[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v6 1/8] vpci/header: Emulate extended capability list for dom0


  • To: Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • From: "Chen, Jiqian" <Jiqian.Chen@xxxxxxx>
  • Date: Tue, 24 Jun 2025 07:01:10 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=w0G8RpxyseQ+LwX4bSHiNKqzn/0U9DNZI25y3B63mNI=; b=MeoQJKugsd33elynreIwy53dVKlj04/ccZpQDc6U8khGAS+PliQlzAaPaAUT6dgAuWrJ7PULmHywfovXSNxYvsNMYownyNVp+yc2IAWDcJ9BAeIrArW8zbbHbLwSHYjamTtxXDswUP2+l5bIbRRrVtkTouaqUvQA3XZ8FWZ9B45f3OXv9f8kJlGMknDy3rzapDBGm3ZKbiyL+NVKVG0EVSLC9E/jJIqL0i0KHOZqoNShsCoI5e/F5fW8GjCyxdNC6SlJbkD8qN1AnCaoaQBTA70GksbThYDKbxSxyFnbmdpjjTUGmwnUGbzk16tFdjJqQrD2Ig3pvS7tjVWuZNu8eg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WHCTXoyU4979xWvloFyR/hj85+jCLgOwsUa15QCm0mY4mgqv5Y2mp3+c68JqmIfxL6uEoINwvZGPcThPoZHt2suu1sXEV8rXnbJcP+Ugd3p4oORKQP/hmzYVjJQIp+W2mLd8vX++mHM2D+ScPm08loi3grjfwCgKSSKYmNKm/ODuVM6kXcF8p6gIKGoiXd2BeIPYtKmM11XN1FeLtgL/TFp9ROM9Fpvijw5ULsIdDij3wvGZQlgtvWpi6g5cfguF/ofm64kb9Y4uxyZNxFADLhNZ9qifHq+Kuo+f0Sw+14Nf8KcDJ8zcNBSqHvvAtsyffrPUBG5LLcNcwICsQnOy3Q==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
  • Cc: "Huang, Ray" <Ray.Huang@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "Chen, Jiqian" <Jiqian.Chen@xxxxxxx>
  • Delivery-date: Tue, 24 Jun 2025 07:01:22 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHb23yZHYwoBN0glE68BnOedByoqrQI+ZKAgAFXGYCAAVGyAIAG16sA
  • Thread-topic: [PATCH v6 1/8] vpci/header: Emulate extended capability list for dom0

On 2025/6/20 14:29, Jan Beulich wrote:
> On 19.06.2025 04:29, Chen, Jiqian wrote:
>> On 2025/6/18 21:52, Jan Beulich wrote:
>>> On 12.06.2025 11:29, Jiqian Chen wrote:
>>>> --- a/xen/drivers/vpci/header.c
>>>> +++ b/xen/drivers/vpci/header.c
>>>> @@ -836,6 +836,42 @@ static int vpci_init_capability_list(struct pci_dev 
>>>> *pdev)
>>>>                                    PCI_STATUS_RSVDZ_MASK);
>>>>  }
>>>>  
>>>> +static int vpci_init_ext_capability_list(struct pci_dev *pdev)
>>>> +{
>>>> +    unsigned int pos = PCI_CFG_SPACE_SIZE;
>>>> +
>>>> +    if ( !is_hardware_domain(pdev->domain) )
>>>> +        /* Extended capabilities read as zero, write ignore for guest */
>>>
>>> s/guest/DomU/ ?
>> Will do.
>>
>>>
>>>> +        return vpci_add_register(pdev->vpci, vpci_read_val, NULL,
>>>> +                                 pos, 4, (void *)0);
>>>> +
>>>> +    while ( pos >= PCI_CFG_SPACE_SIZE )
>>>> +    {
>>>> +        uint32_t header = pci_conf_read32(pdev->sbdf, pos);
>>>> +        int rc;
>>>> +
>>>> +        if ( !header )
>>>> +            return 0;
>>>
>>> Is this a valid check to make for anything other than the first read? And 
>>> even
>>> if valid for the first one, shouldn't that also go through ...
>>>
>>>> +        rc = vpci_add_register(pdev->vpci, vpci_read_val, vpci_hw_write32,
>>>> +                               pos, 4, (void *)(uintptr_t)header);
>>>
>>> ... here?
>> If header of first is zero. There is no need to add a register I think, 
>> since the dom0 can read/write directly.
> 
> Well, my remark of course did go along with that further down. Plus I wonder
> why the entire field being zero is special, but the field holding, say,
> 0x00010000 isn't. Yes, the spec calls out zeroes in all fields specially,
> yet at the same time it does say nothing about certain other special values.
If want to cover these special values.
Should I need to change the check from "!header" to "! PCI_EXT_CAP_ID(header)" ?

> 
> Jan
> 
>>>> --- a/xen/drivers/vpci/vpci.c
>>>> +++ b/xen/drivers/vpci/vpci.c
>>>> @@ -267,6 +267,12 @@ void cf_check vpci_hw_write16(
>>>>      pci_conf_write16(pdev->sbdf, reg, val);
>>>>  }
>>>>  
>>>> +void cf_check vpci_hw_write32(
>>>> +    const struct pci_dev *pdev, unsigned int reg, uint32_t val, void 
>>>> *data)
>>>> +{
>>>> +    pci_conf_write32(pdev->sbdf, reg, val);
>>>> +}
>>>
>>> Iirc we've been there before, yet I continue to wonder whether we're doing
>>> ourselves any good in allowing writes to something that certainly better
>>> wouldn't change. Even if we limit this to Dom0.
>> I remember this was suggested by Roger in V2, since the Dom0 has no 
>> limitations to write the extended register.
>>
>>>
>>> Jan
>>
> 

-- 
Best regards,
Jiqian Chen.

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.