diff options
author | Alex Williamson <alex.williamson@redhat.com> | 2016-07-18 10:55:17 -0600 |
---|---|---|
committer | Alex Williamson <alex.williamson@redhat.com> | 2016-07-18 10:55:17 -0600 |
commit | 383a7af7ecd1f1b6587552b71b8bc517c6edea88 (patch) | |
tree | a3db79a1dd15ddd29754d7d40a5e83ee40b34a2a /hw/vfio | |
parent | 3913d3707e3debfbf0d2d014a1a793394993b088 (diff) | |
download | qemu-383a7af7ecd1f1b6587552b71b8bc517c6edea88.zip qemu-383a7af7ecd1f1b6587552b71b8bc517c6edea88.tar.gz qemu-383a7af7ecd1f1b6587552b71b8bc517c6edea88.tar.bz2 |
vfio/pci: Hide ARI capability
QEMU supports ARI on downstream ports and assigned devices may support
ARI in their extended capabilities. The endpoint ARI capability
specifies the next function, such that the OS doesn't need to walk
each possible function, however this next function is relative to the
host, not the guest. This leads to device discovery issues when we
combine separate functions into virtual multi-function packages in a
guest. For example, SR-IOV VFs are not enumerated by simply probing
the function address space, therefore the ARI next-function field is
zero. When we combine multiple VFs together as a multi-function
device in the guest, the guest OS identifies ARI is enabled, relies on
this next-function field, and stops looking for additional function
after the first is found.
Long term we should expose the ARI capability to the guest to enable
configurations with more than 8 functions per slot, but this requires
additional QEMU PCI infrastructure to manage the next-function field
for multiple, otherwise independent devices. In the short term,
hiding this capability allows equivalent functionality to what we
currently have on non-express chipsets.
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
Reviewed-by: Marcel Apfelbaum <marcel@redhat.com>
Diffstat (limited to 'hw/vfio')
-rw-r--r-- | hw/vfio/pci.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index 44783c5..c8436a1 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -1828,6 +1828,7 @@ static int vfio_add_ext_cap(VFIOPCIDevice *vdev) switch (cap_id) { case PCI_EXT_CAP_ID_SRIOV: /* Read-only VF BARs confuse OVMF */ + case PCI_EXT_CAP_ID_ARI: /* XXX Needs next function virtualization */ trace_vfio_add_ext_cap_dropped(vdev->vbasedev.name, cap_id, next); break; default: |