On 11/13/20 12:29 PM, Jan Beulich wrote: > On 09.11.2020 13:50, Oleksandr Andrushchenko wrote: >> From: Oleksandr Andrushchenko <oleksandr_andrushche...@epam.com> >> >> Non-ECAM host bridges in hwdom go directly to PCI config space, >> not through vpci (they use their specific method for accessing PCI >> configuration, e.g. dedicated registers etc.). > And access to these dedicated registers can't be intercepted?
It can. But then you have to fully emulate that bridge, e.g. "if we write A to regB and after that write C to regZ then it means we are accessing config space. If we write...." I mean this would need lots of code in Xen to achieve that > It > would seem to me that if so, such a platform is not capable of > being virtualized (without cooperation by all the domains in > possession of devices). Guest domains always use an emulated ECAM bridge and are easily trapped and emulated > > Jan