[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH for-4.17] x86/pci: allow BARs to be positioned on e820 reserved regions
- To: Jan Beulich <jbeulich@xxxxxxxx>
- From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
- Date: Wed, 5 Oct 2022 10:37:16 +0200
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5qjRENa9XEdFpSHmz8m7rWW4in8xI1o0DhPHr6aPK+E=; b=OmIRPI+wLF9JrL+w9jfa+oNZvb2SrKzGkaEuhJLI1AKAJ1RFypkyLXndM9sYZZhz33uFS7fUUw4SSAm6l8Mk2VWrXkVLIanPsXgZLwiATcg2WKCsCj4/1JVQD7G88gSrFaPJO9LbHEZEH+tolUf6A5OwvhxH3MdBcbPFmYyT0CbdZeqavzzWSG7Ds3MfAWlpjw1rpKhY9gGDy35sbnEYipLU69/KM0HYxV8ZGz3SpSKh6tGdYxd3ttZCNYg0agLMzo7yEMhIFnSSbhwB/g6nG+1z/4pqX5Zahf6s/HU+40ALKJsXOstTg4z26Qxog4ttjfRgx733ggl/MdcPXb6Kxw==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Qi1bGwFL9vx81jHoz3EQyEvtGR6+n2Ff/+F9+Du4/KctuesxtIERF893bUtGg//9IsAqilaPeeu+Id3OBVI4QDLBjmXeXN6uNsRLvu5AqdJxkRCfSLYYrKJuL4t0za4AGM2E11TVkNhfe8xSJ6zOqRmjaN9aR0CGUrlpZC9WGEYnXCwGgmWbEyEJ/VgETQlWcbxUHuUGJutL+hMAiJap2WjPj23CkmGaD3P4byas/8LPc9PKPOPYrycn2uok5HqnDOg46upUYcbcdH6YsxxZatqg3bf3iMXGNCWisDMnJtWRYG5zqbY2/KcGQSMs9lJjUU7F58EyCMu4iMvHo2PkFw==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
- Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
- Delivery-date: Wed, 05 Oct 2022 08:37:39 +0000
- Ironport-data: A9a23:ug4fv6PHpVuQyy/vrR1clsFynXyQoLVcMsEvi/4bfWQNrUok02MFz mEZXG3QbKyDNGOgeYh+bdu19BsAv5DTmtQxTgto+SlhQUwRpJueD7x1DKtS0wC6dZSfER09v 63yTvGacajYm1eF/k/F3oDJ9CU6j+fQLlbFILasEjhrQgN5QzsWhxtmmuoo6qZlmtH8CA6W0 T/Ii5S31GSNhnglbwr414rZ8Ek15ayq5WtB1rADTasjUGH2xiF94K03fcldH1OgKqFIE+izQ fr0zb3R1gs1KD90V7tJOp6iGqE7aua60Tqm0xK6aID76vR2nQQg075TCRYpQRw/ZwNlPTxG4 I4lWZSYEW/FN0BX8QgXe0Ew/ypWZcWq9FJbSJQWXAP6I0DuKhPRL/tS4E4eEKMox/tmPn13r vU1Lg4SLQHY2emb6efuIgVsrpxLwMjDGqo64ykl6A6DSPEsTNbEXrnA4sJe0HEonMdSEP3CZ s0fLz1ycBDHZB4JMVASYH48tL7w2j+jLHsF9RTM/ftfD2v7lWSd1JD3N9XYYJqSTNh9lUeEv GPWuW/+B3n2MfTPlWffrC/y3IcjmwuiSrg0SrqA9ccw3kaS7UpCDBQKXnuC9KzRZkmWHog3x 1Yv0igkoLU29UerZsLgRBD+q3mB1jYHQMZZGeA+7ACLy4LX7hyfC2xCSSROAPQkqcs3SDoCx lKP2dTzClRHurCPVWiU8LvSqDqoIDUUNkcLfypCRgwAi/Hdp4U0ggPKX8xUOqe/hd3oGhn92 zmP6iM5gt07ksojx6i9u1fdjFqEtpXPCwI4+AjTdmak9R9iIp6oYZSy7lrW5uoGK5yWJmRtp 1ABksmaqeURV5eEkXXVRP1XRen4ofGYLDfbnFhjWYE78Cig8GKieoYW5yxiIEBuMYAPfjqBj FLvhD69LaR7ZBOCBZKbqaroYyj25cAMzejYa80=
- Ironport-hdrordr: A9a23:wy28XKw0hJN+srjxt3OrKrPxRugkLtp133Aq2lEZdPULSKGlfp GV9sjziyWetN9wYh4dcB67Scy9qFfnhOZICOgqTM6ftWzd1FdAQ7sD0WKP+UyCJ8S6zJ8n6U 4CSdkDNDSTNykcsS+S2mDRfbcdKZu8gcaVbI/lvgpQpGpRGsVdBmlCe2Sm+hocfng9OXN1Lu vq2uN34x6bPVgHZMWyAXcIG8DFut3wjZrjJTIWGhI97wGKrDWwrJr3CQKR0BsyWy5Ghe5Kyx mPryXJooGY992rwB7V0GHeq7xQhdva09NGQOCcl8QPLT3oqwCwIKBsQaeLsjwZqPymrHwqjN 7PiRE9ONkb0QKYQkiF5T/WnyXw2jcn7HHvjXeenHvYuMT8ABY3EdBIi451egbQrxNIhqA07I t7m0ai87ZHBxLJmyrwo/DOShFRj0Kx5V4vi/QagXBzWZYXLJVRsYsc1kVIF4poJlON1KkXVM 1VSO3M7vdfdl2XK1jfo2lU2dSpGk8+Gx+XK3JyyPC94nxzpjRU3kEYzMsQkjMr75QmUaRJ4O zCL+BBiKxOZtV+V9MzOM4xBe+MTkDdSxPFN2yfZX79ErscBn7Lo5nrpJ0o+eCRfoASxpdaou WMbLphjx9yR6vSM7zP4HUSmSq9A1lVHA6dh/223qIJ9IEVH9HQQG++oFNHqbrSnxxQOLyfZx +JAuMmPxbSFxqQJW935XyBZ3BzEwhqbCRHgKdOZ3u+5uT2F6bNisv3NN7uGZuFK0dVZoq4OA pIYATO
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On Tue, Oct 04, 2022 at 06:11:50PM +0200, Jan Beulich wrote:
> On 04.10.2022 17:36, Roger Pau Monne wrote:
> > The EFI memory map contains two memory types (EfiMemoryMappedIO and
> > EfiMemoryMappedIOPortSpace) used to describe IO memory areas used by
> > EFI firmware.
> >
> > The current parsing of the EFI memory map is translating
> > EfiMemoryMappedIO to E820_RESERVED on x86. This causes issues on some
> > boxes as the firmware is relying on using those regions to position
> > the BARs of devices being used (possibly during runtime) for the
> > firmware.
> >
> > Xen will disable memory decoding on any device that has BARs
> > positioned over any regions on the e820 memory map, hence the firmware
> > will malfunction after Xen turning off memory decoding for the
> > device(s) that have BARs mapped in EfiMemoryMappedIO regions.
> >
> > The system under which this was observed has:
> >
> > EFI memory map:
> > [...]
> > 00000fd000000-00000fe7fffff type=11 attr=800000000000100d
> > [...]
> > 0000:00:1f.5 disabled: BAR [0xfe010, 0xfe010] overlaps with memory map
> >
> > The device behind this BAR is:
> >
> > 00:1f.5 Serial bus controller [0c80]: Intel Corporation Lewisburg SPI
> > Controller (rev 09)
> > Subsystem: Super Micro Computer Inc Device 091c
> > Flags: fast devsel
> > Memory at fe010000 (32-bit, non-prefetchable) [size=4K]well
> >
> > For the record, the symptom observed in that machine was a hard freeze
> > when attempting to set an EFI variable (XEN_EFI_set_variable).
> >
> > Fix by allowing BARs of PCI devices to be positioned over reserved
> > memory regions, but print a warning message about such overlap.
>
> Somewhat hesitantly I might ack this change, but I'd like to give
> others (Andrew in particular) some time to voice their views. As
> said during the earlier discussion - I think we're relaxing things
> too much by going this route.
Another option would be to explicitly check in efi_memmap for
EfiMemoryMappedIO regions and BAR overlap and only allow those. That
would be more cumbersome code wise AFAICT.
> > --- a/xen/arch/x86/pci.c
> > +++ b/xen/arch/x86/pci.c
> > @@ -98,3 +98,30 @@ int pci_conf_write_intercept(unsigned int seg, unsigned
> > int bdf,
> >
> > return rc;
> > }
> > +
> > +bool pci_check_bar(const struct pci_dev *pdev, mfn_t start, mfn_t end)
> > +{
> > + unsigned long mfn;
> > +
> > + /*
> > + * Check if BAR is not overlapping with any memory region defined
> > + * in the memory map.
> > + */
> > + if ( is_memory_hole(start, end) )
> > + return true;
> > +
> > + /*
> > + * Also allow BARs placed on reserved regions in order to deal with EFI
> > + * firmware using EfiMemoryMappedIO regions to place the BARs of
> > devices
> > + * that can be used during runtime. But print a warning when doing so.
> > + */
> > + for ( mfn = mfn_x(start); mfn <= mfn_x(end); mfn++ )
> > + if ( !page_is_ram_type(mfn, RAM_TYPE_RESERVED) )
> > + return false;
>
> We don't need to be arch-independent here and hence instead of this
> (potentially long) loop can't we use a single call to e820_all_mapped()?
Sure, was searching for a range checking functions but wrongly looked
into mm.c instead of e820. I would have to make the function
non-init, but I think that's fine.
Thanks, Roger.
|