[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v6] vpci: Add resizable bar support


  • To: Roger Pau Monné <roger.pau@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>
  • From: "Chen, Jiqian" <Jiqian.Chen@xxxxxxx>
  • Date: Wed, 5 Feb 2025 03:42:30 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=L+1+HOf2uYFfSfnEp4TE5/DxO8t122URboUMDoWE7rI=; b=lDDnTZcSl4nez2DKC9TnV5a7lrdqAiV9y2r1tF8kjBVbjvLsQVlZEr+pXCnpgh1ahUBYE/64rtevwSDvDGcQTLw43hh8OtyrLgoroNbPIsj7zeKH9o3BN2bdGom0ZVxURB951qcdIvpe5LHB/FQyJkzrENfd6mrMMvVW4c7h6bgs7F7jkG80qrWKktpNymZ7CaqZn6Fk+uF4OUM3k2/a8kSAZCc9y928Rr6pYxIj6oTwYhaz3rOcJ5aop7VSk9nHXN0InUCeL5USkXEAOJSsbjI4/8Y3tn/ZCWAOrG9nFYCk3tASKoLUfGiBPsKBpAqdD5DSjmEgc3jqOTVIJK8xfg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=LJaz2cevrBAo90y6foNNhOv6rU73gWMprC/r0fQ1tJm0CYP3tuudvybup+vbwe9dlhQXA/yKJXt1Ng08RRbdju6j+DnWTNRtph2+BB9Xx8gh0cElPZVnXYCk0KeQeuPfkOSWqEQOj2bkCDExadO3rNYGkLB1ou0dnWrMfJbvg0vdKyRU6Jkzg8yF6M3XRXa9ew2VJtTJFwBOMhXAYkLubkTPnGvvhLsuB7HPAp1HU6oX4hKbcwlfid4APFOO9MOJQdz80z8PKbzGYhVclu6qjCYiDnqOLO10Lg+5WoN7A0IFAkhnzX887Zg5suk1j8JTPAEsBXPsecDwr6JxdDuWRw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
  • Cc: "Chen, Jiqian" <Jiqian.Chen@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Huang, Ray" <Ray.Huang@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 05 Feb 2025 03:42:52 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHbbUoyUzXRgWLOOkOHv+F73OEjK7MqsrQAgAAFzwCAAAMXgIAABJWAgA3j+oA=
  • Thread-topic: [PATCH v6] vpci: Add resizable bar support

On 2025/1/27 23:08, Roger Pau Monné wrote:
> On Mon, Jan 27, 2025 at 03:52:31PM +0100, Jan Beulich wrote:
>> On 27.01.2025 15:41, Roger Pau Monné wrote:
>>> On Mon, Jan 27, 2025 at 03:20:40PM +0100, Jan Beulich wrote:
>>>> On 23.01.2025 04:50, Jiqian Chen wrote:
>>>>> v5->v6 changes:
>>>>> * Changed "1UL" to "1ULL" in PCI_REBAR_CTRL_SIZE idefinition for 32 bit 
>>>>> architecture.
>>>>> * In rebar_ctrl_write used "bar - pdev->vpci->header.bars" to get index 
>>>>> instead of reading
>>>>>   from register.
>>>>> * Added the index of BAR to error messages.
>>>>> * Changed to "continue" instead of "return an error" when 
>>>>> vpci_add_register failed.
>>>>
>>>> I'm not convinced this was a good change to make. While ...
>>>>
>>>>> +static int cf_check init_rebar(struct pci_dev *pdev)
>>>>> +{
>>>>> +    uint32_t ctrl;
>>>>> +    unsigned int nbars;
>>>>> +    unsigned int rebar_offset = pci_find_ext_capability(pdev->sbdf,
>>>>> +                                                        
>>>>> PCI_EXT_CAP_ID_REBAR);
>>>>> +
>>>>> +    if ( !rebar_offset )
>>>>> +        return 0;
>>>>> +
>>>>> +    if ( !is_hardware_domain(pdev->domain) )
>>>>> +    {
>>>>> +        printk(XENLOG_ERR "%pp: resizable BARs unsupported for unpriv 
>>>>> %pd\n",
>>>>> +               &pdev->sbdf, pdev->domain);
>>>>> +        return -EOPNOTSUPP;
>>>>> +    }
>>>>> +
>>>>> +    ctrl = pci_conf_read32(pdev->sbdf, rebar_offset + PCI_REBAR_CTRL(0));
>>>>> +    nbars = MASK_EXTR(ctrl, PCI_REBAR_CTRL_NBAR_MASK);
>>>>> +    for ( unsigned int i = 0; i < nbars; i++ )
>>>>> +    {
>>>>> +        int rc;
>>>>> +        struct vpci_bar *bar;
>>>>> +        unsigned int index;
>>>>> +
>>>>> +        ctrl = pci_conf_read32(pdev->sbdf, rebar_offset + 
>>>>> PCI_REBAR_CTRL(i));
>>>>> +        index = ctrl & PCI_REBAR_CTRL_BAR_IDX;
>>>>> +        if ( index >= PCI_HEADER_NORMAL_NR_BARS )
>>>>> +        {
>>>>> +            printk(XENLOG_ERR "%pd %pp: too big BAR number %u in 
>>>>> REBAR_CTRL\n",
>>>>> +                   pdev->domain, &pdev->sbdf, index);
>>>>> +            continue;
>>>>> +        }
>>>>> +
>>>>> +        bar = &pdev->vpci->header.bars[index];
>>>>> +        if ( bar->type != VPCI_BAR_MEM64_LO && bar->type != 
>>>>> VPCI_BAR_MEM32 )
>>>>> +        {
>>>>> +            printk(XENLOG_ERR "%pd %pp: BAR%u is not in memory space\n",
>>>>> +                   pdev->domain, &pdev->sbdf, index);
>>>>> +            continue;
>>>>> +        }
>>>>
>>>> ... for these two cases we can permit Dom0 direct access because the BAR
>>>> isn't going to work anyway (as far as we can tell), ...
>>>>
>>>>> +        rc = vpci_add_register(pdev->vpci, vpci_hw_read32vpci_hw_read32, 
>>>>> vpci_hw_write32,
>>>>> +                               rebar_offset + PCI_REBAR_CAP(i), 4, NULL);
>>>>> +        if ( rc )
>>>>> +        {
>>>>> +            /*
>>>>> +             * TODO: for failed pathes, need to hide ReBar capability
>>>>> +             * from hardware domain instead of returning an error.
>>>>> +             */
>>>>> +            printk(XENLOG_ERR "%pd %pp: BAR%u fail to add reg of 
>>>>> REBAR_CAP rc=%d\n",
>>>>> +                   pdev->domain, &pdev->sbdf, index, rc);
>>>>> +            continue;
>>>>> +        }
>>>>> +
>>>>> +        rc = vpci_add_register(pdev->vpci, vpci_hw_read32, 
>>>>> rebar_ctrl_write,
>>>>> +                               rebar_offset + PCI_REBAR_CTRL(i), 4, bar);
>>>>> +        if ( rc )
>>>>> +        {
>>>>> +            printk(XENLOG_ERR "%pd %pp: BAR%u fail to add reg of 
>>>>> REBAR_CTRL rc=%d\n",
>>>>> +                   pdev->domain, &pdev->sbdf, index, rc);
>>>>> +            continue;
>>>>> +        }
>>>>
>>>> ... in these two cases we had an issue internally, and would hence wrongly
>>>> allow Dom0 direct access (and in case it's the 2nd one that failed, in fact
>>>> only partially direct access, with who knows what resulting 
>>>> inconsistencies).
>>>>
>>>> Only with this particular change undone:
>>> R> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
>>>>
>>>> Otherwise you and Roger (who needs to at least ack the change anyway) will
>>>> need to sort that out, with me merely watching.
>>>
>>> Ideally errors here should be dealt with by masking the capability.
>>> However Xen doesn't yet have that support.  The usage of continue is
>>> to merely attempt to keep any possible setup hooks working (header,
>>> MSI, MSI-X). Returning failure from init_rebar() will cause all
>>> vPCI hooks to be removed, and thus the hardware domain to have
>>> unmediated access to the device, which is likely worse than just
>>> continuing here.
>>
>> Hmm, true. Maybe with the exception of the case where the first reg
>> registration works, but the 2nd fails. Since CTRL is writable but
>> CAP is r/o (and data there is simply being handed through) I wonder
>> whether we need to intercept CAP at all, and if we do, whether we
>> wouldn't better try to register CTRL first.
> 
> Indeed, Jiqian is that a leftover from a previous version when writes
> to CAP where ignored for being a read-only register?
Sorry to reply late, I just came back from an annual leave.
Did you mean: why I added handler vpci_hw_write32 for CAP?
If so, this is a change since V2, that you suggested to add it because there is 
no write limitation for dom0.

> 
> The current adding of a handler with vpci_hw_{read,write}32() result
> in the exact same behavior for a hardware domain, which is the only
> domain where ReBAR will be exposed.
> 
> Thanks, Roger.

-- 
Best regards,
Jiqian Chen.

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.