[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 02/11] vpci: introduce basic handlers to trap accesses to the PCI config space
>>> On 04.10.17 at 11:24, <roger.pau@xxxxxxxxxx> wrote: > On Wed, Oct 04, 2017 at 08:30:38AM +0000, Jan Beulich wrote: >> >>> On 19.09.17 at 17:29, <roger.pau@xxxxxxxxxx> wrote: >> > +static int vpci_portio_read(const struct hvm_io_handler *handler, >> > + uint64_t addr, uint32_t size, uint64_t *data) >> > +{ >> > + struct domain *d = current->domain; >> > + unsigned int reg; >> > + pci_sbdf_t sbdf; >> > + uint32_t cf8; >> > + >> > + *data = ~(uint64_t)0; >> > + >> > + if ( addr == 0xcf8 ) >> > + { >> > + ASSERT(size == 4); >> > + *data = d->arch.hvm_domain.pci_cf8; >> > + return X86EMUL_OKAY; >> > + } >> > + >> > + cf8 = ACCESS_ONCE(d->arch.hvm_domain.pci_cf8); >> > + if ( !CF8_ENABLED(cf8) ) >> > + return X86EMUL_OKAY; >> >> Why is this OKAY instead of UNHANDLEABLE? The access is supposed to be >> forwarded to qemu if it's not a config space one. Same in the write path >> then. > > No, I don't think this should be forwarded to QEMU. It is a config > space access (because vpci_portio_accept returned true). But the value > in CF8 doesn't have the enabled bit set, hence the access is > discarded. With the enable bit clear it is my understanding that this is then _not_ a config space access. vpci_portio_accept() simply doesn't have enough information to tell. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |