[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 2/2] x86/PCI: Intercept Dom0 MMCFG from dom0s in HVM containers
>>> On 17.12.15 at 21:22, <boris.ostrovsky@xxxxxxxxxx> wrote: > Commit 9256f66c1606 ("x86/PCI: intercept all PV Dom0 MMCFG writes") > added intercepts for writes to RO MMCFG space from PV dom0. > > Similar functionality is needed by dom0s in HVM containers (such as > PVH and, in the future, HVMlite). > > Signed-off-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> Looks okay leaving aside the question of r/o device handling. A few minor remarks: > @@ -463,4 +466,14 @@ void * > decode_register( > uint8_t modrm_reg, struct cpu_user_regs *regs, int highbyte_regs); > > +/* Unhadleable read, write or instruction fetch */ Unhandleable > +int > +unhandleable_rwx( x86emul_unhandleable_rwx() or some such, making it clear what component it belongs to. I also doubt the x here really makes much sense - the insn_fetch field can't usefully point to that function. > + enum x86_segment seg, > + unsigned long offset, > + void *p_data, > + unsigned int bytes, > + struct x86_emulate_ctxt *ctxt); > + > + > #endif /* __X86_EMULATE_H__ */ One blank line only please. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |