[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen-unstable: AMD-Vi: update_paging_mode Try to access pdev_list without aquiring pcidevs_lock.
On 30.10.2019 23:21, Sander Eikelenboom wrote: > Call trace seems to be the same in all cases. Thanks much. > (XEN) [2019-10-30 22:07:05.748] AMD-Vi: update_paging_mode Try to access > pdev_list without aquiring pcidevs_lock. > (XEN) [2019-10-30 22:07:05.748] ----[ Xen-4.13.0-rc x86_64 debug=y Not > tainted ]---- > (XEN) [2019-10-30 22:07:05.748] CPU: 1 > (XEN) [2019-10-30 22:07:05.748] RIP: e008:[<ffff82d080265748>] > iommu_map.c#update_paging_mode+0x1f2/0x3eb > (XEN) [2019-10-30 22:07:05.748] RFLAGS: 0000000000010286 CONTEXT: > hypervisor (d0v2) > (XEN) [2019-10-30 22:07:05.748] rax: ffff830523f9ffff rbx: ffff82e004905f00 > rcx: 0000000000000000 > (XEN) [2019-10-30 22:07:05.748] rdx: 0000000000000001 rsi: 000000000000000a > rdi: ffff82d0804a0698 > (XEN) [2019-10-30 22:07:05.748] rbp: ffff830523f9f848 rsp: ffff830523f9f808 > r8: ffff8305320a0000 > (XEN) [2019-10-30 22:07:05.748] r9: 0000000000000038 r10: 0000000000000002 > r11: 000000000000000a > (XEN) [2019-10-30 22:07:05.748] r12: ffff82e004905f00 r13: 0000000000000003 > r14: 0000000000000003 > (XEN) [2019-10-30 22:07:05.748] r15: ffff83041fb83000 cr0: 0000000080050033 > cr4: 00000000000006e0 > (XEN) [2019-10-30 22:07:05.748] cr3: 000000040a58d000 cr2: ffff8880604835a0 > (XEN) [2019-10-30 22:07:05.748] fsb: 00007f4b8f899bc0 gsb: ffff88807d480000 > gss: 0000000000000000 > (XEN) [2019-10-30 22:07:05.748] ds: 0000 es: 0000 fs: 0000 gs: 0000 > ss: e010 cs: e008 > (XEN) [2019-10-30 22:07:05.748] Xen code around <ffff82d080265748> > (iommu_map.c#update_paging_mode+0x1f2/0x3eb): > (XEN) [2019-10-30 22:07:05.748] 3d 3b 7b 22 00 00 75 07 <0f> 0b e9 c2 01 00 > 00 48 8d 35 1a ce 13 00 48 8d > (XEN) [2019-10-30 22:07:05.748] Xen stack trace from rsp=ffff830523f9f808: [...] > (XEN) [2019-10-30 22:07:05.748] Xen call trace: > (XEN) [2019-10-30 22:07:05.748] [<ffff82d080265748>] R > iommu_map.c#update_paging_mode+0x1f2/0x3eb > (XEN) [2019-10-30 22:07:05.748] [<ffff82d080265ded>] F > amd_iommu_map_page+0x72/0x1c2 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802583b6>] F iommu_map+0x98/0x17e > (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802586fb>] F > iommu_legacy_map+0x28/0x73 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d08034a4a6>] F > p2m-pt.c#p2m_pt_set_entry+0x4d3/0x844 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d080342e13>] F > p2m_set_entry+0x91/0x128 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d080343c52>] F > guest_physmap_add_entry+0x39f/0x5a3 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d080343f85>] F > guest_physmap_add_page+0x12f/0x138 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802201ee>] F > memory.c#populate_physmap+0x2e3/0x505 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d0802221e8>] F > do_memory_op+0x695/0x1bf7 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d080383601>] F > pv_hypercall+0x2ca/0x537 > (XEN) [2019-10-30 22:07:05.748] [<ffff82d08038a432>] F > lstar_enter+0x112/0x120 Now this looks to be a pretty common path, i.e. I wonder why no-one before has noticed this message getting logged. Fixing, as it seems, will require careful auditing of lock nesting, as the PCI devices lock will need to be acquired on a path that's entirely unrelated to any PCI operation; I'll try to get to this asap. Is there anything special about the guest that triggers this? Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |