Bug 442949

Summary: F-9 xen pv_ops : unimplemented failsafe_callback() called while running prelink
Product: [Fedora] Fedora Reporter: Stephen Tweedie <sct>
Component: kernel-xenAssignee: Eduardo Habkost <ehabkost>
Status: CLOSED RAWHIDE QA Contact: Virtualization Bugs <virt-bugs>
Severity: medium Docs Contact:
Priority: high    
Version: rawhideCC: xen-maint
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: kernel-xen-2.6.25.2-2.fc10 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-05-11 22:04:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 434756    
Attachments:
Description Flags
dmesg log of oopses
none
clear %fs when loading new TLS descriptors (1/2)
none
clear %fs when loading new TLS descriptors (2/2) none

Description Stephen Tweedie 2008-04-17 20:03:16 UTC
Description of problem:
Oops observed on rawhide running 2.6.25-1.fc9.x86_64.xen:

Kernel BUG at ffffffff80465fc0 [verbose debug info unavailable]
invalid opcode: 0000 [1] 
Pid: 3699, comm: prelink Not tainted 2.6.25-1.fc9.x86_64.xen #1
RIP: e030:[<ffffffff80465fc0>]  [<ffffffff80465fc0>] xen_failsafe_callback+0x0/0x10
RSP: e02b:ffff88001459be00  EFLAGS: 00010002

and no backtrace was observed.  (Backtrace was obtained for a second oops
shortly afterwards.)  Full dmesg to be attached.

Version-Release number of selected component (if applicable):
kernel-xen-2.6.25-1.fc9.x86_64
prelink-0.4.0-3.x86_64

How reproducible:
Unknown: only observed once so far.

Steps to Reproduce:
Unknown: was observed during automatic daily background prelink.

Comment 1 Stephen Tweedie 2008-04-17 20:05:06 UTC
Created attachment 302798 [details]
dmesg log of oopses

Comment 2 Mark McLoughlin 2008-04-18 07:11:43 UTC
So, here's our invalid opcode:

    ENTRY(xen_failsafe_callback)
            /*FIXME: implement me! */
            ud2a
    ENDPROC(xen_failsafe_callback)

Next thing, of course, is to find out what's going wrong that the failsafe
callback is invoked.

(Note: "invalid opcode" is generally just a BUG(), which is implemented using
ud2 ... that caught me out before. Interesting that report_bug() continues to
claim that it's a BUG() even if it can't find IP in the bug table, like in this
case)

Comment 3 Stephen Tweedie 2008-04-18 13:26:30 UTC
Seems to be reproducible: running /etc/cron.daily/prelink manually just resulted
in the same error within under a minute for me.

Comment 4 Mark McLoughlin 2008-04-18 14:54:56 UTC
(Removing from F9Blocker again - this isn't reproducible for me on a fresh
install and it doesn't cause problems during installation. At this point it
doesn't look like it would warrant holding up the release)

Comment 5 Stephen Tweedie 2008-04-18 16:44:39 UTC
It seems to happen every time for me, at least if I force the prelink with

touch /var/lib/misc/prelink.force

I also noticed that the prelink job itself errors out with:
>>>>>
/etc/cron.daily/prelink: line 47:  2738 Segmentation fault     
/usr/sbin/prelink -av $PRELINK_OPTS >> /var/log/prelink/prelink.log 2>&1
/usr/bin/ldd: line 161: /lib/ld-linux.so.2: cannot execute binary file
>>>>>
where /lib/ld-linux.so.2 is the old 32-bit glibc.  Did you have this installed
on your test-case install that completed prelink without error?

Comment 6 Mark McLoughlin 2008-04-21 16:10:40 UTC
(In reply to comment #5)
> It seems to happen every time for me, at least if I force the prelink with
> 
> touch /var/lib/misc/prelink.force

Yeah, had tried that and variations of e.g. "prelink -au" followed by "prelink -avf"

> I also noticed that the prelink job itself errors out with:
> >>>>>
> /etc/cron.daily/prelink: line 47:  2738 Segmentation fault     
> /usr/sbin/prelink -av $PRELINK_OPTS >> /var/log/prelink/prelink.log 2>&1
> /usr/bin/ldd: line 161: /lib/ld-linux.so.2: cannot execute binary file
> >>>>>
> where /lib/ld-linux.so.2 is the old 32-bit glibc.  Did you have this installed
> on your test-case install that completed prelink without error?

Yep, have that.



Comment 7 Eduardo Habkost 2008-04-22 21:59:14 UTC
I couldn't reproduce it here, either. Maybe running it with 'kstack=64' on the 
kernel command-line could reveal other useful kernel addresses on the stack.

Comment 8 Stephen Tweedie 2008-04-23 16:39:01 UTC
'kstack=64' makes no difference.

Comment 9 Eduardo Habkost 2008-04-23 16:57:14 UTC
(In reply to comment #8)
> 'kstack=64' makes no difference.

Hasn't it shown more data after the "Stack:" line on the oops?

Comment 10 Eduardo Habkost 2008-04-23 18:30:39 UTC
'rpm -qa' output may help me to reproduce the bug. I bet there is an specific
file that triggers the bug when loaded by the prelink script, so maybe having
the exact set of packages installed will make the bug reproducible.

Comment 11 Eduardo Habkost 2008-04-24 16:09:39 UTC
Created attachment 303656 [details]
clear %fs when loading new TLS descriptors (1/2)

__switch_to() is on the backtrace before failsafe_callback(). Probably it is
being triggered when returing from a hypercall at
paravirt_leave_lazy_cpu_mode().

The two attached patches were an attempt to fix this, but I haven't tested them
enough to make sure they are correct.

Comment 12 Eduardo Habkost 2008-04-24 16:10:37 UTC
Created attachment 303657 [details]
clear %fs when loading new TLS descriptors (2/2)

Comment 13 Mark McLoughlin 2008-05-09 15:56:05 UTC
Here's where this shows up on kerneloops.org:

  http://www.kerneloops.org/oops.php?number=9341

Comment 14 Mark McLoughlin 2008-05-11 22:04:56 UTC
Should be fixed with kernel-xen-2.6.25-4.fc9 and kernel-xen-2.6.25.2-2.fc10

* Sun May 11 2008 Mark McLoughlin <markmc>
- Fix oops during prelink (ehabkost, #442949)

Comment 15 Fedora Update System 2008-05-12 12:41:24 UTC
kernel-xen-2.6-2.6.25-4.fc9 has been submitted as an update for Fedora 9