[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [BUG] Xen panic with VT-d PI



The patch fixing this issue has already been sent to upstream.

" [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list "

v2 will be sent out soon.

Thanks,
Feng

> -----Original Message-----
> From: Hao, Xudong
> Sent: Thursday, May 26, 2016 9:45 AM
> To: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
> Cc: Wu, Feng <feng.wu@xxxxxxxxx>; Wei Liu <wei.liu2@xxxxxxxxxx>
> Subject: [BUG] Xen panic with VT-d PI
> 
> Xen 4.7 RC3 enabled VT-d PI(iommu=on,intpost), and created HVM guest with VF
> NIC assigned repeatedly, it will cause Xen panic(maybe 2 times ,5 times ,10
> times).
> It's not a RC3 regression, at least this Xen commit 1bd52e1f got failure as 
> well.
> 
> HW: Intel Broadwell server, Intel(R) Xeon(R) CPU E5-2699 v4 @ 2.20GHz.
> Xen: Xen 4.7.0 RC3
> Dom0: Linux 4.4.4
> VF: Intel 82599 NIC
> 
> ...
> (XEN) irq.c:275: Dom8 PCI link 3 changed 5 -> 0
> [ 1319.177226] ixgbe 0000:05:00.0 eth30: VF Reset msg received from vf 1
> [ 1321.949952] ixgbe 0000:05:00.0 eth30: 1 Spoofed packets detected
> (XEN) ----[ Xen-4.7-unstable  x86_64  debug=y  Tainted:    C ]----
> (XEN) CPU:    3
> (XEN) RIP:    e008:[<ffff82d0801f2910>] vmx.c#pi_wakeup_interrupt+0xcf/0x15b
> (XEN) RFLAGS: 0000000000010002   CONTEXT: hypervisor
> (XEN) rax: ffff830078a71760   rbx: 01001001000fff60   rcx: 0000000000000003
> (XEN) rdx: 0100100100100100   rsi: 0000000000000046   rdi: ffff830078a715c0
> (XEN) rbp: ffff83043c477d18   rsp: ffff83043c477ce8   r8:  0000000000000003
> (XEN) r9:  ffff830425ae2710   r10: ffff830425ae28e0   r11: 000001354d22b2fb
> (XEN) r12: ffff83043c47dde0   r13: ffff83043c47ddf0   r14: 0100100100100100
> (XEN) r15: 0200200200200200   cr0: 000000008005003b   cr4:
> 00000000003526e0
> (XEN) cr3: 0000000424276000   cr2: 0000003abfaaca80
> (XEN) ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 0000   cs: e008
> (XEN) Xen code around <ffff82d0801f2910>
> (vmx.c#pi_wakeup_interrupt+0xcf/0x15b):
> (XEN)  00 5a 48 8b 97 a0 01 00 <48> 3b 42 08 74 04 0f 0b eb fe 48 8b 8f a8 01 
> 00
> (XEN) Xen stack trace from rsp=ffff83043c477ce8:
> (XEN)    ffff83043c477d08 00000000000000f5 ffff83043c477db8
> 00000000000000f5
> (XEN)    ffff83043c47f788 00000000ffffffff ffff83043c477da8 ffff82d080171c7a
> (XEN)    0000000000000000 0000000000000000 deadbeefdeadf00d
> ffff8300782fe000
> (XEN)    0000000000000003 ffff830422e70000 0000000000000000
> 800000003c477d90
> (XEN)    ffff82d0801949fa 8c7adb3d00000002 ffff83043c477e18
> 00000135394f6d83
> (XEN)    ffff83043c47f6d0 ffff82d080807280 ffff83043c47f788 00000000ffffffff
> (XEN)    00007cfbc3b88227 ffff82d08023feb2 00000000ffffffff ffff83043c47f788
> (XEN)    ffff82d080807280 ffff83043c47f6d0 ffff83043c477ee0
> 00000135394f6d83
> (XEN)    000001354d22b2fb ffff830425ae28e0 ffff830425ae2710
> 0000000000000001
> (XEN)    0000000000000008 20c49ba5e353f7cf ffff83043c470000
> 00000135394f6d83
> (XEN)    ffff83043c47f700 000000f500000000 ffff82d0801ba6d2
> 000000000000e008
> (XEN)    0000000000000286 ffff83043c477e60 0000000000000000
> 0000000800000020
> (XEN)    0000013534e2391b ffffffffffffffff ffff830078a71000 ffffffff81c17dc0
> (XEN)    ffff83043c477f08 0000000000000000 0000000000000000
> ffff82d080832980
> (XEN)    00001eba00006a07 ffffffffffffffff ffff83043c477f18 ffff82d080807280
> (XEN)    ffff83043c477f18 ffff830078a71000 ffff83043c423000 ffff83043c477f10
> (XEN)    ffff82d0801660fd ffffffff81df8000 ffff8300782fe000 0000000000000003
> (XEN)    ffff830422e70000 ffff83043c477d78 ffffffff81df8000 ffffffffffffffff
> (XEN)    0000000000000000 ffffffff81c17dc0 ffffffff81a03ea8
> 0000000000000000
> (XEN)    0000000000000000 00000002d788742b 0000000000000000
> 0000000000000000
> (XEN) Xen call trace:
> (XEN)    [<ffff82d0801f2910>] vmx.c#pi_wakeup_interrupt+0xcf/0x15b
> (XEN)    [<ffff82d080171c7a>] do_IRQ+0x9d/0x65e
> (XEN)    [<ffff82d08023feb2>] common_interrupt+0x62/0x70
> (XEN)    [<ffff82d0801ba6d2>] mwait-idle.c#mwait_idle+0x2b3/0x30a
> (XEN)    [<ffff82d0801660fd>] domain.c#idle_loop+0x6c/0x89
> (XEN)
> (XEN)
> (XEN) ****************************************
> (XEN) Panic on CPU 3:
> (XEN) GENERAL PROTECTION FAULT
> (XEN) [error_code=0000]
> (XEN) ****************************************
> (XEN)
> (XEN) Reboot in five seconds...
> 
> 
> Best Regards,
> Xudong


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.