[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen-unstable: xen panic RIP: dpci_softirq



On 14/11/14 13:11, Sander Eikelenboom wrote:
> Hi Konrad / Jan,
>
> One of these commits:
> - aeeea485bcfe2a517ed9bcb3ba1c3be0f6824e07 dpci: move from an hvm_irq_dpci 
> (and struct domain) to an hvm_dirq_dpci model
> - f6dd295381f4b6a66acddacf46bca8940586c8d8 pci: replace tasklet with softirq
>
> gives (running under 5 minutes of host boot, on AMD hardware and with guest 
> with 
> pci passthrough) the splat below.
>
> --
> Sander

I was hoping to get a chance to test this as well, but am currently
blocked on other issues.

Would you mind giving it a go at c/s aeeea485?  It is highly likely that
the bug is in f6dd295, but it would be nice to confirm that it want a
bug in the (hopefully noop) shuffling of the position of the tasklet.

~Andrew

>
> (XEN) [2014-11-14 13:00:06.810] ----[ Xen-4.5.0-rc  x86_64  debug=y  Not 
> tainted ]----
> (XEN) [2014-11-14 13:00:06.810] CPU:    3
> (XEN) [2014-11-14 13:00:06.810] RIP:    e008:[<ffff82d080148f14>] 
> dpci_softirq+0x9c/0x231
> (XEN) [2014-11-14 13:00:06.810] RFLAGS: 0000000000010283   CONTEXT: hypervisor
> (XEN) [2014-11-14 13:00:06.811] rax: 0000000000100100   rbx: ffff830515c86d90 
>   rcx: 0000000000000001
> (XEN) [2014-11-14 13:00:06.811] rdx: ffff83054ef30000   rsi: 0000000000000002 
>   rdi: ffff830518b3b0b8
> (XEN) [2014-11-14 13:00:06.811] rbp: ffff83054ef37eb0   rsp: ffff83054ef37e50 
>   r8:  ffff830515c86d60
> (XEN) [2014-11-14 13:00:06.811] r9:  0000016b62294400   r10: 0000016b63143e58 
>   r11: 0000000000000246
> (XEN) [2014-11-14 13:00:06.811] r12: ffff830515c86d38   r13: ffff830518b3b000 
>   r14: ffff830515c86d28
> (XEN) [2014-11-14 13:00:06.811] r15: ffff830515c86d28   cr0: 000000008005003b 
>   cr4: 00000000000006f0
> (XEN) [2014-11-14 13:00:06.811] cr3: 000000009fc92000   cr2: 0000000000100108
> (XEN) [2014-11-14 13:00:06.811] ds: 0000   es: 0000   fs: 0000   gs: 0000   
> ss: e010   cs: e008
> (XEN) [2014-11-14 13:00:06.811] Xen stack trace from rsp=ffff83054ef37e50:
> (XEN) [2014-11-14 13:00:06.811]    ffff83054ef37e60 ffff830518b3b0b8 
> ffff830515c86d38 ffff83054ef37e70
> (XEN) [2014-11-14 13:00:06.811]    ffff830515c86d90 ffff830515c86d90 
> ffff83054ef37ef0 ffff82d080300100
> (XEN) [2014-11-14 13:00:06.811]    ffff82d0802fff80 ffffffffffffffff 
> ffff83054ef30000 0000000000000002
> (XEN) [2014-11-14 13:00:06.811]    ffff83054ef37ee0 ffff82d08012bd91 
> ffff83054ef30000 ffff83009faea000
> (XEN) [2014-11-14 13:00:06.811]    00000000ffffffff ffff83054ef3e068 
> ffff83054ef37ef0 ffff82d08012bde9
> (XEN) [2014-11-14 13:00:06.811]    ffff83054ef37f10 ffff82d0801623d5 
> ffff82d08012bde9 ffff83009fafd000
> (XEN) [2014-11-14 13:00:06.811]    ffff83054ef37de8 ffffffff82200000 
> ffffffff82200000 0000000000000000
> (XEN) [2014-11-14 13:00:06.811]    0000000000000000 ffffffff82203e28 
> ffffffff822f3ec0 0000000000000246
> (XEN) [2014-11-14 13:00:06.811]    0000000000000001 0000000000000000 
> 0000000000000000 0000000000000000
> (XEN) [2014-11-14 13:00:06.811]    ffffffff810013aa ffffffff8221c520 
> 00000000deadbeef 00000000deadbeef
> (XEN) [2014-11-14 13:00:06.811]    0000010000000000 ffffffff810013aa 
> 000000000000e033 0000000000000246
> (XEN) [2014-11-14 13:00:06.811]    ffffffff82203e10 000000000000e02b 
> 008000000000beef 000000000000beef
> (XEN) [2014-11-14 13:00:06.811]    000000000000beef 00000000ffffbeef 
> ffffea0000000003 ffff83009fafd000
> (XEN) [2014-11-14 13:00:06.811]    00000034cec15280 0000000000000000
> (XEN) [2014-11-14 13:00:06.811] Xen call trace:
> (XEN) [2014-11-14 13:00:06.811]    [<ffff82d080148f14>] 
> dpci_softirq+0x9c/0x231
> (XEN) [2014-11-14 13:00:06.811]    [<ffff82d08012bd91>] __do_softirq+0x81/0x8c
> (XEN) [2014-11-14 13:00:06.811]    [<ffff82d08012bde9>] do_softirq+0x13/0x15
> (XEN) [2014-11-14 13:00:06.811]    [<ffff82d0801623d5>] idle_loop+0x5e/0x6e
> (XEN) [2014-11-14 13:00:06.811] 
> (XEN) [2014-11-14 13:00:06.811] Pagetable walk from 0000000000100108:
> (XEN) [2014-11-14 13:00:06.811]  L4[0x000] = 000000055d09a063 ffffffffffffffff
> (XEN) [2014-11-14 13:00:06.811]  L3[0x000] = 000000055d099063 ffffffffffffffff
> (XEN) [2014-11-14 13:00:06.811]  L2[0x000] = 000000055d098063 
> ffffffffffffffff 
> (XEN) [2014-11-14 13:00:06.811]  L1[0x100] = 0000000000000000 ffffffffffffffff
> (XEN) [2014-11-14 13:00:07.692] 
> (XEN) [2014-11-14 13:00:07.700] ****************************************
> (XEN) [2014-11-14 13:00:07.720] Panic on CPU 3:
> (XEN) [2014-11-14 13:00:07.732] FATAL PAGE FAULT
> (XEN) [2014-11-14 13:00:07.745] [error_code=0000]
> (XEN) [2014-11-14 13:00:07.759] Faulting linear address: 0000000000100108
> (XEN) [2014-11-14 13:00:07.778] ****************************************
> (XEN) [2014-11-14 13:00:07.797] 
> (XEN) [2014-11-14 13:00:07.806] Reboot in five seconds...
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.