WSL2-Linux-Kernel/drivers/xen/xen-pciback
Marek Marczykowski-Górecki 6815b2087d xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too
[ Upstream commit 5e29500eba ]

When Xen domain configures MSI-X, the usual approach is to enable MSI-X
together with masking all of them via the config space, then fill the
table and only then clear PCI_MSIX_FLAGS_MASKALL. Allow doing this via
QEMU running in a stub domain.

Previously, when changing PCI_MSIX_FLAGS_MASKALL was not allowed, the
whole write was aborted, preventing change to the PCI_MSIX_FLAGS_ENABLE
bit too.

Note the Xen hypervisor intercepts this write anyway, and may keep the
PCI_MSIX_FLAGS_MASKALL bit set if it wishes to. It will store the
guest-requested state and will apply it eventually.

Signed-off-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Link: https://lore.kernel.org/r/20221114103110.1519413-1-marmarek@invisiblethingslab.com
Signed-off-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2022-12-02 17:41:10 +01:00
..
Makefile
conf_space.c
conf_space.h
conf_space_capability.c xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too 2022-12-02 17:41:10 +01:00
conf_space_header.c
conf_space_quirks.c
conf_space_quirks.h
passthrough.c
pci_stub.c xen/pciback: Fix incorrect type warnings 2021-04-23 09:27:12 +02:00
pciback.h xen/pciback: use lateeoi irq binding 2020-10-20 10:22:08 +02:00
pciback_ops.c xen/pciback: use lateeoi irq binding 2020-10-20 10:22:08 +02:00
vpci.c xen-pciback: redo VF placement in the virtual topology 2021-05-21 09:55:13 +02:00
xenbus.c xen-pciback: reconfigure also from backend watch handler 2021-05-21 09:55:16 +02:00