[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [BUG] 'o' debug key panics the hypervisor

El 27/08/15 a les 14.02, Andrew Cooper ha escrit:
> On 27/08/15 12:29, Roger Pau Monnà wrote:
>> Hello,
>> When using Intel hardware without shared page tables between the IOMMU 
>> and EPT (I have not tried if the same happens when sharing the page 
>> tables), the following crash happens if I press the 'o' debug key with 
>> a HVM guest running. The guest doesn't have any device passed-through.
>> (XEN) domain1 IOMMU p2m table:
>> (XEN) p2m table has 4 levels
>> (XEN) Assertion 'pfn_to_pdx(ma >> PAGE_SHIFT) < (DIRECTMAP_SIZE >> 
>> PAGE_SHIFT)' failed at /root/src/xen/xen/include/asm/x86_64/page.h:80
>> (XEN) ----[ Xen-4.6.0-rc  x86_64  debug=y  Tainted:    C ]----
>> (XEN) CPU:    0
>> (XEN) RIP:    e008:[<ffff82d080165f20>] map_domain_page+0x1ef/0x5e6
>> (XEN) RFLAGS: 0000000000010216   CONTEXT: hypervisor
> The use of paddr_to_pfn() in map_vtd_domain_page() is incorrect.
> Does this fix the issue?

Sadly no. Here is the panic trace with your patch applied:

(XEN) domain1 IOMMU p2m table:
(XEN) p2m table has 4 levels
(XEN) Assertion 'pfn_to_pdx(ma >> PAGE_SHIFT) < (DIRECTMAP_SIZE >> PAGE_SHIFT)' 
failed at /root/src/xen/xen/include/asm/x86_64/page.h:80
(XEN) ----[ Xen-4.6.0-rc  x86_64  debug=y  Tainted:    C ]----
(XEN) CPU:    0
(XEN) RIP:    e008:[<ffff82d080165815>] map_domain_page+0x1ef/0x5e6
(XEN) RFLAGS: 0000000000010216   CONTEXT: hypervisor
(XEN) rax: 0000000a8bcf000e   rbx: 0000a8bcf000e000   rcx: 0000000000000000
(XEN) rdx: 00000007c7ffffff   rsi: 00000000dfa9f000   rdi: 0000000a8bcf000e
(XEN) rbp: ffff8300dfaf7d60   rsp: ffff8300dfaf7d20   r8:  0000000000000000
(XEN) r9:  0000000000000001   r10: 0000000000000004   r11: 0000000000000001
(XEN) r12: ffff83019d263000   r13: 0000000000000003   r14: ffff8300dfdf2000
(XEN) r15: 000ffffffffff000   cr0: 000000008005003b   cr4: 00000000000026e0
(XEN) cr3: 00000000dfa9f000   cr2: ffff880012b18c90
(XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: e010   cs: e008
(XEN) Xen stack trace from rsp=ffff8300dfaf7d20:
(XEN)    ffff82d08012cfda ffff82d0802a1bc0 ffff8300dfaf7d40 0000a8bcf000e000
(XEN)    ffff830000000000 0000000000000003 0000008000000000 000ffffffffff000
(XEN)    ffff8300dfaf7d70 ffff82d080152998 ffff8300dfaf7dc0 ffff82d08014c389
(XEN)    00000001dfaf7db0 ffff82d08012c71a 0000000000000000 0000000000000001
(XEN)    ffff830000000000 0000000000000003 0000000000000000 000ffffffffff000
(XEN)    ffff8300dfaf7e10 ffff82d08014c402 00000000dfaf7e20 0000002700000001
(XEN)    ffff8300dfdf2000 ffff83019ff11000 ffff82d080291240 ffff82d0802688f8
(XEN)    ffff82d080339488 ffffffffffffffff ffff8300dfaf7e30 ffff82d08014c4a6
(XEN)    0000000000000000 ffff83019ff11000 ffff8300dfaf7e60 ffff82d08014786a
(XEN)    0000000000000000 ffff82d0802a1d60 000000000000006f 0000000000000000
(XEN)    ffff8300dfaf7e90 ffff82d080114906 ffff8300dfaf7e90 ffff82d0802a15c0
(XEN)    0000000000000000 ffff82d080339560 ffff8300dfaf7ea0 ffff82d080114940
(XEN)    ffff8300dfaf7ec0 ffff82d08012f47d ffff8300dfaf7ec0 ffff82d080339570
(XEN)    ffff8300dfaf7ef0 ffff82d08012f7b3 0000054782099709 ffff8300dfaf0000
(XEN)    0000054782099709 ffff8300dfdf2000 ffff8300dfaf7f10 ffff82d0801607c3
(XEN)    ffff82d08012c7c4 ffff8300dfdf2000 ffff8300dfaf7e10 0000000000000000
(XEN)    0000000000000000 ffffffffffffffff ffff88001faa7e80 ffffffff8168f160
(XEN)    ffffffff81600000 0000000000000246 0000000000000020 ffff88001f60da80
(XEN)    0000000000000000 0000000000000000 ffffffff810013aa 0000000000000000
(XEN)    00000000deadbeef 00000000deadbeef 0000010000000000 ffffffff810013aa
(XEN) Xen call trace:
(XEN)    [<ffff82d080165815>] map_domain_page+0x1ef/0x5e6
(XEN)    [<ffff82d080152998>] map_vtd_domain_page+0x4a/0x4c
(XEN)    [<ffff82d08014c389>] vtd_dump_p2m_table_level+0x2a/0xf6
(XEN)    [<ffff82d08014c402>] vtd_dump_p2m_table_level+0xa3/0xf6
(XEN)    [<ffff82d08014c4a6>] vtd_dump_p2m_table+0x51/0x59
(XEN)    [<ffff82d08014786a>] iommu_dump_p2m_table+0xaa/0xbe
(XEN)    [<ffff82d080114906>] handle_keypress+0x68/0x8d
(XEN)    [<ffff82d080114940>] keypress_action+0x15/0x17
(XEN)    [<ffff82d08012f47d>] do_tasklet_work+0x78/0xab
(XEN)    [<ffff82d08012f7b3>] do_tasklet+0x5e/0x8a
(XEN)    [<ffff82d0801607c3>] idle_loop+0x56/0x6b
(XEN) ****************************************
(XEN) Panic on CPU 0:
(XEN) Assertion 'pfn_to_pdx(ma >> PAGE_SHIFT) < (DIRECTMAP_SIZE >> PAGE_SHIFT)' 
failed at /root/src/xen/xen/include/asm/x86_64/page.h
(XEN) ****************************************
(XEN) Reboot in five seconds...

Xen-devel mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.