|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Using debug-key 'o: Dump IOMMU p2m table, locks up machine
Hello Jan,
Monday, September 3, 2012, 10:21:04 AM, you wrote:
>>>> On 02.09.12 at 10:43, Sander Eikelenboom <linux@xxxxxxxxxxxxxx> wrote:
>> I have attached new output from xl dmesg, this time with iommu=debug on (the
>> option changed from 4.1 to 4.2).
> This one
>>(XEN) [2012-09-02 00:55:02] traps.c:3156: GPF (0060): ffff82c48015c9ee ->
>>ffff82c480224b13
> also worries me. While Xen gracefully recovers from it, these
> messages still generally indicate a problem somewhere. Could
> you resolve the addresses to file:line tuples? And, assuming
> this happens in the context of doing something on behalf of
> the guest in the context of a guest vCPU, could you also
> check what guest side action triggers this (e.g. by adding a
> call to show_execution_state() alongside the printing of the
> message)?
Hope i have done it right:
diff -r a0b5f8102a00 xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c Tue Aug 28 22:40:45 2012 +0100
+++ b/xen/arch/x86/traps.c Tue Sep 04 08:53:54 2012 +0200
@@ -3154,6 +3154,11 @@
{
dprintk(XENLOG_INFO, "GPF (%04x): %p -> %p\n",
regs->error_code, _p(regs->eip), _p(fixup));
+ dprintk(XENLOG_INFO, " show_execution_state(regs): \n");
+ show_execution_state(regs);
+ dprintk(XENLOG_INFO, " show_execution_state(guest_cpu_user_regs()):
\n");
+ show_execution_state(guest_cpu_user_regs());
+
regs->eip = fixup;
return;
}
Gives (complete dmesg attached:
(XEN) [2012-09-03 21:20:49] AMD-Vi: IO_PAGE_FAULT: domain = 14, device id =
0x0700, fault address = 0xa8ee82c0
(XEN) [2012-09-03 21:20:49] AMD-Vi: IO_PAGE_FAULT: domain = 14, device id =
0x0700, fault address = 0xa8ee8320
(XEN) [2012-09-04 03:00:34] traps.c:3156: GPF (0060): ffff82c48015c9ee ->
ffff82c480224b73
(XEN) [2012-09-04 03:00:34] traps.c:3157: show_execution_state(regs):
(XEN) [2012-09-04 03:00:34] ----[ Xen-4.2.0-rc4-pre x86_64 debug=y Not
tainted ]----
(XEN) [2012-09-04 03:00:34] CPU: 3
(XEN) [2012-09-04 03:00:34] RIP: e008:[<ffff82c48015c9ee>]
context_switch+0x394/0xeeb
(XEN) [2012-09-04 03:00:34] RFLAGS: 0000000000010246 CONTEXT: hypervisor
(XEN) [2012-09-04 03:00:34] rax: 0000000000000001 rbx: ffff8300a52da000
rcx: 0000000000000001
(XEN) [2012-09-04 03:00:34] rdx: 0000000000000063 rsi: 0000000000000001
rdi: 000000000000037e
(XEN) [2012-09-04 03:00:34] rbp: ffff83024d8a7e28 rsp: ffff83024d8a7d88 r8:
0000000000000006
(XEN) [2012-09-04 03:00:34] r9: ffff83024d95ebb8 r10: 00000000deadbeef
r11: 0000000000000246
(XEN) [2012-09-04 03:00:34] r12: ffff8300afd11000 r13: 0000000000000003
r14: 0000000000000003
(XEN) [2012-09-04 03:00:34] r15: ffff83024d8aa048 cr0: 000000008005003b
cr4: 00000000000006f0
(XEN) [2012-09-04 03:00:34] cr3: 0000000068506000 cr2: ffffffffff600400
(XEN) [2012-09-04 03:00:34] ds: 0000 es: 0000 fs: 0000 gs: 0000 ss:
e010 cs: e008
(XEN) [2012-09-04 03:00:34] Xen stack trace from rsp=ffff83024d8a7d88:
(XEN) [2012-09-04 03:00:34] 0000000000000029 0000000000000000
0000001e00000000 0000000000000000
(XEN) [2012-09-04 03:00:34] ffff83024d8a7db8 ffff83024d8aa060
ffff83024d8a7e18 ffff82c4801805ae
(XEN) [2012-09-04 03:00:34] 0000000000012f22 00003fd9ab6d6ca6
0000000000000000 0000000000000000
(XEN) [2012-09-04 03:00:34] 0000000000000000 0000000000000000
ffff83024d8a7e28 ffff8300afd11000
(XEN) [2012-09-04 03:00:34] ffff8300a52da000 000013ebba37e10c
0000000000000002 ffff83024d8aa048
(XEN) [2012-09-04 03:00:34] ffff83024d8a7eb8 ffff82c480124a70
0000000000000000 ffff83024d8aa040
(XEN) [2012-09-04 03:00:34] 000000034d8a7e68 000013ebba37e10c
ffff83024d8a7e88 ffff82c480189483
(XEN) [2012-09-04 03:00:34] ffff8300a52da000 0000000001c9c380
ffff83024d8a7e00 ffff82c4801226ce
(XEN) [2012-09-04 03:00:34] ffff83024d8a7ef8 ffff82c4802d8180
00000000ffffffff ffff82c4802d8000
(XEN) [2012-09-04 03:00:34] ffff83024d8a7f18 ffffffffffffffff
ffff83024d8a7ef8 ffff82c480125e31
(XEN) [2012-09-04 03:00:34] 0000000000000246 ffff8300afd11000
ffffffff81ece5d8 ffffffff81f420c0
(XEN) [2012-09-04 03:00:34] 0000000000000000 0000000000000000
ffff83024d8a7f08 ffff82c480125e68
(XEN) [2012-09-04 03:00:34] 00007cfdb27580c7 ffff82c480222ef6
0000000000000000 ffff8800030e14a0
(XEN) [2012-09-04 03:00:34] 0000000000000000 ffff88001a0800d8
ffff88001cd17bf0 ffff88001fc0b100
(XEN) [2012-09-04 03:00:34] 0000000000000202 0000000000000000
0000000000000001 0000000000000000
(XEN) [2012-09-04 03:00:34] 0000000000000000 ffffffff810011aa
ffff88001e99e180 00000000deadbeef
(XEN) [2012-09-04 03:00:34] 00000000deadbeef 0000010000000000
ffffffff810011aa 000000000000e033
(XEN) [2012-09-04 03:00:34] 0000000000000202 ffff88001cd17bb8
000000000000e02b 000053fd0000beef
(XEN) [2012-09-04 03:00:34] 800000000000beef 740000000000beef
000000000018beef 000053fe00000003
(XEN) [2012-09-04 03:00:34] ffff8300a52da000 0000003dcd5a8680
000000000018e0c9
(XEN) [2012-09-04 03:00:34] Xen call trace:
(XEN) [2012-09-04 03:00:34] [<ffff82c48015c9ee>] context_switch+0x394/0xeeb
(XEN) [2012-09-04 03:00:34] [<ffff82c480124a70>] schedule+0x666/0x675
(XEN) [2012-09-04 03:00:34] [<ffff82c480125e31>] __do_softirq+0xa4/0xb5
(XEN) [2012-09-04 03:00:34] [<ffff82c480125e68>] do_softirq+0x26/0x28
(XEN) [2012-09-04 03:00:34]
(XEN) [2012-09-04 03:00:34] traps.c:3159:
show_execution_state(guest_cpu_user_regs()):
(XEN) [2012-09-04 03:00:34] ----[ Xen-4.2.0-rc4-pre x86_64 debug=y Not
tainted ]----
(XEN) [2012-09-04 03:00:34] CPU: 3
(XEN) [2012-09-04 03:00:34] RIP: e033:[<ffffffff810011aa>]
(XEN) [2012-09-04 03:00:34] RFLAGS: 0000000000000202 EM: 1 CONTEXT: pv guest
(XEN) [2012-09-04 03:00:34] rax: 0000000000000000 rbx: ffff88001fc0b100
rcx: ffffffff810011aa
(XEN) [2012-09-04 03:00:34] rdx: ffff88001e99e180 rsi: 00000000deadbeef
rdi: 00000000deadbeef
(XEN) [2012-09-04 03:00:34] rbp: ffff88001cd17bf0 rsp: ffff88001cd17bb8 r8:
0000000000000000
(XEN) [2012-09-04 03:00:34] r9: 0000000000000001 r10: 0000000000000000
r11: 0000000000000202
(XEN) [2012-09-04 03:00:34] r12: ffff88001a0800d8 r13: 0000000000000000
r14: ffff8800030e14a0
(XEN) [2012-09-04 03:00:34] r15: 0000000000000000 cr0: 000000008005003b
cr4: 00000000000006f0
(XEN) [2012-09-04 03:00:34] cr3: 0000000068506000 cr2: 00000000f76e4000
(XEN) [2012-09-04 03:00:34] ds: 0000 es: 0000 fs: 0000 gs: 0000 ss:
e02b cs: e033
(XEN) [2012-09-04 03:00:34] Guest stack trace from rsp=ffff88001cd17bb8:
(XEN) [2012-09-04 03:00:34] 0000000000000000 0000000000000001
ffffffff81004942 ffff8800030e1040
(XEN) [2012-09-04 03:00:34] ffff88001e99e180 0000000000000000
ffff8800030e14a0 ffff88001cd17c10
(XEN) [2012-09-04 03:00:34] ffffffff81003941 ffff88001e99e180
ffff8800030e1040 ffff88001cd17c70
(XEN) [2012-09-04 03:00:34] ffffffff8100b850 ffff8800030e1040
ffff88001d280080 0000000000000063
(XEN) [2012-09-04 03:00:34] ffff88001fc10a80 ffff88001cd17c80
ffff88001fc12e80 0000000000000000
(XEN) [2012-09-04 03:00:34] ffff88001d285b00 0000000000000000
0000000000000000 ffff8800030e1040
(XEN) [2012-09-04 03:00:34] ffffffff817fa2f5 ffff88001cd17dd0
0000000000000216 ffffffff810700fe
(XEN) [2012-09-04 03:00:34] ffff88001fc0e018 ffff8800030e1040
0000000000012e80 ffff88001cd17fd8
(XEN) [2012-09-04 03:00:34] ffff88001cd16010 0000000000012e80
0000000000012e80 ffff88001cd17fd8
(XEN) [2012-09-04 03:00:34] 0000000000012e80 ffff88001e999040
ffff8800030e1040 ffff880000000000
(XEN) [2012-09-04 03:00:34] ffff880000000000 ffff88001fc0e000
ffff88001cdb3300 ffff88001fc16e00
(XEN) [2012-09-04 03:00:34] ffff88001fc0e000 ffff88001cd17d50
ffffffff817fb614 ffff88001d08c140
(XEN) [2012-09-04 03:00:34] ffff88001cdb3300 ffff88001fc16e00
ffff88001fc0e000 ffff88001cd17de0
(XEN) [2012-09-04 03:00:34] ffffffff8107f059 ffff8800030e1040
ffff8800030e1040 ffffffff817fbe7b
(XEN) [2012-09-04 03:00:34] ffff88001fc0e448 ffff8800030e1040
ffff88001cdb3320 ffff88001cd17db0
(XEN) [2012-09-04 03:00:34] ffffffff810acb78 ffff88001fc0e000
ffff88001cdb3300 ffff88001fc0e438
(XEN) [2012-09-04 03:00:34] ffff88001fc0e448 ffff8800030e1040
ffff88001cdb3320 ffff88001cd17de0
(XEN) [2012-09-04 03:00:34] ffffffff817fa814 ffff88001cd17eb0
ffffffff8107f6f9 0000000000000000
(XEN) [2012-09-04 03:00:34] ffff88001cd17e50 ffff8800030e1040
ffff88001cd16010 ffff8800030e0240
(XEN) [2012-09-04 03:00:34] ffff88001cd17e68 ffff8800030e1040
ffff8800030e1040 ffff8800030e1040
(XEN) [2012-09-04 03:15:12] grant_table.c:254:d0 Increased maptrack size to 2
frames
> Jan
Attachment:
xl-dmesg.txt _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |