[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RFC XEN PATCH 2/6] vpci: accept BAR writes if dom0 is PVH


  • To: Huang Rui <ray.huang@xxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 22 Mar 2023 13:48:30 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GoyRnUxsEaNy6rjjBZUp94UvGqkVw5TgohOxf4QHXTg=; b=OjNeEGjJp0ZXBdkwdpusW5v6SNvHVa14sNBXIz96FUicHOGG4XlzwE2t9cHpHQaL+ORIj6tfBoO/jNUrjOtDEj+0niWnfe47xjyLa722z4Vqr9xPB3NWSY0Kgr/H+QhlaraP2vj9xkYYZmUeozNvUb2JjceOMDUJzBvi7qaqCY0dIseROZyfGS5BK6ygarIykRsmBYVlNKgxNiPL14rD+t+DQ9UBMZIZiHtB0Q2kWdTyF+cNvPvy7TXmXpeCxOpnm1u1uI0QsuIRNDm4lbJlyVVrngx8yUCrpOkB7+HRSC9L02rgLdilkg//PSGgngMol7p4hvoNNWf5QTFbBJYCBg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RkbwIHA1KYaQFcexWI/Rml/sVUWtCpvmKuBw1j1CZWGN501m53r8stKP0cUf6e1QU8fSxKlWSVy0QxP5EYxZhcmx5b1TxdyXv62tX2TJFziTKemRjy34dApm6xXj8fKadWiA4IdczbEXWaumIeMX5/f2uApg1yyX7hIaDHDEG3GMF0xnICt97VXi5aHKr6GAAPgUhDNFBhI88/Opdg9HhQsj4gdU7dZbNassKfPHRrJ6TsNudsLMfytEGs/hfHG+ZMq0jBh1uStwJlNi80kKSek/waEj22+RlrbHe4jBfZg4GuxxXNJWB+AGF+Gr1G3cLKQNpdKTpfUHE9WgoHPWeg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: "Deucher, Alexander" <Alexander.Deucher@xxxxxxx>, "Koenig, Christian" <Christian.Koenig@xxxxxxx>, "Hildebrand, Stewart" <Stewart.Hildebrand@xxxxxxx>, Xenia Ragiadakou <burzalodowa@xxxxxxxxx>, "Huang, Honglei1" <Honglei1.Huang@xxxxxxx>, "Zhang, Julia" <Julia.Zhang@xxxxxxx>, "Chen, Jiqian" <Jiqian.Chen@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Wed, 22 Mar 2023 12:48:44 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 22.03.2023 13:33, Huang Rui wrote:
> I traced that while we do pci-assignable-add, we will follow below trace to
> bind the passthrough device.
> 
> pciassignable_add()->libxl_device_pci_assignable_add()->libxl__device_pci_assignable_add()->pciback_dev_assign()
> 
> Then kernel xen-pciback driver want to add virtual configuration spaces. In
> this phase, the bar_write() in xen hypervisor will be called. I still need
> a bit more time to figure the exact reason. May I know where the
> xen-pciback driver would trigger a hvm_io_intercept to xen hypervisor?

Any config space access would. And I might guess ...

> [  309.719049] xen_pciback: wants to seize 0000:03:00.0
> [  462.911251] pciback 0000:03:00.0: xen_pciback: probing...
> [  462.911256] pciback 0000:03:00.0: xen_pciback: seizing device
> [  462.911257] pciback 0000:03:00.0: xen_pciback: pcistub_device_alloc
> [  462.911261] pciback 0000:03:00.0: xen_pciback: initializing...
> [  462.911263] pciback 0000:03:00.0: xen_pciback: initializing config
> [  462.911265] pciback 0000:03:00.0: xen-pciback: initializing virtual 
> configuration space
> [  462.911268] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x00
> [  462.911271] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x02
> [  462.911284] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x04
> [  462.911286] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x3c
> [  462.911289] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x3d
> [  462.911291] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x0c
> [  462.911294] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x0d
> [  462.911296] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x0f
> [  462.911301] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x10
> [  462.911306] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x14
> [  462.911309] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x18
> [  462.911313] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x1c
> [  462.911317] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x20
> [  462.911321] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x24
> [  462.911325] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x30
> [  462.911358] pciback 0000:03:00.0: Found capability 0x1 at 0x50
> [  462.911361] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x50
> [  462.911363] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x52
> [  462.911368] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x54
> [  462.911371] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x56
> [  462.911373] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0x57
> [  462.911386] pciback 0000:03:00.0: Found capability 0x5 at 0xa0
> [  462.911388] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0xa0
> [  462.911391] pciback 0000:03:00.0: xen-pciback: added config field at 
> offset 0xa2
> [  462.911405] pciback 0000:03:00.0: xen_pciback: enabling device
> [  462.911412] pciback 0000:03:00.0: enabling device (0006 -> 0007)
> [  462.911658] Already setup the GSI :28
> [  462.911668] Already map the GSI :28 and IRQ: 115
> [  462.911684] pciback 0000:03:00.0: xen_pciback: save state of device
> [  462.912154] pciback 0000:03:00.0: xen_pciback: resetting (FLR, D3, etc) 
> the device
> [  463.954998] pciback 0000:03:00.0: xen_pciback: reset device

... it is actually the reset here, saving and then restoring config space.
If e.g. that restore was done "blindly" (i.e. simply writing fields low to
high), then memory decode would be re-enabled before the BARs are written.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.