[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] RE: hypervisor crash in map_vtd_domain_page
Thanks Ian. I'm looking into it now. -----Original Message----- From: Ian Campbell [mailto:Ian.Campbell@xxxxxxxxxx] Sent: Thursday, January 13, 2011 2:12 AM To: Kay, Allen M Cc: Keir Fraser; xen-devel Subject: hypervisor crash in map_vtd_domain_page Hi Allen, When I try and start an HVM guest with a passed through PCI device I immediately get the hypervisor crash below. Domain 0 is xen/stable-2.6.32.x if that matters. The two devices are USB controllers. Based on the hg log of xen/drivers/passthrough I reverted 22697:1ae74f060a39+22696:f5b3fc5a5220+22695:55450858f414 and reapplied the build fix bit of 22695:55450858f414 and that still failed. I then reverted 22692:66e806289464 and now my guest boots fine. Ian. (XEN) Assertion 'ma < ((((((262UL) >> 8) * 0xffff000000000000UL) | (262UL << 39))) + ((1UL << 39)*10)) - (((((262UL) >> 8) * 0xffff000000000000UL) | (262UL << 39)))' failed at /local/scratch/ianc/devel/xen-unstable.hg/xen/incl:98 (XEN) ----[ Xen-4.1-unstable x86_64 debug=y Not tainted ]---- (XEN) CPU: 5 (XEN) RIP: e008:[<ffff82c48014725d>] map_vtd_domain_page+0x1d/0x58 (XEN) RFLAGS: 0000000000010212 CONTEXT: hypervisor (XEN) rax: 000004ffffffffff rbx: ffff8306221da000 rcx: 0000000000000027 (XEN) rdx: 1c000006221d9000 rsi: 0000000000000000 rdi: 1c000006221d9007 (XEN) rbp: ffff830631167b68 rsp: ffff830631167b68 r8: ffff82c48014261a (XEN) r9: 0000000000000001 r10: 0000000000000000 r11: 0000000000000000 (XEN) r12: 0000000000000012 r13: 0000000000000004 r14: 0000000000000027 (XEN) r15: ffff8306221da000 cr0: 000000008005003b cr4: 00000000000026f0 (XEN) cr3: 0000000630e85000 cr2: 00000000b75ab3f9 (XEN) ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0000 cs: e008 (XEN) Xen stack trace from rsp=ffff830631167b68: (XEN) ffff830631167bb8 ffff82c4801423a6 0000000131167ba8 ffff830622338000 (XEN) 0000000000000000 00000000000000e8 0000000000000000 0000000000000003 (XEN) ffff830622338dc0 ffff830622338000 ffff830631167c18 ffff82c48014268d (XEN) ffff830631167bd8 ffff82c480144a04 000000000023368b 0000000000000000 (XEN) ffff830622338000 00000000000000e8 ffff830622338000 ffff82f60466d160 (XEN) 0000000000000000 00007d0a00000000 ffff830631167c58 ffff82c48013e6be (XEN) ffff830622338018 00000000000000e8 ffff830622338000 0000000000000000 (XEN) 00000000000000e8 0000000000000000 ffff830631167da8 ffff82c480151905 (XEN) 0000000000000092 ffff830631167cd0 0000000000000001 ffff82c4802b0880 (XEN) ffff82c4802c27c0 0000000000000282 ffff830631167ca8 ffff82c480176456 (XEN) ffff830631167cb8 ffff82c480176601 ffff830631167cf8 ffff82c4801232b4 (XEN) ffff8306310a0018 ffff830631167e38 0000000000000000 ffff830631167d78 (XEN) ffff830630e92db0 ffff8300bf4f8000 0000000031167d48 5000000000000000 (XEN) ffff82f6046e84e0 0000000000237427 5400000000000002 ffff82f6046e84f0 (XEN) 0000000000000002 0000004844bbac9c ffff82c4802d3ec0 ffff8300bf4f8000 (XEN) ffff830631167d98 0000000000000282 00000000c8bd98ec 0000000000000001 (XEN) 0000000000000025 0000000000000000 0000000000000202 fffffffffffffff3 (XEN) 0000000008064004 0000000000000000 0000000000000000 0000000000000000 (XEN) ffff830631167ef8 ffff82c480103e41 ffff830631167dc8 0000000000000000 (XEN) ffff830631167e28 ffff82c48016cc4c ffff830631167e08 0000000180106918 (XEN) Xen call trace: (XEN) [<ffff82c48014725d>] map_vtd_domain_page+0x1d/0x58 (XEN) [<ffff82c4801423a6>] addr_to_dma_page_maddr+0x151/0x1b7 (XEN) [<ffff82c48014268d>] intel_iommu_map_page+0x73/0x1db (XEN) [<ffff82c48013e6be>] assign_device+0x1e7/0x26a (XEN) [<ffff82c480151905>] arch_do_domctl+0x1e9f/0x38aa (XEN) [<ffff82c480103e41>] do_domctl+0x1983/0x1a12 (XEN) [<ffff82c4802111c1>] compat_hypercall+0xa1/0xfa (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 5: (XEN) Assertion 'ma < ((((((262UL) >> 8) * 0xffff000000000000UL) | (262UL << 39))) + ((1UL << 39)*10)) - (((((262UL) >> 8) * 0xffff00**************************************** (XEN) (XEN) Manual reset required ('noreboot' specified) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |