[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [XEN PATCH] hvmloader: Enable MMIO and I/O decode, after all resource allocation



> -----Original Message-----
> From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> Sent: 07 April 2020 09:07
> To: paul@xxxxxxx
> Cc: 'Harsha Shamsundara Havanur' <havanur@xxxxxxxxxx>; 
> xen-devel@xxxxxxxxxxxxxxxxxxxx; 'Wei Liu'
> <wl@xxxxxxx>; 'Andrew Cooper' <andrew.cooper3@xxxxxxxxxx>; 'Ian Jackson' 
> <ian.jackson@xxxxxxxxxxxxx>;
> 'Jan Beulich' <jbeulich@xxxxxxxx>
> Subject: Re: [XEN PATCH] hvmloader: Enable MMIO and I/O decode, after all 
> resource allocation
> 
> On Tue, Apr 07, 2020 at 08:48:42AM +0100, Paul Durrant wrote:
> > > -----Original Message-----
> > > From: Xen-devel <xen-devel-bounces@xxxxxxxxxxxxxxxxxxxx> On Behalf Of 
> > > Harsha Shamsundara Havanur
> > > Sent: 06 April 2020 18:47
> > > To: xen-devel@xxxxxxxxxxxxxxxxxxxx
> > > Cc: Wei Liu <wl@xxxxxxx>; Andrew Cooper <andrew.cooper3@xxxxxxxxxx>; Ian 
> > > Jackson
> > > <ian.jackson@xxxxxxxxxxxxx>; Jan Beulich <jbeulich@xxxxxxxx>; Harsha 
> > > Shamsundara Havanur
> > > <havanur@xxxxxxxxxx>; Roger Pau Monné <roger.pau@xxxxxxxxxx>
> > > Subject: [XEN PATCH] hvmloader: Enable MMIO and I/O decode, after all 
> > > resource allocation
> > >
> > > It was observed that PCI MMIO and/or IO BARs were programmed with
> > > BUS master, memory and I/O decodes (bits 0,1 and 2 of PCI COMMAND
> > > register) enabled, during PCI setup phase. This resulted in
> > > spurious and premature bus transactions as soon as the lower bar of
> > > the 64 bit bar is programmed. It is highly recommended that BARs be
> > > programmed whilst decode bits are cleared to avoid spurious bus
> > > transactions.
> > >
> >
> > It's not so much spurious transactions that are the issue. I think 
> > "spurious and premature bus
> transactions" should be replaced with "incorrect mappings being created".
> >
> > I believe the PCI spec says all three bits should be clear after reset 
> > anyway, and BAR programming
> whilst decodes are enabled causes problems for emulators such as QEMU which 
> need to create and destroy
> mappings between the gaddr being programming into the virtual BAR and the 
> maddr programmed into the
> physical BAR.
> > Specifically the case we see is that a 64-bit memory BAR is programmed by 
> > writing the lower half and
> then the upper half. After the first write the BAR is mapped to an address 
> under 4G that happens to
> contain RAM, which is displaced by the mapping. After the second write the 
> BAR is re-mapped to the
> intended location but the RAM displaced by the other mapping is not restored. 
> The OS then continues to
> boot and function until at some point it happens to try to use that RAM at 
> which point it suffers a
> page fault and crashes. It was only by noticing that the faulting address lay 
> within the transient BAR
> mapping that we figured out what was happening.
> 
> In order to fix this isn't it enough to just disable memory and IO
> decodes, leaving bus mastering as it is?
> 
> I assume there is (or was) some reason why bus master is enabled by
> hvmloader in the first place?
> 

I admit it is a while since I went mining for the reason BME was being set but 
IIRC the commit that added the original code did not state why it was done.

In the past I have run with local hacks disabling it whilst playing with GPU 
pass-through and not noticed it causing any problems. There is an argument to 
say that hvmloader should perhaps leave it alone but there is no good reason I 
can think of why it ought to be enabling it.

  Paul

> Thanks, Roger.




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.