[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Using debug-key 'o: Dump IOMMU p2m table, locks up machine



Hello Jan,

Monday, September 3, 2012, 10:21:04 AM, you wrote:

>>>> On 02.09.12 at 10:43, Sander Eikelenboom <linux@xxxxxxxxxxxxxx> wrote:
>> I have attached new output from xl dmesg, this time with iommu=debug on (the 
>> option changed from 4.1 to 4.2).

> This one

>>(XEN) [2012-09-02 00:55:02] traps.c:3156: GPF (0060): ffff82c48015c9ee -> 
>>ffff82c480224b13

> also worries me. While Xen gracefully recovers from it, these
> messages still generally indicate a problem somewhere. Could
> you resolve the addresses to file:line tuples? And, assuming
> this happens in the context of doing something on behalf of
> the guest in the context of a guest vCPU, could you also
> check what guest side action triggers this (e.g. by adding a
> call to show_execution_state() alongside the printing of the
> message)?

Hope i have done it right:

diff -r a0b5f8102a00 xen/arch/x86/traps.c
--- a/xen/arch/x86/traps.c      Tue Aug 28 22:40:45 2012 +0100
+++ b/xen/arch/x86/traps.c      Tue Sep 04 08:53:54 2012 +0200
@@ -3154,6 +3154,11 @@
     {
         dprintk(XENLOG_INFO, "GPF (%04x): %p -> %p\n",
                 regs->error_code, _p(regs->eip), _p(fixup));
+        dprintk(XENLOG_INFO, " show_execution_state(regs): \n");
+       show_execution_state(regs);
+        dprintk(XENLOG_INFO, "  show_execution_state(guest_cpu_user_regs()): 
\n");
+       show_execution_state(guest_cpu_user_regs());
+
         regs->eip = fixup;
         return;
     }


Gives (complete dmesg attached:

(XEN) [2012-09-03 21:20:49] AMD-Vi: IO_PAGE_FAULT: domain = 14, device id = 
0x0700, fault address = 0xa8ee82c0
(XEN) [2012-09-03 21:20:49] AMD-Vi: IO_PAGE_FAULT: domain = 14, device id = 
0x0700, fault address = 0xa8ee8320
(XEN) [2012-09-04 03:00:34] traps.c:3156: GPF (0060): ffff82c48015c9ee -> 
ffff82c480224b73
(XEN) [2012-09-04 03:00:34] traps.c:3157:  show_execution_state(regs): 
(XEN) [2012-09-04 03:00:34] ----[ Xen-4.2.0-rc4-pre  x86_64  debug=y  Not 
tainted ]----
(XEN) [2012-09-04 03:00:34] CPU:    3
(XEN) [2012-09-04 03:00:34] RIP:    e008:[<ffff82c48015c9ee>] 
context_switch+0x394/0xeeb
(XEN) [2012-09-04 03:00:34] RFLAGS: 0000000000010246   CONTEXT: hypervisor
(XEN) [2012-09-04 03:00:34] rax: 0000000000000001   rbx: ffff8300a52da000   
rcx: 0000000000000001
(XEN) [2012-09-04 03:00:34] rdx: 0000000000000063   rsi: 0000000000000001   
rdi: 000000000000037e
(XEN) [2012-09-04 03:00:34] rbp: ffff83024d8a7e28   rsp: ffff83024d8a7d88   r8: 
 0000000000000006
(XEN) [2012-09-04 03:00:34] r9:  ffff83024d95ebb8   r10: 00000000deadbeef   
r11: 0000000000000246
(XEN) [2012-09-04 03:00:34] r12: ffff8300afd11000   r13: 0000000000000003   
r14: 0000000000000003
(XEN) [2012-09-04 03:00:34] r15: ffff83024d8aa048   cr0: 000000008005003b   
cr4: 00000000000006f0
(XEN) [2012-09-04 03:00:34] cr3: 0000000068506000   cr2: ffffffffff600400
(XEN) [2012-09-04 03:00:34] ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 
e010   cs: e008
(XEN) [2012-09-04 03:00:34] Xen stack trace from rsp=ffff83024d8a7d88:
(XEN) [2012-09-04 03:00:34]    0000000000000029 0000000000000000 
0000001e00000000 0000000000000000
(XEN) [2012-09-04 03:00:34]    ffff83024d8a7db8 ffff83024d8aa060 
ffff83024d8a7e18 ffff82c4801805ae
(XEN) [2012-09-04 03:00:34]    0000000000012f22 00003fd9ab6d6ca6 
0000000000000000 0000000000000000
(XEN) [2012-09-04 03:00:34]    0000000000000000 0000000000000000 
ffff83024d8a7e28 ffff8300afd11000
(XEN) [2012-09-04 03:00:34]    ffff8300a52da000 000013ebba37e10c 
0000000000000002 ffff83024d8aa048
(XEN) [2012-09-04 03:00:34]    ffff83024d8a7eb8 ffff82c480124a70 
0000000000000000 ffff83024d8aa040
(XEN) [2012-09-04 03:00:34]    000000034d8a7e68 000013ebba37e10c 
ffff83024d8a7e88 ffff82c480189483
(XEN) [2012-09-04 03:00:34]    ffff8300a52da000 0000000001c9c380 
ffff83024d8a7e00 ffff82c4801226ce
(XEN) [2012-09-04 03:00:34]    ffff83024d8a7ef8 ffff82c4802d8180 
00000000ffffffff ffff82c4802d8000
(XEN) [2012-09-04 03:00:34]    ffff83024d8a7f18 ffffffffffffffff 
ffff83024d8a7ef8 ffff82c480125e31
(XEN) [2012-09-04 03:00:34]    0000000000000246 ffff8300afd11000 
ffffffff81ece5d8 ffffffff81f420c0
(XEN) [2012-09-04 03:00:34]    0000000000000000 0000000000000000 
ffff83024d8a7f08 ffff82c480125e68
(XEN) [2012-09-04 03:00:34]    00007cfdb27580c7 ffff82c480222ef6 
0000000000000000 ffff8800030e14a0
(XEN) [2012-09-04 03:00:34]    0000000000000000 ffff88001a0800d8 
ffff88001cd17bf0 ffff88001fc0b100
(XEN) [2012-09-04 03:00:34]    0000000000000202 0000000000000000 
0000000000000001 0000000000000000
(XEN) [2012-09-04 03:00:34]    0000000000000000 ffffffff810011aa 
ffff88001e99e180 00000000deadbeef
(XEN) [2012-09-04 03:00:34]    00000000deadbeef 0000010000000000 
ffffffff810011aa 000000000000e033
(XEN) [2012-09-04 03:00:34]    0000000000000202 ffff88001cd17bb8 
000000000000e02b 000053fd0000beef
(XEN) [2012-09-04 03:00:34]    800000000000beef 740000000000beef 
000000000018beef 000053fe00000003
(XEN) [2012-09-04 03:00:34]    ffff8300a52da000 0000003dcd5a8680 
000000000018e0c9
(XEN) [2012-09-04 03:00:34] Xen call trace:
(XEN) [2012-09-04 03:00:34]    [<ffff82c48015c9ee>] context_switch+0x394/0xeeb
(XEN) [2012-09-04 03:00:34]    [<ffff82c480124a70>] schedule+0x666/0x675
(XEN) [2012-09-04 03:00:34]    [<ffff82c480125e31>] __do_softirq+0xa4/0xb5
(XEN) [2012-09-04 03:00:34]    [<ffff82c480125e68>] do_softirq+0x26/0x28
(XEN) [2012-09-04 03:00:34]    
(XEN) [2012-09-04 03:00:34] traps.c:3159:   
show_execution_state(guest_cpu_user_regs()): 
(XEN) [2012-09-04 03:00:34] ----[ Xen-4.2.0-rc4-pre  x86_64  debug=y  Not 
tainted ]----
(XEN) [2012-09-04 03:00:34] CPU:    3
(XEN) [2012-09-04 03:00:34] RIP:    e033:[<ffffffff810011aa>]
(XEN) [2012-09-04 03:00:34] RFLAGS: 0000000000000202   EM: 1   CONTEXT: pv guest
(XEN) [2012-09-04 03:00:34] rax: 0000000000000000   rbx: ffff88001fc0b100   
rcx: ffffffff810011aa
(XEN) [2012-09-04 03:00:34] rdx: ffff88001e99e180   rsi: 00000000deadbeef   
rdi: 00000000deadbeef
(XEN) [2012-09-04 03:00:34] rbp: ffff88001cd17bf0   rsp: ffff88001cd17bb8   r8: 
 0000000000000000
(XEN) [2012-09-04 03:00:34] r9:  0000000000000001   r10: 0000000000000000   
r11: 0000000000000202
(XEN) [2012-09-04 03:00:34] r12: ffff88001a0800d8   r13: 0000000000000000   
r14: ffff8800030e14a0
(XEN) [2012-09-04 03:00:34] r15: 0000000000000000   cr0: 000000008005003b   
cr4: 00000000000006f0
(XEN) [2012-09-04 03:00:34] cr3: 0000000068506000   cr2: 00000000f76e4000
(XEN) [2012-09-04 03:00:34] ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 
e02b   cs: e033
(XEN) [2012-09-04 03:00:34] Guest stack trace from rsp=ffff88001cd17bb8:
(XEN) [2012-09-04 03:00:34]    0000000000000000 0000000000000001 
ffffffff81004942 ffff8800030e1040
(XEN) [2012-09-04 03:00:34]    ffff88001e99e180 0000000000000000 
ffff8800030e14a0 ffff88001cd17c10
(XEN) [2012-09-04 03:00:34]    ffffffff81003941 ffff88001e99e180 
ffff8800030e1040 ffff88001cd17c70
(XEN) [2012-09-04 03:00:34]    ffffffff8100b850 ffff8800030e1040 
ffff88001d280080 0000000000000063
(XEN) [2012-09-04 03:00:34]    ffff88001fc10a80 ffff88001cd17c80 
ffff88001fc12e80 0000000000000000
(XEN) [2012-09-04 03:00:34]    ffff88001d285b00 0000000000000000 
0000000000000000 ffff8800030e1040
(XEN) [2012-09-04 03:00:34]    ffffffff817fa2f5 ffff88001cd17dd0 
0000000000000216 ffffffff810700fe
(XEN) [2012-09-04 03:00:34]    ffff88001fc0e018 ffff8800030e1040 
0000000000012e80 ffff88001cd17fd8
(XEN) [2012-09-04 03:00:34]    ffff88001cd16010 0000000000012e80 
0000000000012e80 ffff88001cd17fd8
(XEN) [2012-09-04 03:00:34]    0000000000012e80 ffff88001e999040 
ffff8800030e1040 ffff880000000000
(XEN) [2012-09-04 03:00:34]    ffff880000000000 ffff88001fc0e000 
ffff88001cdb3300 ffff88001fc16e00
(XEN) [2012-09-04 03:00:34]    ffff88001fc0e000 ffff88001cd17d50 
ffffffff817fb614 ffff88001d08c140
(XEN) [2012-09-04 03:00:34]    ffff88001cdb3300 ffff88001fc16e00 
ffff88001fc0e000 ffff88001cd17de0
(XEN) [2012-09-04 03:00:34]    ffffffff8107f059 ffff8800030e1040 
ffff8800030e1040 ffffffff817fbe7b
(XEN) [2012-09-04 03:00:34]    ffff88001fc0e448 ffff8800030e1040 
ffff88001cdb3320 ffff88001cd17db0
(XEN) [2012-09-04 03:00:34]    ffffffff810acb78 ffff88001fc0e000 
ffff88001cdb3300 ffff88001fc0e438
(XEN) [2012-09-04 03:00:34]    ffff88001fc0e448 ffff8800030e1040 
ffff88001cdb3320 ffff88001cd17de0
(XEN) [2012-09-04 03:00:34]    ffffffff817fa814 ffff88001cd17eb0 
ffffffff8107f6f9 0000000000000000
(XEN) [2012-09-04 03:00:34]    ffff88001cd17e50 ffff8800030e1040 
ffff88001cd16010 ffff8800030e0240
(XEN) [2012-09-04 03:00:34]    ffff88001cd17e68 ffff8800030e1040 
ffff8800030e1040 ffff8800030e1040
(XEN) [2012-09-04 03:15:12] grant_table.c:254:d0 Increased maptrack size to 2 
frames


> Jan

Attachment: xl-dmesg.txt
Description: Text document

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.