[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH v2 0/2] Support of RO MMCFG access for PVH/HVMlite dom0s



v2:
* Expanded npfec structure to include page's precense indicator (I took the
  easy way out and didn't implement VMX's fine-grained status since I couldn't
  figure out how to properly do it in SVM)
* s/mmio/mmcfg for some operations. I left mmio_ro_emulate_ctxt as is because
  it is used for non-MMCFG accesses
* Properly initialized hvm_emulate_ctxt (set data pointer after
  hvm_emulate_prepare())
* Added error handling to _hvm_emulate_one()
* Tested for page presence (and whether it is being written) before trying to
  emulate hvm access
* Added generic unhandleable_rwx() to x86_emulate.c
* Left non-MMCFG RO accesses unhandled (we havent't encountered those accesses
  yet with PVH dom0 and it's probably better to fault on them and investigate
  whether they are guest's issues).
* Code style updates

Boris Ostrovsky (2):
  x86/mm: Add information about faulted page's presence to npfec
    structure
  x86/PCI: Intercept Dom0 MMCFG from dom0s in HVM containers

 xen/arch/x86/hvm/emulate.c             |   34 ++++++++++++++++++++
 xen/arch/x86/hvm/hvm.c                 |   15 +++++++++
 xen/arch/x86/hvm/svm/svm.c             |    3 +-
 xen/arch/x86/hvm/vmx/vmx.c             |    5 ++-
 xen/arch/x86/mm.c                      |   53 +++++++++++---------------------
 xen/arch/x86/x86_emulate/x86_emulate.c |   10 ++++++
 xen/arch/x86/x86_emulate/x86_emulate.h |   13 ++++++++
 xen/include/asm-x86/hvm/emulate.h      |    4 ++
 xen/include/asm-x86/mm.h               |   17 ++++++++++
 xen/include/xen/mm.h                   |    1 +
 10 files changed, 118 insertions(+), 37 deletions(-)


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.