[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen-unstable: AMD-Vi: update_paging_mode Try to access pdev_list without aquiring pcidevs_lock.
On 30/10/2019 16:48, Jan Beulich wrote: > On 28.10.2019 11:32, Sander Eikelenboom wrote: >> While testing the latest xen-unstable and starting an HVM guest with >> pci-passtrough on my AMD machine, >> my eye catched the following messages in xl dmesg I haven't seen before: >> >> (XEN) [2019-10-28 10:23:16.372] AMD-Vi: update_paging_mode Try to access >> pdev_list without aquiring pcidevs_lock. > > Unfortunately this sits on the map/unmap path, and hence the > violator is far up one of the many call chains. Therefore I'd > like to ask that you rebuild and retry with the debugging > patch below. In case you observe multiple different call > trees, post them all please. > > Jan Hi Jan, Call trace seems to be the same in all cases. -- Sander (XEN) [2019-10-30 22:07:05.748] AMD-Vi: update_paging_mode Try to access pdev_list without aquiring pcidevs_lock. (XEN) [2019-10-30 22:07:05.748] ----[ Xen-4.13.0-rc x86_64 debug=y Not tainted ]---- (XEN) [2019-10-30 22:07:05.748] CPU: 1 (XEN) [2019-10-30 22:07:05.748] RIP: e008:[<ffff82d080265748>] iommu_map.c#update_paging_mode+0x1f2/0x3eb (XEN) [2019-10-30 22:07:05.748] RFLAGS: 0000000000010286 CONTEXT: hypervisor (d0v2) (XEN) [2019-10-30 22:07:05.748] rax: ffff830523f9ffff rbx: ffff82e004905f00 rcx: 0000000000000000 (XEN) [2019-10-30 22:07:05.748] rdx: 0000000000000001 rsi: 000000000000000a rdi: ffff82d0804a0698 (XEN) [2019-10-30 22:07:05.748] rbp: ffff830523f9f848 rsp: ffff830523f9f808 r8: ffff8305320a0000 (XEN) [2019-10-30 22:07:05.748] r9: 0000000000000038 r10: 0000000000000002 r11: 000000000000000a (XEN) [2019-10-30 22:07:05.748] r12: ffff82e004905f00 r13: 0000000000000003 r14: 0000000000000003 (XEN) [2019-10-30 22:07:05.748] r15: ffff83041fb83000 cr0: 0000000080050033 cr4: 00000000000006e0 (XEN) [2019-10-30 22:07:05.748] cr3: 000000040a58d000 cr2: ffff8880604835a0 (XEN) [2019-10-30 22:07:05.748] fsb: 00007f4b8f899bc0 gsb: ffff88807d480000 gss: 0000000000000000 (XEN) [2019-10-30 22:07:05.748] ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e010 cs: e008 (XEN) [2019-10-30 22:07:05.748] Xen code around <ffff82d080265748> (iommu_map.c#update_paging_mode+0x1f2/0x3eb): (XEN) [2019-10-30 22:07:05.748] 3d 3b 7b 22 00 00 75 07 <0f> 0b e9 c2 01 00 00 48 8d 35 1a ce 13 00 48 8d (XEN) [2019-10-30 22:07:05.748] Xen stack trace from rsp=ffff830523f9f808: (XEN) [2019-10-30 22:07:05.748] ffff82e00a6bc6e0 ffff82e00a6bc6e0 ffff83041fb83000 ffff83041fb83000 (XEN) [2019-10-30 22:07:05.748] ffff83041fb83148 00000000000feff8 ffff83041fb83150 ffff830523f9f93c (XEN) [2019-10-30 22:07:05.748] ffff830523f9f8c8 ffff82d080265ded 0000000380240580 00000000002482f9 (XEN) [2019-10-30 22:07:05.748] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) [2019-10-30 22:07:05.748] 0000000000000000 0000000000000000 0000000000000000 0000000000000000 (XEN) [2019-10-30 22:07:05.748] ffff83041fb83000 00000000000feff8 00000000000feff8 00000000002482f9 (XEN) [2019-10-30 22:07:05.748] ffff830523f9f928 ffff82d0802583b6 00000000000feff8 0000000000000001 (XEN) [2019-10-30 22:07:05.748] 00000003802405da 00000000002482f9 ffff830523f9f93c 0000000000000003 (XEN) [2019-10-30 22:07:05.748] ffff83041fb83000 00000000000feff8 0000000000000000 0000000000000000 (XEN) [2019-10-30 22:07:05.748] ffff830523f9f960 ffff82d0802586fb 0000000048834780 0000000000000003 (XEN) [2019-10-30 22:07:05.748] 0000000000000000 ffff830248834780 00000000000feff8 ffff830523f9f9f8 (XEN) [2019-10-30 22:07:05.748] ffff82d08034a4a6 000000008038a845 0000000000000000 ffff820040024fc0 (XEN) [2019-10-30 22:07:05.748] ffff83041fb83000 00000000002482f9 0000000000000000 80000002484b5367 (XEN) [2019-10-30 22:07:05.748] ffff82004002d5a0 80000002484b5367 0000000000000000 0000000000000000 (XEN) [2019-10-30 22:07:05.748] ffff820040024000 0000000000000000 00000000002482f9 00000000000feff8 (XEN) [2019-10-30 22:07:05.748] 0000000000000001 ffff830248834780 ffff830523f9fa50 ffff82d080342e13 (XEN) [2019-10-30 22:07:05.748] ffffffffffffffff 0000000000000007 ffff83041fb83000 0000000000000023 (XEN) [2019-10-30 22:07:05.748] 00000000002482fa ffff830248834780 0000000000000000 00000000002482f9 (XEN) [2019-10-30 22:07:05.748] 00000000000feff8 ffff830523f9fac8 ffff82d080343c52 0000000023f9fa78 (XEN) [2019-10-30 22:07:05.748] 0000000000000001 00000000002482f9 00000000000feff8 ffff830523f9fa98 (XEN) [2019-10-30 22:07:05.748] Xen call trace: (XEN) [2019-10-30 22:07:05.748] [<ffff82d080265748>] R iommu_map.c#update_paging_mode+0x1f2/0x3eb (XEN) [2019-10-30 22:07:05.748] [<ffff82d080265ded>] F amd_iommu_map_page+0x72/0x1c2 (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802583b6>] F iommu_map+0x98/0x17e (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802586fb>] F iommu_legacy_map+0x28/0x73 (XEN) [2019-10-30 22:07:05.748] [<ffff82d08034a4a6>] F p2m-pt.c#p2m_pt_set_entry+0x4d3/0x844 (XEN) [2019-10-30 22:07:05.748] [<ffff82d080342e13>] F p2m_set_entry+0x91/0x128 (XEN) [2019-10-30 22:07:05.748] [<ffff82d080343c52>] F guest_physmap_add_entry+0x39f/0x5a3 (XEN) [2019-10-30 22:07:05.748] [<ffff82d080343f85>] F guest_physmap_add_page+0x12f/0x138 (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802201ee>] F memory.c#populate_physmap+0x2e3/0x505 (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802221e8>] F do_memory_op+0x695/0x1bf7 (XEN) [2019-10-30 22:07:05.748] [<ffff82d080383601>] F pv_hypercall+0x2ca/0x537 (XEN) [2019-10-30 22:07:05.748] [<ffff82d08038a432>] F lstar_enter+0x112/0x120 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |