[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] pci-attach on dom0 kernel versions above 3.8 crashes dom0



Excellent.

Got it working:

 

Dom0 Kernel: 3.4.83

DomU Kernel: 3.4.83

XEN 4.3.2

 

Thanks for your help.

 

 

Von: rkapoor@xxxxxxxxxxxx [mailto:rkapoor@xxxxxxxxxxxx] Im Auftrag von Rishi Kapoor
Gesendet: Donnerstag, 20. März 2014 17:11
An: Plischke, Markus
Cc: Kristoffer Egefelt; xen-users@xxxxxxxxxxxxxxxxxxx
Betreff: Re: [Xen-users] pci-attach on dom0 kernel versions above 3.8 crashes dom0

 

I moved to an earlier version of linux (linux 3.4) and the problem no longer exists.

 

On Thu, Mar 20, 2014 at 9:00 AM, Plischke, Markus <m.plischke@xxxxxxxxx> wrote:

Hi,

i have exactly the same problem, and testet the whole day, Intel X540 Network Card, Virtual Network Cards are existing and configured.

Pciback is working:
[   22.741678] pciback 0000:04:10.0: seizing device
[   22.741703] pciback 0000:04:10.0: enabling device (0000 -> 0002)

Error is the same, in the moment the VM loads the driver module:

    7.851209] systemd-udevd[977]: starting version 208
[    7.888402] ixgbevf: Intel(R) 10 Gigabit PCI Express Virtual Function Network Driver - version 2.7.12-k
[    7.888404] ixgbevf: Copyright (c) 2009 - 2012 Intel Corporation.
[    7.888501] ixgbevf 0000:00:00.0: enabling device (0000 -> 0002)
[    7.888537] ixgbevf 0000:00:00.0: Xen PCI mapped GSI0 to IRQ31
[    7.899347] ixgbevf 0000:00:00.0: MAC address not assigned by administrator.
[    7.899349] ixgbevf 0000:00:00.0: Assigning random MAC address
[    7.900040] BUG: unable to handle kernel paging request at ffffc90000c0e00c
[    7.900048] IP: [<ffffffff81326a79>] pci_enable_msix+0x339/0x410
[    7.900057] PGD 1c1c23067 PUD 1c1c24067 PMD 1bb02c067 PTE 80100000d9f00465
[    7.900064] Oops: 0003 [#1] SMP
[    7.900068] Modules linked in: x86_pkg_temp_thermal ixgbevf(+)
[    7.900073] CPU: 0 PID: 991 Comm: udevd Not tainted 3.12.13-gentoo #1
[    7.900076] task: ffff8801bad9f350 ti: ffff88017604a000 task.ti: ffff88017604a000
[    7.900079] RIP: e030:[<ffffffff81326a79>]  [<ffffffff81326a79>] pci_enable_msix+0x339/0x410
[    7.900084] RSP: e02b:ffff88017604ba88  EFLAGS: 00010286
[    7.900087] RAX: ffffc90000c0e00c RBX: ffff8801baf46000 RCX: ffff880021d20200
[    7.900090] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff880021d20200
[    7.900093] RBP: ffff88017604bae8 R08: ffff880021d20e00 R09: ffff8801bb800000
[    7.900095] R10: 0000000000000000 R11: 0000000000000044 R12: ffff8801baeadcf0
[    7.900098] R13: ffffc90000c0e00c R14: 0000000000000000 R15: ffff88019fa0b600
[    7.900104] FS:  00007fa016cf9780(0000) GS:ffff8801c2000000(0000) knlGS:0000000000000000
[    7.900107] CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
[    7.900110] CR2: ffff8000006cf800 CR3: 000000017e803000 CR4: 0000000000042660
[    7.900113] Stack:
[    7.900115]  ffff88017604ba98 ffff8801baeadcf8 ffff8801baf46790 ffffc90000000000
[    7.900120]  ffffffffa0003680 00000000c0023680 ffff88017604bb28 ffff88019f9ae740
[    7.900125]  0000000000000002 ffff88019f9ae000 ffff88019f9ae000 ffff88019f9aeb28
[    7.900129] Call Trace:
[    7.900135]  [<ffffffffa0003680>] ? ixgbevf_init_interrupt_scheme+0x70/0x440 [ixgbevf]
[    7.900140]  [<ffffffffa00036de>] ixgbevf_init_interrupt_scheme+0xce/0x440 [ixgbevf]
[    7.900145]  [<ffffffffa00054c4>] ixgbevf_probe+0x464/0x750 [ixgbevf]
[    7.900151]  [<ffffffff8130b296>] pci_device_probe+0x136/0x150
[    7.900156]  [<ffffffff8145c6b5>] driver_probe_device+0x75/0x230
[    7.900160]  [<ffffffff8145c90b>] __driver_attach+0x9b/0xa0
[    7.900163]  [<ffffffff8145c870>] ? driver_probe_device+0x230/0x230
[    7.900169]  [<ffffffff8145a875>] bus_for_each_dev+0x55/0x90
[    7.900172]  [<ffffffff8145c1d9>] driver_attach+0x19/0x20
[    7.900175]  [<ffffffff8145bd14>] bus_add_driver+0x104/0x290
[    7.900179]  [<ffffffff8145cf9f>] driver_register+0x5f/0xf0
[    7.900182]  [<ffffffffa000b000>] ? 0xffffffffa000afff
[    7.900185]  [<ffffffff8130a656>] __pci_register_driver+0x46/0x50
[    7.900190]  [<ffffffffa000b04f>] ixgbevf_init_module+0x4f/0x51 [ixgbevf]
[    7.900196]  [<ffffffff8100211a>] do_one_initcall+0xfa/0x150
[    7.900200]  [<ffffffff8107de7e>] ? __blocking_notifier_call_chain+0x5e/0x80
[    7.900206]  [<ffffffff810b2925>] load_module+0x1945/0x2240
[    7.900210]  [<ffffffff810af9b0>] ? show_initstate+0x50/0x50
[    7.900215]  [<ffffffff811519d1>] ? vfs_read+0x101/0x180
[    7.900219]  [<ffffffff810b3366>] SyS_finit_module+0x86/0x90
[    7.900225]  [<ffffffff81681df9>] system_call_fastpath+0x16/0x1b
[    7.900228] Code: 83 c5 0c 4d 63 ed e8 e7 4f d7 ff 4d 03 6f 28 41 8b 75 00 41 0f b7 47 02 41 89 77 08 83 ce 01 c1 e0 04 83 c0 0c 48 98 49 03 47 28 <89> 30 49 8b 47 18 41 83 c6 01 41 89 77 08 48 39 45 b0 4c 8d 78
[    7.900257] RIP  [<ffffffff81326a79>] pci_enable_msix+0x339/0x410
[    7.900260]  RSP <ffff88017604ba88>
[    7.900262] CR2: ffffc90000c0e00c
[    7.900267] ---[ end trace eba2b5cc0cdfab63 ]---


Ive testet the folliwng Kernel Versions:

3.10.25 and 3.12.13 (both Gentoo-sources Kernel)

And XEN Versions: 4.3.1 and 4.3.2

Regards
Markus


-----Ursprüngliche Nachricht-----
Von: xen-users-bounces@xxxxxxxxxxxxx [mailto:xen-users-bounces@xxxxxxxxxxxxx] Im Auftrag von Kristoffer Egefelt
Gesendet: Dienstag, 1. Oktober 2013 12:03
An: xen-users@xxxxxxxxxxxxxxxxxxx
Betreff: [Xen-users] pci-attach on dom0 kernel versions above 3.8 crashes dom0

I'm still having trouble getting passthrough to work on kernels above 3.8.

Currently I'm trying with kernel 3.11 to passthrough a intel X520 using ixgbevf.
Attached kernel messages from both xen, dom0 and domU - please let me know if more is needed.

Basically what happens is this:

dom0# xl pci-attach vm1 '0000:01:12.3,permissive=1'

[  392.559370] pciback 0000:01:12.3: enabling permissive mode configuration space accesses!
[  392.559557] pciback 0000:01:12.3: permissive mode is potentially unsafe!
[  393.174082] xen_pciback: vpci: 0000:01:12.3: assign to virtual slot 0 [  393.208783] pciback 0000:01:12.3: enabling device (0000 -> 0002) [  393.271754] ixgbe 0000:01:00.1 eth1: VF Reset msg received from vf 9

(XEN) mm.c:807: d1: Forcing read-only access to MFN d5324
(XEN) mm.c:807: d0: Forcing read-only access to MFN d5324
(XEN) mm.c:618:d0 Could not get page ref for pfn d5324
(XEN) mm.c:618:d0 Could not get page ref for pfn d5324
(XEN) mm.c:618:d0 Could not get page ref for pfn d5324
(XEN) mm.c:618:d1 Could not get page ref for pfn d5324


domU log:

[  130.262110] BUG: unable to handle kernel paging request at ffffc9000030200c [  130.262133] IP: [<ffffffff812008f2>] __msix_mask_irq+0x21/0x24 [  130.262154] PGD 75a40067 PUD 75a41067 PMD 75b44067 PTE 8010000000000464 [  130.262176] Oops: 0003 [#1] SMP


Any help is greatly appreciated.

Regards
Kristoffer




_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxx
http://lists.xen.org/xen-users

 

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxx
http://lists.xen.org/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.