02, 2025 at 12:13:27PM +0100, Andrew Cooper wrote: > On 02/09/2025 11:56 am, Manuel Bouyer wrote: > > On Tue, Sep 02, 2025 at 11:44:36AM +0100, Andrew Cooper wrote: > >> On 02/09/2025 11:17 am, Manuel Bouyer wrote: > >>> Hello, > >>> I'm trying to boot a NetBSD PVH dom0 on Xen 4.20. > >>> The same NetBSD kernel works fine with Xen 4.18 > >>> > >>> The boot options are: > >>> menu=Boot netbsd-current PVH Xen420:dev hd0f:;load /netbsd-PVH > >>> console=com0 root=wd0f; multiboot /xen420-debug.gz dom0_mem=1024M > >>> console=com1 com1=38400,8n1 loglvl=all guest_loglvl=all > >>> gnttab_max_nr_frames=64 sync_console=1 dom0=pvh > >>> > >>> and the full log from serial console is attached. > >>> > >>> With 4.20 the boot fails with: > >>> > >>> (XEN) *** Serial input to DOM0 (type 'CTRL-a' three times to switch input) > >>> (XEN) Freed 664kB init memory > >>> (XEN) d0v0 Triple fault - invoking HVM shutdown action 1 > >>> (XEN) *** Dumping Dom0 vcpu#0 state: *** > >>> (XEN) ----[ Xen-4.20.2-pre_20250821nb0 x86_64 debug=y Tainted: C > >>> ]---- > >>> (XEN) CPU: 7 > >>> (XEN) RIP: 0008:[<000000000020e268>] > >>> (XEN) RFLAGS: 0000000000010006 CONTEXT: hvm guest (d0v0) > >>> (XEN) rax: 000000002024c003 rbx: 000000000020e260 rcx: > >>> 00000000000dfeb7 > >>> (XEN) rdx: 0000000000100000 rsi: 0000000000103000 rdi: > >>> 000000000013e000 > >>> (XEN) rbp: 0000000080000000 rsp: 00000000014002e4 r8: > >>> 0000000000000000 > >>> (XEN) r9: 0000000000000000 r10: 0000000000000000 r11: > >>> 0000000000000000 > >>> (XEN) r12: 0000000000000000 r13: 0000000000000000 r14: > >>> 0000000000000000 > >>> (XEN) r15: 0000000000000000 cr0: 0000000000000011 cr4: > >>> 0000000000000000 > >>> (XEN) cr3: 0000000000000000 cr2: 0000000000000000 > >>> (XEN) fsb: 0000000000000000 gsb: 0000000000000000 gss: > >>> 0000000000000000 > >>> (XEN) ds: 0010 es: 0010 fs: 0000 gs: 0000 ss: 0010 cs: 0008 > >>> > >>> because of the triple fault the RIP above doens't point to the code. > >>> > >>> I tracked it down to this code: > >>> cmpl $0,%ecx ; /* zero-sized? */ \ > >>> je 2f ; \ > >>> pushl %ebp ; \ > >>> movl RELOC(nox_flag),%ebp ; \ > >>> 1: movl %ebp,(PDE_SIZE-4)(%ebx) ; /* upper 32 bits: NX */ \ > >>> movl %eax,(%ebx) ; /* store phys addr */ \ > >>> addl $PDE_SIZE,%ebx ; /* next PTE/PDE */ \ > >>> addl $PAGE_SIZE,%eax ; /* next phys page */ \ > >>> loop 1b ; \ > >>> popl %ebp ; \ > >>> 2: ; > >>> > >>> there are others pushl/popl before so I don't think that's the problem > >>> (in fact the exact same fragment is called just before with different > >>> inputs and it doesn't fault). So the culprit it probably the write to > >>> (%ebx), > >>> which would be 0x20e260 > >>> This is in the range: > >>> (XEN) [0000000000100000, 0000000040068e77] (usable) > >>> so I can't see why this would be a problem. > >>> > >>> Any idea, including how to debug this further, welcome > >> Even though triple fault's are aborts, they're generally accurate under > >> virt, so 0x20e268 is most likely where things die. > > but that's the RIP of the last fault, not the first one, right ? > > 0x20e268 isn't in the text segment of the kernel, my guess is that the > > first fault triggers an exception, but the exeption handler isn't set up yet > > so we end up jumping to some random value. > > Double and Triple faults occur when trying to deliver an exception > generates an exception. So while multiple faults are involved, only one > instruction typically is. > > Is this an Intel or an AMD system? One thing virt can do is break apart > a triple fault, but the logic to do so is vendor specific. it's an old intel system: cpu0: "Intel(R) Xeon(R) CPU X5650 @ 2.67GHz" cpu0: Intel Xeon 36xx & 56xx, i7, i5 and i3 (686-class), 2667.30 MHz cpu0: family 0x6 model 0x2c stepping 0x2 (id 0x206c2) -- Manuel Bouyer <bouyer@xxxxxxxxxxxxxxx> NetBSD: 26 ans d'experience feront toujours la difference --
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |