[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v3 07/10] x86/vMSI-X: support qword MMIO access
The specification explicitly provides for this, so we should have supported this from the beginning. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> --- a/xen/arch/x86/hvm/vmsi.c +++ b/xen/arch/x86/hvm/vmsi.c @@ -209,7 +209,7 @@ static int msixtbl_read( unsigned int nr_entry, index; int r = X86EMUL_UNHANDLEABLE; - if ( len != 4 || (address & 3) ) + if ( (len != 4 && len != 8) || (address & (len - 1)) ) return r; rcu_read_lock(&msixtbl_rcu_lock); @@ -227,15 +227,28 @@ static int msixtbl_read( !acc_bit(test, entry, nr_entry, index) ) goto out; *pval = entry->gentries[nr_entry].msi_ad[index]; + if ( len == 8 ) + { + if ( index ) + offset = PCI_MSIX_ENTRY_VECTOR_CTRL_OFFSET; + else if ( acc_bit(test, entry, nr_entry, 1) ) + *pval |= (u64)entry->gentries[nr_entry].msi_ad[1] << 32; + else + goto out; + } } - else + if ( offset == PCI_MSIX_ENTRY_VECTOR_CTRL_OFFSET ) { const struct msi_desc *msi_desc = msixtbl_addr_to_desc(entry, address); if ( !msi_desc ) goto out; - *pval = MASK_INSR(msi_desc->msi_attrib.guest_masked, - PCI_MSIX_VECTOR_BITMASK); + if ( len == 4 ) + *pval = MASK_INSR(msi_desc->msi_attrib.guest_masked, + PCI_MSIX_VECTOR_BITMASK); + else + *pval |= (u64)MASK_INSR(msi_desc->msi_attrib.guest_masked, + PCI_MSIX_VECTOR_BITMASK) << 32; } r = X86EMUL_OKAY; @@ -255,7 +268,7 @@ static int msixtbl_write(struct vcpu *v, unsigned long flags; struct irq_desc *desc; - if ( len != 4 || (address & 3) ) + if ( (len != 4 && len != 8) || (address & (len - 1)) ) return r; rcu_read_lock(&msixtbl_rcu_lock); @@ -266,16 +279,23 @@ static int msixtbl_write(struct vcpu *v, nr_entry = (address - entry->gtable) / PCI_MSIX_ENTRY_SIZE; offset = address & (PCI_MSIX_ENTRY_SIZE - 1); - if ( offset != PCI_MSIX_ENTRY_VECTOR_CTRL_OFFSET) + if ( offset != PCI_MSIX_ENTRY_VECTOR_CTRL_OFFSET ) { + index = offset / sizeof(uint32_t); if ( nr_entry < MAX_MSIX_ACC_ENTRIES ) { - index = offset / sizeof(uint32_t); entry->gentries[nr_entry].msi_ad[index] = val; acc_bit(set, entry, nr_entry, index); + if ( len == 8 && !index ) + { + entry->gentries[nr_entry].msi_ad[1] = val >> 32; + acc_bit(set, entry, nr_entry, 1); + } } set_bit(nr_entry, &entry->table_flags); - goto out; + if ( len != 8 || !index ) + goto out; + val >>= 32; } /* Exit to device model when unmasking and address/data got modified. */ @@ -305,7 +325,8 @@ static int msixtbl_write(struct vcpu *v, unlock: spin_unlock_irqrestore(&desc->lock, flags); - r = X86EMUL_OKAY; + if ( len == 4 ) + r = X86EMUL_OKAY; out: rcu_read_unlock(&msixtbl_rcu_lock); Attachment:
x86-vMSI-X-rw-qword.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |