[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] pci: cleanup MSI interrupts before removing device from IOMMU
On Wed, Oct 21, 2020 at 01:20:27PM +0200, Jan Beulich wrote: > On 21.10.2020 10:19, Roger Pau Monne wrote: > > Doing the MSI cleanup after removing the device from the IOMMU leads > > to the following panic on AMD hardware: > > > > Assertion 'table.ptr && (index < intremap_table_entries(table.ptr, iommu))' > > failed at iommu_intr.c:172 > > ----[ Xen-4.13.1-10.0.3-d x86_64 debug=y Not tainted ]---- > > CPU: 3 > > RIP: e008:[<ffff82d08026ae3c>] > > drivers/passthrough/amd/iommu_intr.c#get_intremap_entry+0x52/0x7b > > [...] > > Xen call trace: > > [<ffff82d08026ae3c>] R > > drivers/passthrough/amd/iommu_intr.c#get_intremap_entry+0x52/0x7b > > [<ffff82d08026af25>] F > > drivers/passthrough/amd/iommu_intr.c#update_intremap_entry_from_msi_msg+0xc0/0x342 > > [<ffff82d08026ba65>] F amd_iommu_msi_msg_update_ire+0x98/0x129 > > [<ffff82d08025dd36>] F iommu_update_ire_from_msi+0x1e/0x21 > > [<ffff82d080286862>] F msi_free_irq+0x55/0x1a0 > > [<ffff82d080286f25>] F pci_cleanup_msi+0x8c/0xb0 > > [<ffff82d08025cf52>] F pci_remove_device+0x1af/0x2da > > [<ffff82d0802a42d1>] F do_physdev_op+0xd18/0x1187 > > [<ffff82d080383925>] F pv_hypercall+0x1f5/0x567 > > [<ffff82d08038a432>] F lstar_enter+0x112/0x120 > > > > That's because the call to iommu_remove_device on AMD hardware will > > remove the per-device interrupt remapping table, and hence the call to > > pci_cleanup_msi done afterwards will find a null intremap table and > > crash. > > > > Reorder the calls so that MSI interrupts are torn down before removing > > the device from the IOMMU. > > I guess this wants > > Fixes: d7cfeb7c13ed ("AMD/IOMMU: don't blindly allocate interrupt remapping > tables") > > ? Oh yes, I didn't git blame the file to figure out when such allocating and freeing was added. > > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> > > Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Thanks. > > --- a/xen/drivers/passthrough/pci.c > > +++ b/xen/drivers/passthrough/pci.c > > @@ -834,10 +834,15 @@ int pci_remove_device(u16 seg, u8 bus, u8 devfn) > > list_for_each_entry ( pdev, &pseg->alldevs_list, alldevs_list ) > > if ( pdev->bus == bus && pdev->devfn == devfn ) > > { > > + /* > > + * Cleanup MSI interrupts before removing the device from the > > + * IOMMU, or else the internal IOMMU data used to track the > > device > > + * interrupts might be already gone. > > + */ > > + pci_cleanup_msi(pdev); > > ret = iommu_remove_device(pdev); > > if ( pdev->domain ) > > list_del(&pdev->domain_list); > > - pci_cleanup_msi(pdev); > > To be honest I'm not sure about the comment. It should really have > been this way from the very beginning, and VT-d not being affected > makes me wonder what possible improvements are there waiting to be > noticed and then carried out. I'm fine with dropping the comment, I would also expect the normal flow to be to cleanup any interrupt and then remove the device, instead of the other way around. Roger.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |