From nobody Sun May 19 08:26:17 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org ARC-Seal: i=1; a=rsa-sha256; t=1595508877; cv=none; d=zohomail.com; s=zohoarc; b=g9sNxJP5sI+8BVkLg+2brjRfcjQoB7XNSe6Annh/JJBfW1O66bPxJGv74jh5pDh25ZFcz6pMFpROB7jK1QgDfHn08TYUn96rE20mBp7SQG3QdeHU5inAn5RiWSIbH7IGJr0gstljgSgsUGHcs0S50ySASm2hu/XbZILkah4fI6Y= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1595508877; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=yYe+tuJwVT+ZAkYqiyFwilpwn5Dm32zwSXHo+1hQGhk=; b=cIoMgWrMHfrUhixFxNqe8I+a9NA6pyWhko1vDVPCxLdbOdv0PjF/DJ5N0+qRP40SaZ+CxK+vJlnCjbe4nUTZHm86PB98NUkiSJBWU7ASoTHYRBN+QEc1OqmbQT2Tt7CaVvSx4QUt/89GIGjzzUdqKLheV2BGT1DKtHCdS8KK15U= ARC-Authentication-Results: i=1; mx.zohomail.com; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1595508877459614.1376385876536; Thu, 23 Jul 2020 05:54:37 -0700 (PDT) Received: from localhost ([::1]:35004 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1jyak8-0008EP-4R for importer@patchew.org; Thu, 23 Jul 2020 08:54:36 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:41616) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jyaiw-0006f3-7s for qemu-devel@nongnu.org; Thu, 23 Jul 2020 08:53:22 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:35438 helo=huawei.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1jyait-0007We-OR for qemu-devel@nongnu.org; Thu, 23 Jul 2020 08:53:21 -0400 Received: from DGGEMS406-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 027E852567806B58EC75; Thu, 23 Jul 2020 20:53:13 +0800 (CST) Received: from localhost (10.174.149.56) by DGGEMS406-HUB.china.huawei.com (10.3.19.206) with Microsoft SMTP Server id 14.3.487.0; Thu, 23 Jul 2020 20:53:06 +0800 From: Wang King To: , Subject: [PATCH v1] hw/pci-host: save/restore pci host config register Date: Thu, 23 Jul 2020 20:53:03 +0800 Message-ID: <20200723125303.2390-1-king.wang@huawei.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.174.149.56] X-CFilter-Loop: Reflected Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=45.249.212.35; envelope-from=king.wang@huawei.com; helo=huawei.com X-detected-operating-system: by eggs.gnu.org: First seen = 2020/07/23 08:53:14 X-ACL-Warn: Detected OS = Linux 3.11 and newer [fuzzy] X-Spam_score_int: -41 X-Spam_score: -4.2 X-Spam_bar: ---- X-Spam_report: (-4.2 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: wangxinxin.wang@huawei.com, weidong.huang@huawei.com, qemu-devel@nongnu.org, king.wang@huawei.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" From: Hogan Wang The pci host config register is used to save PCI address for read/write config data. If guest write a value to config register, and then pause the vcpu to migrate, After the migration, the guest continue to write pci config data, and the write data will be ignored because of new qemu process lost the config register state. Reproduction steps are: 1. guest booting in seabios. 2. guest enable the SMRAM in seabios:piix4_apmc_smm_setup, and then expect to disable the SMRAM by pci_config_writeb. 3. after guest write the pci host config register, and then pasued vcpu to finish migration. 4. guest write config data(0x0A) fail to disable the SMRAM becasue of config register state lost. 5. guest continue to boot and crash in ipxe option ROM due to SMRAM in enabled state. Signed-off-by: Hogan Wang --- hw/pci-host/i440fx.c | 11 +++++++++++ hw/pci-host/q35.c | 11 +++++++++++ hw/pci/pci_host.c | 11 +++++++++++ hw/pci/pcie_host.c | 11 +++++++++++ include/hw/pci/pci_host.h | 10 ++++++++++ include/hw/pci/pcie_host.h | 10 ++++++++++ 6 files changed, 64 insertions(+) diff --git a/hw/pci-host/i440fx.c b/hw/pci-host/i440fx.c index 8ed2417f0c..17705bb025 100644 --- a/hw/pci-host/i440fx.c +++ b/hw/pci-host/i440fx.c @@ -118,6 +118,16 @@ static const VMStateDescription vmstate_i440fx =3D { } }; =20 +static const VMStateDescription vmstate_i440fx_pcihost =3D { + .name =3D "I440FX_PCIHost", + .version_id =3D 1, + .minimum_version_id =3D 1, + .fields =3D (VMStateField[]) { + VMSTATE_PCI_HOST(parent_obj, I440FXState), + VMSTATE_END_OF_LIST() + } +}; + static void i440fx_pcihost_get_pci_hole_start(Object *obj, Visitor *v, const char *name, void *opaq= ue, Error **errp) @@ -398,6 +408,7 @@ static void i440fx_pcihost_class_init(ObjectClass *klas= s, void *data) hc->root_bus_path =3D i440fx_pcihost_root_bus_path; dc->realize =3D i440fx_pcihost_realize; dc->fw_name =3D "pci"; + dc->vmsd =3D &vmstate_i440fx_pcihost; device_class_set_props(dc, i440fx_props); /* Reason: needs to be wired up by pc_init1 */ dc->user_creatable =3D false; diff --git a/hw/pci-host/q35.c b/hw/pci-host/q35.c index b67cb9c29f..5e323be2e3 100644 --- a/hw/pci-host/q35.c +++ b/hw/pci-host/q35.c @@ -165,6 +165,16 @@ static void q35_host_get_pci_hole64_end(Object *obj, V= isitor *v, visit_type_uint64(v, name, &value, errp); } =20 +static const VMStateDescription vmstate_q35_pcihost =3D { + .name =3D "Q35_PCIHost", + .version_id =3D 1, + .minimum_version_id =3D 1, + .fields =3D (VMStateField[]) { + VMSTATE_PCIE_HOST(parent_obj, Q35PCIHost), + VMSTATE_END_OF_LIST() + } +}; + /* * NOTE: setting defaults for the mch.* fields in this table * doesn't work, because mch is a separate QOM object that is @@ -194,6 +204,7 @@ static void q35_host_class_init(ObjectClass *klass, voi= d *data) =20 hc->root_bus_path =3D q35_host_root_bus_path; dc->realize =3D q35_host_realize; + dc->vmsd =3D &vmstate_q35_pcihost; device_class_set_props(dc, q35_host_props); /* Reason: needs to be wired up by pc_q35_init */ dc->user_creatable =3D false; diff --git a/hw/pci/pci_host.c b/hw/pci/pci_host.c index ce7bcdb1d5..7cdd5a3ea3 100644 --- a/hw/pci/pci_host.c +++ b/hw/pci/pci_host.c @@ -24,6 +24,7 @@ #include "hw/pci/pci_host.h" #include "qemu/module.h" #include "hw/pci/pci_bus.h" +#include "migration/vmstate.h" #include "trace.h" =20 /* debug PCI */ @@ -200,6 +201,16 @@ const MemoryRegionOps pci_host_data_be_ops =3D { .endianness =3D DEVICE_BIG_ENDIAN, }; =20 +const VMStateDescription vmstate_pcihost =3D { + .name =3D "PCIHost", + .version_id =3D 1, + .minimum_version_id =3D 1, + .fields =3D (VMStateField[]) { + VMSTATE_UINT32(config_reg, PCIHostState), + VMSTATE_END_OF_LIST() + } +}; + static const TypeInfo pci_host_type_info =3D { .name =3D TYPE_PCI_HOST_BRIDGE, .parent =3D TYPE_SYS_BUS_DEVICE, diff --git a/hw/pci/pcie_host.c b/hw/pci/pcie_host.c index 3534006f99..a653c39bb7 100644 --- a/hw/pci/pcie_host.c +++ b/hw/pci/pcie_host.c @@ -24,6 +24,7 @@ #include "hw/pci/pcie_host.h" #include "qemu/module.h" #include "exec/address-spaces.h" +#include "migration/vmstate.h" =20 /* a helper function to get a PCIDevice for a given mmconfig address */ static inline PCIDevice *pcie_dev_find_by_mmcfg_addr(PCIBus *s, @@ -121,6 +122,16 @@ void pcie_host_mmcfg_update(PCIExpressHost *e, memory_region_transaction_commit(); } =20 +const VMStateDescription vmstate_pciehost =3D { + .name =3D "PCIEHost", + .version_id =3D 1, + .minimum_version_id =3D 1, + .fields =3D (VMStateField[]) { + VMSTATE_PCI_HOST(pci, PCIExpressHost), + VMSTATE_END_OF_LIST() + } +}; + static const TypeInfo pcie_host_type_info =3D { .name =3D TYPE_PCIE_HOST_BRIDGE, .parent =3D TYPE_PCI_HOST_BRIDGE, diff --git a/include/hw/pci/pci_host.h b/include/hw/pci/pci_host.h index 9ce088bd13..fc88305e04 100644 --- a/include/hw/pci/pci_host.h +++ b/include/hw/pci/pci_host.h @@ -70,4 +70,14 @@ extern const MemoryRegionOps pci_host_conf_be_ops; extern const MemoryRegionOps pci_host_data_le_ops; extern const MemoryRegionOps pci_host_data_be_ops; =20 +extern const VMStateDescription vmstate_pcihost; + +#define VMSTATE_PCI_HOST(_field, _state) { \ + .name =3D (stringify(_field)), \ + .size =3D sizeof(PCIHostState), \ + .vmsd =3D &vmstate_pcihost, \ + .flags =3D VMS_STRUCT, \ + .offset =3D vmstate_offset_value(_state, _field, PCIHostState),\ +} + #endif /* PCI_HOST_H */ diff --git a/include/hw/pci/pcie_host.h b/include/hw/pci/pcie_host.h index 3f7b9886d1..e8856f03e9 100644 --- a/include/hw/pci/pcie_host.h +++ b/include/hw/pci/pcie_host.h @@ -78,4 +78,14 @@ void pcie_host_mmcfg_update(PCIExpressHost *e, PCIE_MMCFG_DEVFN_MASK) #define PCIE_MMCFG_CONFOFFSET(addr) ((addr) & PCIE_MMCFG_CONFOFFSET_MA= SK) =20 +extern const VMStateDescription vmstate_pciehost; + +#define VMSTATE_PCIE_HOST(_field, _state) { \ + .name =3D (stringify(_field)), \ + .size =3D sizeof(PCIExpressHost), \ + .vmsd =3D &vmstate_pciehost, \ + .flags =3D VMS_STRUCT, \ + .offset =3D vmstate_offset_value(_state, _field, PCIExpressHost),\ +} + #endif /* PCIE_HOST_H */ --=20 2.23.0