From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0046.outbound.protection.outlook.com [104.47.32.46]) by dpdk.org (Postfix) with ESMTP id F205AFF4 for ; Mon, 8 May 2017 17:20:27 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=CAVIUMNETWORKS.onmicrosoft.com; s=selector1-cavium-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=96g2tPZZO0rx60ecft7iTmMic938Ilv4JK/lYM4X46s=; b=FlIrQDxsK5bDOjvgAneQKxHtHe5iH54A0OMkAMX5YDh8yGdLPSY3l9iXnfbLAeIfZnyT74V79xhwEzu+QWhImlNKkNHK77/irPVdnv+VLVQzbK6+VQDtPS8+EKnf3IuimCnUe8Y7JbT7YzDD+pvRVG0d82vjzt3qJSdtyqDHoqQ= Authentication-Results: monjalon.net; dkim=none (message not signed) header.d=none;monjalon.net; dmarc=none action=none header.from=caviumnetworks.com; Received: from jerin (111.93.218.67) by BLUPR0701MB1714.namprd07.prod.outlook.com (10.163.85.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1075.11; Mon, 8 May 2017 15:20:23 +0000 Date: Mon, 8 May 2017 20:50:07 +0530 From: Jerin Jacob To: Thomas Monjalon Cc: Alejandro Lucero , dev@dpdk.org, "Burakov, Anatoly" Message-ID: <20170508152006.GA28180@jerin> References: <1493203787-25555-1-git-send-email-alejandro.lucero@netronome.com> <1528500.cNnDXbOJL1@xps> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1528500.cNnDXbOJL1@xps> User-Agent: Mutt/1.8.2 (2017-04-18) X-Originating-IP: [111.93.218.67] X-ClientProxiedBy: BM1PR01CA0039.INDPRD01.PROD.OUTLOOK.COM (10.163.199.11) To BLUPR0701MB1714.namprd07.prod.outlook.com (10.163.85.140) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 092ad6c8-e31e-4dd0-922f-08d49625c0a7 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(201703131423075)(201703031133081); SRVR:BLUPR0701MB1714; X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1714; 3:C/jHWvfqs0B2YAeQSplu1CwcCzAnKaB9owbGFSd7yu7e89HVOsOypOc67T9gYbL+y5RzJcHweb4IOi0YuSWdILZSS/Cc2QEQoA7hvgZ/CFKyqvEgc8JS9WG6x0WABUXdany6X6YEqiOA/u4zhKvComw0WQmFe0sh3A6VmaulFYdnqos9eqCMQGmm4vMrWP+2BoQR+HlGntCz+drYtacvo65Fk7+DYF0DKsEFq+TlJ/RWBptZ0JUrnIik5r3wnKve65ziM9fAE+dc6q8DVhJjpBxETcHjWyO6S2ySzXbvIuYaBAXZPM64b5jwp/NIak2KM/FwmggHpRhggAL4Xd6fgA==; 25:MltvveNEM6BFswz5GzfTHpmOzh8YTclM6h0K4tqnH/kyHAiUqUfL9i1mesR6rUrSXDu+xyr6grbxI4ubOHg9g1KtbPczi/XB/MMe4tUt338DRxz96HT+t5lujAolIhrD+VLN8Wk3YUBBjQPTmh0hf6GLGNNRXomZqniQxQbWpxNAIC8tMYUjWvoVGoHzZ4z+aHa9pYQxvQXIZu32OLrQCTh8bz/5mDNS3ZBvJfJPbhufC+cY5uFyFp8IGtJnozWDXoNZBQ0BlStEL1APHo2QlCYFXumtI4f4uyW3Uu4SP9FIJJM4cqbyFAHtPPUAn7NjgWzY9V5ZAgnlHW7dv5vRiH9Y3RRk96VWnMICY+pw9uMWbrIsDBl9lB5T9P3g7mGEdvMZ5Q3vHN7Of5N2x9B33ISPuQMYnMIuelcV9wU4NnUjaV9EdDKYD++x5SYjFoOUFsLbf9Ev60gqCUxHSP5Ptty/OCl3aktAUtrUwfambU8= X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1714; 31:qbXspAuUMZS6WyI+/LwGiqP3d5pl0+u7PdrS9vGeiyI9J/zfDm4T9W8+BeNO5waf3v1+olwcp47/BWwTsmmkftB3GT1gV3imCNsBewqrhthYNdDViEi7rIdI7sSJzVsJ/3Gepbm0MOgwmRjpgQsNYFK++zvp8NG82AtaJQauyNCdlTJ4WjD7z6v8wV33ckByyKC1FQNm9v9zVMm4MuGAPqdDYPmsf88okImRCJ1KP3iq/BQ6MABUsdBXUb2W8aUk6W1Ok4hZ2clALbDOIjL3OIdTJ7zVMawW/WD79UxJQ50=; 20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(228905959029699); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(93006095)(10201501046)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123558100)(20161123562025)(20161123555025)(20161123564025)(6072148); SRVR:BLUPR0701MB1714; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0701MB1714; X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1714; 4: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 X-Forefront-PRVS: 0301360BF5 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6009001)(39840400002)(39410400002)(39850400002)(39450400003)(39400400002)(13464003)(5890100001)(23676002)(33656002)(83506001)(54906002)(2906002)(55016002)(9686003)(4001350100001)(189998001)(2870700001)(50466002)(81166006)(8676002)(6246003)(6496005)(42186005)(25786009)(1076002)(5660300001)(42882006)(6916009)(33716001)(76176999)(478600001)(54356999)(3846002)(6116002)(50986999)(110136004)(38730400002)(53936002)(5009440100003)(47776003)(66066001)(305945005)(229853002)(7736002)(2950100002)(4326008)(6666003)(18370500001); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR0701MB1714; H:jerin; FPR:; SPF:None; MLV:nov; PTR:InfoNoRecords; LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjA3MDFNQjE3MTQ7MjM6bmJkSzh0TDEyNDdmbkNXejRkb2VuZnE4?= =?utf-8?B?NkZGcFJhRTBuZ0dVNUNBU2N5SlUySVhFbUFyTWRNYXE1UlZzRzBrd3IwNGQ4?= =?utf-8?B?b0h6S1N3bVpUeWgzS2F2aE42c3g4M2N4QjZBNnpBa2hjQWpzeWU5N0UrVUlE?= =?utf-8?B?dzNQY2ozRXIwVmtFQ1REampYQ1R2a1NJdmd0T0VWMVcxamhrZGNpcGNsVEFL?= =?utf-8?B?ajFCMHM4T254bkUvU1N6Qi9LaEM3c3pXcXlTeDNFWEtmUGRyRTE4eFhLdmlx?= =?utf-8?B?REVHMUpOeEo0RVIwLzdlL2o2NTRzSTdnbFk3bTdtalhOUjB6ZmRsZ3hJOG1R?= =?utf-8?B?d3ZZVWYvcTErNmFEbjJmbEtKWUpqY1ZrTGxHODI3c1N6NElISENZNzZPSjc5?= =?utf-8?B?LzgzT0NIZ0dVMTh6N082L3h1aXFuNzRrSVE2c2k0WHJkK0xLeXUxZnVYUzFI?= =?utf-8?B?WHBvL1hxWVk2SjhQUFVMODFDTjNPNHNZeXdUODAzSU5OMXlMMTVCS2p2MDFy?= =?utf-8?B?djQ2WVk2a0J0QUdiM2ZidVA3d0IvOTNoWjhtcW43SFNhWi8vUzhMNEJUM1Fu?= =?utf-8?B?V2t1MHpqYUVEWW1GOUFWeThjYnI0WTJXSk1DMVhrQjByNURQT1pEalJFdWpu?= =?utf-8?B?VmE0eHY2REdjdFdCTG05bXNJNHpPNFdrVHZyTmYrcWVoZ2RMUFhWbTFGTmdC?= =?utf-8?B?SXZTTUR1UVpSemZEelhTT295VHptUXBSdHk1cml3TFBFYjFJN1EvZnBuajhi?= =?utf-8?B?VDd0MHNMQjkreFYzbUEwQjZjYjJUTGVLM0RVQXVBbnZmNTZOeFdSUzZLbU1K?= =?utf-8?B?cWpDczZUR2dwNUdqNjA5SVZQZklBWi9MaGFQa3hWbThXUUNDQ2JlWjFMeWRk?= =?utf-8?B?WlFPOVdocnRmaS9oSVVIcXM4R0x5ZjM3U1YzOS9hSmRsYmE0N0lIeEtoNzBK?= =?utf-8?B?a29EejNnQ21oOVhuR28zcUpCdnhESGgzSEtCbGRlU0pXVmd0RCt5cU9EbE9h?= =?utf-8?B?aHRWV1F4aHN1VXd1S2N3WjhaUXAyVG81YjFNTmVqaC9NNDdUOTdiVk9RbkNL?= =?utf-8?B?MFVTVXdBYkd5anhmQm9RNUNiQXR6SjVPQmFYV2xZUGtTZXdiRmpGcFZBejhQ?= =?utf-8?B?cGtmakpTZ1ArZjRmR25KaEMxVHA1dUxwU2NZZzB0YzNidGIvdUoxN2NOZ0NM?= =?utf-8?B?YVFqZDQvS3BNS08zQXdEQWdPQ3RRWXMvcDErejhLMUpEc0kyUmVpWE5mcTJQ?= =?utf-8?B?d1AydXdKMnI5RGI1RmdJZmNEMThxdDlCRXpGNWQ4NENqYVhETDdVK0FXUmhz?= =?utf-8?B?YnRWS0RtejZVRllnVWZRZDViK1hUWmdaR3piVkpTQnlmcTFINlVtb214c3Yw?= =?utf-8?B?aElKd2RONmdRNW5PbEdsaWV0ZW82VHFFR3dMNGhsRW1DK2VhU2dIYW1udnEw?= =?utf-8?B?UnlYVG5UMXkxRnVFTjNsNDIveUdJZjMyeGxTdEVlR3Zkb2RSaDVQbGZ3UWhC?= =?utf-8?B?TnVkYlFxcTdYYXVaOXErYkdnQ2s5UkdnLy9HQUFpV29UNVluMFl1YVRVZEFQ?= =?utf-8?B?alFrTXdXRVY2UkFvZ1BkeXJjdlNxREZpYVAwMnUyMmU5VElGWE9tMDIrZFRs?= =?utf-8?B?LzVLWEZrdE5vTGRuWFZINCtHQy8yRUZpMUQyaDVFbXZZVmtqL1NRSi9GeXMv?= =?utf-8?Q?xAfGhGdQdtcrZ2Tc9iEtorrQwXmvsyxBXxSy0z4zx?= X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1714; 6: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; 5:jdmJYeXKtBcq0wNopsKsBdWdM+6KNfe8F+SzkfBPSJQ/lyKkCx2cAJPwO2Aie2tvPXZPfmQClqAjG/Ck99tQQAr9+U13aZFnTIpx9XuHhDovocGIBkS0qmLro6ESIlxulzPYoQ9YkAMQa2jgbPe0kA==; 24:azR0jXE0P11KcAs4MGPxAjhrZQY3VEW8ey07x28Wpy/QnkiOeqMmBVUjsyU2Jm8Br5Z440vzGYkXatYoipbyQISGSDQZ+Y547U1TILoions= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BLUPR0701MB1714; 7:4aZMNhnuelxEp9GucSkH6+2qS8XGPhmeNB4588WSo1335ap0LXiKibel26vxKvLJ8mN0+0JrqKo9054xDYFUiKRooVKNuDIybP7WRxaFCtH3VLZjQrbxtgMYaE6zrWFHglQpTK2+XsLwWDjumkFezAJorRaynQGt1ZmFCXK7JdufOt7z7RZ3aN0pXRlO+arpnzlQLVejD92SfKGQQW7JFaPDSJdCt211cKVIoA+01Ale44GxZoHL7L3HySiwPJyq83QPXORUeYo5MWHR3iPOQpXvDuLck6v27sGCbDDwO3jFSZomNv3TEKGFypBHszT69McbwmWRvAKqmhLFmly3mA== X-OriginatorOrg: caviumnetworks.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 May 2017 15:20:23.6245 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0701MB1714 Subject: Re: [dpdk-dev] [PATCH] vfio: fix device unplug when several devices per vfio group X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 08 May 2017 15:20:28 -0000 -----Original Message----- > Date: Sun, 30 Apr 2017 19:29:49 +0200 > From: Thomas Monjalon > To: Alejandro Lucero > Cc: dev@dpdk.org, "Burakov, Anatoly" > Subject: Re: [dpdk-dev] [PATCH] vfio: fix device unplug when several > devices per vfio group > > 28/04/2017 15:25, Burakov, Anatoly: > > From: Alejandro Lucero [mailto:alejandro.lucero@netronome.com] > > > VFIO allows a secure way of assigning devices to user space and those > > > devices which can not be isolated from other ones are set in same VFIO > > > group. Releasing or unplugging a device should be aware of remaining > > > devices is the same group for avoiding to close such a group. > > > > > > Fixes: 94c0776b1bad ("vfio: support hotplug") > > > > > > Signed-off-by: Alejandro Lucero > > > > I have tested this on my setup on an old kernel with multiple attach/detaches, and it works (whereas it fails without this patch). > > > > Acked-by: Anatoly Burakov > > Applied, thanks This patch creates issue when large number of PCIe devices connected to system. Found it through git bisect. This issue is, vfio_group_fd goes beyond 64(VFIO_MAX_GROUPS) and writes to wrong memory on following code execution and sub sequentially creates issues in vfio mapping or such. vfio_cfg.vfio_groups[vfio_group_fd].devices++; I can increase VFIO_MAX_GROUPS, but I think, it is not correct fix as vfio_group_fd generated from open system call. I add some prints the code for debug. Please find below the output. Any thoughts from VFIO experts? ➜ [master]83xx [dpdk-master] $ git diff diff --git a/lib/librte_eal/linuxapp/eal/eal_vfio.c b/lib/librte_eal/linuxapp/eal/eal_vfio.c index d3eae20..2d8ee4c 100644 --- a/lib/librte_eal/linuxapp/eal/eal_vfio.c +++ b/lib/librte_eal/linuxapp/eal/eal_vfio.c @@ -100,6 +100,7 @@ vfio_get_group_fd(int iommu_group_no) snprintf(filename, sizeof(filename), VFIO_GROUP_FMT, iommu_group_no); vfio_group_fd = open(filename, O_RDWR); + printf("###### name %s vfio_group_fd %d\n", filename, vfio_group_fd); if (vfio_group_fd < 0) { /* if file not found, it's not an error */ if (errno != ENOENT) { @@ -259,6 +260,8 @@ vfio_setup_device(const char *sysfs_base, const char *dev_addr, if (vfio_group_fd < 0) return -1; + printf("#### iommu_group_fd %d vfio_group_fd=%d\n", iommu_group_no, vfio_group_fd); + /* if group_fd == 0, that means the device isn't managed by VFIO * */ if (vfio_group_fd == 0) { RTE_LOG(WARNING, EAL, " %s not managed by VFIO driver, skipping\n", @@ -266,6 +269,7 @@ vfio_setup_device(const char *sysfs_base, const char *dev_addr, return 1; } /* * at this point, we know that this group is viable (meaning, * all devices * are either bound to VFIO or not bound to anything) @@ -359,6 +363,7 @@ vfio_setup_device(const char *sysfs_base, const char *dev_addr, return -1; } vfio_cfg.vfio_groups[vfio_group_fd].devices++; + printf("vfio_group_fd %d device %d\n", vfio_group_fd, vfio_cfg.vfio_groups[vfio_group_fd].devices++); return 0; } output log ---------- EAL: PCI device 0000:07:00.1 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/114 vfio_group_fd 44 #### iommu_group_fd 114 vfio_group_fd=44 EAL: using IOMMU type 1 (Type 1) vfio_group_fd 44 device 1 EAL: PCI device 0000:07:00.2 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/115 vfio_group_fd 47 #### iommu_group_fd 115 vfio_group_fd=47 vfio_group_fd 47 device 1 EAL: PCI device 0000:07:00.3 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/116 vfio_group_fd 50 #### iommu_group_fd 116 vfio_group_fd=50 vfio_group_fd 50 device 1 EAL: PCI device 0000:07:00.4 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/117 vfio_group_fd 53 #### iommu_group_fd 117 vfio_group_fd=53 vfio_group_fd 53 device 1 EAL: PCI device 0000:07:00.5 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/118 vfio_group_fd 56 #### iommu_group_fd 118 vfio_group_fd=56 vfio_group_fd 56 device 1 EAL: PCI device 0000:07:00.6 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/119 vfio_group_fd 59 #### iommu_group_fd 119 vfio_group_fd=59 vfio_group_fd 59 device 1 EAL: PCI device 0000:07:00.7 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/120 vfio_group_fd 62 #### iommu_group_fd 120 vfio_group_fd=62 vfio_group_fd 62 device 1 EAL: PCI device 0000:07:01.0 on NUMA socket 0 EAL: probe driver: 177d:a04b octeontx_ssovf ###### name /dev/vfio/121 vfio_group_fd 65 #### iommu_group_fd 121 vfio_group_fd=65 vfio_group_fd 65 device 1632632833 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^(memory corruption here) EAL: PCI device 0000:08:00.1 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf ###### name /dev/vfio/122 vfio_group_fd 68 #### iommu_group_fd 122 vfio_group_fd=68 vfio_group_fd 68 device 1 EAL: PCI device 0000:08:00.2 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf ###### name /dev/vfio/123 vfio_group_fd 71 #### iommu_group_fd 123 vfio_group_fd=71 vfio_group_fd 71 device 99999941 EAL: PCI device 0000:08:00.3 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf ###### name /dev/vfio/124 vfio_group_fd 74 #### iommu_group_fd 124 vfio_group_fd=74 vfio_group_fd 74 device 1 EAL: PCI device 0000:08:00.4 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf ###### name /dev/vfio/125 vfio_group_fd 77 #### iommu_group_fd 125 vfio_group_fd=77 vfio_group_fd 77 device 1 EAL: PCI device 0000:08:00.5 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf ###### name /dev/vfio/126 vfio_group_fd 80 #### iommu_group_fd 126 vfio_group_fd=80 vfio_group_fd 80 device 1 EAL: PCI device 0000:08:00.6 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf ###### name /dev/vfio/127 vfio_group_fd 83 #### iommu_group_fd 127 vfio_group_fd=83 vfio_group_fd 83 device 1 EAL: PCI device 0000:08:00.7 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf EAL: PCI device 0000:08:01.0 on NUMA socket 0 EAL: probe driver: 177d:a04d octeontx_ssowvf EAL: PCI device 0001:01:00.1 on NUMA socket 0 EAL: probe driver: 177d:a034 net_thunderx ###### name /dev/vfio/64 vfio_group_fd 86 #### iommu_group_fd 64 vfio_group_fd=86 vfio_group_fd 86 device 1 Segmentation fault