|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 8/9] vpci/header: Reset the command register when adding devices
On 07.09.21 11:49, Jan Beulich wrote:
> On 07.09.2021 10:18, Oleksandr Andrushchenko wrote:
>> On 07.09.21 11:00, Jan Beulich wrote:
>>> On 07.09.2021 09:43, Oleksandr Andrushchenko wrote:
>>>> On 06.09.21 17:55, Jan Beulich wrote:
>>>>> On 03.09.2021 12:08, Oleksandr Andrushchenko wrote:
>>>>>> --- a/xen/drivers/vpci/header.c
>>>>>> +++ b/xen/drivers/vpci/header.c
>>>>>> @@ -811,6 +811,16 @@ int vpci_bar_add_handlers(const struct domain *d,
>>>>>> struct pci_dev *pdev)
>>>>>> gprintk(XENLOG_ERR,
>>>>>> "%pp: failed to add BAR handlers for dom%d\n",
>>>>>> &pdev->sbdf,
>>>>>> d->domain_id);
>>>>>> +
>>>>>> + /*
>>>>>> + * Reset the command register: it is possible that when passing
>>>>>> + * through a PCI device its memory decoding bits in the command
>>>>>> + * register are already set. Thus, a guest OS may not write to the
>>>>>> + * command register to update memory decoding, so guest mappings
>>>>>> + * (guest's view of the BARs) are left not updated.
>>>>>> + */
>>>>>> + pci_conf_write16(pdev->sbdf, PCI_COMMAND, 0);
>>>>> Can you really blindly write 0 here? What about bits that have to be
>>>>> under host control, e.g. INTX_DISABLE? I can see that you may want to
>>>>> hand off with I/O and memory decoding off and bus mastering disabled,
>>>>> but for every other bit (including reserved ones) I'd expect separate
>>>>> justification (in the commit message).
>>>> According to "PCI LOCAL BUS SPECIFICATION, REV. 3.0" I have at hand,
>>>> section "6.2.2 Device Control" says that the reset state of the command
>>>> register is typically 0, so this is why I chose to write 0 here, e.g.
>>>> make the command register as if it is after the reset.
>>>>
>>>> With respect to host control: we currently do not really emulate command
>>>> register which probably was ok for x86 PVH Dom0 and this might not be the
>>>> case now as we add DomU's. That being said: in my implementation guest can
>>>> alter command register as it wants without restrictions.
>>>> If we see it does need proper emulation then we would need adding that as
>>>> well (is not part of this series though).
>>>>
>>>> Meanwhile, I agree that we can only reset IO space, memory space and bus
>>>> master bits and leave the rest untouched. But again, without proper command
>>>> register emulation guests can still set what they want.
>>> Yes, writes to the register will need emulating for DomU.
>> But then I am wondering to what extent we need to emulate the command
>>
>> register? We have the following bits in the command register:
>>
>> #define PCI_COMMAND_IO 0x1 /* Enable response in I/O space */
>> #define PCI_COMMAND_MEMORY 0x2 /* Enable response in Memory space */
>> #define PCI_COMMAND_MASTER 0x4 /* Enable bus mastering */
>> #define PCI_COMMAND_SPECIAL 0x8 /* Enable response to special cycles
>> */
>> #define PCI_COMMAND_INVALIDATE 0x10 /* Use memory write and
>> invalidate */
>> #define PCI_COMMAND_VGA_PALETTE 0x20 /* Enable palette snooping */
>> #define PCI_COMMAND_PARITY 0x40 /* Enable parity checking */
>> #define PCI_COMMAND_WAIT 0x80 /* Enable address/data stepping */
>> #define PCI_COMMAND_SERR 0x100 /* Enable SERR */
>> #define PCI_COMMAND_FAST_BACK 0x200 /* Enable back-to-back writes */
>> #define PCI_COMMAND_INTX_DISABLE 0x400 /* INTx Emulation Disable */
>>
>> We want the guest to access directly at least I/O and memory decoding and
>> bus mastering
>> bits, but how do we emulate the rest? Do you mean we can match the rest to
>> what host
>> uses for the device, like PCI_COMMAND_INTX_DISABLE bit? If so, as per my
>> understanding,
>> those bits get set/cleared when a device is enabled, e.g. by Linux
>> kernel/device driver for example.
> I would suggest to take qemu's emulation as a starting point.
Sure, I'll take a look what QEMU does. But I guess that emulation may depend
on host bridge emulation etc. which may not be applicable for our case without
serious complications.
>
>> So, if we have a hidden PCI device which can be assigned to a guest and it
>> is literally untouched
>> (not enabled in Dom0) then I think there will be no such reference as "host
>> assigned values" as
>> most probably the command register will remain in its after reset state.
> What meaning of "hidden" do you imply here? Devices passed to
> pci_{hide,ro}_device() may not be assigned to guests ...
You are completely right here.
>
> For any other meaning of "hidden", even if the device is completely
> ignored by Dom0,
Dom0less is such a case when a device is assigned to the guest
without Dom0 at all?
> certain of the properties still cannot be allowed
> to be DomU-controlled.
The list is not that big, could you please name a few you think cannot
be controlled by a guest? I can think of PCI_COMMAND_SPECIAL(?),
PCI_COMMAND_INVALIDATE(?), PCI_COMMAND_PARITY, PCI_COMMAND_WAIT,
PCI_COMMAND_SERR, PCI_COMMAND_INTX_DISABLE which we may want to
be aligned with the "host reference" values, e.g. we only allow those bits
to be set as they are in Dom0.
> (I'm therefore not sure in how far Dom0 can
> actually legitimately "ignore" devices. It may decide to not enable
> them, but that's not "ignoring".)
>
> Jan
>
Thank you,
Oleksandr
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |