WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 1762] New: [VT-D]Sometimes xen panic when run guest with

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 1762] New: [VT-D]Sometimes xen panic when run guest with two devices case
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Sun, 17 Apr 2011 19:51:08 -0700
Delivery-date: Sun, 17 Apr 2011 19:51:20 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1762

           Summary: [VT-D]Sometimes xen panic when run guest with two
                    devices case
           Product: Xen
           Version: unstable
          Platform: x86-64
        OS/Version: Linux-2.6
            Status: NEW
          Severity: critical
          Priority: P1
         Component: Hardware Support
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: yang.z.zhang@xxxxxxxxx


Environment:
------------
Service Arch (ia32/ia32e/IA64): ia32e
Guest Arch (ia32/ia32e/IA64): 
Guest OS Type (Linux/Windows):Linux
Change Set:  23198:697ac895c11c 
Hardware: Westmere-EP


Other:
pvops git:
commit bb1a15e55ec665a64c8a9c6bd699b1f16ac01ff4
Merge: df3a556... bd51e05...
Author: Jeremy Fitzhardinge <jeremy.fitzhardinge@xxxxxxxxxx>
Date:   Tue Mar 29 15:17:46 2011 -0700


Bug detailed description:
--------------------------
I seen the following panic once when runing our test case that create guest
with two NICs. 

vt-nhm7 login: (XEN) [VT-D]iommu.c:853: iommu_fault_status: Primary Pending
Fault
(XEN) [VT-D]iommu.c:828: DMAR:[DMA Write] Request device [0a:00.0] fault addr
2b4830942000, iommu reg = ffff82c3ffe57000
(XEN) DMAR:[fault reason 05h] PTE Write access is not set
(XEN) print_vtd_entries: iommu = ffff83013fffa5b0 bdf = a:0.0 gmfn = 2b4830942
(XEN)     root_entry = ffff83013ffd4000
(XEN)     root_entry[a] = 13c492001
(XEN)     context = ffff83013c492000
(XEN)     context[0] = 102_11cb9e005
(XEN)     l4 = ffff83011cb9e000
(XEN)     l4_index = 56
(XEN)     l4[56] = 0
(XEN)     l4[56] not present
(XEN) [VT-D]io.c:329: d6: unbind: m_gsi=127 g_gsi=36 device=5 intx=0
(XEN) [VT-D]io.c:387: d6 unmap: m_irq=127 device=5 intx=0
(XEN) [VT-D]io.c:305: d6: bind: m_gsi=17 g_gsi=36 device=5 intx=0
(XEN) msi.c:815: MSI is already in use on device 0a:00.0
(XEN) msi.c:815: MSI is already in use on device 0a:00.0
INIT: Id "co" respawning too fast: disabled for 5 minutes
[ 1069.049714] pci-stub 0000:08:02.0: restoring config space at offset 0x1 (was
0x2300400, writing 0x2300007)
(XEN) [VT-D]iommu.c:1500: d6:PCI: unmap bdf = 8:2.0
(XEN) [VT-D]iommu.c:1373: d0:PCI: map bdf = 8:2.0
[ 1069.067489] pci-stub 0000:0a:00.0: restoring config space at offset 0x1 (was
0x100400, writing 0x100407)
(XEN) [VT-D]iommu.c:1490: d6:PCIe: unmap bdf = a:0.0
(XEN) [VT-D]iommu.c:1363: d0:PCIe: map bdf = a:0.0
(XEN) irq.c:1590: dom6: forcing unbind of pirq 16
(XEN) irq.c:1590: dom6: forcing unbind of pirq 17
(XEN) irq.c:1590: dom6: forcing unbind of pirq 125
(XEN) irq.c:1590: dom6: forcing unbind of pirq 126
(XEN) ----[ Xen-4.2-unstable  x86_64  debug=y  Not tainted ]----
(XEN) CPU:    10
(XEN) RIP:    e008:[<ffff82c4801b57b8>] vioapic_irq_positive_edge+0x9f/0xe7
(XEN) RFLAGS: 0000000000010202   CONTEXT: hypervisor
(XEN) rax: 0000000000000130   rbx: 0000000000000024   rcx: 0000000000000000
(XEN) rdx: 0000000000000297   rsi: 0000000000000024   rdi: ffff8301032826dc
(XEN) rbp: ffff83013efafe00   rsp: ffff83013efafde0   r8:  0000000000000002
(XEN) r9:  ffff83013efb7280   r10: 0000ffff0000ffff   r11: 00ff00ff00ff00ff
(XEN) r12: ffff830103282000   r13: 0000000000000000   r14: ffff830103282000
(XEN) r15: 0000000000000005   cr0: 000000008005003b   cr4: 00000000000026f0
(XEN) cr3: 00000000bf0a4000   cr2: 0000000000000132
(XEN) ds: 002b   es: 002b   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff83013efafde0:
(XEN)    0000ffff0000ffff ffff8301032826e0 0000000000000005 0000000000000000
(XEN)    ffff83013efafe30 ffff82c4801b05b4 0000000000000000 ffff8301032826d8
(XEN)    ffff830103282000 0000000000000005 ffff83013efafe60 ffff82c4801b0879
(XEN)    ffff8301033ef7a0 0000000000000000 0000000000000330 0000000000000011
(XEN)    ffff83013efafec0 ffff82c48013f2d4 ffff830103282190 0000000000000330
(XEN)    ffff830103282000 ffff83011cb9f010 000000113efaff18 000000000000000a
(XEN)    ffff83013efb70e0 ffff83011cb9f340 ffff83013efb70d0 ffff83013efb7040
(XEN)    ffff83013efafef0 ffff82c4801257d0 ffff83013efaff18 ffff8300bf7fa000
(XEN)    ffffffffffffffff ffff83013efb7060 ffff83013efaff10 ffff82c480153787
(XEN)    ffff82c4801234fe ffff8300bf7fa000 ffff83013efafe10 0000000000000000
(XEN)    0000000000000000 0000000000000000 0000000000000000 ffff88003fccbf10
(XEN)    ffffffff81878950 0000000000000246 ffff88003c18bc18 ffffffff81067fbb
(XEN)    0000000000000000 0000000000000000 ffffffff810093aa 0000000000000000
(XEN)    00000000deadbeef 00000000deadbeef 0000010000000000 ffffffff810093aa
(XEN)    000000000000e033 0000000000000246 ffff88003fccbef8 000000000000e02b
(XEN)    000000000000beef 000000000000beef 000000000000beef 000000000000beef
(XEN)    000000000000000a ffff8300bf7fa000 0000003cbecde480 0000000000000000
(XEN) Xen call trace:
(XEN)    [<ffff82c4801b57b8>] vioapic_irq_positive_edge+0x9f/0xe7
(XEN)    [<ffff82c4801b05b4>] __hvm_pci_intx_assert+0x7c/0xd3
(XEN)    [<ffff82c4801b0879>] hvm_pci_intx_assert+0x3f/0x5c
(XEN)    [<ffff82c48013f2d4>] hvm_dirq_assist+0x12e/0x1ea
(XEN)    [<ffff82c4801257d0>] do_tasklet+0xf4/0x16f
(XEN)    [<ffff82c480153787>] idle_loop+0x4d/0x58
(XEN)
(XEN) Pagetable walk from 0000000000000132:
(XEN)  L4[0x000] = 000000013fff5063 5555555555555555
(XEN)  L3[0x000] = 000000013fff4063 5555555555555555
(XEN)  L2[0x000] = 000000013fff3063 5555555555555555
(XEN)  L1[0x000] = 0000000000000000 ffffffffffffffff
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 10:
(XEN) FATAL PAGE FAULT
(XEN) [error_code=0000]
(XEN) Faulting linear address: 0000000000000132
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...
(XEN) Resetting with ACPI MEMORY or I/O RESET_REG. 


Reproduce steps:
----------------
1.Create guest with two devices.
2.We found xen painc once. 

Current result:
----------------
xen panic

Expected result:
----------------
work well

Basic root-causing log:
----------------------


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>