On 11/21/2018 2:02 AM, Stephen Hemminger wrote:
On Tue, 20 Nov 2018 23:09:31 +0800
Jeff Guo <jia....@intel.com> wrote:

When device has been bound to igb_uio driver and application is running,
hot-unplugging the device may cause kernel crash.

Signed-off-by: Jeff Guo <jia....@intel.com>
---
  doc/guides/rel_notes/known_issues.rst | 21 +++++++++++++++++++++
  1 file changed, 21 insertions(+)

diff --git a/doc/guides/rel_notes/known_issues.rst 
b/doc/guides/rel_notes/known_issues.rst
index 95e4ce6..dfe0565 100644
--- a/doc/guides/rel_notes/known_issues.rst
+++ b/doc/guides/rel_notes/known_issues.rst
@@ -759,3 +759,24 @@ Netvsc driver and application restart
**Driver/Module**:
     ``uio_hv_generic`` module.
+
+
+kernel crash when hot-unplug igb_uio device while DPDK application is running
+-----------------------------------------------------------------------------
+
+**Description**:
+   When device has been bound to igb_uio driver and application is running, 
hot-unplugging
+   the device may cause kernel crash.
+
+**Reason**:
+   When device is hot-unplugged, igb_uio driver will be removed which will 
destroy uio resources.
+   Later trying to access any uio resource will cause kernel crash.
+
+**Resolution/Workaround**:
+   If using DPDK for PCI HW hot-unplug, prefer to bind device with VFIO 
instead of IGB_UIO.
+
+**Affected Environment/Platform**:
+    ALL.
+
+**Driver/Module**:
+   ``igb_uio`` module.
Surely this is fixable. What is the back trace in the kernel? How can it be 
reproduced with some
common hardware (or hypervisor).  Will it happen with KVM?

I think the final fix should be at uio_module in the linux kernel,  and workaround could be in user space and igb_uio kernel driver if there is a better one. So that is why we need a document here.


you could reference the back trace as below.

[ 1078.006709] RIP: 0010:uio_write+0x2e/0xc0 [uio]

[ 1078.006727] Call Trace: [ 1078.006765]

 __vfs_write+0x18/0x40 [ 1078.006768]

 vfs_write+0xb8/0x1b0 [ 1078.006770]

 SyS_write+0x55/0xc0 [ 1078.006791]

 entry_SYSCALL_64_fastpath+0x1e/0xad [ 1078.006793]

RIP: 0033:0x7f75a10224bd


you could check the whole info  at below link which i have attach.

http://patches.dpdk.org/patch/47923/


The system env:

Host kernel: 4.17.0-041700rc1-generic

Vm kernel: Linux ubuntu 4.10.0-28-generic #32~16.04.2-Ubuntu.

QEMU emulator version: 2.5.0

DPDK: version: 18.11-rc4

NIC: ixgbe or i40e nic or other(igb_uio pci nic)

Reproduce step:

Host environment

1. Host: Bind port 0 to vfio-pci

   modprobe vfio_pci

./usertools/dpdk-devbind.py -b vfio-pci 81:10.0

2. start qemu scripts

taskset -c 12-21 qemu-system-x86_64 \

-enable-kvm -m 8192 -smp cores=10,sockets=1 -cpu host -name dpdk1-vm1 \

-monitor stdio \

-drive file=/home/vm/ubuntu-14.04.img \

-device vfio-pci,host=0000:81:10.0,id=dev1 \

-netdev tap,id=ipvm1,ifname=tap5,script=/etc/qemu-ifup -device rtl8139,netdev=ipvm1,id=net0,mac=00:00:00:00:00:01 \

-localtime -vnc :2


VM environment

1. Bind port 0 to igb_uio

./usertools/dpdk-devbind.py --st

./usertools/dpdk-devbind.py -b igb_uio 00:03.0

2. Start testpmd and enable hotplug feature

./x86_64-native-linuxapp-gcc/app/testpmd -c f -n 4 -- -i --hot-plug

3. testpmd>set fwd txonly

4. testpmd>start

5. Qemu: remove device for unplug:

(qemu) device_del dev1

6.Qemu : add device for plug:

(qemu) device_add vfio-pci,host=0000:81:10.0,id=dev1

7. Bind port 0 to igb_uio:

./usertools/dpdk-devbind.py -b igb_uio 00:03.0

8. testpmd>stop

9. testpmd>port attach 0000: 00:03.0

10. testpmd>port start all

11. testpmd>start

12. Repeat 5 -- 12 until the kernel crash occur.

Reply via email to