[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH v13 07/60] xen-platform: exclude vfio-pci from the PCI platform u
From: |
David Woodhouse |
Subject: |
[PATCH v13 07/60] xen-platform: exclude vfio-pci from the PCI platform unplug |
Date: |
Thu, 23 Feb 2023 12:45:20 +0000 |
From: Joao Martins <joao.m.martins@oracle.com>
Such that PCI passthrough devices work for Xen emulated guests.
Signed-off-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Reviewed-by: Paul Durrant <paul@xen.org>
---
hw/i386/xen/xen_platform.c | 18 +++++++++++++++---
1 file changed, 15 insertions(+), 3 deletions(-)
diff --git a/hw/i386/xen/xen_platform.c b/hw/i386/xen/xen_platform.c
index 66e6de31a6..d601a5509d 100644
--- a/hw/i386/xen/xen_platform.c
+++ b/hw/i386/xen/xen_platform.c
@@ -109,12 +109,25 @@ static void log_writeb(PCIXenPlatformState *s, char val)
#define _UNPLUG_NVME_DISKS 3
#define UNPLUG_NVME_DISKS (1u << _UNPLUG_NVME_DISKS)
+static bool pci_device_is_passthrough(PCIDevice *d)
+{
+ if (!strcmp(d->name, "xen-pci-passthrough")) {
+ return true;
+ }
+
+ if (xen_mode == XEN_EMULATE && !strcmp(d->name, "vfio-pci")) {
+ return true;
+ }
+
+ return false;
+}
+
static void unplug_nic(PCIBus *b, PCIDevice *d, void *o)
{
/* We have to ignore passthrough devices */
if (pci_get_word(d->config + PCI_CLASS_DEVICE) ==
PCI_CLASS_NETWORK_ETHERNET
- && strcmp(d->name, "xen-pci-passthrough") != 0) {
+ && !pci_device_is_passthrough(d)) {
object_unparent(OBJECT(d));
}
}
@@ -187,9 +200,8 @@ static void unplug_disks(PCIBus *b, PCIDevice *d, void
*opaque)
!(flags & UNPLUG_IDE_SCSI_DISKS);
/* We have to ignore passthrough devices */
- if (!strcmp(d->name, "xen-pci-passthrough")) {
+ if (pci_device_is_passthrough(d))
return;
- }
switch (pci_get_word(d->config + PCI_CLASS_DEVICE)) {
case PCI_CLASS_STORAGE_IDE:
--
2.39.0
- [PATCH v13 20/60] i386/xen: implement HYPERVISOR_vcpu_op, (continued)
- [PATCH v13 20/60] i386/xen: implement HYPERVISOR_vcpu_op, David Woodhouse, 2023/02/23
- [PATCH v13 06/60] i386/kvm: Set Xen vCPU ID in KVM, David Woodhouse, 2023/02/23
- [PATCH v13 37/60] hw/xen: Implement EVTCHNOP_bind_vcpu, David Woodhouse, 2023/02/23
- [PATCH v13 38/60] hw/xen: Implement EVTCHNOP_reset, David Woodhouse, 2023/02/23
- [PATCH v13 30/60] hw/xen: Implement EVTCHNOP_close, David Woodhouse, 2023/02/23
- [PATCH v13 09/60] i386/xen: handle guest hypercalls, David Woodhouse, 2023/02/23
- [PATCH v13 25/60] i386/xen: implement HVMOP_set_evtchn_upcall_vector, David Woodhouse, 2023/02/23
- [PATCH v13 35/60] hw/xen: Implement EVTCHNOP_alloc_unbound, David Woodhouse, 2023/02/23
- [PATCH v13 45/60] i386/xen: Implement HYPERVISOR_grant_table_op and GNTTABOP_[gs]et_verson, David Woodhouse, 2023/02/23
- [PATCH v13 08/60] xen-platform: allow its creation with XEN_EMULATE mode, David Woodhouse, 2023/02/23
- [PATCH v13 07/60] xen-platform: exclude vfio-pci from the PCI platform unplug,
David Woodhouse <=
- [PATCH v13 42/60] kvm/i386: Add xen-gnttab-max-frames property, David Woodhouse, 2023/02/23
- [PATCH v13 31/60] hw/xen: Implement EVTCHNOP_unmask, David Woodhouse, 2023/02/23
- [PATCH v13 36/60] hw/xen: Implement EVTCHNOP_bind_interdomain, David Woodhouse, 2023/02/23
- [PATCH v13 50/60] hw/xen: Add backend implementation of interdomain event channel support, David Woodhouse, 2023/02/23
- [PATCH v13 49/60] i386/xen: handle HVMOP_get_param, David Woodhouse, 2023/02/23
- [PATCH v13 34/60] hw/xen: Implement EVTCHNOP_send, David Woodhouse, 2023/02/23
- [PATCH v13 16/60] i386/xen: manage and save/restore Xen guest long_mode setting, David Woodhouse, 2023/02/23
- [PATCH v13 29/60] hw/xen: Implement EVTCHNOP_status, David Woodhouse, 2023/02/23
- [PATCH v13 26/60] i386/xen: implement HVMOP_set_param, David Woodhouse, 2023/02/23
- [PATCH v13 14/60] xen: Permit --xen-domid argument when accel is KVM, David Woodhouse, 2023/02/23