xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: George Dunlap <george.dunlap@citrix.com>
To: Jan Beulich <JBeulich@novell.com>
Cc: George Dunlap <George.Dunlap@eu.citrix.com>,
	Jeremy Fitzhardinge <jeremy@goop.org>,
	"xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Subject: Re: [PATCH] xen/pci: make bus notifier handler	 return sane values
Date: Thu, 25 Aug 2011 11:15:57 +0100	[thread overview]
Message-ID: <1314267357.29585.7425.camel@elijah> (raw)
In-Reply-To: <4E563AFB02000078000532E6@nat28.tlf.novell.com>

On Thu, 2011-08-25 at 11:07 +0100, Jan Beulich wrote:
> >>> On 25.08.11 at 11:14, George Dunlap <george.dunlap@citrix.com> wrote:
> > On Wed, 2011-08-24 at 21:42 +0100, Konrad Rzeszutek Wilk wrote:
> >> > Requiring the PCI device to be known to Xen to be able to use MSI is
> >> > an implementation detail of the hypervisor. And in fact I had a patch
> >> > to remove the call to pci_get_pdev() from map_domain_pirq() (since
> >> > setup_msi_irq() doesn't really consume this parameter). This got made
> >> > impossible to do (at least for the moment) with George's
> >> > 23753:2e0cf9428554 (and later on the device is getting looked up by
> >> > __pci_enable_msi{,x}() anyway, but even that is an implementation
> >> > choice, not a hard requirement afaict).
> > 
> > The device has to be known to Xen in order to do proper interrupt
> > remapping, does it not?  At least if the AMD per-device interrupt
> > remapping tables.
> 
> Yes, but doesn't this only affect device passthrough? Further, Xen
> does its own (poor man's) PCI bus scan, so generally it knows of all
> devices (at least on segment 0).

>From what I understand, the IOMMU doesn't know which devices are being
passed through; if it's on, all devices have to be given permissions for
whatever they need to do.  You can boot with iommu=off, but then you
can't safely pass any devices through to other VMs, including driver
domains, and you can't pass devices through to HVM domains at all (no
address translation for DMA).

> Additionally the Dom0 kernel doesn't even know whether IOMMUs are
> actually in use by Xen.
> 
> Bottom line - imo still no reason to disable MSI (neither globally nor for
> the device).

I have no idea about this.  I was just commenting about my c/s requiring
Xen to know about PCI devices (which is I assume why you cc'd me). :-)

 -George

      reply	other threads:[~2011-08-25 10:15 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-08-17  8:32 [PATCH] xen/pci: make bus notifier handler return sane values Jan Beulich
2011-08-17 14:57 ` Konrad Rzeszutek Wilk
2011-08-17 15:18   ` Jan Beulich
2011-08-17 15:31     ` Konrad Rzeszutek Wilk
2011-08-17 15:37       ` Jan Beulich
2011-08-22 16:20 ` Konrad Rzeszutek Wilk
2011-08-23  8:19   ` Jan Beulich
2011-08-24 20:42     ` Konrad Rzeszutek Wilk
2011-08-25  9:14       ` George Dunlap
2011-08-25 10:07         ` Jan Beulich
2011-08-25 10:15           ` George Dunlap [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1314267357.29585.7425.camel@elijah \
    --to=george.dunlap@citrix.com \
    --cc=George.Dunlap@eu.citrix.com \
    --cc=JBeulich@novell.com \
    --cc=jeremy@goop.org \
    --cc=konrad.wilk@oracle.com \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).