[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Using debug-key 'o: Dump IOMMU p2m table, locks up machine
Hello Jan, Monday, September 3, 2012, 10:21:04 AM, you wrote: >>>> On 02.09.12 at 10:43, Sander Eikelenboom <linux@xxxxxxxxxxxxxx> wrote: >> I have attached new output from xl dmesg, this time with iommu=debug on (the >> option changed from 4.1 to 4.2). > This one >>(XEN) [2012-09-02 00:55:02] traps.c:3156: GPF (0060): ffff82c48015c9ee -> >>ffff82c480224b13 > also worries me. While Xen gracefully recovers from it, these > messages still generally indicate a problem somewhere. Could > you resolve the addresses to file:line tuples? And, assuming > this happens in the context of doing something on behalf of > the guest in the context of a guest vCPU, could you also > check what guest side action triggers this (e.g. by adding a > call to show_execution_state() alongside the printing of the > message)? Hope i have done it right: diff -r a0b5f8102a00 xen/arch/x86/traps.c --- a/xen/arch/x86/traps.c Tue Aug 28 22:40:45 2012 +0100 +++ b/xen/arch/x86/traps.c Tue Sep 04 08:53:54 2012 +0200 @@ -3154,6 +3154,11 @@ { dprintk(XENLOG_INFO, "GPF (%04x): %p -> %p\n", regs->error_code, _p(regs->eip), _p(fixup)); + dprintk(XENLOG_INFO, " show_execution_state(regs): \n"); + show_execution_state(regs); + dprintk(XENLOG_INFO, " show_execution_state(guest_cpu_user_regs()): \n"); + show_execution_state(guest_cpu_user_regs()); + regs->eip = fixup; return; } Gives (complete dmesg attached: (XEN) [2012-09-03 21:20:49] AMD-Vi: IO_PAGE_FAULT: domain = 14, device id = 0x0700, fault address = 0xa8ee82c0 (XEN) [2012-09-03 21:20:49] AMD-Vi: IO_PAGE_FAULT: domain = 14, device id = 0x0700, fault address = 0xa8ee8320 (XEN) [2012-09-04 03:00:34] traps.c:3156: GPF (0060): ffff82c48015c9ee -> ffff82c480224b73 (XEN) [2012-09-04 03:00:34] traps.c:3157: show_execution_state(regs): (XEN) [2012-09-04 03:00:34] ----[ Xen-4.2.0-rc4-pre x86_64 debug=y Not tainted ]---- (XEN) [2012-09-04 03:00:34] CPU: 3 (XEN) [2012-09-04 03:00:34] RIP: e008:[<ffff82c48015c9ee>] context_switch+0x394/0xeeb (XEN) [2012-09-04 03:00:34] RFLAGS: 0000000000010246 CONTEXT: hypervisor (XEN) [2012-09-04 03:00:34] rax: 0000000000000001 rbx: ffff8300a52da000 rcx: 0000000000000001 (XEN) [2012-09-04 03:00:34] rdx: 0000000000000063 rsi: 0000000000000001 rdi: 000000000000037e (XEN) [2012-09-04 03:00:34] rbp: ffff83024d8a7e28 rsp: ffff83024d8a7d88 r8: 0000000000000006 (XEN) [2012-09-04 03:00:34] r9: ffff83024d95ebb8 r10: 00000000deadbeef r11: 0000000000000246 (XEN) [2012-09-04 03:00:34] r12: ffff8300afd11000 r13: 0000000000000003 r14: 0000000000000003 (XEN) [2012-09-04 03:00:34] r15: ffff83024d8aa048 cr0: 000000008005003b cr4: 00000000000006f0 (XEN) [2012-09-04 03:00:34] cr3: 0000000068506000 cr2: ffffffffff600400 (XEN) [2012-09-04 03:00:34] ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 (XEN) [2012-09-04 03:00:34] Xen stack trace from rsp=ffff83024d8a7d88: (XEN) [2012-09-04 03:00:34] 0000000000000029 0000000000000000 0000001e00000000 0000000000000000 (XEN) [2012-09-04 03:00:34] ffff83024d8a7db8 ffff83024d8aa060 ffff83024d8a7e18 ffff82c4801805ae (XEN) [2012-09-04 03:00:34] 0000000000012f22 00003fd9ab6d6ca6 0000000000000000 0000000000000000 (XEN) [2012-09-04 03:00:34] 0000000000000000 0000000000000000 ffff83024d8a7e28 ffff8300afd11000 (XEN) [2012-09-04 03:00:34] ffff8300a52da000 000013ebba37e10c 0000000000000002 ffff83024d8aa048 (XEN) [2012-09-04 03:00:34] ffff83024d8a7eb8 ffff82c480124a70 0000000000000000 ffff83024d8aa040 (XEN) [2012-09-04 03:00:34] 000000034d8a7e68 000013ebba37e10c ffff83024d8a7e88 ffff82c480189483 (XEN) [2012-09-04 03:00:34] ffff8300a52da000 0000000001c9c380 ffff83024d8a7e00 ffff82c4801226ce (XEN) [2012-09-04 03:00:34] ffff83024d8a7ef8 ffff82c4802d8180 00000000ffffffff ffff82c4802d8000 (XEN) [2012-09-04 03:00:34] ffff83024d8a7f18 ffffffffffffffff ffff83024d8a7ef8 ffff82c480125e31 (XEN) [2012-09-04 03:00:34] 0000000000000246 ffff8300afd11000 ffffffff81ece5d8 ffffffff81f420c0 (XEN) [2012-09-04 03:00:34] 0000000000000000 0000000000000000 ffff83024d8a7f08 ffff82c480125e68 (XEN) [2012-09-04 03:00:34] 00007cfdb27580c7 ffff82c480222ef6 0000000000000000 ffff8800030e14a0 (XEN) [2012-09-04 03:00:34] 0000000000000000 ffff88001a0800d8 ffff88001cd17bf0 ffff88001fc0b100 (XEN) [2012-09-04 03:00:34] 0000000000000202 0000000000000000 0000000000000001 0000000000000000 (XEN) [2012-09-04 03:00:34] 0000000000000000 ffffffff810011aa ffff88001e99e180 00000000deadbeef (XEN) [2012-09-04 03:00:34] 00000000deadbeef 0000010000000000 ffffffff810011aa 000000000000e033 (XEN) [2012-09-04 03:00:34] 0000000000000202 ffff88001cd17bb8 000000000000e02b 000053fd0000beef (XEN) [2012-09-04 03:00:34] 800000000000beef 740000000000beef 000000000018beef 000053fe00000003 (XEN) [2012-09-04 03:00:34] ffff8300a52da000 0000003dcd5a8680 000000000018e0c9 (XEN) [2012-09-04 03:00:34] Xen call trace: (XEN) [2012-09-04 03:00:34] [<ffff82c48015c9ee>] context_switch+0x394/0xeeb (XEN) [2012-09-04 03:00:34] [<ffff82c480124a70>] schedule+0x666/0x675 (XEN) [2012-09-04 03:00:34] [<ffff82c480125e31>] __do_softirq+0xa4/0xb5 (XEN) [2012-09-04 03:00:34] [<ffff82c480125e68>] do_softirq+0x26/0x28 (XEN) [2012-09-04 03:00:34] (XEN) [2012-09-04 03:00:34] traps.c:3159: show_execution_state(guest_cpu_user_regs()): (XEN) [2012-09-04 03:00:34] ----[ Xen-4.2.0-rc4-pre x86_64 debug=y Not tainted ]---- (XEN) [2012-09-04 03:00:34] CPU: 3 (XEN) [2012-09-04 03:00:34] RIP: e033:[<ffffffff810011aa>] (XEN) [2012-09-04 03:00:34] RFLAGS: 0000000000000202 EM: 1 CONTEXT: pv guest (XEN) [2012-09-04 03:00:34] rax: 0000000000000000 rbx: ffff88001fc0b100 rcx: ffffffff810011aa (XEN) [2012-09-04 03:00:34] rdx: ffff88001e99e180 rsi: 00000000deadbeef rdi: 00000000deadbeef (XEN) [2012-09-04 03:00:34] rbp: ffff88001cd17bf0 rsp: ffff88001cd17bb8 r8: 0000000000000000 (XEN) [2012-09-04 03:00:34] r9: 0000000000000001 r10: 0000000000000000 r11: 0000000000000202 (XEN) [2012-09-04 03:00:34] r12: ffff88001a0800d8 r13: 0000000000000000 r14: ffff8800030e14a0 (XEN) [2012-09-04 03:00:34] r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0 (XEN) [2012-09-04 03:00:34] cr3: 0000000068506000 cr2: 00000000f76e4000 (XEN) [2012-09-04 03:00:34] ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 (XEN) [2012-09-04 03:00:34] Guest stack trace from rsp=ffff88001cd17bb8: (XEN) [2012-09-04 03:00:34] 0000000000000000 0000000000000001 ffffffff81004942 ffff8800030e1040 (XEN) [2012-09-04 03:00:34] ffff88001e99e180 0000000000000000 ffff8800030e14a0 ffff88001cd17c10 (XEN) [2012-09-04 03:00:34] ffffffff81003941 ffff88001e99e180 ffff8800030e1040 ffff88001cd17c70 (XEN) [2012-09-04 03:00:34] ffffffff8100b850 ffff8800030e1040 ffff88001d280080 0000000000000063 (XEN) [2012-09-04 03:00:34] ffff88001fc10a80 ffff88001cd17c80 ffff88001fc12e80 0000000000000000 (XEN) [2012-09-04 03:00:34] ffff88001d285b00 0000000000000000 0000000000000000 ffff8800030e1040 (XEN) [2012-09-04 03:00:34] ffffffff817fa2f5 ffff88001cd17dd0 0000000000000216 ffffffff810700fe (XEN) [2012-09-04 03:00:34] ffff88001fc0e018 ffff8800030e1040 0000000000012e80 ffff88001cd17fd8 (XEN) [2012-09-04 03:00:34] ffff88001cd16010 0000000000012e80 0000000000012e80 ffff88001cd17fd8 (XEN) [2012-09-04 03:00:34] 0000000000012e80 ffff88001e999040 ffff8800030e1040 ffff880000000000 (XEN) [2012-09-04 03:00:34] ffff880000000000 ffff88001fc0e000 ffff88001cdb3300 ffff88001fc16e00 (XEN) [2012-09-04 03:00:34] ffff88001fc0e000 ffff88001cd17d50 ffffffff817fb614 ffff88001d08c140 (XEN) [2012-09-04 03:00:34] ffff88001cdb3300 ffff88001fc16e00 ffff88001fc0e000 ffff88001cd17de0 (XEN) [2012-09-04 03:00:34] ffffffff8107f059 ffff8800030e1040 ffff8800030e1040 ffffffff817fbe7b (XEN) [2012-09-04 03:00:34] ffff88001fc0e448 ffff8800030e1040 ffff88001cdb3320 ffff88001cd17db0 (XEN) [2012-09-04 03:00:34] ffffffff810acb78 ffff88001fc0e000 ffff88001cdb3300 ffff88001fc0e438 (XEN) [2012-09-04 03:00:34] ffff88001fc0e448 ffff8800030e1040 ffff88001cdb3320 ffff88001cd17de0 (XEN) [2012-09-04 03:00:34] ffffffff817fa814 ffff88001cd17eb0 ffffffff8107f6f9 0000000000000000 (XEN) [2012-09-04 03:00:34] ffff88001cd17e50 ffff8800030e1040 ffff88001cd16010 ffff8800030e0240 (XEN) [2012-09-04 03:00:34] ffff88001cd17e68 ffff8800030e1040 ffff8800030e1040 ffff8800030e1040 (XEN) [2012-09-04 03:15:12] grant_table.c:254:d0 Increased maptrack size to 2 frames > Jan Attachment:
xl-dmesg.txt _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |