[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 14/17] xen/arm: Enable the existing x86 virtual PCI support for ARM.

  • To: Rahul Singh <Rahul.Singh@xxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Fri, 1 Oct 2021 14:40:49 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6HVoRp3HJtQ+BByKx+UH2Z/rmdwcUrvQZUxWIiCqngs=; b=c0DVgl0TtpGBiOhEHBm+E44GLB7W+j7YQdgrTqKdaCeRjOMRgQ+c7JYmqh8eA1nKJkHVVyGz8/MdWc5AXCZ8DR7c0F4uEL4uyT6lGkI0aBc3oI0fG4YzAZpVJvlFna2C0BQCl8IHM1bFNWzcrpFlVIFgTTETj96gpPhaWRL/M2txZn3qS4i6qfVpTRM3zw8T5PUsfHGer4dG1N4elVi5IuWeAYg7rBWthc2QQ1feov8u6sR3c3wP5xy9nDmHxncztXccHpge2kZrFQAEHY8wRiaZT6iJ64AcT7g+PVWXr8yqaet9LnYggNfuusXxo/LXhRdbUD5PJvil1Ys3yG0pFw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EujXjLyN+emKrpVByOg+VrL8cwUOIBm01XecQ0HyeOtPJfmmrHwitJw18IjKOQ137OObiCdz0eY3Z5OgSyJ4um+Zx6lHWUSpMDh0oVWiUjmpklY9zjCQu4q0nhBValZo8tUKH9xCDsA+i7KWra5xGDL9hcSkBMf1HLTre/T4QFf/D0ZR5eBu7jmAViiPP/wPx0T9HPSAInu502mCYAScWYA0erWiOxhPRjby+9np53XQ4lETOCFZZs3mjM7v12eeb2uSwzjpVojYF6L0nBht5cfHzxSag7pss5sS2mQeAAoOKacu4Yqq3t+R3/XyvpUSgo7l0PQzbwVJ9mlJ0iLqvQ==
  • Authentication-results: lists.xenproject.org; dkim=none (message not signed) header.d=none;lists.xenproject.org; dmarc=none action=none header.from=suse.com;
  • Cc: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Andre Przywara <Andre.Przywara@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Paul Durrant <paul@xxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Fri, 01 Oct 2021 12:41:09 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 01.10.2021 13:44, Rahul Singh wrote:
>> On 30 Sep 2021, at 4:19 pm, Jan Beulich <jbeulich@xxxxxxxx> wrote:
>> On 28.09.2021 20:18, Rahul Singh wrote:
>>> The existing VPCI support available for X86 is adapted for Arm.
>>> When the device is added to XEN via the hyper call
>>> “PHYSDEVOP_pci_device_add”, VPCI handler for the config space
>>> access is added to the Xen to emulate the PCI devices config space.
>>> A MMIO trap handler for the PCI ECAM space is registered in XEN
>>> so that when guest is trying to access the PCI config space,XEN
>>> will trap the access and emulate read/write using the VPCI and
>>> not the real PCI hardware.
>> All of this is just for Dom0, I understand? Could you say so, perhaps
>> already in the title?
> DOMU guest will also use the same VPCI handler. When we assign the PCI 
> devices to DOMU guests
> XEN will deregister the VPCI handler from DOM0 and register it for DOMU 
> guests. 

But that logic is not fit for DomU use, is it? Aiui some of the other
series on the list are aiming to work towards making it usable.

>>> --- a/xen/arch/x86/domain.c
>>> +++ b/xen/arch/x86/domain.c
>>> @@ -662,6 +662,12 @@ int arch_sanitise_domain_config(struct 
>>> xen_domctl_createdomain *config)
>>>         return -EINVAL;
>>>     }
>>> +    if ( config->flags & XEN_DOMCTL_CDF_vpci )
>>> +    {
>>> +        dprintk(XENLOG_INFO, "VPCI not supported\n");
>> This is a misleading message, at least if for some reason it was to
>> trigger for Dom0. But down the road perhaps also for DomU, as I could
>> imagine vPCI to get enabled alongside passthrough rather than via a
>> separate control.
> Can I silently reject the flag or do you have any suggestion for the commit 
> message.

Whether to issue a message can be judged by all the other code in this
function. Which makes the answer "no, you can't silently reject the
flag". As to the message itself, maybe "vPCI cannot be enabled this way"
or "vPCI cannot be enabled yet"?

>>> --- a/xen/include/asm-arm/domain.h
>>> +++ b/xen/include/asm-arm/domain.h
>>> @@ -262,7 +263,12 @@ static inline void arch_vcpu_block(struct vcpu *v) {}
>>> #define arch_vm_assist_valid_mask(d) (1UL << 
>>> VMASST_TYPE_runstate_update_flag)
>>> -#define has_vpci(d)    ({ (void)(d); false; })
>>> +/*
>>> + * For X86 VPCI is enabled and tested for PVH DOM0 only but
>>> + * for ARM we enable support VPCI for guest domain also.
>>> + */
>>> +#define has_vpci(d) ((void)(d), \
>>> +        evaluate_nospec(d->options & XEN_DOMCTL_CDF_vpci))
>> Why the (void)(d)? Instead you want to parenthesize the other use of d.
> I will modify as below:
> #define has_vpci(d) (evaluate_nopsec((d)->options & XEN_DOMCTL_CDF_vpci))

Please also omit the outer pair of parentheses, unless the Arm maintainers
insist on having them despite being redundant.




Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.