[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PCI passthrough on arm Design Session MoM


  • To: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Wed, 8 Jul 2020 12:55:36 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7O0pWyJHPvi8nQWXoAC5491PgIgYx6Koi38WUGnJONA=; b=eHQD7tbX6ONuBkzDVGblzBi6c1xKKRZXLO6iQ4qUw99Qw2XMl3UnSFnnhSHrVr0+YOb2hdt6whfyW3UTSIKOmbC2EAyVxWHyup+ugrY2TuPWHh4d82BD/3JpHp4P7qlbk2VQ9WhT+1tOcZA574CwQtgqACjEZABdnPm8A6cjhGT+vgxLJxMVkX8SLBoy9FRaMkQq7rl0x++SuMn5PjM8iAuXZnJqs8TF71CtdcV7DHjU7lnXQuMsejX9C/KMrNKANhhAv4SgWjYrL2LdcRYMQseJB2vMrQzUB6RHFAnyK9hPBj3OZ5YPQN6rzqVEA7QA7gW3CJLBuqLimYT/SgkKyg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kpNeAywT9SXiqyv8+hUA+CUOPetR+aF8BY6FJ7yca8nu5c0JLoXMZ/zaiKiChjbMUxFW+Vvt+jqrWgXAcDGhCLGdPaUFeJdiSmXW+wJD1C5C+LNv62VoLUGsvZObUlHpMOCm4ppGOvFgm6XeipghISOtpUhpXNkY/tLG3wfJtHW9am3uHAYO0DZK3LTitYEr+Bo0IG9IBWsMYlIpbQPTLYwHSeDYEk+JBUCrPtlCJy0sWMaP8R1U3sj5iiM8x0hG+yVz8UPdYo+5muYrinzW3G81l2nip53x5Wz5iNsjMmHH2l/suMPMKBkV9ZwLiuRRuZVpuxbYB55BMR/CYSbfyQ==
  • Authentication-results-original: lists.xenproject.org; dkim=none (message not signed) header.d=none; lists.xenproject.org; dmarc=none action=none header.from=arm.com;
  • Cc: nd <nd@xxxxxxx>, Rahul Singh <Rahul.Singh@xxxxxxx>
  • Delivery-date: Wed, 08 Jul 2020 12:56:13 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: lists.xenproject.org; dkim=none (message not signed) header.d=none;lists.xenproject.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHWVScSyjWrTj065kev9PFLOqlwvQ==
  • Thread-topic: PCI passthrough on arm Design Session MoM

Hi,

Here are the notes we took during the design session around PCI devices 
passthrough on Arm.
Feel free to comment or add anything :-)

Bertrand

PCI devices passthrough on Arm Design Session
======================================

Date: 7/7/2020

- X86 VPCI support  is for the PVH guest .
- X86 PCI devices discovery code should be checked and maybe used on Arm as it 
is not very complex
        - Remark from Julien: This might not work in number of cases
- Sanitation of each the PCI access for each guest in XEN is required
- MSI trap is not required for gicv3 but it required for gicv2m
        - We do not plan to support non ITS GIC
- Check possibility to add some specifications in EBBR for PCI enumeration 
(address assignment part)
- PCI enumeration support should not depend on DOM0 for safety reasons
- PCI enumeration could be done in several places
        - DTB, with some entries giving values to be applied by Xen
        - In XEN (complex, not wanted out of devices discovery)
        - In Firmware and then xen device discovery
- As per Julien it is difficult to tell the XEN on which segment PCI device is 
present
        - Current test implementation is done on Juno where there is only one 
segment
        - This should be investigated with an other hardware in the next months
- Julien mentioned that clocks issues will be complex to solve and most 
hardware are not following the ECAM standard
- Julien mentioned that Linux and Xen could do the enumeration in a different 
way, making it complex to have linux doing an enumeration after Xen
- We should push the code we have ASAP on the mailing list for a review and 
discussion on the design
        - Arm will try to do that before end of July
- It would be good to push some PCI support in Xen even though it would not be 
compatible with all hardware





 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.