[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [BUG] Xen panic with VT-d PI



Xen 4.7 RC3 enabled VT-d PI(iommu=on,intpost), and created HVM guest with VF 
NIC assigned repeatedly, it will cause Xen panic(maybe 2 times ,5 times ,10 
times).
It's not a RC3 regression, at least this Xen commit 1bd52e1f got failure as 
well.

HW: Intel Broadwell server, Intel(R) Xeon(R) CPU E5-2699 v4 @ 2.20GHz. 
Xen: Xen 4.7.0 RC3
Dom0: Linux 4.4.4
VF: Intel 82599 NIC

...
(XEN) irq.c:275: Dom8 PCI link 3 changed 5 -> 0
[ 1319.177226] ixgbe 0000:05:00.0 eth30: VF Reset msg received from vf 1
[ 1321.949952] ixgbe 0000:05:00.0 eth30: 1 Spoofed packets detected
(XEN) ----[ Xen-4.7-unstable  x86_64  debug=y  Tainted:    C ]----
(XEN) CPU:    3
(XEN) RIP:    e008:[<ffff82d0801f2910>] vmx.c#pi_wakeup_interrupt+0xcf/0x15b
(XEN) RFLAGS: 0000000000010002   CONTEXT: hypervisor
(XEN) rax: ffff830078a71760   rbx: 01001001000fff60   rcx: 0000000000000003
(XEN) rdx: 0100100100100100   rsi: 0000000000000046   rdi: ffff830078a715c0
(XEN) rbp: ffff83043c477d18   rsp: ffff83043c477ce8   r8:  0000000000000003
(XEN) r9:  ffff830425ae2710   r10: ffff830425ae28e0   r11: 000001354d22b2fb
(XEN) r12: ffff83043c47dde0   r13: ffff83043c47ddf0   r14: 0100100100100100
(XEN) r15: 0200200200200200   cr0: 000000008005003b   cr4: 00000000003526e0
(XEN) cr3: 0000000424276000   cr2: 0000003abfaaca80
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
(XEN) Xen code around <ffff82d0801f2910> (vmx.c#pi_wakeup_interrupt+0xcf/0x15b):
(XEN)  00 5a 48 8b 97 a0 01 00 <48> 3b 42 08 74 04 0f 0b eb fe 48 8b 8f a8 01 00
(XEN) Xen stack trace from rsp=ffff83043c477ce8:
(XEN)    ffff83043c477d08 00000000000000f5 ffff83043c477db8 00000000000000f5
(XEN)    ffff83043c47f788 00000000ffffffff ffff83043c477da8 ffff82d080171c7a
(XEN)    0000000000000000 0000000000000000 deadbeefdeadf00d ffff8300782fe000
(XEN)    0000000000000003 ffff830422e70000 0000000000000000 800000003c477d90
(XEN)    ffff82d0801949fa 8c7adb3d00000002 ffff83043c477e18 00000135394f6d83
(XEN)    ffff83043c47f6d0 ffff82d080807280 ffff83043c47f788 00000000ffffffff
(XEN)    00007cfbc3b88227 ffff82d08023feb2 00000000ffffffff ffff83043c47f788
(XEN)    ffff82d080807280 ffff83043c47f6d0 ffff83043c477ee0 00000135394f6d83
(XEN)    000001354d22b2fb ffff830425ae28e0 ffff830425ae2710 0000000000000001
(XEN)    0000000000000008 20c49ba5e353f7cf ffff83043c470000 00000135394f6d83
(XEN)    ffff83043c47f700 000000f500000000 ffff82d0801ba6d2 000000000000e008
(XEN)    0000000000000286 ffff83043c477e60 0000000000000000 0000000800000020
(XEN)    0000013534e2391b ffffffffffffffff ffff830078a71000 ffffffff81c17dc0
(XEN)    ffff83043c477f08 0000000000000000 0000000000000000 ffff82d080832980
(XEN)    00001eba00006a07 ffffffffffffffff ffff83043c477f18 ffff82d080807280
(XEN)    ffff83043c477f18 ffff830078a71000 ffff83043c423000 ffff83043c477f10
(XEN)    ffff82d0801660fd ffffffff81df8000 ffff8300782fe000 0000000000000003
(XEN)    ffff830422e70000 ffff83043c477d78 ffffffff81df8000 ffffffffffffffff
(XEN)    0000000000000000 ffffffff81c17dc0 ffffffff81a03ea8 0000000000000000
(XEN)    0000000000000000 00000002d788742b 0000000000000000 0000000000000000
(XEN) Xen call trace:
(XEN)    [<ffff82d0801f2910>] vmx.c#pi_wakeup_interrupt+0xcf/0x15b
(XEN)    [<ffff82d080171c7a>] do_IRQ+0x9d/0x65e
(XEN)    [<ffff82d08023feb2>] common_interrupt+0x62/0x70
(XEN)    [<ffff82d0801ba6d2>] mwait-idle.c#mwait_idle+0x2b3/0x30a
(XEN)    [<ffff82d0801660fd>] domain.c#idle_loop+0x6c/0x89
(XEN)
(XEN)
(XEN) ****************************************
(XEN) Panic on CPU 3:
(XEN) GENERAL PROTECTION FAULT
(XEN) [error_code=0000]
(XEN) ****************************************
(XEN)
(XEN) Reboot in five seconds...


Best Regards,
Xudong

Attachment: config.vmxvtd_ass_02
Description: config.vmxvtd_ass_02

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.