[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v3 0/9] vpci: PCI config space emulation
Hello, The following series contain an implementation of handlers for the PCI configuration space inside of Xen. This allows Xen to detect accesses to the PCI configuration space and react accordingly. Although there hasn't been a lot of review on the previous version, I send this new version because I will be away for > 1 week, and I would rather have review on this version than the old one. As usual, each patch contains a changeset summary between versions. Patch 1 implements the generic handlers for accesses to the PCI configuration space together with a minimal user-space test harness that I've used during development. Currently a per-device red-back tree is used in order to store the list of handlers, and they are indexed based on their offset inside of the configuration space. Patch 1 also adds the x86 port IO traps and wires them into the newly introduced vPCI dispatchers. Patch 2 adds handlers for the ECAM areas (as found on the MMCFG ACPI table). Patches 3 and 4 are mostly code moment/refactoring in order to implement support for BAR mapping in patch 5. Patch 6 allows Xen to mask certain PCI capabilities on-demand, which is used in order to mask MSI and MSI-X. Finally patches 8 and 9 implement support in order to emulate the MSI/MSI-X capabilities inside of Xen, so that the interrupts are transparently routed to the guest. This series is based on top of my previous "x86/dpci: bind legacy PCI interrupts to PVHv2 Dom0". The branch containing the patches can be found at: git://xenbits.xen.org/people/royger/xen.git vpci_v3 Note that this is only safe to use for the hardware domain (that's trusted), any non-trusted domain will need a lot more of traps before it can freely access the PCI configuration space. Thanks, Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |