* [PATCH RFC] ioreq-server: handle the lack of a default emulator properly
@ 2014-09-26 15:31 Paul Durrant
2014-09-26 16:23 ` Jan Beulich
0 siblings, 1 reply; 5+ messages in thread
From: Paul Durrant @ 2014-09-26 15:31 UTC (permalink / raw)
To: xen-devel; +Cc: Paul Durrant, Keir Fraser, Jan Beulich
I started porting QEMU over to use the new ioreq server API and hit a
problem with PCI bus enumeration. Because, with my patches, QEMU only
registers to handle config space accesses for the PCI device it implements
all other attempts by the guest to access 0xcfc go nowhere and this was
causing the vcpu to wedge up because nothing was completing the I/O.
This patch introduces an I/O completion handler into the hypervisor for the
case where no ioreq server matches a particular request. Read requests are
completed with 0xf's in the data buffer, writes and all other I/O req types
are ignored.
Signed-off-by: Paul Durrant <paul.durrant@citrix.com>
Cc: Keir Fraser <keir@xen.org>
Cc: Jan Beulich <jbeulich@suse.com>
---
This fix should probably go in 4.5 but this patch is RFC for the moment
because of uncertainty about what to do for unemulated MMIO accesses.
Originally I forced a domain crash in this case, but hvmloader actually
hit the crash because the code that deals with building the ACPI TPM
info reads from 0xFED40F00 looking for a signature value and there is
nothing backing this access in my configuration. So, the question is
whether to whitelist this access in some way or make building that
table optional in some way so that it is only invoked if an emulated
TPM is definitely present.
xen/arch/x86/hvm/hvm.c | 41 ++++++++++++++++++++++++++++++++++++++---
1 file changed, 38 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index bb45593..5d653d8 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -2386,8 +2386,7 @@ static struct hvm_ioreq_server *hvm_select_ioreq_server(struct domain *d,
if ( list_empty(&d->arch.hvm_domain.ioreq_server.list) )
return NULL;
- if ( list_is_singular(&d->arch.hvm_domain.ioreq_server.list) ||
- (p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO) )
+ if ( p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO )
return d->arch.hvm_domain.default_ioreq_server;
cf8 = d->arch.hvm_domain.pci_cf8;
@@ -2618,12 +2617,48 @@ bool_t hvm_send_assist_req_to_ioreq_server(struct hvm_ioreq_server *s,
return 0;
}
+static bool_t hvm_complete_assist_req(ioreq_t *p)
+{
+ switch (p->type)
+ {
+ case IOREQ_TYPE_COPY:
+ gdprintk(XENLOG_WARNING, "unemulated MMIO (%s %d bytes @ %lx) %u reps\n",
+ (p->dir == IOREQ_READ) ? "read" : "write",
+ p->size,
+ p->addr,
+ p->count);
+ /* FALLTHRU */
+ case IOREQ_TYPE_PIO:
+ if ( p->dir == IOREQ_READ )
+ {
+ if ( !p->data_is_ptr )
+ p->data = ~0ul;
+ else
+ {
+ int i, sign = p->df ? -1 : 1;
+ uint32_t data = ~0;
+
+ for ( i = 0; i < p->count; i++ )
+ hvm_copy_to_guest_phys(p->data + sign * i * p->size, &data,
+ p->size);
+ }
+ }
+ /* FALLTHRU */
+ default:
+ p->state = STATE_IORESP_READY;
+ hvm_io_assist(p);
+ break;
+ }
+
+ return 1;
+}
+
bool_t hvm_send_assist_req(ioreq_t *p)
{
struct hvm_ioreq_server *s = hvm_select_ioreq_server(current->domain, p);
if ( !s )
- return 0;
+ return hvm_complete_assist_req(p);
return hvm_send_assist_req_to_ioreq_server(s, p);
}
--
1.7.10.4
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH RFC] ioreq-server: handle the lack of a default emulator properly
2014-09-26 15:31 [PATCH RFC] ioreq-server: handle the lack of a default emulator properly Paul Durrant
@ 2014-09-26 16:23 ` Jan Beulich
2014-09-29 8:59 ` Paul Durrant
0 siblings, 1 reply; 5+ messages in thread
From: Jan Beulich @ 2014-09-26 16:23 UTC (permalink / raw)
To: Paul Durrant; +Cc: Keir Fraser, xen-devel
>>> On 26.09.14 at 17:31, <paul.durrant@citrix.com> wrote:
> This fix should probably go in 4.5 but this patch is RFC for the moment
> because of uncertainty about what to do for unemulated MMIO accesses.
> Originally I forced a domain crash in this case, but hvmloader actually
> hit the crash because the code that deals with building the ACPI TPM
> info reads from 0xFED40F00 looking for a signature value and there is
> nothing backing this access in my configuration. So, the question is
> whether to whitelist this access in some way or make building that
> table optional in some way so that it is only invoked if an emulated
> TPM is definitely present.
I think in the sense of acting like real hardware, having a definite
point to complete such I/O is quite desirable, as opposed to killing
the guest.
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -2386,8 +2386,7 @@ static struct hvm_ioreq_server *hvm_select_ioreq_server(struct domain *d,
> if ( list_empty(&d->arch.hvm_domain.ioreq_server.list) )
> return NULL;
>
> - if ( list_is_singular(&d->arch.hvm_domain.ioreq_server.list) ||
> - (p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO) )
> + if ( p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO )
I'm having some trouble understanding the reason for this change.
Jan
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH RFC] ioreq-server: handle the lack of a default emulator properly
2014-09-26 16:23 ` Jan Beulich
@ 2014-09-29 8:59 ` Paul Durrant
2014-09-29 9:28 ` Jan Beulich
0 siblings, 1 reply; 5+ messages in thread
From: Paul Durrant @ 2014-09-29 8:59 UTC (permalink / raw)
To: Jan Beulich; +Cc: Keir (Xen.org), xen-devel@lists.xen.org
> -----Original Message-----
> From: Jan Beulich [mailto:JBeulich@suse.com]
> Sent: 26 September 2014 17:23
> To: Paul Durrant
> Cc: xen-devel@lists.xen.org; Keir (Xen.org)
> Subject: Re: [PATCH RFC] ioreq-server: handle the lack of a default emulator
> properly
>
> >>> On 26.09.14 at 17:31, <paul.durrant@citrix.com> wrote:
> > This fix should probably go in 4.5 but this patch is RFC for the moment
> > because of uncertainty about what to do for unemulated MMIO accesses.
> > Originally I forced a domain crash in this case, but hvmloader actually
> > hit the crash because the code that deals with building the ACPI TPM
> > info reads from 0xFED40F00 looking for a signature value and there is
> > nothing backing this access in my configuration. So, the question is
> > whether to whitelist this access in some way or make building that
> > table optional in some way so that it is only invoked if an emulated
> > TPM is definitely present.
>
> I think in the sense of acting like real hardware, having a definite
> point to complete such I/O is quite desirable, as opposed to killing
> the guest.
Ok. The doubt was around the fact that on bare metal an unhandled MMIO would normally cause an MCE (by way of a bus error).
>
> > --- a/xen/arch/x86/hvm/hvm.c
> > +++ b/xen/arch/x86/hvm/hvm.c
> > @@ -2386,8 +2386,7 @@ static struct hvm_ioreq_server
> *hvm_select_ioreq_server(struct domain *d,
> > if ( list_empty(&d->arch.hvm_domain.ioreq_server.list) )
> > return NULL;
> >
> > - if ( list_is_singular(&d->arch.hvm_domain.ioreq_server.list) ||
> > - (p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO) )
> > + if ( p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO )
>
> I'm having some trouble understanding the reason for this change.
>
The implication that list_is_singular -> 'singular ioreq server is default' is wrong; it was an 'optimization' too far. Now that I have QEMU ported, in my tests it is the only emulator but it is not a default emulator (because it registers explicit ranges).
Paul
> Jan
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH RFC] ioreq-server: handle the lack of a default emulator properly
2014-09-29 8:59 ` Paul Durrant
@ 2014-09-29 9:28 ` Jan Beulich
2014-09-29 9:33 ` Paul Durrant
0 siblings, 1 reply; 5+ messages in thread
From: Jan Beulich @ 2014-09-29 9:28 UTC (permalink / raw)
To: Paul Durrant; +Cc: Keir (Xen.org), xen-devel@lists.xen.org
>>> On 29.09.14 at 10:59, <Paul.Durrant@citrix.com> wrote:
>> -----Original Message-----
>> From: Jan Beulich [mailto:JBeulich@suse.com]
>> Sent: 26 September 2014 17:23
>> To: Paul Durrant
>> Cc: xen-devel@lists.xen.org; Keir (Xen.org)
>> Subject: Re: [PATCH RFC] ioreq-server: handle the lack of a default emulator
>> properly
>>
>> >>> On 26.09.14 at 17:31, <paul.durrant@citrix.com> wrote:
>> > This fix should probably go in 4.5 but this patch is RFC for the moment
>> > because of uncertainty about what to do for unemulated MMIO accesses.
>> > Originally I forced a domain crash in this case, but hvmloader actually
>> > hit the crash because the code that deals with building the ACPI TPM
>> > info reads from 0xFED40F00 looking for a signature value and there is
>> > nothing backing this access in my configuration. So, the question is
>> > whether to whitelist this access in some way or make building that
>> > table optional in some way so that it is only invoked if an emulated
>> > TPM is definitely present.
>>
>> I think in the sense of acting like real hardware, having a definite
>> point to complete such I/O is quite desirable, as opposed to killing
>> the guest.
>
> Ok. The doubt was around the fact that on bare metal an unhandled MMIO would
> normally cause an MCE (by way of a bus error).
Hmm, no, I don't think so, particularly on x86: Together with the
chipset, all transactions should have an instance completing them.
And I don't think MCEs would be the way to signal failure thereof.
All this may be different on other architectures, but x86's heritage
is that you can access any "unused" memory location without
causing the machine to lock up (other than e.g. on ia64).
>> > --- a/xen/arch/x86/hvm/hvm.c
>> > +++ b/xen/arch/x86/hvm/hvm.c
>> > @@ -2386,8 +2386,7 @@ static struct hvm_ioreq_server
>> *hvm_select_ioreq_server(struct domain *d,
>> > if ( list_empty(&d->arch.hvm_domain.ioreq_server.list) )
>> > return NULL;
>> >
>> > - if ( list_is_singular(&d->arch.hvm_domain.ioreq_server.list) ||
>> > - (p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO) )
>> > + if ( p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO )
>>
>> I'm having some trouble understanding the reason for this change.
>>
>
> The implication that list_is_singular -> 'singular ioreq server is default' is
> wrong; it was an 'optimization' too far. Now that I have QEMU ported, in my
> tests it is the only emulator but it is not a default emulator (because it
> registers explicit ranges).
Ah, that makes sense of course. In which case I'm fine with the
patch as is.
Jan
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH RFC] ioreq-server: handle the lack of a default emulator properly
2014-09-29 9:28 ` Jan Beulich
@ 2014-09-29 9:33 ` Paul Durrant
0 siblings, 0 replies; 5+ messages in thread
From: Paul Durrant @ 2014-09-29 9:33 UTC (permalink / raw)
To: Jan Beulich; +Cc: Keir (Xen.org), xen-devel@lists.xen.org
> -----Original Message-----
> From: Jan Beulich [mailto:JBeulich@suse.com]
> Sent: 29 September 2014 10:28
> To: Paul Durrant
> Cc: xen-devel@lists.xen.org; Keir (Xen.org)
> Subject: RE: [PATCH RFC] ioreq-server: handle the lack of a default emulator
> properly
>
> >>> On 29.09.14 at 10:59, <Paul.Durrant@citrix.com> wrote:
> >> -----Original Message-----
> >> From: Jan Beulich [mailto:JBeulich@suse.com]
> >> Sent: 26 September 2014 17:23
> >> To: Paul Durrant
> >> Cc: xen-devel@lists.xen.org; Keir (Xen.org)
> >> Subject: Re: [PATCH RFC] ioreq-server: handle the lack of a default
> emulator
> >> properly
> >>
> >> >>> On 26.09.14 at 17:31, <paul.durrant@citrix.com> wrote:
> >> > This fix should probably go in 4.5 but this patch is RFC for the moment
> >> > because of uncertainty about what to do for unemulated MMIO
> accesses.
> >> > Originally I forced a domain crash in this case, but hvmloader actually
> >> > hit the crash because the code that deals with building the ACPI TPM
> >> > info reads from 0xFED40F00 looking for a signature value and there is
> >> > nothing backing this access in my configuration. So, the question is
> >> > whether to whitelist this access in some way or make building that
> >> > table optional in some way so that it is only invoked if an emulated
> >> > TPM is definitely present.
> >>
> >> I think in the sense of acting like real hardware, having a definite
> >> point to complete such I/O is quite desirable, as opposed to killing
> >> the guest.
> >
> > Ok. The doubt was around the fact that on bare metal an unhandled MMIO
> would
> > normally cause an MCE (by way of a bus error).
>
> Hmm, no, I don't think so, particularly on x86: Together with the
> chipset, all transactions should have an instance completing them.
> And I don't think MCEs would be the way to signal failure thereof.
> All this may be different on other architectures, but x86's heritage
> is that you can access any "unused" memory location without
> causing the machine to lock up (other than e.g. on ia64).
>
Ok, I'll drop the warning printk then.
> >> > --- a/xen/arch/x86/hvm/hvm.c
> >> > +++ b/xen/arch/x86/hvm/hvm.c
> >> > @@ -2386,8 +2386,7 @@ static struct hvm_ioreq_server
> >> *hvm_select_ioreq_server(struct domain *d,
> >> > if ( list_empty(&d->arch.hvm_domain.ioreq_server.list) )
> >> > return NULL;
> >> >
> >> > - if ( list_is_singular(&d->arch.hvm_domain.ioreq_server.list) ||
> >> > - (p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO) )
> >> > + if ( p->type != IOREQ_TYPE_COPY && p->type != IOREQ_TYPE_PIO )
> >>
> >> I'm having some trouble understanding the reason for this change.
> >>
> >
> > The implication that list_is_singular -> 'singular ioreq server is default' is
> > wrong; it was an 'optimization' too far. Now that I have QEMU ported, in
> my
> > tests it is the only emulator but it is not a default emulator (because it
> > registers explicit ranges).
>
> Ah, that makes sense of course. In which case I'm fine with the
> patch as is.
>
Cool. I'll resubmit non-RFC without the printk.
Thanks,
Paul
> Jan
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2014-09-29 9:33 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-09-26 15:31 [PATCH RFC] ioreq-server: handle the lack of a default emulator properly Paul Durrant
2014-09-26 16:23 ` Jan Beulich
2014-09-29 8:59 ` Paul Durrant
2014-09-29 9:28 ` Jan Beulich
2014-09-29 9:33 ` Paul Durrant
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).