All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Roger Pau Monné" <roger.pau@citrix.com>
To: Laszlo Ersek <lersek@redhat.com>
Cc: Igor Druzhinin <igor.druzhinin@citrix.com>,
	ard.biesheuvel@linaro.org, jordan.l.justen@intel.com,
	edk2-devel@lists.01.org, Ray Ni <ray.ni@intel.com>,
	julien.grall@arm.com, anthony.perard@citrix.com,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH RESEND 1/3] OvmfPkg/XenSupport: remove usage of prefetchable PCI host bridge aperture
Date: Sun, 24 Mar 2019 12:50:53 +0900	[thread overview]
Message-ID: <20190324035053.xs3yccnpmn5dy6cl@MacBook-Air-de-Roger.local> (raw)
In-Reply-To: <7b8b9559-6479-9ee0-5b5a-300b43606669@redhat.com>

On Fri, Mar 22, 2019 at 10:06:45AM +0100, Laszlo Ersek wrote:
> On 03/22/19 09:33, Roger Pau Monné wrote:
> > On Wed, Mar 06, 2019 at 12:40:54PM +0000, Igor Druzhinin wrote:
> >> This aperture doesn't exist in OVMF and trying to use it causes
> >> failing assertions later in cases there are prefetchable and
> >> non-prefetchable BARs following each other. This configuration is
> >> quite likely with some PCI passthrough devices.
> > 
> > According to the PCIe spec, it's fine to place prefetchable BARs in
> > non-prefetchable memory space. There's a note that says that most
> > implementations will only have 1G of non-prefetchable memory, and
> > that most scalable platforms will map 32bit BARs into
> > non-prefetchable memory regardless of the prefetchable bit value.
> > 
> > Shouldn't OVMF be fine with finding both prefetchable and
> > non-prefetchable BARs, as long as the memory region is set to
> > non-prefetchable?
> > 
> > Does OVMF have the capability to position BARs by itself? If so we
> > could skip of the placement done by hvmloader and just let OVMF
> > position things where it see fit.
> 
> The core PciBusDxe driver that is built into OVMF certainly does the
> resource allocation/placement, but when OVMF is executed on Xen, this
> functionality of PciBusDxe is dynamically disabled by setting
> PcdPciDisableBusEnumeration to TRUE. (I'm not saying this is right vs.
> wrong, just that it happens.)
> 
> Note that OVMF itself checks PcdPciDisableBusEnumeration for many things
> (just grep OvmfPkg to see), so if we were to flip the PCD while running
> on Xen, it would change the behavior of OVMF on Xen in a number of
> areas. Can't offer a deeper treatise for now; all the related source
> code locations would have to be audited (likely with "git blame" too).
> 
> Now, if PciBusDxe *is* allowed/requested to lay out the BARs, through
> the PCD, then it (indirectly) depends on platform code to provide the
> resource apertures -- of the root bridges -- out of which it can
> allocate the BARs. My understanding is that XenSupport.c tries to detect
> these apertures "retroactively", from the pre-existing BAR placements.
> This was contributed by Ray in commit 49effaf26ec9
> ("OvmfPkg/PciHostBridgeLib: Scan for root bridges when running over
> Xen", 2016-05-11), so I'll have to defer to him on the code.
> 
> I believe that, if we flipped the PCD to FALSE on Xen, and hvmloader
> would stop pre-configuring the BARs (or OVMF would simply ignore that
> pre-config), then this code (XenSupport.c) should be possible to
> eliminate -- *however*, in that case, some other Xen-specific code would
> become necessary, to expose the root bridge resource apertures (out of
> which BARs should be allocated by PciBusDxe, see above).
> 
> In QEMU's case: all root bridges share the same apertures between each
> other (given any specific resource type). They are communicated via
> dynamic PCDs. The 32-bit MMIO aperture PCDs are set in PlatformPei
> somewhat simply (based on QEMU machine type, IIRC). The 64-bit MMIO
> aperture PCDs are also calculated in PlatformPei, but that calculation
> is a *lot* more complex.
> 
> All in all, the "root" information is the set of apertures, i.e. what
> parts of the GPA space can be used for what resource allocation.

Thanks for the detailed explanation. IMO it would be better to let
OVMF do the BAR placement instead of having to do it in hvmloader,
this just causes code duplication between projects and there's nothing
Xen-specific about the PCI resource allocation.

I will try to find some time to look into this, albeit I'm not going
to be able to work in this immediately. I'm more than happy if someone
else has spare time and wants to pick this up.

Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  parent reply	other threads:[~2019-03-24  3:51 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-03-06 12:40 [PATCH RESEND 0/3] Xen PCI passthrough fixes Igor Druzhinin
2019-03-06 12:40 ` [PATCH RESEND 1/3] OvmfPkg/XenSupport: remove usage of prefetchable PCI host bridge aperture Igor Druzhinin
2019-03-14 17:41   ` Anthony PERARD
2019-03-14 19:45     ` Igor Druzhinin
2019-03-19 14:03       ` Anthony PERARD
2019-03-20 11:15         ` Laszlo Ersek
2019-03-22  8:33   ` Roger Pau Monné
2019-03-22  9:06     ` Laszlo Ersek
     [not found]     ` <7b8b9559-6479-9ee0-5b5a-300b43606669@redhat.com>
2019-03-24  3:50       ` Roger Pau Monné [this message]
2019-03-25 14:32         ` Igor Druzhinin
2019-03-06 12:40 ` [PATCH RESEND 2/3] OvmfPkg/XenSupport: use a correct PCI host bridge aperture for BAR64 Igor Druzhinin
2019-03-14 17:44   ` Anthony PERARD
2019-03-06 12:40 ` [PATCH RESEND 3/3] OvmfPkg/XenSupport: turn off address decoding before BAR sizing Igor Druzhinin
2019-03-06 13:22   ` Laszlo Ersek
     [not found]   ` <e8cdf4a2-b02b-daa7-4301-803fb1e0086d@redhat.com>
2019-03-06 14:26     ` Igor Druzhinin
2019-03-06 17:39       ` Laszlo Ersek
2019-03-14 17:55   ` Anthony PERARD
2019-03-14 20:09     ` Igor Druzhinin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190324035053.xs3yccnpmn5dy6cl@MacBook-Air-de-Roger.local \
    --to=roger.pau@citrix.com \
    --cc=anthony.perard@citrix.com \
    --cc=ard.biesheuvel@linaro.org \
    --cc=edk2-devel@lists.01.org \
    --cc=igor.druzhinin@citrix.com \
    --cc=jordan.l.justen@intel.com \
    --cc=julien.grall@arm.com \
    --cc=lersek@redhat.com \
    --cc=ray.ni@intel.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.