qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
* [Qemu-devel] [PATCH v2] pci: relax pci_msi_get_message()
@ 2016-11-22  8:08 Peter Xu
  2016-11-24  5:29 ` Peter Xu
  2016-11-25  4:11 ` Michael S. Tsirkin
  0 siblings, 2 replies; 9+ messages in thread
From: Peter Xu @ 2016-11-22  8:08 UTC (permalink / raw)
  To: qemu-devel; +Cc: mst, peterx, david

We are very strict in the past getting MSIs from commit
d1f6af6a1 ("kvm-irqchip: simplify kvm_irqchip_add_msi_route"), assuming
that MSI should be configured before hand when fetching. When we have
unrecognized configurations, we panic the system. However looks like
this is too strict to be working on some platform, and issues occured.
Firstly it's found on a ppc case and fixed by David in:

  6d17a01 vfio/pci: Fix regression in MSI routing configuration

However we encountered another case now with windows virtio driver and
reported (and possibly more):

  http://bugs.debian.org/844361

To make every driver/hardware happy, let's loosen the rule and go back
to the original behavior - instead of panic the system, when we try to
fetch MSI without configured MSI/MSI-X system, we just provide an empty
message to make drivers happy.

Reported-by: Maciej Kotliński <makotlinski@gmail.com>
Signed-off-by: Peter Xu <peterx@redhat.com>
---
 hw/pci/pci.c | 8 +++++---
 1 file changed, 5 insertions(+), 3 deletions(-)

diff --git a/hw/pci/pci.c b/hw/pci/pci.c
index 24fae16..0cd2bb0 100644
--- a/hw/pci/pci.c
+++ b/hw/pci/pci.c
@@ -2606,9 +2606,11 @@ MSIMessage pci_get_msi_message(PCIDevice *dev, int vector)
     } else if (msi_enabled(dev)) {
         msg = msi_get_message(dev, vector);
     } else {
-        /* Should never happen */
-        error_report("%s: unknown interrupt type", __func__);
-        abort();
+        /*
+         * Device is not configured with MSI/MSI-X yet, let's provide
+         * an empty message to make all device drivers happy.
+         */
+        memset(&msg, 0, sizeof(msg));
     }
     return msg;
 }
-- 
2.7.4

^ permalink raw reply related	[flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH v2] pci: relax pci_msi_get_message()
@ 2016-11-25  5:53 Changlimin
  0 siblings, 0 replies; 9+ messages in thread
From: Changlimin @ 2016-11-25  5:53 UTC (permalink / raw)
  To: peterx@redhat.com; +Cc: qemu-devel@nongnu.org

-device pci-assign,configfd=30,host=05:00.0,id=hostdev0,bus=pci.0,addr=0x3
KVM pci-assign is configured, maybe the same reason as
http://lists.nongnu.org/archive/html/qemu-devel/2016-11/msg04668.html
please try the patch inside it.

Chang limin


On Fri, Nov 25, 2016 at 06:11:01AM +0200, Michael S. Tsirkin wrote:

> On Tue, Nov 22, 2016 at 04:08:50PM +0800, Peter Xu wrote:

> > We are very strict in the past getting MSIs from commit

> > d1f6af6a1 ("kvm-irqchip: simplify kvm_irqchip_add_msi_route"), assuming

> > that MSI should be configured before hand when fetching. When we have

> > unrecognized configurations, we panic the system. However looks like

> > this is too strict to be working on some platform, and issues occured.

> > Firstly it's found on a ppc case and fixed by David in:

> >

> >   6d17a01 vfio/pci: Fix regression in MSI routing configuration

> >

> > However we encountered another case now with windows virtio driver and

> > reported (and possibly more):

> >

> >   http://bugs.debian.org/844361

> >

> > To make every driver/hardware happy, let's loosen the rule and go back

> > to the original behavior - instead of panic the system, when we try to

> > fetch MSI without configured MSI/MSI-X system, we just provide an empty

> > message to make drivers happy.

> >

> > Reported-by: Maciej Kotliński <address@hidden>

> > Signed-off-by: Peter Xu <address@hidden>

> > ---

> >  hw/pci/pci.c | 8 +++++---

> >  1 file changed, 5 insertions(+), 3 deletions(-)

> >

> > diff --git a/hw/pci/pci.c b/hw/pci/pci.c

> > index 24fae16..0cd2bb0 100644

> > --- a/hw/pci/pci.c

> > +++ b/hw/pci/pci.c

> > @@ -2606,9 +2606,11 @@ MSIMessage pci_get_msi_message(PCIDevice *dev, int

> > vector)

> >      } else if (msi_enabled(dev)) {

> >          msg = msi_get_message(dev, vector);

> >      } else {

> > -        /* Should never happen */

> > -        error_report("%s: unknown interrupt type", __func__);

> > -        abort();

> > +        /*

> > +         * Device is not configured with MSI/MSI-X yet, let's provide

> > +         * an empty message to make all device drivers happy.

> > +         */

> > +        memset(&msg, 0, sizeof(msg));

> >      }

> >      return msg;

> >  }

>

> Looks like a hack to me. Even if callers happen to treat

> 0 message as a nop, there's no guarantee that's true for

> all platforms. Pls change pci_get_msi_message to

> return an error code, and fix callers to check that.



Actually I'd say I still cannot understand why some guests will

encounter this issue - the driver just tries to fetch and enable

MSI/MSI-X messages without fully activate MSI/MSI-X in general (that's

why msi_enabled() and msix_enabled() both returned false).



But indeed some drivers won't work properly after commit d1f6af6a.

David fixed some case for ppc and vfio (6d17a01), but problem still

exist, like Debian's report (http://bugs.debian.org/844361).



To avoid going into every details of guest drivers, I was thinking

maybe we can just "recover" the behavior to the past: old QEMU (before

d1f6af6a) allows to fetch an meaningless message (e.g., when

msi_get_message() is called, it's possible that MSI is still not

setup, but IMHO that message is meaningless). So here we emulate that

case, and return a meaningless message. From the Debian bug report, we

can see that this does solve the issue (yeah I know this is not even

an excuse to agree on this patch, but again I just think this is

currently the best way to solve the problem...).



If we change this into return error, then kvm_irqchip_add_msi_route()

might fail, and that's a different behavior again, I don't know

whether it'll bring more troubles (only if I can test every guest

driver with that code, but that's merely impossible). So IMHO the best

way to solve the problem is use the current patch and try to keep the

old behavior.



I would really appreciate if you (or anyone) has better suggestion.



Thanks,



-- peterx

-------------------------------------------------------------------------------------------------------------------------------------
本邮件及其附件含有杭州华三通信技术有限公司的保密信息,仅限于发送给上面地址中列出
的个人或群组。禁止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、
或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本
邮件!
This e-mail and its attachments contain confidential information from H3C, which is
intended only for the person or entity whose address is listed above. Any use of the
information contained herein in any way (including, but not limited to, total or partial
disclosure, reproduction, or dissemination) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender
by phone or email immediately and delete it!

^ permalink raw reply	[flat|nested] 9+ messages in thread
* Re: [Qemu-devel] [PATCH v2] pci: relax pci_msi_get_message()
@ 2016-11-25  6:03 Changlimin
  2016-11-25  6:31 ` Peter Xu
  0 siblings, 1 reply; 9+ messages in thread
From: Changlimin @ 2016-11-25  6:03 UTC (permalink / raw)
  To: peterx@redhat.com; +Cc: qemu-devel@nongnu.org

update the link

-device pci-assign,configfd=30,host=05:00.0,id=hostdev0,bus=pci.0,addr=0x3
KVM pci-assign is configured, maybe the same reason as
http://lists.nongnu.org/archive/html/qemu-devel/2016-11/msg04649.html
please try the patch inside it.

Chang limin

-------------------------------------------------------------------------------------------------------------------------------------
本邮件及其附件含有杭州华三通信技术有限公司的保密信息,仅限于发送给上面地址中列出
的个人或群组。禁止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、
或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本
邮件!
This e-mail and its attachments contain confidential information from H3C, which is
intended only for the person or entity whose address is listed above. Any use of the
information contained herein in any way (including, but not limited to, total or partial
disclosure, reproduction, or dissemination) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender
by phone or email immediately and delete it!

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2016-11-25  7:06 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-22  8:08 [Qemu-devel] [PATCH v2] pci: relax pci_msi_get_message() Peter Xu
2016-11-24  5:29 ` Peter Xu
2016-11-25  4:11 ` Michael S. Tsirkin
2016-11-25  5:28   ` Peter Xu
2016-11-25  6:47     ` Michael S. Tsirkin
2016-11-25  7:05       ` Peter Xu
  -- strict thread matches above, loose matches on Subject: below --
2016-11-25  5:53 Changlimin
2016-11-25  6:03 Changlimin
2016-11-25  6:31 ` Peter Xu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).