Hello Oleksandr,

On 24.08.25 20:21, Oleksandr Tyshchenko wrote:
> 
> 
> On 07.08.25 15:33, Leonid Komarianskyi wrote:
>> Hello everyone!
> 
> Hello Leonid,
> 
>>
>> ### Background
>> Unlike the Linux kernel, which has supported extended shared peripheral
>> interrupts (eSPIs) since 2019 [1], Xen currently lacks support for this
>> interrupt range. For SoCs with GICv3.1+, this feature may be essential
>> because critical devices, such as consoles required for booting Xen
>> itself, may rely on eSPIs. Additionally, these platforms require eSPI
>> support for fully functional domains, as any device using eSPIs cannot
>> currently be used with Xen setups. Without eSPI support, Xen cannot run
>> properly on these platforms, significantly limiting its usability on
>> modern ARM hardware.
>>
>> This patch series adds support for the extended shared peripheral
>> interrupt (eSPI) range (INTIDs 4096-5119 [2](ranges of INTIDs)) for Xen
>> and guest domains. The implementation uses a generic approach to handle
>> eSPIs, similar to regular SPIs, while maintaining compatibility with the
>> existing SPI range. Functionality remains unchanged for setups that do
>> not require eSPIs.
> 
> 
> I have lightly re-checked the simple Arm64 Xen environment (dom0less 
> DomU under QEMU) with your series applied. To be clear, I did not really 
> test the eSPI support (the underlying GICv3 HW does support it); I just 
> wanted to ensure that your series would not break anything. So, in both 
> cases (CONFIG_GICV3_ESPI=y and CONFIG_GICV3_ESPI=n), I did not notice 
> any issues (at least obvious) related to GICv3 emulation and SPI 
> injection for the passed-through device.
> 

Thank you for your verification and proving that all works as expected 
on setup without HW eSPI support:)

> Also, I think you want to describe the eSPI feature in the CHANGELOG.md.
> 
> 
> [snip]

Okay, I will add one more patch in V3 to update the CHANGELOG.md file.

Best regards,
Leonid

Reply via email to