[Pkg-xen-devel] Bug#912975: Bug#912975: xen-hypervisor-4.8-amd64: Dom0 crashes randomly without logs on Debian Stretch with Xen 4.8.4

Patrick Beckmann beckmann at tyntec.com
Thu Jan 3 10:02:20 GMT 2019


Hi,

this bug description sounds a lot like a problem we have with two Xen
Dom0s, so I am replying here.

One of our machines has been running stable on Debian 8 and was newly
upgraded to Debian 9, another one is new hardware with a fresh
installation. With the most recent Debian 9 they crash at a rate from
every 3 days to 3 times a day, suspected to be depending on load.
Versions are
- Xen hypervisor: 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10
- Linux Kernel:	  4.9.130-2

On Tue, 6 Nov 2018 18:54:53 +0100 Hans van Kranenburg <hans at knorrie.org>
wrote:
> Are you able to configure and capture output from serial console?

We have been able to capture the output of our new machine crashing.
Please find it attached to this e-mail. Unfortunately it lacks the lines
during boot time. If you need them or any other information, please let
me know.

> Can you confirm that this is the only change that you made between the
> before/after scenario? I mean, if you downgrade the packages, or you
> drop the old hypervisor xen-x.y-amd64.gz in /boot again, it's stable again?

We would try this next with Xen version
4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u9.

Best Regards,
Patrick Beckmann
-------------- next part --------------
[SOL Session operational.  Use ~? for help]
[   99.992731] xen-blkback: backend/vbd/19/51712: prepare for reconnect

[  101.634684] xen-blkback: backend/vbd/20/51712: prepare for reconnect

[  103.653671] xen-blkback: backend/vbd/19/51712: using 4 queues, protocol 1 (x86_64-abi) persistent grants

[  103.827314] vif vif-19-0 vif19.0: Guest Rx ready

[  103.827427] IPv6: ADDRCONF(NETDEV_CHANGE): vif19.0: link becomes ready

[  103.827534] br02: port 15(vif19.0) entered blocking state

[  103.827541] br02: port 15(vif19.0) entered forwarding state

[  104.476998] xen-blkback: backend/vbd/20/51712: using 4 queues, protocol 1 (x86_64-abi) persistent grants

[  104.660889] vif vif-20-0 vif20.0: Guest Rx ready

[  104.661018] IPv6: ADDRCONF(NETDEV_CHANGE): vif20.0: link becomes ready

[  104.661168] br026: port 2(vif20.0) entered blocking state

[  104.661184] br026: port 2(vif20.0) entered forwarding state

(XEN) d8 L1TF-vulnerable L1e 0000000001a23320 - Shadowing
(XEN) d8 L1TF-vulnerable L1e 0000000001a23320 - Shadowing
(XEN) d8 L1TF-vulnerable L1e 0000000001a23320 - Shadowing
(XEN) d11 L1TF-vulnerable L1e 00000000020c3320 - Shadowing
(XEN) d13 L1TF-vulnerable L1e 0000000001a3b320 - Shadowing
(XEN) d15 L1TF-vulnerable L1e 0000000001a23320 - Shadowing



Debian GNU/Linux 9 caribou hvc0



caribou login: 


Debian GNU/Linux 9 caribou hvc0



caribou login: [ 4676.600094] br02: port 14(vif17.0) entered disabled state

[ 4676.744064] br02: port 14(vif17.0) entered disabled state

[ 4676.745573] device vif17.0 left promiscuous mode

[ 4676.745618] br02: port 14(vif17.0) entered disabled state

[ 4683.146619] br02: port 14(vif21.0) entered blocking state

[ 4683.146678] br02: port 14(vif21.0) entered disabled state

[ 4683.146921] device vif21.0 entered promiscuous mode

[ 4683.153997] IPv6: ADDRCONF(NETDEV_UP): vif21.0: link is not ready

[ 4683.639331] xen-blkback: backend/vbd/21/51712: using 1 queues, protocol 1 (x86_64-abi) 

[ 4684.544484] xen-blkback: backend/vbd/21/51712: prepare for reconnect

[ 4684.938636] xen-blkback: backend/vbd/21/51712: using 1 queues, protocol 1 (x86_64-abi) 

[ 4692.235692] xen-blkback: backend/vbd/21/51712: prepare for reconnect

[ 4694.917436] vif vif-21-0 vif21.0: Guest Rx ready

[ 4694.917800] IPv6: ADDRCONF(NETDEV_CHANGE): vif21.0: link becomes ready

[ 4694.917918] br02: port 14(vif21.0) entered blocking state

[ 4694.917926] br02: port 14(vif21.0) entered forwarding state

[ 4694.921344] xen-blkback: backend/vbd/21/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants




Debian GNU/Linux 9 caribou hvc0



caribou login: (XEN) ----[ Xen-4.8.5-pre  x86_64  debug=n   Not tainted ]----
(XEN) CPU:    32
(XEN) RIP:    e008:[<ffff82d08023116d>] guest_4.o#sh_page_fault__guest_4+0x75d/0x1e30
(XEN) RFLAGS: 0000000000010202   CONTEXT: hypervisor (d8v0)
(XEN) rax: 00007fb5797e6580   rbx: ffff8310f4372000   rcx: ffff81c0e0600000
(XEN) rdx: 0000000000000000   rsi: ffff8310f4372000   rdi: 000000000001fed5
(XEN) rbp: ffff8310f4372000   rsp: ffff8340250e7c78   r8:  000000000001fed5
(XEN) r9:  0000000000000000   r10: 0000000000000000   r11: 0000000000000000
(XEN) r12: ffff81c0e06ff6a8   r13: 000000000407fad6   r14: ffff830078da7000
(XEN) r15: ffff8340250e7ef8   cr0: 0000000080050033   cr4: 0000000000372660
(XEN) cr3: 000000407ec02001   cr2: ffff81c0e06ff6a8
(XEN) fsb: 00007fb58fc26700   gsb: 0000000000000000   gss: ffff8801fea00000
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen code around <ffff82d08023116d> (guest_4.o#sh_page_fault__guest_4+0x75d/0x1e30):
(XEN)  ff ff 03 00 4e 8d 24 c1 <49> 8b 0c 24 f6 c1 01 0f 84 b6 06 00 00 48 c1 e1
(XEN) Xen stack trace from rsp=ffff8340250e7c78:
(XEN)    00007fb5797e6580 00000000027372df ffff82d080323600 ffff8310f4372648
(XEN)    ffff8310f43726a8 00000000027372df ffff8340250e7d50 ffff8340250e7d98
(XEN)    00000007fb5797e6 0000000000000090 ffff82d080323618 00000000000007f8
(XEN)    00000000000006a8 0000000000000e58 0000000000000f30 ffff82d000000000
(XEN)    000000000000000d 0000005100000002 00000000000001e6 ffff8340250e7d20
(XEN)    00000000000000e0 0000000000000000 000000000277f512 ffff830078da7000
(XEN)    0000000000000001 ffff830078da7bc0 00000000020dd93d 00007fb5797e6580
(XEN)    0000002700075067 000000280ae61067 000000280ca6f067 00000027372df967
(XEN)    000000000267c9a0 0000000002700075 000000000280ae61 000000000280ca6f
(XEN)    000000407faf7067 ffff830078da7000 ffff8310f4372000 ffff8340250e7ef8
(XEN)    ffff82d08023a910 0000000000000000 000000005c2d2f4a ffff82d08023a780
(XEN)    ffff8310f4372000 ffff8340250e7fff ffff830078da7000 ffff82d08023aa0f
(XEN)    ffff82d08023f913 ffff82d08023f907 ffff82d08023f913 ffff82d08023f907
(XEN)    ffff82d08023f913 ffff82d08023f907 ffff82d08023f913 ffff82d08023f907
(XEN)    ffff82d08023f913 ffff82d08023f907 ffff82d08023f913 ffff82d08023f907
(XEN)    ffff82d08023f913 ffff82d08023f907 ffff82d08023f913 ffff8340250e7ef8
(XEN)    00007fb5797e6580 ffff830078da7000 0000000000000014 ffff8310f4372000
(XEN)    0000000000000000 ffff82d08019f5a2 ffff82d08023f913 ffff82d08023f907
(XEN)    ffff82d08023f913 ffff830078da7000 0000000000000000 0000000000000000
(XEN)    0000000000000000 ffff8340250e7fff 0000000000000000 ffff82d08023f9d9
(XEN) Xen call trace:
(XEN)    [<ffff82d08023116d>] guest_4.o#sh_page_fault__guest_4+0x75d/0x1e30
(XEN)    [<ffff82d08023a910>] do_iret+0/0x1c0
(XEN)    [<ffff82d08023a780>] toggle_guest_pt+0x30/0x160
(XEN)    [<ffff82d08023aa0f>] do_iret+0xff/0x1c0
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08019f5a2>] do_page_fault+0x1f2/0x4c0
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f907>] handle_exception+0x8f/0xf9
(XEN)    [<ffff82d08023f913>] handle_exception+0x9b/0xf9
(XEN)    [<ffff82d08023f9d9>] entry.o#handle_exception_saved+0x68/0x94
(XEN) 
(XEN) Pagetable walk from ffff81c0e06ff6a8:
(XEN)  L4[0x103] = 000000407ec02063 ffffffffffffffff
(XEN)  L3[0x103] = 000000407ec02063 ffffffffffffffff
(XEN)  L2[0x103] = 000000407ec02063 ffffffffffffffff 
(XEN)  L1[0x0ff] = 0000000000000000 ffffffffffffffff
(XEN) 
(XEN) ****************************************
(XEN) Panic on CPU 32:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0000]
(XEN) Faulting linear address: ffff81c0e06ff6a8
(XEN) ****************************************
(XEN) 
(XEN) Manual reset required ('noreboot' specified)


More information about the Pkg-xen-devel mailing list