NetBSD Problem Report #53879

From bad@bsd.de  Tue Jan 15 22:31:50 2019
Return-Path: <bad@bsd.de>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
	by mollari.NetBSD.org (Postfix) with ESMTPS id 5DD6D7A18B
	for <gnats-bugs@gnats.NetBSD.org>; Tue, 15 Jan 2019 22:31:50 +0000 (UTC)
Message-Id: <20190115223142.BE1059181A@irregular-apocalypse.k.bsd.de>
Date: Tue, 15 Jan 2019 23:31:42 +0100 (CET)
From: bad@bsd.de
Reply-To: bad@bsd.de
To: gnats-bugs@gnats.NetBSD.org
Subject: xen boot -d fails
X-Send-Pr-Version: 3.95

>Number:         53879
>Category:       port-xen
>Synopsis:       booting xen dom0 kernel with -d traps
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    port-xen-maintainer
>State:          closed
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Tue Jan 15 22:35:00 +0000 2019
>Closed-Date:    Fri Jul 17 11:24:09 +0000 2020
>Last-Modified:  Fri Jul 17 11:24:09 +0000 2020
>Originator:     Christoph Badura
>Release:        NetBSD 8, NetBSD -current
>Organization:
bozotic software testing labs

>Environment:
System: NetBSD 8.99.29 (XEN3_DOM0) #38: Thu Jan 10 16:06:40 CET 2019
	NetBSD 8.0_STABLE (XEN3_DOM0) #2: Wed Dec 12 20:30:10 CET 2019
Architecture: amd64
Machine: amd64
>Description:


booting XEN3_DOM0 kernel with RB_KDB (-d) traps early and the hypervisor
reboots.

On 8.99.29 from 2018-12-26:
(XEN) Xen version 4.8.3nb0 (root@) (gcc (nb2 20180327) 5.5.0) debug=n  Tue Aug 2
1 22:00:09 CEST 2018
...
(XEN) Scrubbing Free RAM on 1 nodes using 4 CPUs
(XEN) ..................................................................done.
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 308kB init memory
[   1.0000000] fatal breakpoint trap in supervisor mode
[   1.0000000] trap type 1 code 0 rip 0xffffffff802059f5 cs 0xe030 rflags 0x202 cr2 0 ilevel 0x8 rsp 0xffffffff8136aeb0
[   1.0000000] curlwp 0xffffffff80e18b40 pid 0.1 lowest kstack 0xffffffff813662c0
Stopped in pid 0.1 (system) at  netbsd:breakpoint+0x5:(XEN) Pagetable walk from ffffffff81365eb8:
(XEN)  L4[0x1ff] = 0000000827333027 0000000000001333
(XEN)  L3[0x1fe] = 0000000827334027 0000000000001334
(XEN)  L2[0x009] = 000000082733d027 000000000000133d
(XEN)  L1[0x165] = 8010000827365005 0000000000001365
(XEN) domain_crash_sync called from entry.S: fault at ffff82d08022f9a0 entry.o#create_bounce_frame+0x67/0x146
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.8.3nb0  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e033:[<ffffffff807cea07>]
(XEN) RFLAGS: 0000000000010246   EM: 0   CONTEXT: pv guest (d0v0)
(XEN) rax: 0000000000000000   rbx: ffffffff80fd0040   rcx: 0000000000000000
(XEN) rdx: 0000000000000001   rsi: 0000000000000000   rdi: 0000000000000000
(XEN) rbp: ffffffff813660b0   rsp: ffffffff81365ec0   r8:  ffffffff80fd0040
(XEN) r9:  0000000000000038   r10: 0000000000000001   r11: 0000000000000000
(XEN) r12: 0000000000000000   r13: ffffffff81366190   r14: ffffffff80e190a0
(XEN) r15: ffffffff81366000   cr0: 000000008005003b   cr4: 00000000000026e0
(XEN) cr3: 0000000827331000   cr2: ffffffff81365f18
(XEN) fsb: 0000000000000000   gsb: ffffffff80dc0800   gss: 0000000000000000
(XEN) ds: 0013   es: 0013   fs: 0000   gs: 0000   ss: e02b   cs: e033
(XEN) Guest stack trace from rsp=ffffffff81365ec0:
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000038 0000000001331000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 ffffffff80e18b40 0000000000000006 ffffffff81366190
(XEN)    ffffffff80e190a0 ffffffff81366000 ffffffff81366180 ffffffff8020af21
(XEN)    0000000000000000 ffffffff80fd0040 0000000000000000 0000000000000038
(XEN)    0000000000000001 0000000000000000 0000000000000000 ffffffff80fd0040
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds.

On netbsd-8 from 2018-12-12:
(XEN) Xen version 4.8.3nb0 (root@) (gcc (nb2 20180327) 5.5.0) debug=n  Tue Aug 2
1 22:00:09 CEST 2018
...
(XEN) Scrubbing Free RAM on 1 nodes using 4 CPUs
(XEN) ..................................................................done.
(XEN) Initial low memory virq threshold set at 0x4000 pages.
(XEN) Std. Loglevel: Errors and warnings
(XEN) Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
(XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch input to Xen)
(XEN) Freed 308kB init memory
fatal breakpoint trap in supervisor mode
trap type 1 code 0 rip 0xffffffff80205be5 cs 0xe030 rflags 0x202 cr2 0 ilevel 0x8 rsp 0xffffffff812a2ec0
curlwp 0xffffffff80d66ba0 pid 0.1 lowest kstack 0xffffffff8129f2c0
Stopped in pid 0.1 (system) at  netbsd:breakpoint+0x5:(XEN) Pagetable walk from ffffffff8129ef38:
(XEN)  L4[0x1ff] = 000000082727c027 000000000000127c
(XEN)  L3[0x1fe] = 000000082727d027 000000000000127d
(XEN)  L2[0x009] = 0000000827286027 0000000000001286
(XEN)  L1[0x09e] = 801000082729e005 000000000000129e
(XEN) domain_crash_sync called from entry.S: fault at ffff82d08022f9a0 entry.o#create_bounce_frame+0x67/0x146
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
(XEN) ----[ Xen-4.8.3nb0  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    0
(XEN) RIP:    e033:[<ffffffff807aeb36>]
(XEN) RFLAGS: 0000000000010246   EM: 0   CONTEXT: pv guest (d0v0)
(XEN) rax: 0000000000000000   rbx: ffffffff80f1d740   rcx: 0000000000000000
(XEN) rdx: 0000000000000001   rsi: 0000000000000000   rdi: 0000000000000000
(XEN) rbp: ffffffff8129f120   rsp: ffffffff8129ef40   r8:  ffffffff80f1d740
(XEN) r9:  0000000000000000   r10: 0000000000000038   r11: 0000000000000001
(XEN) r12: 0000000000000006   r13: 0000000000000000   r14: ffffffff80d67100
(XEN) r15: ffffffff8129f000   cr0: 000000008005003b   cr4: 00000000000026e0
(XEN) cr3: 000000082727a000   cr2: ffffffff8129ef88
(XEN) fsb: 0000000000000000   gsb: ffffffff80ce6780   gss: 0000000000000000
(XEN) ds: 0013   es: 0013   fs: 0000   gs: 0000   ss: e02b   cs: e033
(XEN) Guest stack trace from rsp=ffffffff8129ef40:
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000038 000000000127a000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 ffffffff80d66ba0
(XEN)    0000000000000006 ffffffff8129f1f0 ffffffff80d67100 ffffffff8129f000
(XEN)    ffffffff8129f1e0 ffffffff8020ac18 ffffffff80f1d740 0000000000000038
(XEN)    0000000000000000 0000000100000000 ffffffff80f1d740 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 ffffffff8129f390
(XEN) Hardware Dom0 crashed: rebooting machine in 5 seconds.

>How-To-Repeat:

boot amd64 XEN3_DOM0 kernel with RB_KDB (-d):
In /boot.cfg
menu=NetBSD Xen:load /netbsd-XEN3_DOM0.gz -d;multiboot /xen.gz dom0_mem=1024M

>Fix:


>Release-Note:

>Audit-Trail:
From: Martin Husemann <martin@duskware.de>
To: gnats-bugs@NetBSD.org
Cc: port-xen-maintainer@netbsd.org, gnats-admin@netbsd.org,
	netbsd-bugs@netbsd.org
Subject: Re: port-xen/53879: xen boot -d fails
Date: Wed, 16 Jan 2019 08:09:42 +0100

 > booting XEN3_DOM0 kernel with RB_KDB (-d) traps early and the hypervisor
 > reboots.

 IIRC this is not XEN specific, but also happens on amd64.

 Martin

From: Andreas Gustafsson <gson@gson.org>
To: gnats-bugs@NetBSD.org
Cc: 
Subject: Re: port-xen/53879: xen boot -d fails
Date: Wed, 16 Jan 2019 13:58:58 +0200

 Martin wrote:
 > IIRC this is not XEN specific, but also happens on amd64.

 That would be PR kern/53311.
 -- 
 Andreas Gustafsson, gson@gson.org

State-Changed-From-To: open->closed
State-Changed-By: jdolecek@NetBSD.org
State-Changed-When: Fri, 17 Jul 2020 11:24:09 +0000
State-Changed-Why:
This is not Xen specific, dup of PR kern/53311


>Unformatted:

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.46 2020/01/03 16:35:01 leot Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2020 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.