[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 1/9] xen/vpci: introduce basic handlers to trap accesses to the PCI config space
On Mon, Apr 24, 2017 at 10:58:04AM +0100, Paul Durrant wrote: > > -----Original Message----- > > From: Roger Pau Monne > > Sent: 24 April 2017 10:42 > > To: Paul Durrant <Paul.Durrant@xxxxxxxxxx> > > Cc: xen-devel@xxxxxxxxxxxxxxxxxxxx; konrad.wilk@xxxxxxxxxx; > > boris.ostrovsky@xxxxxxxxxx; Ian Jackson <Ian.Jackson@xxxxxxxxxx>; Wei Liu > > <wei.liu2@xxxxxxxxxx>; Jan Beulich <jbeulich@xxxxxxxx>; Andrew Cooper > > <Andrew.Cooper3@xxxxxxxxxx> > > Subject: Re: [PATCH v2 1/9] xen/vpci: introduce basic handlers to trap > > accesses to the PCI config space > > > > On Fri, Apr 21, 2017 at 05:23:34PM +0100, Paul Durrant wrote: > > > > -----Original Message----- > > > > From: Roger Pau Monne [mailto:roger.pau@xxxxxxxxxx] > > [...] > > > > +int xen_vpci_read(unsigned int seg, unsigned int bus, unsigned int > > devfn, > > > > + unsigned int reg, uint32_t size, uint32_t *data) > > > > +{ > > > > + struct domain *d = current->domain; > > > > + struct pci_dev *pdev; > > > > + const struct vpci_register *r; > > > > + union vpci_val val = { .double_word = 0 }; > > > > + unsigned int data_rshift = 0, data_lshift = 0, data_size; > > > > + uint32_t tmp_data; > > > > + int rc; > > > > + > > > > + ASSERT(vpci_locked(d)); > > > > + > > > > + *data = 0; > > > > + > > > > + /* Find the PCI dev matching the address. */ > > > > + pdev = pci_get_pdev_by_domain(d, seg, bus, devfn); > > > > + if ( !pdev ) > > > > + goto passthrough; > > > > > > I hope this can eventually be generalised so I wonder what your intention > > > is > > regarding co-existence between Xen emulated PCI config space, pass- > > through and PCI devices emulated externally. We already have a framework > > for registering PCI devices by SBDF but this code seems to make no use of > > it, > > which I suspect is likely to cause future conflict. > > > > Yes, the long term aim is to use this code in order to implement > > PCI-passthrough for PVH and HVM DomUs also. > > > > TBH, I didn't know we already had such code (I assume you mean the IOREQ > > related PCI code). As it is, I see a couple of issues with that, the first > > one > > is that this code expects a ioreq client on the other end, and the code I'm > > adding here is all inside of the hypervisor. The second issue is that the > > IOREQ > > code ATM only allows for local PCI accesses, which means I should extend it > > to > > also deal with ECAM/MMCFG areas. > > > > I completely agree that at some point this should be made to work together, > > but > > I'm not sure if it would be better to do that once we want to also use vPCI > > for > > DomUs, so that the Dom0 side is not delayed further. > > BTW, that's also an argument for forgetting about the r-b scheme for handler > registration since, if this really is for dom0 only, 8 pages worth of direct > map is not a lot. It's 8 pages for each device, not 8 pages for each domain, so it doesn't matter if it's Dom0 or DomU, each PCIe device would use 8 pages. Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |