From mboxrd@z Thu Jan 1 00:00:00 1970 From: Konrad Rzeszutek Wilk Subject: Re: PCI passthrough (pci-attach) to HVM guests bug (BAR64 addresses are bogus) Date: Mon, 10 Nov 2014 13:07:20 -0500 Message-ID: <20141110180720.GA15286@laptop.dumpdata.com> References: <20141110173248.GA13778@laptop.dumpdata.com> <5460F908.4040208@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Return-path: Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1XntNH-0000j2-OF for xen-devel@lists.xenproject.org; Mon, 10 Nov 2014 18:07:35 +0000 Content-Disposition: inline In-Reply-To: <5460F908.4040208@citrix.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: David Vrabel Cc: xen-devel@lists.xenproject.org, jbeulich@suse.com List-Id: xen-devel@lists.xenproject.org On Mon, Nov 10, 2014 at 05:42:32PM +0000, David Vrabel wrote: > On 10/11/14 17:32, Konrad Rzeszutek Wilk wrote: > > Hey, > > = > > With Xen 4.5 (today's staging), when I boot a guest and then do pci-att= ach > > the BARs values are corrupt. > = > Corrupt? > = > > [ 152.572965] pci 0000:00:04.0: BAR 1: no space for [mem size 0x080000= 00 64bit pref] > = > Looks like the default MMIO hole isn't large enough for this device. The BARs are 32M, 64M, 128MB and the MMIO is 2GB. It looks like the BAR value is corrupted as: (dom0): [ =A0=A022.834109] pci 0000:05:00.0: reg 0x14: [mem 0xd0000000-0xd7ffffff 6= 4bit pref] ^ - here we have '0xd' guest: [ =A0152.518320] pci 0000:00:04.0: reg 0x14: [mem 0x00000000-0x07ffffff 64b= it pref] See that '0xd' gone in the guest? > = > David