[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2 0/9] vpci: PCI config space emulation
Hello, The following series contain an implementation of handlers for the PCI configuration space inside of Xen. This allows Xen to detect accesses to the PCI configuration space and react accordingly. Patch 1 implements the generic handlers for accesses to the PCI configuration space together with a minimal user-space test harness that I've used during development. Currently a per-device red-back tree is used in order to store the list of handlers, and they are indexed based on their offset inside of the configuration space. Patch 1 also adds the x86 port IO traps and wires them into the newly introduced vPCI dispatchers. Patch 2 adds handlers for the ECAM areas (as found on the MMCFG ACPI table). Patches 3 and 4 are mostly code moment/refactoring in order to implement support for BAR mapping in patch 5. Patch 6 allows Xen to mask certain PCI capabilities on-demand, which is used in order to mask MSI and MSI-X. Finally patches 8 and 9 implement support in order to emulate the MSI/MSI-X capabilities inside of Xen, so that the interrupts are transparently routed to the guest. This series is based on top of my previous "x86/dpci: bind legacy PCI interrupts to PVHv2 Dom0". The branch containing the patches can be found at: git://xenbits.xen.org/people/royger/xen.git vpci_v2 Note that this is only safe to use for the hardware domain (that's trusted), any non-trusted domain will need a lot more of traps before it can freely access the PCI configuration space. Thanks, Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |