[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] [Xen-devel] ARM: "xen_add_mach_to_phys_entry: cannot add ... already exists and panics"



On Fri, 4 Jul 2014, David Vrabel wrote:
> On 04/07/14 17:36, David Vrabel wrote:
> > On 04/07/14 15:31, Stefano Stabellini wrote:
> >> On Fri, 4 Jul 2014, David Vrabel wrote:
> >>> On 04/07/14 15:12, Stefano Stabellini wrote:
> >>>> On Fri, 4 Jul 2014, David Vrabel wrote:
> >>>>> On 03/07/14 18:47, Stefano Stabellini wrote:
> >>>>>>
> >>>>>> At the moment I would like a way to disable grant mappings and go back
> >>>>>> to grant copies on demand. Maybe we could have a feature flag to change
> >>>>>> the behaviour of the network backend?
> >>>>>
> >>>>> You must fix the ARM code to handle this properly.
> >>>>>
> >>>>> blkback also uses grant maps and depending on the frontend blkback may
> >>>>> grant map the same machine frame multiple time.  We have see frontends
> >>>>> that send such requests.
> >>>>
> >>>> Indeed, it must be fixed properly. The workaround of disabling grant
> >>>> mappings would be just to buy us some time to come up with the fix.
> >>>
> >>> It's an expensive workaround though.
> >>
> >> In terms of performances or in terms of code?
> >> If it's the performances you are worried about, we could enable the
> >> workaround just for arm and arm64.
> > 
> > Expensive in terms of effort required to implement and maintain.
> > 
> >>>>> I can't remember how the ARM code works.  Where is the problematic m2p
> >>>>> lookup?
> >>>>
> >>>> arch/arm/xen/p2m.c
> >>>>
> >>>>
> >>>>> Perhaps this could be avoided for foreign frames?
> >>>>
> >>>> Unfortunately no. The whole point of p2m.c is to be able to translate
> >>>> foreign frames for dma operations.
> >>>
> >>> This is a p2m lookup though, which is fine, yes?  Where, specifically is
> >>> a mfn_to_pfn() lookup needed for a foreign MFN.
> >>  
> >> drivers/xen/swiotlb-xen.c:xen_unmap_single. xen_bus_to_phys is based on
> >> the value returned by mfn_to_pfn.
> > 
> > I think you can probably get away with not doing the cache operations on
> > foreign pages when DMA map/unmapping.  DMA mapped foreign pages are
> > (currently) either:
> > 
> > a) packets from a guest being Tx'd off host.  These are read-only and
> > are immediately freed after they're tranmitted.
> > 
> > b) block requests from blkback and these pages are never accessed.

Unfortunately it doesn't look like it is possible to skip the call to
__dma_page_dev_to_cpu
(xen_dma_unmap_page->arm_dma_unmap_page->__dma_page_dev_to_cpu), because
otherwise the data written by DMA to system memory won't be visible to
the CPU, at least on ARM32.

In fact the grant_unmap operation might issue flushes, but they are
inner flushes. While here we would need to issue an outer flush at the
very least. In addition to it, __dma_page_dev_to_cpu also calls
dmac_unmap_area, that on v7 becomes v7_dma_inv_range that issues a bunch
of DCCIMVAC.

So in order for this to work on grant_unmap Xen would have to:

- issue an outer flush
- DCCIMVAC the page

Also not all devices need this, only the non-coherent ones.

Given that we assume that Dom0 is mapped 1:1, one way to solve this
would be for Dom0 to map the grant on PFN=MFN too, then issue all the
required flushed on the machine address instead of the physical address.



> Something like:
> 
> --- a/drivers/xen/swiotlb-xen.c
> +++ b/drivers/xen/swiotlb-xen.c
> @@ -90,17 +90,18 @@ static inline dma_addr_t xen_phys_to_bus(phys_addr_t 
> paddr)
>       return dma;
>  }
>  
> -static inline phys_addr_t xen_bus_to_phys(dma_addr_t baddr)
> +/* Return true if baddr is the address of a foreign frame. */
> +static inline int xen_bus_to_phys(dma_addr_t baddr, phys_addr_t *paddr)
>  {
>       unsigned long pfn = mfn_to_pfn(PFN_DOWN(baddr));
>       dma_addr_t dma = (dma_addr_t)pfn << PAGE_SHIFT;
> -     phys_addr_t paddr = dma;
>  
> -     BUG_ON(paddr != dma); /* truncation has occurred, should never happen */
> +     if (pfn == INVALID_P2M_ENTRY)
> +             return true;
>  
> -     paddr |= baddr & ~PAGE_MASK;
> +     *paddr = dma | (baddr & ~PAGE_MASK);
>  
> -     return paddr;
> +     return false;
>  }
>  
>  static inline dma_addr_t xen_virt_to_bus(void *address)
> @@ -443,10 +444,30 @@ static void xen_unmap_single(struct device *hwdev, 
> dma_addr_t dev_addr,
>                            size_t size, enum dma_data_direction dir,
>                                struct dma_attrs *attrs)
>  {
> -     phys_addr_t paddr = xen_bus_to_phys(dev_addr);
> +     phys_addr_t paddr;
> +     bool is_foreign;
>  
>       BUG_ON(dir == DMA_NONE);
>  
> +     is_foreign = xen_bus_to_phys(dev_addr, &paddr);
> +
> +     /*
> +      * We can't get the appropriate PFN for a foreign frame since
> +      * it may be grant mapped multiple times.
> +      *
> +      * Assume that the grant unmap will do any appropriate cache
> +      * operations, and that the frontend will do any for its own
> +      * mappings.
> +      *
> +      * This does mean there is a window between the DMA unmap and
> +      * the grant unmap where the CPU may see stale data (for a
> +      * FROM_DEVICE operation), but this is not a problem in
> +      * practice with the current users of foreign mappings
> +      * (netback and blkback).
> +      */
> +     if (is_foreign)
> +             return;
> +
>       xen_dma_unmap_page(hwdev, paddr, size, dir, attrs);
>  
>       /* NOTE: We use dev_addr here, not paddr! */
> 

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxx
http://lists.xen.org/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.