|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v5][PATCH 0/5] xen: add Intel IGD passthrough support
On 2014/7/2 14:22, Michael S. Tsirkin wrote: On Wed, Jul 02, 2014 at 08:59:38AM +0800, Chen, Tiejun wrote:On 2014/7/1 20:33, Michael S. Tsirkin wrote:On Tue, Jul 01, 2014 at 05:46:58PM +0800, Chen, Tiejun wrote:On 2014/7/1 17:12, Michael S. Tsirkin wrote:On Tue, Jul 01, 2014 at 10:40:42AM +0800, Chen, Tiejun wrote:On 2014/6/30 19:28, Michael S. Tsirkin wrote:On Mon, Jun 30, 2014 at 06:20:22PM +0800, Chen, Tiejun wrote:On 2014/6/30 17:55, Michael S. Tsirkin wrote:On Mon, Jun 30, 2014 at 05:38:21PM +0800, Chen, Tiejun wrote:On 2014/6/30 17:05, Michael S. Tsirkin wrote:On Mon, Jun 30, 2014 at 03:24:58PM +0800, Chen, Tiejun wrote:On 2014/6/30 14:48, Michael S. Tsirkin wrote:On Mon, Jun 30, 2014 at 10:51:49AM +0800, Chen, Tiejun wrote:On 2014/6/26 18:03, Paolo Bonzini wrote:Il 26/06/2014 11:18, Chen, Tiejun ha scritto:- offsets 0x0000..0x0fff map to configuration space of the host MCHAre you saying the config space in the video device?No, I am saying in a new BAR, or at some magic offset of an existing MMIO BAR.As I mentioned previously, the IGD guy told me we have no any unused a offset or BAR in the config space. And guy who are responsible for the native driver seems not be accept to extend some magic offset of an existing MMIO BAR. In addition I think in a short time its not possible to migrate i440fx to q35 as a PCIe machine of xen.That seems like a weak motivation. I don't see a need to get something merged upstream in a short time: this seems sure to miss 2.1, so you have the time to make it architecturally sound. "Making existing guests work" would be a better motivation.Yes.So focus on this then. Existing guests will probably work fine on a newer chipset - likely better than on i440fx. xen management tools need to do some work to support this? That will just give everyone more long term benefits. If instead we create a hack that does not resemble any existing hardware even remotely, what's the chance that it will not break with any future guest modification?Isn't this possible with an mch chipset?If you're saying q35, I mean AFAIK we have no any plan to migrate to this MCH in xen case.q35 or a newer chipset that's closer to what guests expect.Additionally, I think I should follow this feature after q35 can work for xen scenario.What's stopping you?I mean if you want create an new machine based on q35, actually this is equal to start making xen to migrate to q35 now. Right? I can't image how much effort should be done.I don't see why you don't try. Sounds like a more robust solution to me.As I think this is another requirement to us. I'm not sure if I have enough time to touch this currently.So this is a reason why I'm saying I'd like to follow this feature after q35 can work with xen completely.Then we'll end up with more configurations to support, and to what end?So could we do this step by step: #1 phase: We just cover current qemu-xen implementation based on i44fx, so still provide that pseudo ISA bridge at 00:1f.0 as we already did.By the way there is no reason to put it at 00:1f.0 specifically I think. So it seems simple: create a dummy device that gets device and vendor id as properties. If you really like, add an option to get valuesYes, this is just what we did in [Xen-devel] [v5][PATCH 2/5] xen, gfx passthrough: create pseudo intel isa bridge. There, we fake this device just at 00:1f.0. But you guys don't like this, and shouldn't this be just this point we discussing now? If you guys agree that , everything is fine.Actually, this isn't what you did. Don't tie it to xen, and don't tie it to 1f. Just make it a simple stub pci device. Whoever wants it, creates it. The thing I worry about, is the chance this will break going forward. So you created a system with 2 isa bridges. I think this will definitely work as long as we still have a PCI device represented with a real vendor/device ids. I'm sure windows has a similar API as well. I guess this is true as well but firstly I have to further ask native team guys if both native Linux and Windows are like this way to avoid we're missing something. Thanks Tiejun This isn't a suggestion to make the change in guests right now! Just a question.Same applies to MCH really.get things working first, find a clean way for new driver to work next.This is already not something that exists on real hardware. So it might break some guests that will get confused. Maybe we are lucky and most guests see an unfamiliar device and ignore it. It seems believable. But your MCH hack overrides registers in the pci host.We just try to write *one* register we already confirm this is safe enough.This should go in code in form of comments: document what this register does on 440fx and why it's safe to override. We don't see what you confirmed off-line.That offset is one specific to IGD usage, not for i440fx common. This is why we need to expose something in the host bridge. They're just introduced to support IGD.Other register are read-only.Doesn't matter, need to document these as well.I think everything are covered in igd_pci_write()/igd_pci_write().Are we lucky and there's nothing in these registers of interest to guests? This seems much more fragile. So please poke at the spec, and compile the list of registers you want to touch, figure out why they are safe to override, and put this all in code comments. And the same thing that applies to the isa bridgeWe just expose its own vendor/device ids here. We don't access to change anything in the isa bridge.applies here too. It should work without QEMU touching hosts' hardware.>from sysfs: device and vendor id are world readable, so just get themdirectly and not through xen wrappers, this way you can open the files RO and not RW. You seem to poke at revision as well, I don't see driver looking at that - strictly necessary? If yes please patch host kernel to expose that info in sysfs, though we can fall back on pci config if not there. MCH (bridge_dev) hacks in i915 are nastier. To clean them up, we really have to have an explicit driver for this bridge, not a pass-through device. Long term, the right thing to do is likely to extend host driver and expose the necessary information in sysfs on host kernel.I'm a bit confused. Any sysfs should be filled by the associated PCIe device, shouldn't it? So qemu still need to emulate this PCIe device firstly, then set properties into sysfs.I am talking about getting host properties into qemu. You don't want to give qemu R/W root access to host sysfs system of the root bridge, that's not secure. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |