[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [BUG] domU kernel crash at igbvf module loading / __msix_mask_irq
On 27/11/2013 20:53, Norbert Marx
wrote:
Hello,
on a Supermicro H8DGU server with the latest BIOS PCI passtrough
fails.
I tried to give a two igbvf devices to the domU. pciback is
configured and everything locks good until igbvf tries to
initialize the PCI device. I have the same error with XEN 4.3,
4.3.1 and the current 4.4-unstable, linux kernel 3.12.0, 3.12.1,
3.9.
What about dom0 kernel? This looks suspiciously like the new memory
protection for MSI-X config tables. With this model, pciback marks
the MSI region as read only after it has set it up appropriately,
with the knowledge that pcifront should indirect all requests.
What about Xen 4.2?
~Andrew
DomU config:
kernel = "/boot/gentoo-DomU"
memory = 2048
name = "domU"
nic = 2
vcpus = 1
#pci = ['02:10.0,msitranslate=1,permissive=1'] <= same crash
#pci = ['02:10.0,permissive=1'] <= same crash
pci = ['02:10.0', '02:10.1']
vif = ['bridge=xenbr1','bridge=xenbr2']
disk = ['phy:/dev/loop4,xvda1,w', 'phy:/dev/loop5,xvda2,w',
'phy:/dev/loop6,xvda3,w']
root = "/dev/xvda1 ro rootfstype=ext4 iommu=soft
xen-pcifront.verbose_request=1"
DomU crash log:
[ 71.124852] pcifront pci-0: write dev=0000:00:00.0 - offset 72
size 2 val c00
2
[ 71.124888] BUG: unable to handle kernel paging request at
ffffc9000015400c
[ 71.124900] IP: [<ffffffff8121ea05>]
__msix_mask_irq+0x21/0x24
[ 71.124911] PGD 784a0067 PUD 784a1067 PMD 784a2067 PTE
8010000000000464
[ 71.124919] Oops: 0003 [#1] SMP
[ 71.124923] Modules linked in: igbvf(+)
[ 71.124929] CPU: 0 PID: 2114 Comm: insmod Not tainted
3.12.1-gentoo-DomU #6
[ 71.124934] task: ffff8800784c3080 ti: ffff880077324000
task.ti: ffff88007732
4000
[ 71.124939] RIP: e030:[<ffffffff8121ea05>]
[<ffffffff8121ea05>] __msix_mask_
irq+0x21/0x24
[ 71.124947] RSP: e02b:ffff880077325bb0 EFLAGS: 00010286
[ 71.124951] RAX: 0000000000000001 RBX: ffff880078741000 RCX:
0000000000000001
[ 71.124957] RDX: ffffc9000015400c RSI: 0000000000000001 RDI:
ffff880077770180
[ 71.124961] RBP: ffff880077770180 R08: 0000000000000200 R09:
ffff88007873fc00
[ 71.124967] R10: 0000000000000000 R11: ffff88007873fc00 R12:
0000000000000000
[ 71.124972] R13: ffff8800771138a0 R14: 0000000000000000 R15:
ffffc9000015400c
[ 71.124980] FS: 00007fb8d2c37700(0000)
GS:ffff88007f200000(0000) knlGS:00000
00000000000
[ 71.124985] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[ 71.124989] CR2: ffffc9000015400c CR3: 000000007712e000 CR4:
0000000000040660
[ 71.124994] Stack:
[ 71.124996] ffffffff8121f9dd ffff88007707c000 ffff880078741840
0000000000000
002
[ 71.125004] ffff880078741840 ffffffffa0005140 00000000c0020010
ffff880078741
000
[ 71.125011] ffff880078741000 0000000000000000 ffff880078741098
ffff88007707c
7c0
[ 71.125018] Call Trace:
[ 71.125023] [<ffffffff8121f9dd>] ?
pci_enable_msix+0x27d/0x353
[ 71.125032] [<ffffffffa00017b6>] ?
igbvf_probe+0x323/0x8d9 [igbvf]
[ 71.125039] [<ffffffff8141fe9d>] ?
_raw_spin_unlock_irqrestore+0x42/0x5b
[ 71.125047] [<ffffffff8121300d>] ?
pci_device_probe+0x60/0x9d
[ 71.125056] [<ffffffff812af74d>] ?
driver_probe_device+0x1b3/0x1b3
[ 71.125060] [<ffffffff812af62c>] ?
driver_probe_device+0x92/0x1b3
[ 71.125060] [<ffffffff812af7a0>] ?
__driver_attach+0x53/0x73
[ 71.125060] [<ffffffff812add94>] ?
bus_for_each_dev+0x4e/0x7f
[ 71.125060] [<ffffffff812aedf2>] ?
bus_add_driver+0xe5/0x22d
[ 71.125060] [<ffffffff812afcfa>] ?
driver_register+0x82/0xb5
[ 71.125060] [<ffffffffa0008000>] ? 0xffffffffa0007fff
[ 71.125060] [<ffffffff81002092>] ?
do_one_initcall+0x78/0x102
[ 71.125060] [<ffffffff810db633>] ?
free_hot_cold_page+0x100/0x109
[ 71.125060] [<ffffffff811083b3>] ? kfree+0xb6/0xc8
[ 71.125060] [<ffffffff810fd8f4>] ? __vunmap+0x8c/0xc4
[ 71.125060] [<ffffffff810ad804>] ?
load_module+0x18d3/0x1b9a
[ 71.125060] [<ffffffff810ab117>] ?
mod_kobject_put+0x42/0x42
[ 71.125060] [<ffffffff81118716>] ? vfs_read+0xf7/0x13e
[ 71.125060] [<ffffffff810adbad>] ?
SyS_finit_module+0x4e/0x62
[ 71.125060] [<ffffffff81420c8f>] ? tracesys+0xe1/0xe6
[ 71.125060] Code: 83 c4 18 5b 5d 41 5c 41 5d c3 8b 47 08 0f b7
57 02 83 e0 fe
c1 e2 04 89 c1 83 c9 01 83 c2 0c 85 f6 0f 45 c1 48 63 d2 48 03 57
28 <89> 02 c3
48 8b 46 10 48 83 ef 48 48 85 c0 74 02 ff e0 48 c7 c0
[ 71.125060] RIP [<ffffffff8121ea05>]
__msix_mask_irq+0x21/0x24
[ 71.125060] RSP <ffff880077325bb0>
[ 71.125060] CR2: ffffc9000015400c
[ 71.125060] ---[ end trace 66e59b16e50eead2 ]---
I tried also to use the patch from
http://lists.xen.org/archives/html/xen-devel/2013-11/msg03752.html
"[Xen-devel] [PATCH v6] x86: properly handle MSI-X unmask
operation from guests" but without success.
More logs I attached. Any suggestions to fix this issue?
Kind regards,
Norbert
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|