[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Question about xen and Rasp 4B





On 1.2.2021 21.25, Stefano Stabellini wrote:
On Sat, 30 Jan 2021, Julien Grall wrote:
On 27/01/2021 11:47, Jukka Kaartinen wrote:


On Tue, Jan 26, 2021 at 10:22 PM Stefano Stabellini
<sstabellini@xxxxxxxxxx <mailto:sstabellini@xxxxxxxxxx>> wrote:

     On Tue, 26 Jan 2021, Jukka Kaartinen wrote:
      > On Tue, Jan 26, 2021 at 2:54 AM Stefano Stabellini
     <sstabellini@xxxxxxxxxx <mailto:sstabellini@xxxxxxxxxx>> wrote:
      >       On Sat, 23 Jan 2021, Jukka Kaartinen wrote:
      >       > Thanks for the response!
      >       >
      >       > On Sat, Jan 23, 2021 at 2:27 AM Stefano Stabellini
     <sstabellini@xxxxxxxxxx <mailto:sstabellini@xxxxxxxxxx>> wrote:
      >       >       + xen-devel, Roman,
      >       >
      >       >
      >       >       On Fri, 22 Jan 2021, Jukka Kaartinen wrote:
      >       >       > Hi Stefano,
      >       >       > I'm Jukka Kaartinen a SW developer working on
     enabling hypervisors on mobile platforms. One of our HW that we use
on
      >       >       development is
      >       >       > Raspberry Pi 4B. I wonder if you could help me a
     bit :).
      >       >       >
      >       >       > I'm trying to enable the GPU with Xen + Raspberry
     Pi for
      >       >       dom0.
https://www.raspberrypi.org/forums/viewtopic.php?f=63&t=232323#p1797605
<https://www.raspberrypi.org/forums/viewtopic.php?f=63&t=232323#p1797605>
      >       >       >
      >       >       > I got so far that GPU drivers are loaded (v3d &
     vc4) without errors. But now Xen returns error when X is starting:
      >       >       > (XEN) traps.c:1986:d0v1 HSR=0x93880045
     pc=0x00007f97b14e70 gva=0x7f7f817000 gpa=0x0000401315d000
      >       >       >  I tried to debug what causes this and looks
     like find_mmio_handler cannot find handler.
      >       >       > (See more here:
https://www.raspberrypi.org/forums/viewtopic.php?f=63&t=232323&start=25#p1801691
<https://www.raspberrypi.org/forums/viewtopic.php?f=63&t=232323&start=25#p1801691>
     )
      >       >       >
      >       >       > Any ideas why the handler is not found?
      >       >
      >       >
      >       >       Hi Jukka,
      >       >
      >       >       I am glad to hear that you are interested in Xen on
     RaspberryPi :-)  I
      >       >       haven't tried the GPU yet, I have been using the
     serial only.
      >       >       Roman, did you ever get the GPU working?
      >       >
      >       >
      >       >       The error is a data abort error: Linux is trying to
     access an address
      >       >       which is not mapped to dom0. The address seems to
     be 0x401315d000. It is
      >       >       a pretty high address; I looked in device tree but
     couldn't spot it.
      >       >
      >       >       >From the HSR (the syndrom register) it looks like
     it is a translation
      >       >       fault at EL1 on stage1. As if the Linux address
     mapping was wrong.
      >       >       Anyone has any ideas how this could happen? Maybe a
     reserved-memory
      >       >       misconfiguration?
      >       >
      >       > I had issues with loading the driver in the first place.
     Apparently swiotlb is used, maybe it can cause this. I also tried to
      >       enable CMA.
      >       > config.txt:
      >       > dtoverlay=vc4-fkms-v3d,cma=320M@0x0-0x40000000
      >       > gpu_mem=128
      >
      >       Also looking at your other reply and the implementation of
      >       vc4_bo_create, it looks like this is a CMA problem.
      >
      >       It would be good to run a test with the swiotlb-xen
disabled:
      >
      >       diff --git a/arch/arm/xen/mm.c b/arch/arm/xen/mm.c
      >       index 467fa225c3d0..2bdd12785d14 100644
      >       --- a/arch/arm/xen/mm.c
      >       +++ b/arch/arm/xen/mm.c
      >       @@ -138,8 +138,7 @@ void
     xen_destroy_contiguous_region(phys_addr_t pstart, unsigned int
order)
      >        static int __init xen_mm_init(void)
      >        {
      >               struct gnttab_cache_flush cflush;
      >       -       if (!xen_initial_domain())
      >       -               return 0;
      >       +       return 0;
      >               xen_swiotlb_init(1, false);
      >
      >               cflush.op = 0;
      >
      > With this change the kernel is not booting up. (btw. I'm using
     USB SSD for my OS.)
      > [    0.071081] bcm2835-dma fe007000.dma: Unable to set DMA mask
      > [    0.076277] bcm2835-dma fe007b00.dma: Unable to set DMA mask
      > (XEN) physdev.c:16:d0v0 PHYSDEVOP cmd=25: not implemented
      > (XEN) physdev.c:16:d0v0 PHYSDEVOP cmd=15: not implemented
      > [    0.592695] pci 0000:00:00.0: Failed to add - passthrough or
     MSI/MSI-X might fail!
      > (XEN) physdev.c:16:d0v0 PHYSDEVOP cmd=15: not implemented
      > [    0.606819] pci 0000:01:00.0: Failed to add - passthrough or
     MSI/MSI-X might fail!
      > [    1.212820] usb 1-1: device descriptor read/64, error 18
      > [    1.452815] usb 1-1: device descriptor read/64, error 18
      > [    1.820813] usb 1-1: device descriptor read/64, error 18
      > [    2.060815] usb 1-1: device descriptor read/64, error 18
      > [    2.845548] usb 1-1: device descriptor read/8, error -61
      > [    2.977603] usb 1-1: device descriptor read/8, error -61
      > [    3.237530] usb 1-1: device descriptor read/8, error -61
      > [    3.369585] usb 1-1: device descriptor read/8, error -61
      > [    3.480765] usb usb1-port1: unable to enumerate USB device
      >
      > Traces stop here. I could try with a memory card. Maybe it makes
     a difference.

     This is very surprising. Disabling swiotlb-xen should make things
better
     not worse. The only reason I can think of why it could make things
worse
     is if Linux runs out of low memory. Julien's patch
     437b0aa06a014ce174e24c0d3530b3e9ab19b18b for Xen should have
addressed
     that issue though. Julien, any ideas?

I think, Stefano's small patch is not enough to disable the swiotlb as we
will still override the DMA ops. You also likely want:

diff --git a/arch/arm/mm/dma-mapping.c b/arch/arm/mm/dma-mapping.c
index 8a8949174b1c..aa43e249ecdd 100644
--- a/arch/arm/mm/dma-mapping.c
+++ b/arch/arm/mm/dma-mapping.c
@@ -2279,7 +2279,7 @@ void arch_setup_dma_ops(struct device *dev, u64
dma_base, u64 size,
          set_dma_ops(dev, dma_ops);

   #ifdef CONFIG_XEN
-       if (xen_initial_domain())
+       if (0 || xen_initial_domain())
                  dev->dma_ops = &xen_swiotlb_dma_ops;
   #endif
          dev->archdata.dma_ops_setup = true;

Otherwise, you would still use the swiotlb DMA ops that would not be
functional as we disabled the swiotlb.

This would explain the following error because it will check whether the
mask is valid using the callback dma_supported():

[    0.071081] bcm2835-dma fe007000.dma: Unable to set DMA mask

Good catch.
GPU works now and I can start X! Thanks! I was also able to create domU that
runs Raspian OS.

Glad to hear it works! IIRC, the swiotlb may become necessary when running
guest if the guest memory ends up to be used for DMA transaction.

It is necessary if you are using PV network or PV disk: memory shared by
another domU could end up being used in a DMA transaction. For that, you
need swiotlb-xen.

Now that swiotlb is disabled what does it mean?

I can see two reasons:
   1) You have limited memory below the 30 bits mark. So Swiotlb and CMA may
try to fight for the low memory.
   2) We found a few conversion bugs in the swiotlb on RPI4 last year (IIRC the
DMA and physical address may be different). I looked at the Linux branch you
are using and they seem to all be there. So there might be another bug.

I am not sure how to figure out where is the problem. Stefano, do you have a
suggestion where to start?

Both 1) and 2) are possible. It is also possible that another driver,
probably something related to CMA or DRM, has some special dma_ops
handling that doesn't work well together with swiotlb-xen.

Given that the original error seemed to be related to vc4_bo_create,
which calls dma_alloc_wc, I would add a couple of printks to
xen_swiotlb_alloc_coherent to help us figure it out:


diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index 2b385c1b4a99..cac8b09af603 100644
--- a/drivers/xen/swiotlb-xen.c
+++ b/drivers/xen/swiotlb-xen.c
@@ -295,6 +295,7 @@ xen_swiotlb_alloc_coherent(struct device *hwdev, size_t 
size,
        /* Convert the size to actually allocated. */
        size = 1UL << (order + XEN_PAGE_SHIFT);
+ printk("DEBUG %s %d size=%lu flags=%lx attr=%lx\n",__func__,__LINE__,size,flags,attrs);
        /* On ARM this function returns an ioremap'ped virtual address for
         * which virt_to_phys doesn't return the corresponding physical
         * address. In fact on ARM virt_to_phys only works for kernel direct
@@ -315,16 +316,20 @@ xen_swiotlb_alloc_coherent(struct device *hwdev, size_t 
size,
        phys = dma_to_phys(hwdev, *dma_handle);
        dev_addr = xen_phys_to_dma(hwdev, phys);
        if (((dev_addr + size - 1 <= dma_mask)) &&
-           !range_straddles_page_boundary(phys, size))
+           !range_straddles_page_boundary(phys, size)) {
                *dma_handle = dev_addr;
-       else {
+               printk("DEBUG %s %d phys=%lx 
dma=%lx\n",__func__,__LINE__,phys,dev_addr);
+       } else {
                if (xen_create_contiguous_region(phys, order,
                                                 fls64(dma_mask), dma_handle) 
!= 0) {
+                       printk("DEBUG %s %d\n",__func__,__LINE__);
                        xen_free_coherent_pages(hwdev, size, ret, 
(dma_addr_t)phys, attrs);
                        return NULL;
                }
                *dma_handle = phys_to_dma(hwdev, *dma_handle);
                SetPageXenRemapped(virt_to_page(ret));
+               printk("DEBUG %s %d dma_mask=%d page_boundary=%d phys=%lx 
dma=%lx\n",__func__,__LINE__,
+                       ((dev_addr + size - 1 <= 
dma_mask)),range_straddles_page_boundary(phys, size),phys,*dma_handle);
        }
        memset(ret, 0, size);
        return ret;




And also can I pass the GPU to domU? Raspberry Pi 4 is limited HW and
doesn't have IOMMU. I'm trying to create similar OS like QubesOS where GPU,
Network, keyboard/mouse, ... are isolated to their own VMs.

Without an IOMMU or any other HW mechamisns (e.g. MPU), it would not be safe
to assign a DMA-capable device to a non-trusted VM.

If you trust the VM where you assigned a device, then a possible approach
would be to have the VM direct mapped (e.g. guest physical address == host
physical address). Although, I can foreese some issues if you have multiple
VMs requires memory below 30 bits (there seem to be limited amount)>

If you don't trust the VM where you assigned a device, then your best option
will be to expose a PV interface of the device and have your backend
sanitizing the request and issuing it on behalf of the guest.

FYI you could do that with the existing PVFB drivers that only support 2D
graphics.


We really need direct HW access so PVFB is not really an option. And at this point. We can trust the VMs.


Any idea what am I missing something here is this the way to give domu access to the memory?

# from dom0: cat /proc/iomem
# fe104000-fe104027 : fe104000.rng rng@7e104000

# to hide the above rng from the dom0 I added these to device-tree and above line from /proc/iomem dissapiered.
boot2.scr:
fdt set /soc/rng@7e104000 xen,passthrough <0x1>
fdt set /soc/rng@7e104000 status disabled


domu.cfg:
iomem = [ 'fe104,1' ]

domu start but I cannot see that address in the domu iomem range.
Also the device-tree from the domu is quite empty.

Do I need something like:
device_tree = "rng.dtb"

like here:
https://lists.xenproject.org/archives/html/xen-devel/2018-01/msg02618.html


I tried to add
dtdev = [ "/soc/rng@7e104000" ]
but this gives be error:
"libxl: error: libxl_create.c:1107:libxl__domain_config_setdefault: passthrough not supported on this platform"

Will this happen if generate the rng.dtb?



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.