Wow, that is more than i expected :) > I wonder if you started to see this issue very recently. Very recently, however we use a pretty old OVMF build, circa 2015
> OVMF debug log Sorry, we hadn't had it enabled when VM crashed and these crashes are very rare. We will try to capture it when it happens again > - your host CPU model, cpu family : 6 model : 42 model name : Intel(R) Core(TM) i7-2600 CPU @ 3.40GHz stepping : 7 > - the host kernel (KVM) version, Our kernel is roughly based on RHEL7.2 (kernel version 3.10.0-327.36.1). We also have some upstream KVM patches backported. > - the guest CPU model, -cpu SandyBridge,+vme,+ds,+acpi,+ss,+ht,+tm,+pbe,+dtes64,+monitor,+ds_cpl,+smx,+est,+tm2,+xtpr,+pdcm,+pcid,+osxsave,-arat,-xsaveopt,-xgetbv1,-vmx,-xsavec,hv_time,hv_relaxed,hv_vapic,hv_spinlocks=0x1fff,hv_vpindex,hv_runtime,hv_synic,hv_stimer,hv_reset,hv_crash > - the guest CPU topology. 8 sockets, 1 core per socket, 1 thread per core Hope that helps! 2016-11-22 16:41 GMT+03:00 Laszlo Ersek <[email protected]>: > Hello Evgeny, > > On 11/22/16 13:57, Evgeny Yakovlev wrote: > > We are running windows UEFI-based VMs on QEMU/KVM with OvmfPkg. > > > > Very rarely we are experiencing a crash when VM tries to write to RO > memory > > very early during UEFI boot process. > > > > Crash happens when VM tries to execute this code in interrupt handler: > > https://github.com/tianocore/edk2/blob/master/UefiCpuPkg/Library/ > CpuExceptionHandlerLib/X64/ExceptionHandlerAsm.asm#L244-L246 > > > > > > fxsave [rdi], where RDI = 0xffe60 > > > > Which is bad - it points to ISA BIOS F-segment area. > > > > This memory was mapped by qemu for read only access, which is reflected > in > > KVM EPT: > > 00000000000e0000-00000000000fffff (prio 1, R-): isa-bios > > > > This is a very early IRQ0 interrupt, presumably during early > initialization > > phase (Sec or Pei). > > > > Looks like CommonInterruptHandler does not switch to a separate stack and > > works on interrupted context's stack, which was fairly close to 1MB > > boundary when IRQ0 fired (RSP around 1002c0). When CommonInterruptEntry > > reached highlighted code it subtracted 512 bytes from current RSP which > > dropped to 0xffe60, below 1MB and into QEMU RO region. > > > > We were figuring out how to best fix this. Possible solutions are to > switch > > to a separate stack in CommonInterruptEntry, relocate early OvmfPkg stack > > to somewhere farther away from 1MB, to run with interrupts disabled until > > we reach a later phase or maybe something else. > > > > Any comments would be very appreciated! > > I wonder if you started to see this issue very recently. > > I suspect (hope!) that the symptoms you are experiencing are a > consequence of a bug in UefiCpuPkg that I've debugged and fixed just > today. (I hope to post the patches today.) > > While testing those patches on your end will of course tell us if your > issue has the same root cause, you could gather a few more symptoms even > before I get around posting the patches. The bug that I'm working on has > extremely varied crash symptoms (basically the APs wander off into the > weeds), and some of those symptoms have involved CpuExceptionHandlerLib. > The point is, by the time we get into CpuExceptionHandlerLib, all is > lost -- it is executing on an AP whose state is corrupt anyway. The > fxsave symptom is a red herring, most likely. > > CpuExceptionHandlerLib works fine otherwise, especially when invoked > from the BSP -- we've used the output dumped by CpuExceptionHandlerLib > to the serial port several times to track down issues. > > So, my request is that you please capture the OVMF debug log (please see > the "OvmfPkg/README" file for how). I'm curious if it crashes where and > how I suspect it crashes. > > Also, it would help if you provided > - your host CPU model, > - the host kernel (KVM) version, > - the guest CPU model, > - the guest CPU topology. > > Thanks! > Laszlo > _______________________________________________ edk2-devel mailing list [email protected] https://lists.01.org/mailman/listinfo/edk2-devel

