From: scottwood@freescale.com (Scott Wood)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v2 0/4] VFIO platform reset
Date: Fri, 5 Jun 2015 16:14:52 -0500 [thread overview]
Message-ID: <1433538892.2477.24.camel@freescale.com> (raw)
In-Reply-To: <CAL_JsqK4dm_Kmoys6+qxJrwFpo0K3gatVQxZiNPoWCduQKqj8w@mail.gmail.com>
On Fri, 2015-06-05 at 13:05 -0500, Rob Herring wrote:
> On Fri, Jun 5, 2015 at 10:06 AM, Eric Auger <eric.auger@linaro.org>
> wrote:
> > In situations where the userspace driver is stopped abnormally and
> > the
> > VFIO platform device is released, the assigned HW device currently
> > is
> > left running. As a consequence the HW device might continue
> > issuing IRQs
> > and performing DMA accesses.
> >
> > On release, no physical IRQ handler is setup anymore. Also the DMA
> > buffers
> > are unmapped leading to IOMMU aborts. So there is no serious
> > consequence.
> >
> > However when assigning that HW device again to another userspace
> > driver,
> > this latter might face some unexpected IRQs and DMA accesses,
> > which are
> > the result of the previous assignment.
>
> In general, shouldn't it just be a requirement that the drivers
> handle
> this condition. You have the same problem with firmware/bootloaders
> leaving h/w not in reset state or kexec'ing to a new kernel.
It's not the same situation. Firmware may leave HW in a non-reset
state but it must not leave the HW doing DMA; there's nothing the OS
could do about that as the OS could get corrupted before the driver
has a chance to run (this is not fun to debug). Leaving interrupts
potentially asserted would be bad as well, especially if the interrupt
is shared.
Likewise, with normal kexec drivers are supposed to quiesce the
hardware first -- and with kdump, the affected DMA buffers are never
reused.
In order for the driver to handle this, it would need to reset/quiesce
the device itself before enabling an IOMMU mapping. How would that
work for virtualization scenarios where the guest does not see any
IOMMU, and all vfio mappings are handled by QEMU or equivalent?
-Scott
next prev parent reply other threads:[~2015-06-05 21:14 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-06-05 15:06 [PATCH v2 0/4] VFIO platform reset Eric Auger
2015-06-05 15:06 ` [PATCH v2 1/4] VFIO: platform: add reset struct and lookup table Eric Auger
2015-06-09 18:26 ` Alex Williamson
2015-06-10 11:45 ` Eric Auger
2015-06-05 15:06 ` [PATCH v2 2/4] VFIO: platform: add reset callback Eric Auger
2015-06-05 15:06 ` [PATCH v2 3/4] VFIO: platform: populate the reset function on probe Eric Auger
2015-06-09 18:26 ` Alex Williamson
2015-06-10 11:44 ` Eric Auger
2015-06-10 15:10 ` Alex Williamson
2015-06-10 15:13 ` Eric Auger
2015-06-11 9:37 ` Eric Auger
2015-06-05 15:06 ` [PATCH v2 4/4] VFIO: platform: Calxeda xgmac reset module Eric Auger
2015-06-06 12:57 ` Paul Bolle
2015-06-08 8:02 ` Eric Auger
2015-06-05 18:05 ` [PATCH v2 0/4] VFIO platform reset Rob Herring
2015-06-05 21:14 ` Scott Wood [this message]
2015-06-08 7:51 ` Eric Auger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1433538892.2477.24.camel@freescale.com \
--to=scottwood@freescale.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).