diff mbox

pci-assign: Do not reset the device unless the kernel supports it

Message ID 1307472373.5901.33.camel@x201 (mailing list archive)
State New, archived
Headers show

Commit Message

Alex Williamson June 7, 2011, 6:46 p.m. UTC
On Tue, 2011-06-07 at 10:14 +0200, Jan Kiszka wrote:
> On 2011-06-07 10:06, Avi Kivity wrote:
> > On 06/07/2011 01:04 AM, Jan Kiszka wrote:
> >> On 2011-06-06 23:48, Alex Williamson wrote:
> >> >  On Mon, 2011-06-06 at 23:30 +0200, Jan Kiszka wrote:
> >> >>  From: Jan Kiszka<jan.kiszka@siemens.com>
> >> >>
> >> >>  At least kernels 2.6.38 and 2.6.39 do not properly support issuing a
> >> >>  reset on an assigned device and corrupt its config space. Prevent
> >> >>  this by checking for a host kernel with the required support,
> >> tagged by
> >> >>  the to-be-introduced KVM_CAP_DEVICE_RESET.
> >> >
> >> >  Wouldn't it be easier just to revert ed78661f in 2.6.39 stable?  I
> >> guess
> >> >  we don't have an option to do that for .38 since stable is done there,
> >> >  but there are also some intel-iommu breakages that won't make
> >> stable for
> >> >  that release.  It seems like the userspace invoked reset resolves
> >> known,
> >> >  demonstrable issues of devices continuing to DMA into guest memory
> >> while
> >> >  ed78661f is mostly a theoretical change.
> >>
> >> Easier would be this patch. But I don't mind reverting the problematic
> >> commit in 39, whatever is preferred. We should just resolve the issue
> >> finally.
> > 
> > Kernel problems should be solved in the kernel (with exceptions of
> > course, but don't see the need here).
> 
> Then please file a revert for stable ASAP.

How's this?  For stable only or course.  Thanks,

Alex

Revert "KVM: Save/restore state of assigned PCI device"

From: Alex Williamson <alex.williamson@redhat.com>

This reverts ed78661f2614d3c9f69c23e280db3bafdabdf5bb as it assumes
the saved PCI state will remain valid for the entire length of time
that it is attached to a guest.  This fails when userspace makes use
of the pci-sysfs reset interface, which invalidates the saved device
state, leaving nothing to be restored after the device is reset on
de-assignment.  This leaves the device in an unusable state.

3.0.0 will add an interface for KVM to save the PCI state in a
buffer unaffected by other callers of pci_reset_function(), but the
most appropriate stable fix seems to be reverting this change since
the original assumption about the device saved state persisting is
incorrect.

Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
---

 virt/kvm/assigned-dev.c |    5 +----
 1 files changed, 1 insertions(+), 4 deletions(-)





--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Comments

Jan Kiszka June 8, 2011, 7:52 a.m. UTC | #1
On 2011-06-07 20:46, Alex Williamson wrote:
> On Tue, 2011-06-07 at 10:14 +0200, Jan Kiszka wrote:
>> On 2011-06-07 10:06, Avi Kivity wrote:
>>> On 06/07/2011 01:04 AM, Jan Kiszka wrote:
>>>> On 2011-06-06 23:48, Alex Williamson wrote:
>>>>>  On Mon, 2011-06-06 at 23:30 +0200, Jan Kiszka wrote:
>>>>>>  From: Jan Kiszka<jan.kiszka@siemens.com>
>>>>>>
>>>>>>  At least kernels 2.6.38 and 2.6.39 do not properly support issuing a
>>>>>>  reset on an assigned device and corrupt its config space. Prevent
>>>>>>  this by checking for a host kernel with the required support,
>>>> tagged by
>>>>>>  the to-be-introduced KVM_CAP_DEVICE_RESET.
>>>>>
>>>>>  Wouldn't it be easier just to revert ed78661f in 2.6.39 stable?  I
>>>> guess
>>>>>  we don't have an option to do that for .38 since stable is done there,
>>>>>  but there are also some intel-iommu breakages that won't make
>>>> stable for
>>>>>  that release.  It seems like the userspace invoked reset resolves
>>>> known,
>>>>>  demonstrable issues of devices continuing to DMA into guest memory
>>>> while
>>>>>  ed78661f is mostly a theoretical change.
>>>>
>>>> Easier would be this patch. But I don't mind reverting the problematic
>>>> commit in 39, whatever is preferred. We should just resolve the issue
>>>> finally.
>>>
>>> Kernel problems should be solved in the kernel (with exceptions of
>>> course, but don't see the need here).
>>
>> Then please file a revert for stable ASAP.
> 
> How's this?  For stable only or course.  Thanks,
> 
> Alex
> 
> Revert "KVM: Save/restore state of assigned PCI device"
> 
> From: Alex Williamson <alex.williamson@redhat.com>
> 
> This reverts ed78661f2614d3c9f69c23e280db3bafdabdf5bb as it assumes
> the saved PCI state will remain valid for the entire length of time
> that it is attached to a guest.  This fails when userspace makes use
> of the pci-sysfs reset interface, which invalidates the saved device
> state, leaving nothing to be restored after the device is reset on
> de-assignment.  This leaves the device in an unusable state.
> 
> 3.0.0 will add an interface for KVM to save the PCI state in a

[ It will be called "3.0". :) ]

> buffer unaffected by other callers of pci_reset_function(), but the
> most appropriate stable fix seems to be reverting this change since
> the original assumption about the device saved state persisting is
> incorrect.
> 
> Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
> ---
> 
>  virt/kvm/assigned-dev.c |    5 +----
>  1 files changed, 1 insertions(+), 4 deletions(-)
> 
> 
> diff --git a/virt/kvm/assigned-dev.c b/virt/kvm/assigned-dev.c
> index ae72ae6..e3f1235 100644
> --- a/virt/kvm/assigned-dev.c
> +++ b/virt/kvm/assigned-dev.c
> @@ -197,8 +197,7 @@ static void kvm_free_assigned_device(struct kvm *kvm,
>  {
>  	kvm_free_assigned_irq(kvm, assigned_dev);
>  
> -	__pci_reset_function(assigned_dev->dev);
> -	pci_restore_state(assigned_dev->dev);
> +	pci_reset_function(assigned_dev->dev);
>  
>  	pci_release_regions(assigned_dev->dev);
>  	pci_disable_device(assigned_dev->dev);
> @@ -515,7 +514,6 @@ static int kvm_vm_ioctl_assign_device(struct kvm *kvm,
>  	}
>  
>  	pci_reset_function(dev);
> -	pci_save_state(dev);
>  
>  	match->assigned_dev_id = assigned_dev->assigned_dev_id;
>  	match->host_segnr = assigned_dev->segnr;
> @@ -546,7 +544,6 @@ out:
>  	mutex_unlock(&kvm->lock);
>  	return r;
>  out_list_del:
> -	pci_restore_state(dev);
>  	list_del(&match->list);
>  	pci_release_regions(dev);
>  out_disable:
> 
> 
> 

Acked-by: Jan Kiszka <jan.kiszka@siemens.com>

Jan
Avi Kivity June 9, 2011, 8:10 a.m. UTC | #2
On 06/07/2011 09:46 PM, Alex Williamson wrote:
> Revert "KVM: Save/restore state of assigned PCI device"
>
> From: Alex Williamson<alex.williamson@redhat.com>
>
> This reverts ed78661f2614d3c9f69c23e280db3bafdabdf5bb as it assumes
> the saved PCI state will remain valid for the entire length of time
> that it is attached to a guest.  This fails when userspace makes use
> of the pci-sysfs reset interface, which invalidates the saved device
> state, leaving nothing to be restored after the device is reset on
> de-assignment.  This leaves the device in an unusable state.
>
> 3.0.0 will add an interface for KVM to save the PCI state in a
> buffer unaffected by other callers of pci_reset_function(), but the
> most appropriate stable fix seems to be reverting this change since
> the original assumption about the device saved state persisting is
> incorrect.
>

Thanks, queued for 2.6.39.
diff mbox

Patch

diff --git a/virt/kvm/assigned-dev.c b/virt/kvm/assigned-dev.c
index ae72ae6..e3f1235 100644
--- a/virt/kvm/assigned-dev.c
+++ b/virt/kvm/assigned-dev.c
@@ -197,8 +197,7 @@  static void kvm_free_assigned_device(struct kvm *kvm,
 {
 	kvm_free_assigned_irq(kvm, assigned_dev);
 
-	__pci_reset_function(assigned_dev->dev);
-	pci_restore_state(assigned_dev->dev);
+	pci_reset_function(assigned_dev->dev);
 
 	pci_release_regions(assigned_dev->dev);
 	pci_disable_device(assigned_dev->dev);
@@ -515,7 +514,6 @@  static int kvm_vm_ioctl_assign_device(struct kvm *kvm,
 	}
 
 	pci_reset_function(dev);
-	pci_save_state(dev);
 
 	match->assigned_dev_id = assigned_dev->assigned_dev_id;
 	match->host_segnr = assigned_dev->segnr;
@@ -546,7 +544,6 @@  out:
 	mutex_unlock(&kvm->lock);
 	return r;
 out_list_del:
-	pci_restore_state(dev);
 	list_del(&match->list);
 	pci_release_regions(dev);
 out_disable: