[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH v2 0/4] vpci: first series in preparation for vpci on ARM


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Date: Mon, 18 Jul 2022 21:15:39 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DVMURCXF+8xKx1eYG9povulw9IOC6DKljZ6HILZCK2I=; b=DLCOVgrg+iBEuI5AMgjr4NTV6r4Sa25v2AEsYgSLBgbprOuWWvPGJazn7W+SXro2Qya67HG/BXgO6piK+IozL8RfG3AjqBEZwafihpDUHSq39Zdtrv28aDomKzy2AWJ+DmF2j3mSTFDLahaFh9B5leuJTxHgro9Os+eJtCU6Xc3dsBdDcDNg8+UEdOHYQhv4ESlI+41/6YjKJtU+YO4F7/aC85tfsMqGoFoBW4eT1zaSpWHEfzu4RoU5/UmHzx/fUNBxJiVJzy5L65NZjcsypaGlcxJDwn+1LsV0i3UH5AM9Kj5wem95/VOgYcRofrazbXCm7eezrWPGv3Q8By91Cg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OC9zgu3yqwZR5XqSIru2I3ga28LlND5uf5jXSAnCRzCJFYDyVVZwm8prB6ZS8poLcdcw9WhtwNASkm2BFJ3VFsStsgZWgR7kojTUt5wDFXVmTdRuUdo0LjeV0A8i/VhSLxO91fwZ8Q8FW70YV6CXSF6j/W1MD8fmR13fWzRNCShi/McHQdpr+knfv8p0SWr4ieIoNVkX3vmWq3QzI59Ej7SV/nDE6NI27zuAk+149WFFImSxmWxpe4fwRQ53jRLNKrGqHzbgj7QbTVEgsfQ2rqDQGATZWf9Ja2VYQCPVNWNg1BKnI6MWXjre/bwo9kDcV/ctc42z05rOxQF50gj/0A==
  • Cc: Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Paul Durrant <paul@xxxxxxx>
  • Delivery-date: Mon, 18 Jul 2022 21:15:59 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHYmuuIRfBsTERtW0qM5QZ/dvYwvw==
  • Thread-topic: [PATCH v2 0/4] vpci: first series in preparation for vpci on ARM

Hello all,

While Oleksandr Andrushchenko is busy with more important matters, I
want to continue his work on preparing different Xen subsystems to
support PCI on ARM platform.

This patch series are mostly focused on next take of PCI locking
rework. It introduces reentrant read/write locking mechanism for
pcidevs, which will be immediatelly used to decouple readers and
writers in the PCI code. There are also some minor changes to a
related vpci code.

Oleksandr Andrushchenko (3):
  pci: add rwlock to pcidevs_lock machinery
  vpci: restrict unhandled read/write operations for guests
  vpci: use pcidevs locking to protect MMIO handlers

Volodymyr Babchuk (1):
  vpci: include xen/vmap.h to fix build on ARM

 xen/arch/x86/hvm/vmsi.c       | 46 +++++++++++++++++--------
 xen/arch/x86/irq.c            |  8 ++---
 xen/arch/x86/msi.c            | 16 ++++-----
 xen/drivers/passthrough/pci.c | 65 +++++++++++++++++++++++++++++++----
 xen/drivers/vpci/header.c     | 24 +++++++++++--
 xen/drivers/vpci/msi.c        | 21 +++++++----
 xen/drivers/vpci/msix.c       | 55 +++++++++++++++++++++++++----
 xen/drivers/vpci/vpci.c       | 29 +++++++++++++---
 xen/include/xen/pci.h         | 11 +++++-
 xen/include/xen/vpci.h        |  2 +-
 10 files changed, 223 insertions(+), 54 deletions(-)

-- 
2.36.1

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.