[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] RE: [xen-unstable test] 5482: regressions - FAIL
Attached patch disables pci_vtd_quirk for 32-bit Xen since 32-bit xen does not support MMCFG access. Signed-off-by: Allen Kay <allen.m.kay@xxxxxxxxx> -----Original Message----- From: Ian Jackson [mailto:Ian.Jackson@xxxxxxxxxxxxx] Sent: Monday, January 31, 2011 6:20 AM To: xen-devel@xxxxxxxxxxxxxxxxxxx; Kay, Allen M Subject: Re: [xen-unstable test] 5482: regressions - FAIL Ian Jackson writes ("[xen-unstable test] 5482: regressions - FAIL"): > test-i386-i386-xl-win 5 xen-boot fail like 5237 This is a Xen crash. BUG was in xen/arch/x86/x86_32/pci.c:pci_conf_read32 28 uint32_t pci_conf_read32( 29 unsigned int bus, unsigned int dev, unsigned int func, unsigned int reg) 30 { 31 BUG_ON((bus > 255) || (dev > 31) || (func > 7) || (reg > 255)); Called from xen/drivers/passthrough/vtd/quirks.c:pci_vtd_quirk. pci_vtd_quirk says: 363 val = pci_conf_read32(bus, dev, func, 0x1AC); I note that the "reg" value 0x1AC is >255 so this code will always BUG if the quirk code is triggered. CC'ing Allen Kay whose c/s 22751:93e7bf0e1845 "vt-d: quirks for Sandybridge errata workaround, WLAN, VT-d fault escalation" seems responsible. Ian. Jan 29 11:41:15.493646 (XEN) Xen BUG at pci.c:31 Jan 29 11:41:18.069664 (XEN) ----[ Xen-4.1.0-rc3-pre x86_32p debug=y Not tainted ]---- Jan 29 11:41:18.078659 (XEN) CPU: 0 Jan 29 11:41:18.078671 (XEN) EIP: e008:[<ff1db99a>] pci_conf_read32+0x30/0x73 Jan 29 11:41:18.082648 (XEN) EFLAGS: 00010212 CONTEXT: hypervisor Jan 29 11:41:18.090705 (XEN) eax: 00000000 ebx: 000001ac ecx: 00000000 edx: 00000014 Jan 29 11:41:18.090723 (XEN) esi: 00000014 edi: 00000000 ebp: ff247a44 esp: ff247a2c Jan 29 11:41:18.102663 (XEN) cr0: 8005003b cr4: 000026f0 cr3: 00213040 cr2: 00000000 Jan 29 11:41:18.109651 (XEN) ds: e010 es: e010 fs: e010 gs: e010 ss: e010 cs: e008 Jan 29 11:41:18.113650 (XEN) Xen stack trace from esp=ff247a2c: Jan 29 11:41:18.125673 (XEN) 8000a000 00000000 00000004 ff136fa1 00000000 00000000 ff247a74 ff13dab5 Jan 29 11:41:18.125694 (XEN) 00000000 00000014 00000000 000001ac ff213868 00000292 ff213868 ffbfce18 Jan 29 11:41:18.137659 (XEN) 000000a0 00000000 ff247aa4 ff221dc5 ffbfce18 000000a0 ff247ab4 ff1259f9 Jan 29 11:41:18.145666 (XEN) 00000010 ffbfe000 ffb82228 00000001 00000000 ffb82000 ff247ad4 ff2217e3 Jan 29 11:41:18.150736 (XEN) ffb82000 ffba1e18 ff247ad4 ff113cdd ffb85c64 00000004 ffb85c64 00000001 Jan 29 11:41:18.150757 (XEN) 00000000 00000001 ff247e54 ff22a611 ffb82000 000fec80 000fec80 00000020 Jan 29 11:41:18.162665 (XEN) ff1fefeb c55d6000 c5656000 c5656000 c565647c c5657000 c5688000 c5688000 Jan 29 11:41:18.170658 (XEN) c5689000 c0000000 c5800000 00000020 ff247b50 01e1e000 ff247b50 000055d6 Jan 29 11:41:18.170686 (XEN) 00025c3e 00025c3d 00000004 00000000 00005800 01e19000 25a19000 01247b68 Jan 29 11:41:18.185671 (XEN) 00000000 00000000 00000000 00000000 00225bc2 00020000 00000031 00224000 Jan 29 11:41:18.190661 (XEN) 00226000 00001998 00230000 c5656000 ff2e8000 03c3d200 01e4a000 01e19000 Jan 29 11:41:18.202654 (XEN) 01e1d160 c1000000 c1998000 c1998000 c55d5200 c55d6000 c5656000 c5656000 Jan 29 11:41:18.202682 (XEN) c565647c c5689000 c5657000 c5688000 c0000000 c5800000 25a19000 00000002 Jan 29 11:41:18.213665 (XEN) ff11f799 7fffffff 7fffffff 00000000 ff265144 00005c3d ff250000 01e1d158 Jan 29 11:41:18.225658 (XEN) 25a4a000 00000002 03c3e1ff 00003c3e 01e19000 01e1a000 01e1a000 00005800 Jan 29 11:41:18.225686 (XEN) 00000031 05800000 00005c3e fd0bfffc 00000000 00000008 ff247d04 ff23d820 Jan 29 11:41:18.230672 (XEN) 00000000 015db294 015db3fc 00000000 00000000 00000000 00000000 00000001 Jan 29 11:41:18.242661 (XEN) ff238a47 c16f5000 00000000 00000001 ff238a5e c1002000 00000000 00000001 Jan 29 11:41:18.250656 (XEN) ff238a38 c0000000 00000000 00000001 ff238a51 00000000 00000000 00000002 Jan 29 11:41:18.250682 (XEN) ff238aeb 015db2d0 00000000 00000002 ff2389f8 015db2a4 00000000 00000002 Jan 29 11:41:18.262674 (XEN) Xen call trace: Jan 29 11:41:18.262695 (XEN) [<ff1db99a>] pci_conf_read32+0x30/0x73 Jan 29 11:41:18.270670 (XEN) [<ff13dab5>] pci_vtd_quirk+0x65/0x93 Jan 29 11:41:18.270694 (XEN) [<ff221dc5>] intel_iommu_dom0_init+0x9e/0x192 Jan 29 11:41:18.285657 (XEN) [<ff2217e3>] iommu_dom0_init+0xba/0xc2 Jan 29 11:41:18.285679 (XEN) [<ff22a611>] construct_dom0+0x1a76/0x1a95 Jan 29 11:41:18.290653 (XEN) [<ff232189>] __start_xen+0x21ad/0x2204 Jan 29 11:41:18.290676 (XEN) [<ff10006c>] __high_start+0x58/0x5a Jan 29 11:41:18.290699 (XEN) Jan 29 11:41:18.290709 (XEN) Jan 29 11:41:18.290718 (XEN) **************************************** Jan 29 11:41:18.301660 (XEN) Panic on CPU 0: Jan 29 11:41:18.301678 (XEN) Xen BUG at pci.c:31 Attachment:
quirk.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |