On Mon, Apr 24, 2017 at 10:58:04AM +0100, Paul Durrant wrote: > > -----Original Message----- > > From: Roger Pau Monne > > Sent: 24 April 2017 10:42 > > To: Paul Durrant <paul.durr...@citrix.com> > > Cc: xen-de...@lists.xenproject.org; konrad.w...@oracle.com; > > boris.ostrov...@oracle.com; Ian Jackson <ian.jack...@citrix.com>; Wei Liu > > <wei.l...@citrix.com>; Jan Beulich <jbeul...@suse.com>; Andrew Cooper > > <andrew.coop...@citrix.com> > > Subject: Re: [PATCH v2 1/9] xen/vpci: introduce basic handlers to trap > > accesses to the PCI config space > > > > On Fri, Apr 21, 2017 at 05:23:34PM +0100, Paul Durrant wrote: > > > > -----Original Message----- > > > > From: Roger Pau Monne [mailto:roger....@citrix.com] > > [...] > > > > +int xen_vpci_read(unsigned int seg, unsigned int bus, unsigned int > > devfn, > > > > + unsigned int reg, uint32_t size, uint32_t *data) > > > > +{ > > > > + struct domain *d = current->domain; > > > > + struct pci_dev *pdev; > > > > + const struct vpci_register *r; > > > > + union vpci_val val = { .double_word = 0 }; > > > > + unsigned int data_rshift = 0, data_lshift = 0, data_size; > > > > + uint32_t tmp_data; > > > > + int rc; > > > > + > > > > + ASSERT(vpci_locked(d)); > > > > + > > > > + *data = 0; > > > > + > > > > + /* Find the PCI dev matching the address. */ > > > > + pdev = pci_get_pdev_by_domain(d, seg, bus, devfn); > > > > + if ( !pdev ) > > > > + goto passthrough; > > > > > > I hope this can eventually be generalised so I wonder what your intention > > > is > > regarding co-existence between Xen emulated PCI config space, pass- > > through and PCI devices emulated externally. We already have a framework > > for registering PCI devices by SBDF but this code seems to make no use of > > it, > > which I suspect is likely to cause future conflict. > > > > Yes, the long term aim is to use this code in order to implement > > PCI-passthrough for PVH and HVM DomUs also. > > > > TBH, I didn't know we already had such code (I assume you mean the IOREQ > > related PCI code). As it is, I see a couple of issues with that, the first > > one > > is that this code expects a ioreq client on the other end, and the code I'm > > adding here is all inside of the hypervisor. The second issue is that the > > IOREQ > > code ATM only allows for local PCI accesses, which means I should extend it > > to > > also deal with ECAM/MMCFG areas. > > > > I completely agree that at some point this should be made to work together, > > but > > I'm not sure if it would be better to do that once we want to also use vPCI > > for > > DomUs, so that the Dom0 side is not delayed further. > > BTW, that's also an argument for forgetting about the r-b scheme for handler > registration since, if this really is for dom0 only, 8 pages worth of direct > map is not a lot.
It's 8 pages for each device, not 8 pages for each domain, so it doesn't matter if it's Dom0 or DomU, each PCIe device would use 8 pages. Roger. _______________________________________________ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel