[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Xen-unstable: AMD-Vi: update_paging_mode Try to access pdev_list without aquiring pcidevs_lock.



On 30/10/2019 16:48, Jan Beulich wrote:
> On 28.10.2019 11:32, Sander Eikelenboom wrote:
>> While testing the latest xen-unstable and starting an HVM guest with 
>> pci-passtrough on my AMD machine,
>> my eye catched the following messages in xl dmesg I haven't seen before:
>>
>> (XEN) [2019-10-28 10:23:16.372] AMD-Vi: update_paging_mode Try to access 
>> pdev_list without aquiring pcidevs_lock.
> 
> Unfortunately this sits on the map/unmap path, and hence the
> violator is far up one of the many call chains. Therefore I'd
> like to ask that you rebuild and retry with the debugging
> patch below. In case you observe multiple different call
> trees, post them all please.
> 
> Jan

Hi Jan,

Call trace seems to be the same in all cases.

--
Sander


(XEN) [2019-10-30 22:07:05.748] AMD-Vi: update_paging_mode Try to access 
pdev_list without aquiring pcidevs_lock.
(XEN) [2019-10-30 22:07:05.748] ----[ Xen-4.13.0-rc  x86_64  debug=y   Not 
tainted ]----
(XEN) [2019-10-30 22:07:05.748] CPU:    1
(XEN) [2019-10-30 22:07:05.748] RIP:    e008:[<ffff82d080265748>] 
iommu_map.c#update_paging_mode+0x1f2/0x3eb
(XEN) [2019-10-30 22:07:05.748] RFLAGS: 0000000000010286   CONTEXT: hypervisor 
(d0v2)
(XEN) [2019-10-30 22:07:05.748] rax: ffff830523f9ffff   rbx: ffff82e004905f00   
rcx: 0000000000000000
(XEN) [2019-10-30 22:07:05.748] rdx: 0000000000000001   rsi: 000000000000000a   
rdi: ffff82d0804a0698
(XEN) [2019-10-30 22:07:05.748] rbp: ffff830523f9f848   rsp: ffff830523f9f808   
r8:  ffff8305320a0000
(XEN) [2019-10-30 22:07:05.748] r9:  0000000000000038   r10: 0000000000000002   
r11: 000000000000000a
(XEN) [2019-10-30 22:07:05.748] r12: ffff82e004905f00   r13: 0000000000000003   
r14: 0000000000000003
(XEN) [2019-10-30 22:07:05.748] r15: ffff83041fb83000   cr0: 0000000080050033   
cr4: 00000000000006e0
(XEN) [2019-10-30 22:07:05.748] cr3: 000000040a58d000   cr2: ffff8880604835a0
(XEN) [2019-10-30 22:07:05.748] fsb: 00007f4b8f899bc0   gsb: ffff88807d480000   
gss: 0000000000000000
(XEN) [2019-10-30 22:07:05.748] ds: 0000   es: 0000   fs: 0000   gs: 0000   ss: 
e010   cs: e008
(XEN) [2019-10-30 22:07:05.748] Xen code around <ffff82d080265748> 
(iommu_map.c#update_paging_mode+0x1f2/0x3eb):
(XEN) [2019-10-30 22:07:05.748]  3d 3b 7b 22 00 00 75 07 <0f> 0b e9 c2 01 00 00 
48 8d 35 1a ce 13 00 48 8d
(XEN) [2019-10-30 22:07:05.748] Xen stack trace from rsp=ffff830523f9f808:
(XEN) [2019-10-30 22:07:05.748]    ffff82e00a6bc6e0 ffff82e00a6bc6e0 
ffff83041fb83000 ffff83041fb83000
(XEN) [2019-10-30 22:07:05.748]    ffff83041fb83148 00000000000feff8 
ffff83041fb83150 ffff830523f9f93c
(XEN) [2019-10-30 22:07:05.748]    ffff830523f9f8c8 ffff82d080265ded 
0000000380240580 00000000002482f9
(XEN) [2019-10-30 22:07:05.748]    0000000000000000 0000000000000000 
0000000000000000 0000000000000000
(XEN) [2019-10-30 22:07:05.748]    0000000000000000 0000000000000000 
0000000000000000 0000000000000000
(XEN) [2019-10-30 22:07:05.748]    ffff83041fb83000 00000000000feff8 
00000000000feff8 00000000002482f9
(XEN) [2019-10-30 22:07:05.748]    ffff830523f9f928 ffff82d0802583b6 
00000000000feff8 0000000000000001
(XEN) [2019-10-30 22:07:05.748]    00000003802405da 00000000002482f9 
ffff830523f9f93c 0000000000000003
(XEN) [2019-10-30 22:07:05.748]    ffff83041fb83000 00000000000feff8 
0000000000000000 0000000000000000
(XEN) [2019-10-30 22:07:05.748]    ffff830523f9f960 ffff82d0802586fb 
0000000048834780 0000000000000003
(XEN) [2019-10-30 22:07:05.748]    0000000000000000 ffff830248834780 
00000000000feff8 ffff830523f9f9f8
(XEN) [2019-10-30 22:07:05.748]    ffff82d08034a4a6 000000008038a845 
0000000000000000 ffff820040024fc0
(XEN) [2019-10-30 22:07:05.748]    ffff83041fb83000 00000000002482f9 
0000000000000000 80000002484b5367
(XEN) [2019-10-30 22:07:05.748]    ffff82004002d5a0 80000002484b5367 
0000000000000000 0000000000000000
(XEN) [2019-10-30 22:07:05.748]    ffff820040024000 0000000000000000 
00000000002482f9 00000000000feff8
(XEN) [2019-10-30 22:07:05.748]    0000000000000001 ffff830248834780 
ffff830523f9fa50 ffff82d080342e13
(XEN) [2019-10-30 22:07:05.748]    ffffffffffffffff 0000000000000007 
ffff83041fb83000 0000000000000023
(XEN) [2019-10-30 22:07:05.748]    00000000002482fa ffff830248834780 
0000000000000000 00000000002482f9
(XEN) [2019-10-30 22:07:05.748]    00000000000feff8 ffff830523f9fac8 
ffff82d080343c52 0000000023f9fa78
(XEN) [2019-10-30 22:07:05.748]    0000000000000001 00000000002482f9 
00000000000feff8 ffff830523f9fa98
(XEN) [2019-10-30 22:07:05.748] Xen call trace:
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d080265748>] R 
iommu_map.c#update_paging_mode+0x1f2/0x3eb
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d080265ded>] F 
amd_iommu_map_page+0x72/0x1c2
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d0802583b6>] F iommu_map+0x98/0x17e
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d0802586fb>] F 
iommu_legacy_map+0x28/0x73
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d08034a4a6>] F 
p2m-pt.c#p2m_pt_set_entry+0x4d3/0x844
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d080342e13>] F 
p2m_set_entry+0x91/0x128
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d080343c52>] F 
guest_physmap_add_entry+0x39f/0x5a3
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d080343f85>] F 
guest_physmap_add_page+0x12f/0x138
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d0802201ee>] F 
memory.c#populate_physmap+0x2e3/0x505
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d0802221e8>] F 
do_memory_op+0x695/0x1bf7
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d080383601>] F 
pv_hypercall+0x2ca/0x537
(XEN) [2019-10-30 22:07:05.748]    [<ffff82d08038a432>] F 
lstar_enter+0x112/0x120


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.