[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] RE: hypervisor crash in map_vtd_domain_page



On Thu, 2011-01-13 at 18:38 +0000, Kay, Allen M wrote:
> Ian/Keir,
> 
> The attached patch should fix the crash issue.  Somehow the check for 
> !iommu_hap_pt_share in function iommu_set_pgd() got dropped in changeset 
> 22692.
> 
> Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx>

Works for me. Thanks.

Tested-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

> 
> -----Original Message-----
> From: Ian Campbell [mailto:Ian.Campbell@xxxxxxxxxx] 
> Sent: Thursday, January 13, 2011 2:12 AM
> To: Kay, Allen M
> Cc: Keir Fraser; xen-devel
> Subject: hypervisor crash in map_vtd_domain_page
> 
> Hi Allen,
> 
> When I try and start an HVM guest with a passed through PCI device I
> immediately get the hypervisor crash below.
> 
> Domain 0 is xen/stable-2.6.32.x if that matters. The two devices are USB
> controllers.
> 
> Based on the hg log of xen/drivers/passthrough I reverted
> 22697:1ae74f060a39+22696:f5b3fc5a5220+22695:55450858f414 and reapplied
> the build fix bit of 22695:55450858f414 and that still failed.
> 
> I then reverted 22692:66e806289464 and now my guest boots fine.
> 
> Ian.
> 
> (XEN) Assertion 'ma < ((((((262UL) >> 8) * 0xffff000000000000UL) | (262UL << 
> 39))) + ((1UL << 39)*10)) - (((((262UL) >> 8) * 0xffff000000000000UL) | 
> (262UL << 39)))' failed at 
> /local/scratch/ianc/devel/xen-unstable.hg/xen/incl:98
> (XEN) ----[ Xen-4.1-unstable  x86_64  debug=y  Not tainted ]----
> (XEN) CPU:    5
> (XEN) RIP:    e008:[<ffff82c48014725d>] map_vtd_domain_page+0x1d/0x58
> (XEN) RFLAGS: 0000000000010212   CONTEXT: hypervisor
> (XEN) rax: 000004ffffffffff   rbx: ffff8306221da000   rcx: 0000000000000027
> (XEN) rdx: 1c000006221d9000   rsi: 0000000000000000   rdi: 1c000006221d9007
> (XEN) rbp: ffff830631167b68   rsp: ffff830631167b68   r8:  ffff82c48014261a
> (XEN) r9:  0000000000000001   r10: 0000000000000000   r11: 0000000000000000
> (XEN) r12: 0000000000000012   r13: 0000000000000004   r14: 0000000000000027
> (XEN) r15: ffff8306221da000   cr0: 000000008005003b   cr4: 00000000000026f0
> (XEN) cr3: 0000000630e85000   cr2: 00000000b75ab3f9
> (XEN) ds: 007b   es: 007b   fs: 00d8   gs: 0033   ss: 0000   cs: e008
> (XEN) Xen stack trace from rsp=ffff830631167b68:
> (XEN)    ffff830631167bb8 ffff82c4801423a6 0000000131167ba8 ffff830622338000
> (XEN)    0000000000000000 00000000000000e8 0000000000000000 0000000000000003
> (XEN)    ffff830622338dc0 ffff830622338000 ffff830631167c18 ffff82c48014268d
> (XEN)    ffff830631167bd8 ffff82c480144a04 000000000023368b 0000000000000000
> (XEN)    ffff830622338000 00000000000000e8 ffff830622338000 ffff82f60466d160
> (XEN)    0000000000000000 00007d0a00000000 ffff830631167c58 ffff82c48013e6be
> (XEN)    ffff830622338018 00000000000000e8 ffff830622338000 0000000000000000
> (XEN)    00000000000000e8 0000000000000000 ffff830631167da8 ffff82c480151905
> (XEN)    0000000000000092 ffff830631167cd0 0000000000000001 ffff82c4802b0880
> (XEN)    ffff82c4802c27c0 0000000000000282 ffff830631167ca8 ffff82c480176456
> (XEN)    ffff830631167cb8 ffff82c480176601 ffff830631167cf8 ffff82c4801232b4
> (XEN)    ffff8306310a0018 ffff830631167e38 0000000000000000 ffff830631167d78
> (XEN)    ffff830630e92db0 ffff8300bf4f8000 0000000031167d48 5000000000000000
> (XEN)    ffff82f6046e84e0 0000000000237427 5400000000000002 ffff82f6046e84f0
> (XEN)    0000000000000002 0000004844bbac9c ffff82c4802d3ec0 ffff8300bf4f8000
> (XEN)    ffff830631167d98 0000000000000282 00000000c8bd98ec 0000000000000001
> (XEN)    0000000000000025 0000000000000000 0000000000000202 fffffffffffffff3
> (XEN)    0000000008064004 0000000000000000 0000000000000000 0000000000000000
> (XEN)    ffff830631167ef8 ffff82c480103e41 ffff830631167dc8 0000000000000000
> (XEN)    ffff830631167e28 ffff82c48016cc4c ffff830631167e08 0000000180106918
> (XEN) Xen call trace:
> (XEN)    [<ffff82c48014725d>] map_vtd_domain_page+0x1d/0x58
> (XEN)    [<ffff82c4801423a6>] addr_to_dma_page_maddr+0x151/0x1b7
> (XEN)    [<ffff82c48014268d>] intel_iommu_map_page+0x73/0x1db
> (XEN)    [<ffff82c48013e6be>] assign_device+0x1e7/0x26a
> (XEN)    [<ffff82c480151905>] arch_do_domctl+0x1e9f/0x38aa
> (XEN)    [<ffff82c480103e41>] do_domctl+0x1983/0x1a12
> (XEN)    [<ffff82c4802111c1>] compat_hypercall+0xa1/0xfa
> (XEN)    
> (XEN) 
> (XEN) ****************************************
> (XEN) Panic on CPU 5:
> (XEN) Assertion 'ma < ((((((262UL) >> 8) * 0xffff000000000000UL) | (262UL << 
> 39))) + ((1UL << 39)*10)) - (((((262UL) >> 8) * 
> 0xffff00****************************************
> (XEN) 
> (XEN) Manual reset required ('noreboot' specified)
> 
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.