Displaying 12 results from an estimated 12 matches for "assign_device".
2012 Nov 05
25
[PATCH] IOMMU: don't disable bus mastering on faults for devices used by Xen or Dom0
Under the assumption that in these cases recurring faults aren''t a
security issue and it can be expected that the drivers there are going
to try to take care of the problem.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/amd/iommu_init.c
+++ b/xen/drivers/passthrough/amd/iommu_init.c
@@ -625,6 +625,18 @@ static void parse_event_log_entry(struct
2012 Jul 18
0
[PATCH] xsm deassign hook fix
...de was
moved to a different file and patch fixes that file. The following
patch is for xen-4.1-testing.hg.
diff -r 3ce155e77f39 xen/arch/x86/domctl.c
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -873,7 +873,7 @@ long arch_do_domctl(
break;
}
- ret = xsm_assign_device(d, domctl->u.assign_device.machine_bdf);
+ ret = xsm_deassign_device(d, domctl->u.assign_device.machine_bdf);
if ( ret )
goto deassign_device_out;
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH
2009 May 20
0
[PATCHv2-RFC 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */
+ if (assigned_dev_register_regions(dev->real_device.regions,
+ dev->real_device.region_number,
+ dev))
+ goto out;
/* assign device to guest */
r = assign_device(adev);
@@ -1163,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus)
if (r < 0)
goto assigned_out;
- /* intercept MSI-X entry page in the MMIO */
- if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX)
- if (assigned_dev_registe...
2009 May 20
0
[PATCHv2-RFC 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */
+ if (assigned_dev_register_regions(dev->real_device.regions,
+ dev->real_device.region_number,
+ dev))
+ goto out;
/* assign device to guest */
r = assign_device(adev);
@@ -1163,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus)
if (r < 0)
goto assigned_out;
- /* intercept MSI-X entry page in the MMIO */
- if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX)
- if (assigned_dev_registe...
2009 May 11
0
[PATCH 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */
+ if (assigned_dev_register_regions(dev->real_device.regions,
+ dev->real_device.region_number,
+ dev))
+ goto out;
/* assign device to guest */
r = assign_device(adev);
@@ -1162,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus)
if (r < 0)
goto assigned_out;
- /* intercept MSI-X entry page in the MMIO */
- if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX)
- if (assigned_dev_registe...
2009 May 11
0
[PATCH 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */
+ if (assigned_dev_register_regions(dev->real_device.regions,
+ dev->real_device.region_number,
+ dev))
+ goto out;
/* assign device to guest */
r = assign_device(adev);
@@ -1162,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus)
if (r < 0)
goto assigned_out;
- /* intercept MSI-X entry page in the MMIO */
- if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX)
- if (assigned_dev_registe...
2007 Dec 27
2
VT-d and the GPU
...bios call when posting the the new vgabios
and if any one knows the details surrounding int15h AX=5F21, I would
also appreciate that as well, I know it has something to do with the
GPU clock rate.
(XEN) intel-iommu.c:1965:d0 iommu_set_pgd: hd->pgd = ff25f000
(XEN) intel-iommu.c:1843: assign_device: bus = 0 dev = 2 func = 0
(XEN) intel-iommu.c:1371:d0 reassign_device-0:2:0- source = 0 target = 1
(XEN) dmar.c:110:d0 acpi_find_matched_drhd_unit: drhd->address =
feb01000
(XEN) intel-iommu.c:1312:d0 domain_context_unmap:PCI: bdf = 0:2:0
(XEN) intel-iommu.c:1260:d0 domain_context...
2007 Dec 10
19
[VTD][PATCH] Change xc_assign_device()
...ce doesn''t work in Dom0;
2) device is assigned one by one, if assign multiple devices, some
devices may have been assigned when problem happens, it results in
assigned devices don''t work in Dom0. I think Xend is not a good place to
assign devices. This patch adds a parameter to xc_assign_device(), let
it just do check in Xend whether the devices can be assigned or not, and
move real device assignment to qemu.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensour...
2009 May 20
0
[PATCHv2-RFC 1/2] qemu-kvm: add MSI-X support
...gnment.c
@@ -1151,6 +1151,8 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus)
assigned_device_pci_cap_init) < 0)
goto assigned_out;
+ pci_dev->config[PCI_STATUS] |= PCI_STATUS_CAP_LIST;
+
/* assign device to guest */
r = assign_device(adev);
if (r < 0)
diff --git a/hw/msix.c b/hw/msix.c
new file mode 100644
index 0000000..323eabc
--- /dev/null
+++ b/hw/msix.c
@@ -0,0 +1,447 @@
+/*
+ * MSI-X device support
+ *
+ * This module includes support for MSI-X in pci devices.
+ *
+ * Author: Michael S. Tsirkin <mst at redhat.c...
2009 May 20
0
[PATCHv2-RFC 1/2] qemu-kvm: add MSI-X support
...gnment.c
@@ -1151,6 +1151,8 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus)
assigned_device_pci_cap_init) < 0)
goto assigned_out;
+ pci_dev->config[PCI_STATUS] |= PCI_STATUS_CAP_LIST;
+
/* assign device to guest */
r = assign_device(adev);
if (r < 0)
diff --git a/hw/msix.c b/hw/msix.c
new file mode 100644
index 0000000..323eabc
--- /dev/null
+++ b/hw/msix.c
@@ -0,0 +1,447 @@
+/*
+ * MSI-X device support
+ *
+ * This module includes support for MSI-X in pci devices.
+ *
+ * Author: Michael S. Tsirkin <mst at redhat.c...
2007 May 30
30
[VTD][patch 0/5] HVM device assignment using vt-d
...struct p2m
mapping.
- shadow page table fault handler have been modified to allow memory
above
max_pages to be mapped.
- ioport
- Xen intercepts guest io port accesses
- translates guest io port to machine io port
- does machine port access on behalf of guest
5) new hypercalls
int xc_assign_device(int xc_handle,
uint32_t domain_id,
uint32_t machine_bdf);
int xc_domain_ioport_mapping(int xc_handle,
uint32_t domid,
uint32_t first_gport,
uint32_t first_mport,...