[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH for-4.21] vpci/msix: improve handling of bogus MSI-X capabilities
On Mon, Oct 06, 2025 at 03:29:11PM +0100, Andrew Cooper wrote: > On 06/10/2025 2:55 pm, Alejandro Vallejo wrote: > > On Tue Sep 30, 2025 at 2:57 PM CEST, Roger Pau Monné wrote: > >> On Tue, Sep 30, 2025 at 11:15:01AM +0200, Alejandro Vallejo wrote: > >>> On Mon Sep 29, 2025 at 10:41 AM CEST, Roger Pau Monne wrote: > >>>> I've had the luck to come across a PCI card that exposes a MSI-X > >>>> capability > >>>> where the BIR of the vector and PBA tables points at a BAR that has 0 > >>>> size. > >>>> > >>>> This doesn't play nice with the code in vpci_make_msix_hole(), as it > >>>> would > >>>> still use the address of such empty BAR (0) and attempt to crave a hole > >>>> in > >>>> the p2m. This leads to errors like the one below being reported by Xen: > >>>> > >>>> d0v0 0000:22:00.0: existing mapping (mfn: 181c4300 type: 0) at 0 > >>>> clobbers MSIX MMIO area > >>>> > >>>> And the device left unable to enable memory decoding due to the failure > >>>> reported by vpci_make_msix_hole(). > >>>> > >>>> Introduce checking in init_msix() to ensure the BARs containing the MSI-X > >>>> tables are usable. This requires checking that the BIR points to a > >>>> non-empty BAR, and the offset and size of the MSI-X tables can fit in the > >>>> target BAR. > >>>> > >>>> This fixes booting PVH dom0 on Supermicro AS -2126HS-TN severs with AMD > >>>> EPYC 9965 processors. The broken device is: > >>>> > >>>> 22:00.0 SATA controller: Advanced Micro Devices, Inc. [AMD] FCH SATA > >>>> Controller [AHCI mode] (rev 93) > >>>> > >>>> There are multiple of those integrated controllers in the system, all > >>>> broken in the same way. > >>>> > >>>> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> > >>>> --- > >>>> Cc: Stewart Hildebrand <stewart.hildebrand@xxxxxxx> > >>>> Cc: Jan Beulich <jbeulich@xxxxxxxx> > >>>> Cc: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx> > >>>> > >>>> While not strictly a bugfix, I consider this a worthy improvement so that > >>>> PVH dom0 has a chance to boot on hardware that exposes such broken MSI-X > >>>> capabilities. Hence I think this change should be considered for > >>>> inclusion > >>>> into 4.21. There a risk of regressing on hardware that was already > >>>> working > >>>> with PVH, but given enough testing that should be minimal. > >>>> --- > >>>> xen/drivers/vpci/msix.c | 50 ++++++++++++++++++++++++++++++++++++----- > >>>> 1 file changed, 45 insertions(+), 5 deletions(-) > >>>> > >>>> diff --git a/xen/drivers/vpci/msix.c b/xen/drivers/vpci/msix.c > >>>> index 54a5070733aa..8458955d5bbb 100644 > >>>> --- a/xen/drivers/vpci/msix.c > >>>> +++ b/xen/drivers/vpci/msix.c > >>>> @@ -675,6 +675,51 @@ static int cf_check init_msix(struct pci_dev *pdev) > >>>> if ( !msix ) > >>>> return -ENOMEM; > >>>> > >>>> + msix->tables[VPCI_MSIX_TABLE] = > >>>> + pci_conf_read32(pdev->sbdf, msix_table_offset_reg(msix_offset)); > >>>> + msix->tables[VPCI_MSIX_PBA] = > >>>> + pci_conf_read32(pdev->sbdf, msix_pba_offset_reg(msix_offset)); > >>>> + > >>>> + /* Check that the provided BAR is valid. */ > >>>> + for ( i = 0; i < ARRAY_SIZE(msix->tables); i++ ) > >>>> + { > >>>> + const char *name = (i == VPCI_MSIX_TABLE) ? "vector" : "PBA"; > >>>> + const struct vpci_bar *bars = pdev->vpci->header.bars; > >>>> + unsigned int bir = msix->tables[i] & PCI_MSIX_BIRMASK; > >>>> + unsigned int type; > >>>> + unsigned int offset = msix->tables[i] & ~PCI_MSIX_BIRMASK; > >>>> + unsigned int size = > >>>> + (i == VPCI_MSIX_TABLE) ? max_entries * PCI_MSIX_ENTRY_SIZE > >>>> + : ROUNDUP(DIV_ROUND_UP(max_entries, > >>>> 8), 8); > >>>> + > >>>> + if ( bir >= ARRAY_SIZE(pdev->vpci->header.bars) ) > >>>> + { > >>>> + printk(XENLOG_ERR "%pp: MSI-X %s table with out of range > >>>> BIR %u\n", > >>>> + &pdev->sbdf, name, bir); > >>> Would it be worth adding something here such that a device vendor testing > >>> their > >>> hardware under Xen can trivially grep for device bugs? > >>> > >>> Something akin to "[Firmware bug]" on Linux, like "[Device bug]" or some > >>> such. > >>> > >>> It would also let anyone not very knowledgeable about PCI know that a > >>> device > >>> they own is being unreasonable. Same below in the other XENLOG_ERR > >>> messages. > >> We could add indeed. I don't think we haven't done so in the past. > >> If we go that route I would suggest that I add a: > >> > >> #define DEVICE_BUG_PREFIX "[Device bug] " > >> > >> in lib.h or similar, to make sure we use the same prefix uniformly. > >> TBH > > We have several FIRMWARE BUG's in Xen already, and several more that > ought to move to this pattern. > > Given that Linux has definitely been booted on this hardware, we should > match whichever prefix they use for messages about this. I don't think Linux prints any message about this, it simply ignores the capability. We have another instance of having to support buggy devices in vPCI: when a device places registers in the same 4K page as the MSI-X vector or PBA tables. In that case the offending device was an Intel Wireless card. I'm happy to use "[Device Bug]", will adjust the patch this afternoon. > What's unclear is whether AMD can even fix this with a firmware update. > I would have expected that the PCIe hardblock would have prevented > making this mistake, but clearly not... I didn't want to point fingers :), I have no idea if it can be fixed in firmware. Thanks, Roger.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |