[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/2] Do not access /dev/mem in MSI-X PCI passthrough on Xen


  • To: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 15 Nov 2022 15:05:22 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sDUWyWScZMXji1y9yEi0ju0eOiWvng1aTwJR6Pj7BFM=; b=JXNdaEAXSYJ0BoXckqbdApDtEVqscNItlzails6aTsocaNg5vcaGzn3EqmRTH+D3BZudlKCz8V10G5l1HmV7//jb1n3ruK10tCj5mr0ufPj8xpHuaJGLMXfxCDRG94vXCqHx/jr3MXLAyLwyFL7i7Aj7KyK6O+4uxy3VQ4gE7DfPQF2B27TaTWmrjgoN8EBUeC94OuJOWAjlPmxY5NtssNr9qo5h57fFVtKmVa4XWkwXO2loF4N9NbAPZNMNIqIpPiLR5sOnn6IVHmHMnUTzL8ya47OzCgsCS+pztThw1ioNjs3B1oM6eGlsNmJnOrLWBRBiwX2AZSExWM6KQxE6zQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JLGARLFu0OCksTqjfABCFLeyK7Gvl8w8BpZ7pxPhQbqFoIzmTCrOB7cGB7+773+ZJJvyZJefmH3g1hNnAwl2+3qdlLmr0g5KNd9vJ+vZgGvlitAg4XCZYkCMSEipYoKM4e8Czt6/KkTBNm/k35pCcrg5iEJ0Ir8bgqBMUdiztNzVcM+ob+GdrvX2xypRrrLWufwWXB6HFsYC0P2URwgq0X11mca13Vw3NHnHqWui6bdv4ZTCVsoKacXEHmgH1iS7igont8sSzNT8/dqkAMwms3MA54cNl8MGWZBeYjZJV34HplEhnLRVduPFpcBu4flrAkJip8RrR63VmJn0cgDoVw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>, Paul Durrant <paul@xxxxxxx>, "open list:X86 Xen CPUs" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, qemu-devel@xxxxxxxxxx
  • Delivery-date: Tue, 15 Nov 2022 14:05:34 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 15.11.2022 12:38, Marek Marczykowski-Górecki wrote:
> On Tue, Nov 15, 2022 at 09:14:07AM +0100, Jan Beulich wrote:
>> On 14.11.2022 20:20, Marek Marczykowski-Górecki wrote:
>>> The /dev/mem is used for two purposes:
>>>  - reading PCI_MSIX_ENTRY_CTRL_MASKBIT
>>>  - reading Pending Bit Array (PBA)
>>>
>>> The first one was originally done because when Xen did not send all
>>> vector ctrl writes to the device model, so QEMU might have outdated old
>>> register value. This has been changed in Xen, so QEMU can now use its
>>> cached value of the register instead.
>>>
>>> The Pending Bit Array (PBA) handling is for the case where it lives on
>>> the same page as the MSI-X table itself. Xen has been extended to handle
>>> this case too (as well as other registers that may live on those pages),
>>> so QEMU handling is not necessary anymore.
>>
>> Don't you need to check for new enough Xen for both aspects?
> 
> Yes, see my response to Andrew in the thread. I'm open for suggestions
> what to check specifically (Xen version directly?). 

I guess we should first see what changes we (you) end up doing in Xen
itself, and then decide whether to surface the new functionality in
some kind of feature indicator. Generally I'd prefer to avoid version
checks, because they don't fit very well with backports nor the (rare)
need to revert something. But sometimes a feature can be probed easily
without requiring an explicit feature indicator.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.