search for: assign_device

Displaying 12 results from an estimated 12 matches for "assign_device".

2012 Nov 05
25
[PATCH] IOMMU: don't disable bus mastering on faults for devices used by Xen or Dom0
Under the assumption that in these cases recurring faults aren''t a security issue and it can be expected that the drivers there are going to try to take care of the problem. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/drivers/passthrough/amd/iommu_init.c +++ b/xen/drivers/passthrough/amd/iommu_init.c @@ -625,6 +625,18 @@ static void parse_event_log_entry(struct
2012 Jul 18
0
[PATCH] xsm deassign hook fix
...de was moved to a different file and patch fixes that file. The following patch is for xen-4.1-testing.hg. diff -r 3ce155e77f39 xen/arch/x86/domctl.c --- a/xen/arch/x86/domctl.c +++ b/xen/arch/x86/domctl.c @@ -873,7 +873,7 @@ long arch_do_domctl( break; } - ret = xsm_assign_device(d, domctl->u.assign_device.machine_bdf); + ret = xsm_deassign_device(d, domctl->u.assign_device.machine_bdf); if ( ret ) goto deassign_device_out;
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have posted, and remain prerequisites for that series. However, they are independent of the XSM changes and are a useful simplification regardless of the use of XSM. The Acked-bys on these patches were provided before rebasing them over the copyback changes in 26268:1b72138bddda, which had minor conflicts that I resolved. [PATCH
2009 May 20
0
[PATCHv2-RFC 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */ + if (assigned_dev_register_regions(dev->real_device.regions, + dev->real_device.region_number, + dev)) + goto out; /* assign device to guest */ r = assign_device(adev); @@ -1163,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus) if (r < 0) goto assigned_out; - /* intercept MSI-X entry page in the MMIO */ - if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX) - if (assigned_dev_registe...
2009 May 20
0
[PATCHv2-RFC 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */ + if (assigned_dev_register_regions(dev->real_device.regions, + dev->real_device.region_number, + dev)) + goto out; /* assign device to guest */ r = assign_device(adev); @@ -1163,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus) if (r < 0) goto assigned_out; - /* intercept MSI-X entry page in the MMIO */ - if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX) - if (assigned_dev_registe...
2009 May 11
0
[PATCH 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */ + if (assigned_dev_register_regions(dev->real_device.regions, + dev->real_device.region_number, + dev)) + goto out; /* assign device to guest */ r = assign_device(adev); @@ -1162,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus) if (r < 0) goto assigned_out; - /* intercept MSI-X entry page in the MMIO */ - if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX) - if (assigned_dev_registe...
2009 May 11
0
[PATCH 2/2] qemu-kvm: use common code for assigned msix
.../* handle real device's MMIO/PIO BARs */ + if (assigned_dev_register_regions(dev->real_device.regions, + dev->real_device.region_number, + dev)) + goto out; /* assign device to guest */ r = assign_device(adev); @@ -1162,11 +997,6 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus) if (r < 0) goto assigned_out; - /* intercept MSI-X entry page in the MMIO */ - if (dev->cap.available & ASSIGNED_DEVICE_CAP_MSIX) - if (assigned_dev_registe...
2007 Dec 27
2
VT-d and the GPU
...bios call when posting the the new vgabios and if any one knows the details surrounding int15h AX=5F21, I would also appreciate that as well, I know it has something to do with the GPU clock rate. (XEN) intel-iommu.c:1965:d0 iommu_set_pgd: hd->pgd = ff25f000 (XEN) intel-iommu.c:1843: assign_device: bus = 0 dev = 2 func = 0 (XEN) intel-iommu.c:1371:d0 reassign_device-0:2:0- source = 0 target = 1 (XEN) dmar.c:110:d0 acpi_find_matched_drhd_unit: drhd->address = feb01000 (XEN) intel-iommu.c:1312:d0 domain_context_unmap:PCI: bdf = 0:2:0 (XEN) intel-iommu.c:1260:d0 domain_context...
2007 Dec 10
19
[VTD][PATCH] Change xc_assign_device()
...ce doesn''t work in Dom0; 2) device is assigned one by one, if assign multiple devices, some devices may have been assigned when problem happens, it results in assigned devices don''t work in Dom0. I think Xend is not a good place to assign devices. This patch adds a parameter to xc_assign_device(), let it just do check in Xend whether the devices can be assigned or not, and move real device assignment to qemu. Signed-off-by: Weidong Han <weidong.han@intel.com> _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensour...
2009 May 20
0
[PATCHv2-RFC 1/2] qemu-kvm: add MSI-X support
...gnment.c @@ -1151,6 +1151,8 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus) assigned_device_pci_cap_init) < 0) goto assigned_out; + pci_dev->config[PCI_STATUS] |= PCI_STATUS_CAP_LIST; + /* assign device to guest */ r = assign_device(adev); if (r < 0) diff --git a/hw/msix.c b/hw/msix.c new file mode 100644 index 0000000..323eabc --- /dev/null +++ b/hw/msix.c @@ -0,0 +1,447 @@ +/* + * MSI-X device support + * + * This module includes support for MSI-X in pci devices. + * + * Author: Michael S. Tsirkin <mst at redhat.c...
2009 May 20
0
[PATCHv2-RFC 1/2] qemu-kvm: add MSI-X support
...gnment.c @@ -1151,6 +1151,8 @@ struct PCIDevice *init_assigned_device(AssignedDevInfo *adev, PCIBus *bus) assigned_device_pci_cap_init) < 0) goto assigned_out; + pci_dev->config[PCI_STATUS] |= PCI_STATUS_CAP_LIST; + /* assign device to guest */ r = assign_device(adev); if (r < 0) diff --git a/hw/msix.c b/hw/msix.c new file mode 100644 index 0000000..323eabc --- /dev/null +++ b/hw/msix.c @@ -0,0 +1,447 @@ +/* + * MSI-X device support + * + * This module includes support for MSI-X in pci devices. + * + * Author: Michael S. Tsirkin <mst at redhat.c...
2007 May 30
30
[VTD][patch 0/5] HVM device assignment using vt-d
...struct p2m mapping. - shadow page table fault handler have been modified to allow memory above max_pages to be mapped. - ioport - Xen intercepts guest io port accesses - translates guest io port to machine io port - does machine port access on behalf of guest 5) new hypercalls int xc_assign_device(int xc_handle, uint32_t domain_id, uint32_t machine_bdf); int xc_domain_ioport_mapping(int xc_handle, uint32_t domid, uint32_t first_gport, uint32_t first_mport,...