Commit 16f592ab authored by Konrad Rzeszutek Wilk's avatar Konrad Rzeszutek Wilk Committed by Ben Hutchings

xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.

commit 408fb0e5 upstream.

commit f598282f ("PCI: Fix the NIU MSI-X problem in a better way")
teaches us that dealing with MSI-X can be troublesome.

Further checks in the MSI-X architecture shows that if the
PCI_COMMAND_MEMORY bit is turned of in the PCI_COMMAND we
may not be able to access the BAR (since they are memory regions).

Since the MSI-X tables are located in there.. that can lead
to us causing PCIe errors. Inhibit us performing any
operation on the MSI-X unless the MEMORY bit is set.

Note that Xen hypervisor with:
"x86/MSI-X: access MSI-X table only after having enabled MSI-X"
will return:
xen_pciback: 0000:0a:00.1: error -6 enabling MSI-X for guest 3!

When the generic MSI code tries to setup the PIRQ without
MEMORY bit set. Which means with later versions of Xen
(4.6) this patch is not neccessary.

This is part of XSA-157
Reviewed-by: default avatarJan Beulich <jbeulich@suse.com>
Signed-off-by: default avatarKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: default avatarBen Hutchings <ben@decadent.org.uk>
parent 5a08e0db
...@@ -210,6 +210,7 @@ int xen_pcibk_enable_msix(struct xen_pcibk_device *pdev, ...@@ -210,6 +210,7 @@ int xen_pcibk_enable_msix(struct xen_pcibk_device *pdev,
struct xen_pcibk_dev_data *dev_data; struct xen_pcibk_dev_data *dev_data;
int i, result; int i, result;
struct msix_entry *entries; struct msix_entry *entries;
u16 cmd;
if (unlikely(verbose_request)) if (unlikely(verbose_request))
printk(KERN_DEBUG DRV_NAME ": %s: enable MSI-X\n", printk(KERN_DEBUG DRV_NAME ": %s: enable MSI-X\n",
...@@ -221,7 +222,12 @@ int xen_pcibk_enable_msix(struct xen_pcibk_device *pdev, ...@@ -221,7 +222,12 @@ int xen_pcibk_enable_msix(struct xen_pcibk_device *pdev,
if (dev->msix_enabled) if (dev->msix_enabled)
return -EALREADY; return -EALREADY;
if (dev->msi_enabled) /*
* PCI_COMMAND_MEMORY must be enabled, otherwise we may not be able
* to access the BARs where the MSI-X entries reside.
*/
pci_read_config_word(dev, PCI_COMMAND, &cmd);
if (dev->msi_enabled || !(cmd & PCI_COMMAND_MEMORY))
return -ENXIO; return -ENXIO;
entries = kmalloc(op->value * sizeof(*entries), GFP_KERNEL); entries = kmalloc(op->value * sizeof(*entries), GFP_KERNEL);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment