[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] RE: [PATCH] [RFC] VT-d: always clean up dpci timers.
Hi Tim, Can you provide the code flow that can cause this failure? In pci_release_devices(), pci_clean_dpci_irqs() is called before "d->need_iommu = 0" in deassign_device(). If this path is taken, then it should not return from !need_iommu(d) in pci_clean_dpci_irqs(). Allen -----Original Message----- From: Tim Deegan [mailto:Tim.Deegan@xxxxxxxxxx] Sent: Monday, July 18, 2011 9:39 AM To: xen-devel@xxxxxxxxxxxxxxxxxxx Cc: keir@xxxxxxx; Kay, Allen M Subject: [PATCH] [RFC] VT-d: always clean up dpci timers. If a VM has all its PCI devices deassigned, need_iommu(d) becomes false but it might still have DPCI EOI timers that were init_timer()d but not yet kill_timer()d. That causes xen to crash later because the linked list of inactive timers gets corrupted, e.g.: (XEN) Xen call trace: (XEN) [<ffff82c480126256>] set_timer+0x1c2/0x24f (XEN) [<ffff82c48011fbf8>] schedule+0x129/0x5dd (XEN) [<ffff82c480122c1e>] __do_softirq+0x7e/0x89 (XEN) [<ffff82c480122c9d>] do_softirq+0x26/0x28 (XEN) [<ffff82c480153c85>] idle_loop+0x5a/0x5c (XEN) (XEN) (XEN) **************************************** (XEN) Panic on CPU 0: (XEN) Assertion 'entry->next->prev == entry' failed at /local/scratch/tdeegan/xen-unstable.hg/xen/include:172 (XEN) **************************************** The following patch makes sure that the domain destruction path always clears up the DPCI state even if !needs_iommu(d). Although it fixes the crash for me, I'm sufficiently confused by this code that I don't know whether it's enough. If the dpci timer state gets freed earlier than pci_clean_dpci_irqs() then there's still a race, and some other function (reassign_device_ownership() ?) needs to sort out the timers when the PCI card is deassigned. Allen, can you comment? Signed-off-by: Tim Deegan <Tim.Deegan@xxxxxxxxxx> diff -r ab6551e30841 xen/drivers/passthrough/pci.c --- a/xen/drivers/passthrough/pci.c Mon Jul 18 10:59:44 2011 +0100 +++ b/xen/drivers/passthrough/pci.c Mon Jul 18 17:22:48 2011 +0100 @@ -269,7 +269,7 @@ static void pci_clean_dpci_irqs(struct d if ( !iommu_enabled ) return; - if ( !is_hvm_domain(d) || !need_iommu(d) ) + if ( !is_hvm_domain(d) ) return; spin_lock(&d->event_lock); _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |