|
|
|
|
|
|
|
|
|
|
xen-devel
RE: [Xen-devel] Re: free_irq_vector on ia64
To: |
"Alex Williamson" <alex.williamson@xxxxxx>, "Herbert Xu" <herbert@xxxxxxxxxxxxxxxxxxx> |
Subject: |
RE: [Xen-devel] Re: free_irq_vector on ia64 |
From: |
"Duan, Ronghui" <ronghui.duan@xxxxxxxxx> |
Date: |
Mon, 3 Sep 2007 15:27:32 +0800 |
Cc: |
"Zhang, Xing Z" <xing.z.zhang@xxxxxxxxx>, Xen Development Mailing List <xen-devel@xxxxxxxxxxxxxxxxxxx>, "Zhang, Xiantao" <xiantao.zhang@xxxxxxxxx>, "Xu, Anthony" <anthony.xu@xxxxxxxxx>, xen-ia64-devel <xen-ia64-devel@xxxxxxxxxxxxxxxxxxx> |
Delivery-date: |
Mon, 03 Sep 2007 00:27:58 -0700 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxx |
In-reply-to: |
<1188484479.6474.19.camel@lappy> |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
Thread-index: |
AcfrEv/pjVFSIngfQ3K2hK7o6Z/40wC5izVg |
Thread-topic: |
[Xen-devel] Re: free_irq_vector on ia64 |
Hi Alex:
I follow your steps to hide e1000 from domain0, adding
"pciback.hide==
(0000:01:00.0)" in append line, then reboot .It seem that all right. The
NAT consumption fault may have fixed by this patch:
http://xenbits.xensource.com/xen-unstable.hg?rev/7158623a1b3d
Could you please have a check?
BTW: It seems that we don't free irq_handler of e1000, so when
rebooting, there may be some warning message printing in the serial
port!
Thank you!
Best regards
Duan Ronghui
-----Original Message-----
From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
[mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Alex
Williamson
Sent: Thursday, August 30, 2007 10:35 PM
To: Herbert Xu
Cc: Xen Development Mailing List; xen-ia64-devel
Subject: [Xen-devel] Re: free_irq_vector on ia64
On Thu, 2007-08-30 at 18:48 +0800, Herbert Xu wrote:
> Hi Alex:
>
> I was looking at an ia64 bug report and noticed that we don't
> actually free IRQs in the free_irq_vector hypercall. This
> would eventually lead to alloc_irq_vector failing. Unless I'm
> mistaken something like calling pci_disable_device and
> pci_enable_device can lead to this situation.
>
> So I'm wondering what the original problem was and how could
> we resolve it without leaking the IRQ. Any ideas?
Hi Herbert,
I don't think we ever investigated this any further, though there's
obviously something wrong there. I believe you're referring to this
cset:
http://xenbits.xensource.com/xen-unstable.hg?rev/968caf47b548
Unfortunately, the comment is still true. This is fairly simply to
reproduce, hide a PCI device from dom0 using something like
pciback.hide=(0000:01:02.1) on the dom0 append line (this is hiding
function 1 or a 2 port/function e1000 card). Simply boot dom0, reboot,
badness...
Unable to handle kernel paging request at virtual address
0000007366627375
reboot[2703]: Oops 8813272891392 [1]
Modules linked in:
Pid: 2703, CPU 1, comm: reboot
psr : 00001010085a6010 ifs : 800000000000038a ip : [<a0000001000acab0>]
Not tainted
ip is at notifier_call_chain+0x30/0xc0
unat: 0000000000000000 pfs : 400000000000038a rsc : 0000000000000007
rnat: 0000000000000000 bsps: 0000000000000000 pr : 000000000055a959
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c0270033f
csd : 0000000000000000 ssd : 0000000000000000
b0 : a0000001000aed00 b6 : a000000100018610 b7 : a000000100018570
f6 : 000000000000000000000 f7 : 000000000000000000000
f8 : 000000000000000000000 f9 : 000000000000000000000
f10 : 000000000000000000000 f11 : 000000000000000000000
r1 : a0000001011225a0 r2 : 4000000000000792 r3 : a000000100f3e368
r8 : 0000007366627375 r9 : 60000fffff4bfc90 r10 : 0000000000000000
r11 : 0000000000000008 r12 : e0000001b7d57d30 r13 : e0000001b7d50000
r14 : e0000001be05a880 r15 : 0000000100000000 r16 : 0000000000000000
r17 : 0000000001234567 r18 : 0000000000200000 r19 : 0000000000000008
r20 : 2000000000244200 r21 : 0009804c8a70033f r22 : e0000001b7d50f70
r23 : 60000fff7fffc0c8 r24 : 0000000000000000 r25 : 0000000000000000
r26 : c00000000000010a r27 : 0000000000000000 r28 : fffffffffff00031
r29 : 00001213085a6010 r30 : 0000000000000000 r31 : a000000100d0b080
Call Trace:
[<a00000010001d520>] show_stack+0x40/0xa0
sp=e0000001b7d578e0 bsp=e0000001b7d511a8
[<a00000010001e180>] show_regs+0x840/0x880
sp=e0000001b7d57ab0 bsp=e0000001b7d51150
[<a000000100042900>] die+0x1c0/0x380
sp=e0000001b7d57ab0 bsp=e0000001b7d51108
[<a000000100066970>] ia64_do_page_fault+0x870/0x9a0
sp=e0000001b7d57ad0 bsp=e0000001b7d510b8
[<a000000100069140>] xen_leave_kernel+0x0/0x3e0
sp=e0000001b7d57b60 bsp=e0000001b7d510b8
[<a0000001000acab0>] notifier_call_chain+0x30/0xc0
sp=e0000001b7d57d30 bsp=e0000001b7d51068
[<a0000001000aed00>] blocking_notifier_call_chain+0x40/0x80
sp=e0000001b7d57d30 bsp=e0000001b7d51030
[<a0000001000afb10>] kernel_restart+0x30/0x120
sp=e0000001b7d57d30 bsp=e0000001b7d51010
[<a0000001000afff0>] sys_reboot+0x3b0/0x480
sp=e0000001b7d57d30 bsp=e0000001b7d50f90
[<a000000100014560>] ia64_ret_from_syscall+0x0/0x40
sp=e0000001b7d57e30 bsp=e0000001b7d50f90
[<a0000000000108e0>] __kernel_syscall_via_break+0x0/0x20
sp=e0000001b7d58000 bsp=e0000001b7d50f90
/etc/rc6.d/S90reboot: line 17: 2703 Segmentation fault reboot -d
-f -i
I'd guess this is some kind of double free that we need to track down.
Thanks,
Alex
--
Alex Williamson HP Open Source & Linux Org.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- RE: [Xen-devel] Re: free_irq_vector on ia64,
Duan, Ronghui <=
|
|
|
|
|