[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v8 00/13] PCI devices passthrough on Arm, part 3


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Date: Thu, 20 Jul 2023 00:32:30 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JeowWcWPtPbWi0eZ5zqE5dIolWtWXr+/pLHrvWgkYIw=; b=EzPRdT+/Lh86sZc6Eq2rPy90VHag5ZaZm2CTy2jcQ5KGL4eXtRdcKge/fjv8qydsBLcQ4vLG7AC8F4ZN58v+B8jva+6dTpJ06coJeQrn9EAi7g7i0JWdt9l5uZ5k9WeLFWex/MFfJgRjXZKF70ACcFCro5HFRY11wWIjOeh21JJhgdxgR2Aw/aBGHI3s+MVZA/0LAJW4S7i8Sccq991JY48V2C8LCj58M+2IsJcPPc4EkXRvboOd6vTk5pf8F+5QBVMu1gGyjjgMdATiviWXaAsfiLnGG1eSjRQM/sQcvBzkf0GbS8iS9JEtC7g+/M/5Q6J2R58A/QFjdGXGAz1Mkw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fbF0bKnUtZ9ymR4HbSCROfRaaceHqpUNQBH26ssCKQDdJXaQ2tdz4BCa5cvjXfM+2CXyKx5X3M0ZraS5S2oDx+b085zBUffS9YMef3DZocfgryG9Y12hW20xhfnoKTK42HkUCosQ7zFUV5R5gW6VkB/B/74dee2pwziiVl6eKa/LoCXdnsOtrsEMnh61BlCpGhFStB/yPwSqCLbgeKPyVuBJfkDJA1KhzDV0WfbrMtgx0FF4z9lBEdVHekZOky2dN5cdPFtDZlwNMcmEQkGhcKWLAzG6WN9FXLwqczOJIiw5nQsOqNePn7htz6GJoBAsd8Co6fJ2kkBPj5javY1ydw==
  • Cc: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Thu, 20 Jul 2023 00:32:50 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHZuqGqn2EU3dWVak6ca3YhrfMkhg==
  • Thread-topic: [PATCH v8 00/13] PCI devices passthrough on Arm, part 3

Hello,

This is next version of vPCI rework. Aim of this series is to prepare
ground for introducing PCI support on ARM platform.

The biggest change from previous, mistakenly named, v7 series is how
locking is implemented. Instead of d->vpci_rwlock we introduce
d->pci_lock which has broader scope, as it protects not only domain's
vpci state, but domain's list of PCI devices as well.

As we discussed in IRC with Roger, it is not feasible to rework all
the existing code to use the new lock right away. It was agreed that
any write access to d->pdev_list will be protected by **both**
d->pci_lock in write mode and pcidevs_lock(). Read access on other
hand should be protected by either d->pci_lock in read mode or
pcidevs_lock(). It is expected that existing code will use
pcidevs_lock() and new users will use new rw lock. Of course, this
does not mean that new users shall not use pcidevs_lock() when it is
appropriate.

Apart from locking scheme rework, there are less major fixes in some
patches, based on the review comments.

Oleksandr Andrushchenko (12):
  vpci: use per-domain PCI lock to protect vpci structure
  vpci: restrict unhandled read/write operations for guests
  vpci: add hooks for PCI device assign/de-assign
  vpci/header: implement guest BAR register handlers
  rangeset: add RANGESETF_no_print flag
  vpci/header: handle p2m range sets per BAR
  vpci/header: program p2m with guest BAR view
  vpci/header: emulate PCI_COMMAND register for guests
  vpci/header: reset the command register when adding devices
  vpci: add initial support for virtual PCI bus topology
  xen/arm: translate virtual PCI bus topology for guests
  xen/arm: account IO handlers for emulated PCI MSI-X

Volodymyr Babchuk (1):
  pci: introduce per-domain PCI rwlock

 xen/arch/arm/vpci.c                         |  61 ++-
 xen/arch/x86/hvm/vmsi.c                     |   4 +
 xen/common/domain.c                         |   1 +
 xen/common/rangeset.c                       |   5 +-
 xen/drivers/Kconfig                         |   4 +
 xen/drivers/passthrough/amd/pci_amd_iommu.c |   9 +-
 xen/drivers/passthrough/pci.c               |  96 ++++-
 xen/drivers/passthrough/vtd/iommu.c         |   9 +-
 xen/drivers/vpci/header.c                   | 453 ++++++++++++++++----
 xen/drivers/vpci/msi.c                      |  18 +-
 xen/drivers/vpci/msix.c                     |  56 ++-
 xen/drivers/vpci/vpci.c                     | 176 +++++++-
 xen/include/xen/pci.h                       |   1 +
 xen/include/xen/rangeset.h                  |   5 +-
 xen/include/xen/sched.h                     |   9 +
 xen/include/xen/vpci.h                      |  42 +-
 16 files changed, 828 insertions(+), 121 deletions(-)

-- 
2.41.0

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.