[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 08/10] vpci/arm: Allow updating BAR's header for non-ECAM bridges


  • To: Jan Beulich <jbeulich@xxxxxxxx>, Oleksandr Andrushchenko <andr2000@xxxxxxxxx>
  • From: Oleksandr Andrushchenko <Oleksandr_Andrushchenko@xxxxxxxx>
  • Date: Fri, 13 Nov 2020 10:55:13 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MTmf1xo1ri00lh5oQncPVVAvvL2RpcWSZY5ZC3IWaoE=; b=ZmcsllVJrTEcWvr+ZsoUoGrq6OlID4QMJjv8DembL3XX/j7UvdD62vku3SGwaUhyhWIKGOtMJxTA8RhXl+I08mhVWy2Wmlo3QCUiR/s4Qand8/suC2ejkOuUH4uqNlollRx552WJB3TFzbae4/FYl32W8HYoKEKVpYsTsBiakR1HcUKHG+lw5gvVn9ZmaPuDYCmCCEeLsGv16cF71SRsQUsWjTdVercRvLZKByADUdtACEmZHUechZpoahMwmjqHdCD2w3PIqHGfvR/jdP/yW14tY9LLCiqm9MOZ3lWv23hI+v/u9T9N5IaFyAqb+Q+yvRvuPmlykNP/6Tg7Zx38OQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ENqQ47H8g+p3HT6+RUo+Enr48MEMiy4OVq5mCifgjwjJ20aGWrXHSqDVCkfzz35q9vrguJk4gIN+nbMDGet3KtTwr4aSOqkNzSN/LRDmZltQHfIMGYU3k1wxzZfV4V7rnWD4QSjc+1e57aCn9qdRH2QxSfHWZWSjLFTodDAbAiM2Eo2pwSumlSbXYRchn43yWEAd4zZdOBnGP0KUnwt4NgF9vNwrZ7M/s4MpOU06z3uiaxZsMEqO+QCWnnn+aWbNmV0g2SKfpehd/Jy/35SI7BGU410g3nr2XN4xWuAOyN8RbWdnLsj82qAQX2HEqaS5FFsI8Ti1oTWMOBFnGH7oww==
  • Authentication-results: suse.com; dkim=none (message not signed) header.d=none;suse.com; dmarc=none action=none header.from=epam.com;
  • Cc: "iwj@xxxxxxxxxxxxxx" <iwj@xxxxxxxxxxxxxx>, "wl@xxxxxxx" <wl@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "julien.grall@xxxxxxx" <julien.grall@xxxxxxx>, "Bertrand.Marquis@xxxxxxx" <Bertrand.Marquis@xxxxxxx>, "sstabellini@xxxxxxxxxx" <sstabellini@xxxxxxxxxx>, "roger.pau@xxxxxxxxxx" <roger.pau@xxxxxxxxxx>, "Rahul.Singh@xxxxxxx" <Rahul.Singh@xxxxxxx>
  • Delivery-date: Fri, 13 Nov 2020 10:55:30 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHWtpbyYHzQ7b7gKkKm7jsDdoAEE6nF4pWAgAACsYCAAAJmAIAAAhEA
  • Thread-topic: [PATCH 08/10] vpci/arm: Allow updating BAR's header for non-ECAM bridges

On 11/13/20 12:47 PM, Jan Beulich wrote:
> On 13.11.2020 11:39, Oleksandr Andrushchenko wrote:
>> On 11/13/20 12:29 PM, Jan Beulich wrote:
>>> On 09.11.2020 13:50, Oleksandr Andrushchenko wrote:
>>>> From: Oleksandr Andrushchenko <oleksandr_andrushchenko@xxxxxxxx>
>>>>
>>>> Non-ECAM host bridges in hwdom go directly to PCI config space,
>>>> not through vpci (they use their specific method for accessing PCI
>>>> configuration, e.g. dedicated registers etc.).
>>> And access to these dedicated registers can't be intercepted?
>> It can. But then you have to fully emulate that bridge, e.g.
>>
>> "if we write A to regB and after that write C to regZ then it
>>
>> means we are accessing config space. If we write...."
> Sounds pretty much like the I/O port based access mechanism on
> x86, which also has some sort of "enable". Of course, I/O port
> accesses are particularly easy to intercept and handle...
Yes, it has somewhat similar idea
>
>> I mean this would need lots of code in Xen to achieve that
> Possibly, but look at the amount of code we have in Xen on the
> x86 side to handle MCFG writes by Dom0.

But MCFG is handled the same way for all x86 machines, right?

And here I'll have to have a SoC specific code, e.g. a specific driver

>
> Jan

Thank you,

Oleksandr

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.