[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [BUG] Xen panic with VT-d PI
Xen 4.7 RC3 enabled VT-d PI(iommu=on,intpost), and created HVM guest with VF NIC assigned repeatedly, it will cause Xen panic(maybe 2 times ,5 times ,10 times). It's not a RC3 regression, at least this Xen commit 1bd52e1f got failure as well. HW: Intel Broadwell server, Intel(R) Xeon(R) CPU E5-2699 v4 @ 2.20GHz. Xen: Xen 4.7.0 RC3 Dom0: Linux 4.4.4 VF: Intel 82599 NIC ... (XEN) irq.c:275: Dom8 PCI link 3 changed 5 -> 0 [ 1319.177226] ixgbe 0000:05:00.0 eth30: VF Reset msg received from vf 1 [ 1321.949952] ixgbe 0000:05:00.0 eth30: 1 Spoofed packets detected (XEN) ----[ Xen-4.7-unstable x86_64 debug=y Tainted: C ]---- (XEN) CPU: 3 (XEN) RIP: e008:[<ffff82d0801f2910>] vmx.c#pi_wakeup_interrupt+0xcf/0x15b (XEN) RFLAGS: 0000000000010002 CONTEXT: hypervisor (XEN) rax: ffff830078a71760 rbx: 01001001000fff60 rcx: 0000000000000003 (XEN) rdx: 0100100100100100 rsi: 0000000000000046 rdi: ffff830078a715c0 (XEN) rbp: ffff83043c477d18 rsp: ffff83043c477ce8 r8: 0000000000000003 (XEN) r9: ffff830425ae2710 r10: ffff830425ae28e0 r11: 000001354d22b2fb (XEN) r12: ffff83043c47dde0 r13: ffff83043c47ddf0 r14: 0100100100100100 (XEN) r15: 0200200200200200 cr0: 000000008005003b cr4: 00000000003526e0 (XEN) cr3: 0000000424276000 cr2: 0000003abfaaca80 (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: 0000 cs: e008 (XEN) Xen code around <ffff82d0801f2910> (vmx.c#pi_wakeup_interrupt+0xcf/0x15b): (XEN) 00 5a 48 8b 97 a0 01 00 <48> 3b 42 08 74 04 0f 0b eb fe 48 8b 8f a8 01 00 (XEN) Xen stack trace from rsp=ffff83043c477ce8: (XEN) ffff83043c477d08 00000000000000f5 ffff83043c477db8 00000000000000f5 (XEN) ffff83043c47f788 00000000ffffffff ffff83043c477da8 ffff82d080171c7a (XEN) 0000000000000000 0000000000000000 deadbeefdeadf00d ffff8300782fe000 (XEN) 0000000000000003 ffff830422e70000 0000000000000000 800000003c477d90 (XEN) ffff82d0801949fa 8c7adb3d00000002 ffff83043c477e18 00000135394f6d83 (XEN) ffff83043c47f6d0 ffff82d080807280 ffff83043c47f788 00000000ffffffff (XEN) 00007cfbc3b88227 ffff82d08023feb2 00000000ffffffff ffff83043c47f788 (XEN) ffff82d080807280 ffff83043c47f6d0 ffff83043c477ee0 00000135394f6d83 (XEN) 000001354d22b2fb ffff830425ae28e0 ffff830425ae2710 0000000000000001 (XEN) 0000000000000008 20c49ba5e353f7cf ffff83043c470000 00000135394f6d83 (XEN) ffff83043c47f700 000000f500000000 ffff82d0801ba6d2 000000000000e008 (XEN) 0000000000000286 ffff83043c477e60 0000000000000000 0000000800000020 (XEN) 0000013534e2391b ffffffffffffffff ffff830078a71000 ffffffff81c17dc0 (XEN) ffff83043c477f08 0000000000000000 0000000000000000 ffff82d080832980 (XEN) 00001eba00006a07 ffffffffffffffff ffff83043c477f18 ffff82d080807280 (XEN) ffff83043c477f18 ffff830078a71000 ffff83043c423000 ffff83043c477f10 (XEN) ffff82d0801660fd ffffffff81df8000 ffff8300782fe000 0000000000000003 (XEN) ffff830422e70000 ffff83043c477d78 ffffffff81df8000 ffffffffffffffff (XEN) 0000000000000000 ffffffff81c17dc0 ffffffff81a03ea8 0000000000000000 (XEN) 0000000000000000 00000002d788742b 0000000000000000 0000000000000000 (XEN) Xen call trace: (XEN) [<ffff82d0801f2910>] vmx.c#pi_wakeup_interrupt+0xcf/0x15b (XEN) [<ffff82d080171c7a>] do_IRQ+0x9d/0x65e (XEN) [<ffff82d08023feb2>] common_interrupt+0x62/0x70 (XEN) [<ffff82d0801ba6d2>] mwait-idle.c#mwait_idle+0x2b3/0x30a (XEN) [<ffff82d0801660fd>] domain.c#idle_loop+0x6c/0x89 (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 3: (XEN) GENERAL PROTECTION FAULT (XEN) [error_code=0000] (XEN) **************************************** (XEN) (XEN) Reboot in five seconds... Best Regards, Xudong Attachment:
config.vmxvtd_ass_02 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |