[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [BUG] Assertion '(sp == 0) || (peoi[sp-1].vector < vector)' failed at irq.c:1163
Den 17. jan. 2016 16:25, skrev Andrew Cooper: > On 17/01/16 15:16, Andrew Cooper wrote: >>>> This isn't the first time we have seen this on Haswell processors. Do >>>> you have microcode loading set up? >>>> >>>> ~Andrew >>>> >>> Still happening with kernel-genkernel-x86_64-4.1.15-gentoo and updated >>> cpu microcode, using microcode from 20151106. ... >>> Actually, this will be more useful: >>> >>> diff --git a/xen/arch/x86/irq.c b/xen/arch/x86/irq.c >>> index 1228568..4e75b03 100644 >>> --- a/xen/arch/x86/irq.c >>> +++ b/xen/arch/x86/irq.c >>> @@ -1165,6 +1165,15 @@ static void __do_IRQ_guest(int irq) >>> if ( action->ack_type == ACKTYPE_EOI ) >>> { >>> sp = pending_eoi_sp(peoi); >>> + if ( unlikely(!((sp == 0) || (peoi[sp-1].vector < vector))) ) >>> + { >>> + int p; >>> + >>> + printk("** sp %d, irq %d, vec %#x\n", sp, irq, vector); >>> + for ( p = sp; p > 0; --p ) >>> + printk("**peoi[%d] = {%d, %#x, %d}\n", >>> + p-1, peoi[p-1].irq, peoi[p-1].vector, >>> peoi[p-1].ready); >>> + } >>> ASSERT((sp == 0) || (peoi[sp-1].vector < vector)); >>> ASSERT(sp < (NR_DYNAMIC_VECTORS-1)); >>> peoi[sp].irq = irq; >>> >>> >>> Got one again. dom5 is my desktop, dom1 is my mail-server/router/firewall. (planning to split that up ... ) . Is there any additional info that would be useful? Running now with gentoo xen 4.6.0-r8 and xen-tools 4.6.0-r7. dom0 kernel is gentoo-sources-4.1.15-r1 , and the above patch. I tried running with maxcpus=6 for a while, but I had to disable some services to get that running. So, when nothing happened for a while I re-enabled all my cores (two cpus, 12 cores, 24 threads). I was running with two cpu-pools, one for each cpu. I have not re-enabled that. -------- Here is the dump from the assert (full log attached): ------------- (XEN) [2016-01-22 06:19:15] grant_table.c:1491:d5v2 Expanding dom (5) grant table from (9) to (10) frames. (XEN) [2016-01-22 07:32:50] grant_table.c:1491:d1v3 Expanding dom (1) grant table from (12) to (13) frames. (XEN) [2016-01-22 07:33:36] ** sp 1, irq 107, vec 0x3b (XEN) [2016-01-22 07:33:36] **peoi[0] = {107, 0x3b, 0} (XEN) [2016-01-22 07:33:36] Assertion '(sp == 0) || (peoi[sp-1].vector < vector)' failed at irq.c:1172 (XEN) [2016-01-22 07:33:36] ----[ Xen-4.6.0 x86_64 debug=y Tainted: C ]---- (XEN) [2016-01-22 07:33:36] CPU: 21 (XEN) [2016-01-22 07:33:36] RIP: e008:[<ffff82d080170205>] do_IRQ+0x451/0x6ea (XEN) [2016-01-22 07:33:36] RFLAGS: 0000000000010046 CONTEXT: hypervisor (XEN) [2016-01-22 07:33:36] rax: 000000000000003b rbx: 000000000000003b rcx: 0000000000000000 (XEN) [2016-01-22 07:33:36] rdx: ffff83107e048000 rsi: 000000000000000a rdi: ffff82d0802ab768 (XEN) [2016-01-22 07:33:36] rbp: ffff83107e04fdc8 rsp: ffff83107e04fd58 r8: ffff83083ff00000 (XEN) [2016-01-22 07:33:36] r9: 0000000000000002 r10: 0000000000000024 r11: 0000000000000002 (XEN) [2016-01-22 07:33:36] r12: ffff83072ea1ef50 r13: ffff830839bc8480 r14: 0000000000000001 (XEN) [2016-01-22 07:33:36] r15: 000000000000006b cr0: 000000008005003b cr4: 00000000001526e0 (XEN) [2016-01-22 07:33:36] cr3: 00000004d337d000 cr2: 00007f0152c28000 (XEN) [2016-01-22 07:33:36] ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: e008 (XEN) [2016-01-22 07:33:36] Xen stack trace from rsp=ffff83107e04fd58: (XEN) [2016-01-22 07:33:36] 000000000000006b ffff830839bc8480 ffff831000000000 ffff830839c06b24 (XEN) [2016-01-22 07:33:36] 0000000000000000 0000006b00000001 00000015ffc00015 ffff830839dadac0 (XEN) [2016-01-22 07:33:36] ffff82d08034a480 00013dd61b4fef1a ffff830839bd0da0 0000000000000004 (XEN) [2016-01-22 07:33:36] 0000000000000008 ffff830839bd0e60 00007cef81fb0207 ffff82d08023b132 (XEN) [2016-01-22 07:33:36] ffff830839bd0e60 0000000000000008 0000000000000004 ffff830839bd0da0 (XEN) [2016-01-22 07:33:36] ffff83107e04fef0 00013dd61b4fef1a 00013dd61b7d5a72 0000000000000000 (XEN) [2016-01-22 07:33:36] ffff83007dfe8060 0000000000000914 ffff830839bc8020 20c49ba5e353f7cf (XEN) [2016-01-22 07:33:36] ffff83107e048000 00013dd61b4f6ed5 ffff830839bd0dd0 0000003b00000000 (XEN) [2016-01-22 07:33:36] ffff82d0801af1ea 000000000000e008 0000000000000202 ffff83107e04fe80 (XEN) [2016-01-22 07:33:36] 0000000000000000 0000002075ff8000 00013dd61b466d12 ffff82d0801ebb00 (XEN) [2016-01-22 07:33:36] ffff83107e04ff08 ffff82d080321b00 0000000000000000 0000000000000000 (XEN) [2016-01-22 07:33:36] 000002e200000229 ffffffff81a04000 ffff83107e048000 ffff83007dfe8000 (XEN) [2016-01-22 07:33:36] 00000000ffffffff ffff830839d2f000 ffff8304ccbf0000 ffff83107e04ff10 (XEN) [2016-01-22 07:33:36] ffff82d0801607bc ffff82d08012c574 ffff830075ff8000 ffff83107e04fdd8 (XEN) [2016-01-22 07:33:36] ffffffff81a04000 ffffffff81a04000 ffffffff81a04000 0000000000000000 (XEN) [2016-01-22 07:33:36] ffffffff81a03ed8 0000000000000000 0000000000000206 ffff88014111bbd0 (XEN) [2016-01-22 07:33:36] 0000000000000000 0000000000000000 0000000000000000 ffffffff81a2e700 (XEN) [2016-01-22 07:33:36] ffff88023f20da70 0000000000000000 0000000000000000 0000beef0000beef (XEN) [2016-01-22 07:33:36] ffffffff81038162 000000bf0000beef 0000000000000286 ffffffff81a03ed8 (XEN) [2016-01-22 07:33:36] 000000000000beef 000000000000beef 000000000000beef 000000000000beef (XEN) [2016-01-22 07:33:36] Xen call trace: (XEN) [2016-01-22 07:33:36] [<ffff82d080170205>] do_IRQ+0x451/0x6ea (XEN) [2016-01-22 07:33:36] [<ffff82d08023b132>] common_interrupt+0x62/0x70 (XEN) [2016-01-22 07:33:36] [<ffff82d0801af1ea>] mwait_idle+0x2cb/0x315 (XEN) [2016-01-22 07:33:36] [<ffff82d0801607bc>] idle_loop+0x51/0x6b (XEN) [2016-01-22 07:33:36] (XEN) [2016-01-22 07:33:36] (XEN) [2016-01-22 07:33:36] **************************************** (XEN) [2016-01-22 07:33:36] Panic on CPU 21: (XEN) [2016-01-22 07:33:36] Assertion '(sp == 0) || (peoi[sp-1].vector < vector)' failed at irq.c:1172 (XEN) [2016-01-22 07:33:36] **************************************** (XEN) [2016-01-22 07:33:36] (XEN) [2016-01-22 07:33:36] Reboot in five seconds... ---- Attachment:
xen-assert.log _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |