qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] [BUG]Unassigned mem write during pci device hot-plug


From: xuyandong
Subject: Re: [Qemu-devel] [BUG]Unassigned mem write during pci device hot-plug
Date: Mon, 7 Jan 2019 15:28:36 +0000


> -----Original Message-----
> From: Michael S. Tsirkin [mailto:address@hidden
> Sent: Monday, January 07, 2019 11:06 PM
> To: xuyandong <address@hidden>
> Cc: address@hidden; Paolo Bonzini <address@hidden>; qemu-
> address@hidden; Zhanghailiang <address@hidden>;
> wangxin (U) <address@hidden>; Huangweidong (C)
> <address@hidden>
> Subject: Re: [BUG]Unassigned mem write during pci device hot-plug
> 
> On Mon, Jan 07, 2019 at 02:37:17PM +0000, xuyandong wrote:
> > > > > > > > > > > > Hi all,
> > > > > > > > > > > >
> > > > > > > > > > > >
> > > > > > > > > > > >
> > > > > > > > > > > > In our test, we configured VM with several
> > > > > > > > > > > > pci-bridges and a virtio-net nic been attached
> > > > > > > > > > > > with bus 4,
> > > > > > > > > > > >
> > > > > > > > > > > > After VM is startup, We ping this nic from host to
> > > > > > > > > > > > judge if it is working normally. Then, we hot add
> > > > > > > > > > > > pci devices to this VM with bus
> > > > > > > 0.
> > > > > > > > > > > >
> > > > > > > > > > > > We  found the virtio-net NIC in bus 4 is not
> > > > > > > > > > > > working (can not
> > > > > > > > > > > > connect) occasionally, as it kick virtio backend
> > > > > > > > > > > > failure with error
> >
> > > > > > But I have another question, if we only fix this problem in
> > > > > > the kernel, the Linux version that has been released does not
> > > > > > work well on the
> > > > > virtualization platform.
> > > > > > Is there a way to fix this problem in the backend?
> >
> > Hi Michael,
> >
> > If we want to fix this problem on the backend, it is not enough to
> > consider only PCI device hot plugging, because I found that if we use
> > a command like "echo 1 > /sys/bus/pci/rescan" in guest, this problem is very
> easy to reproduce.
> >
> > From the perspective of device emulation, when guest writes 0xffffffff
> > to the BAR, guest just want to get the size of the region but not really
> updating the address space.
> > So I made the following patch to avoid  update pci mapping.
> >
> > Do you think this make sense?
> >
> > [PATCH] pci: avoid update pci mapping when writing 0xFFFF FFFF to BAR
> >
> > When guest writes 0xffffffff to the BAR, guest just want to get the
> > size of the region but not really updating the address space.
> > So when guest writes 0xffffffff to BAR, we need avoid
> > pci_update_mappings or pci_bridge_update_mappings.
> >
> > Signed-off-by: xuyandong <address@hidden>
> 
> I see how that will address the common case however there are a bunch of
> issues here.  First of all it's easy to trigger the update by some other 
> action like
> VM migration.  More importantly it's just possible that guest actually does 
> want
> to set the low 32 bit of the address to all ones.  For example, that is 
> clearly
> listed as a way to disable all devices behind the bridge in the pci to pci 
> bridge
> spec.

Ok, I see. If I only skip upate when guest writing 0xFFFFFFFF to Prefetcable 
Base Upper 32 Bits
to meet the kernel double check problem.
Do you think there is still risk?

> 
> Given upstream is dragging it's feet I'm open to adding a flag that will help
> keep guests going as a temporary measure.
> We will need to think about ways to restrict this as much as we can.
> 
> 
> > ---
> >  hw/pci/pci.c        | 6 ++++--
> >  hw/pci/pci_bridge.c | 8 +++++---
> >  2 files changed, 9 insertions(+), 5 deletions(-)
> >
> > diff --git a/hw/pci/pci.c b/hw/pci/pci.c index 56b13b3..ef368e1 100644
> > --- a/hw/pci/pci.c
> > +++ b/hw/pci/pci.c
> > @@ -1361,6 +1361,7 @@ void pci_default_write_config(PCIDevice *d,
> > uint32_t addr, uint32_t val_in, int  {
> >      int i, was_irq_disabled = pci_irq_disabled(d);
> >      uint32_t val = val_in;
> > +    uint64_t barmask = (1 << l*8) - 1;
> >
> >      for (i = 0; i < l; val >>= 8, ++i) {
> >          uint8_t wmask = d->wmask[addr + i]; @@ -1369,9 +1370,10 @@
> > void pci_default_write_config(PCIDevice *d, uint32_t addr, uint32_t val_in,
> int
> >          d->config[addr + i] = (d->config[addr + i] & ~wmask) | (val & 
> > wmask);
> >          d->config[addr + i] &= ~(val & w1cmask); /* W1C: Write 1 to Clear 
> > */
> >      }
> > -    if (ranges_overlap(addr, l, PCI_BASE_ADDRESS_0, 24) ||
> > +    if ((val_in != barmask &&
> > +   (ranges_overlap(addr, l, PCI_BASE_ADDRESS_0, 24) ||
> >          ranges_overlap(addr, l, PCI_ROM_ADDRESS, 4) ||
> > -        ranges_overlap(addr, l, PCI_ROM_ADDRESS1, 4) ||
> > +        ranges_overlap(addr, l, PCI_ROM_ADDRESS1, 4))) ||
> >          range_covers_byte(addr, l, PCI_COMMAND))
> >          pci_update_mappings(d);
> >
> > diff --git a/hw/pci/pci_bridge.c b/hw/pci/pci_bridge.c index
> > ee9dff2..f2bad79 100644
> > --- a/hw/pci/pci_bridge.c
> > +++ b/hw/pci/pci_bridge.c
> > @@ -253,17 +253,19 @@ void pci_bridge_write_config(PCIDevice *d,
> >      PCIBridge *s = PCI_BRIDGE(d);
> >      uint16_t oldctl = pci_get_word(d->config + PCI_BRIDGE_CONTROL);
> >      uint16_t newctl;
> > +    uint64_t barmask = (1 << len * 8) - 1;
> >
> >      pci_default_write_config(d, address, val, len);
> >
> >      if (ranges_overlap(address, len, PCI_COMMAND, 2) ||
> >
> > -        /* io base/limit */
> > -        ranges_overlap(address, len, PCI_IO_BASE, 2) ||
> > +        (val != barmask &&
> > +   /* io base/limit */
> > +        (ranges_overlap(address, len, PCI_IO_BASE, 2) ||
> >
> >          /* memory base/limit, prefetchable base/limit and
> >             io base/limit upper 16 */
> > -        ranges_overlap(address, len, PCI_MEMORY_BASE, 20) ||
> > +        ranges_overlap(address, len, PCI_MEMORY_BASE, 20))) ||
> >
> >          /* vga enable */
> >          ranges_overlap(address, len, PCI_BRIDGE_CONTROL, 2)) {
> > --
> > 1.8.3.1
> >
> >
> >

reply via email to

[Prev in Thread] Current Thread [Next in Thread]