Displaying 14 results from an estimated 14 matches similar to: "[patch]: qemu-xen: pass-through: pt_reset_interrupt_and_io_mapping(): use hw INTX"
2008 Sep 27
0
[PATCH 8/9] qemu: enable HMV guest SR-IOV support
Add SR-IOV support for HVM guest.
Signed-off-by: Yu Zhao <yu.zhao@intel.com>
diff --git a/hw/pass-through.c b/hw/pass-through.c
index 77ab759..da1a86b 100644
--- a/hw/pass-through.c
+++ b/hw/pass-through.c
@@ -47,6 +47,10 @@ struct dpci_infos {
/* prototype */
static uint32_t pt_common_reg_init(struct pt_dev *ptdev,
struct pt_reg_info_tbl *reg, uint32_t real_offset);
+static
2006 Oct 16
0
tg3: eth0: No interrupt was generated using MSI, switching to INTx mode.
Hi,
I just installed CentOS 4.4 x86_64 on our new 2 x Dual Core Opteron Server.
First the system was unstable, but I after turning of Power-now it runs
stable (anyone else experienced this?). However the following line in dmesg
puzzles me:
tg3: eth0: No interrupt was generated using MSI, switching to INTx mode.
Please report this failure to the PCI maintainer and include system chipset
2016 Jan 11
0
"INTx fd" busy error on VM startup at boot, subsequent startup okay
Hey all,
I'm getting an error starting a libvirt managed qemu/kvm VM at physical
host boot time, but manually starting it afterwards works fine. This is
on a Ubuntu Wily i7-4790 box running Linux 4.2 and libvirt 1.2.16.
There is a legacy (5V) PCI card being passed through to the VM, the
error seems to relate to that.
The error that always appears at boot in
2016 Mar 29
0
Re: "INTx fd" busy error on VM startup at boot, subsequent startup okay
Hey Mike, did you ever have any success figuring out this issue? I am having the same problem (on CentOS 7) with a custom data acquisition PCI card. It seems like the solution might have something to do with delaying the start of libvirtd in systemd until the PCI card (or vfio?) is ready, but I don’t know how to do that. Can anyone else offer assistance?
My output:
2016-03-29T18:29:26.191010Z
2009 Jul 31
8
[PATCH][ioemu] support the assignment of the VF of Intel 82599 10GbE Controller
The datasheet is available at
http://download.intel.com/design/network/datashts/82599_datasheet.pdf
See 'Table 9.7. VF PCIe Configuration Space' of the datasheet, the PCI
Express Capability Structure of the VF of Intel 82599 10GbE Controller looks
trivial, e.g., the PCI Express Capabilities Register is 0, so the Capability
Version is 0 and pt_pcie_size_init() would fail.
We should not
2020 Apr 07
1
"failed to setup INTx fd: Operation not permitted" error when using PCI passthrough
Hi,
I'm on a Dell VEP 1405 running Debian 9.11 and I'm running a few tests with
various interfaces given in PCI passthrough to a qemu/KVM Virtual Machine
also running Debian 9.11.
I noticed that only one of the four I350 network controllers can be used in
PCI passthrough. The available interfaces are:
*# dpdk-devbind.py --status Network devices using kernel driver
2011 Jan 26
9
[PATCH]vtd: Fix for irq bind failure after PCI attaching 32 times
vtd: Fix for irq bind failure after PCI attaching 32 times
Originally when detaching a PCI device, pirq_to_emuirq and pirq_to_irq are freed via hypercall do_physdev_op. Now in function pt_irq_destroy_bind_vtd, duplicated logic is added to free pirq_to_emuirq, but not pirq_to_irq. This causes do_physdev_op fail to free both emuirq and irq. After attaching a PCI device for 32 times, irq resources
2013 Nov 02
2
"pt_iomul_init: Error: pt_iomul_init can't open file /dev/xen/pci_iomul: No such file or directory: 0x1:0x0.0x0". in qemu-dm-example.hvm.log
hi,
I want to pass through "01:00.0",declared as pci=['01:00.0'] in cfg file. but found error log
"pt_iomul_init: Error: pt_iomul_init can't open file /dev/xen/pci_iomul: No such file or directory: 0x1:0x0.0x0". in qemu-dm-example.hvm.log
In fact, /dev/xen/pci_iomul does not exist.
So where /dev/xen/pci_iomul implemented ?
I have searched xen and linux code,
2009 May 20
0
[PATCHv2-RFC 2/2] qemu-kvm: use common code for assigned msix
For assigned devices, use common code to enable msi-x. We need a special
"assigned" option as assigned devices lack a standard way to get vector
usage.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
hw/device-assignment.c | 329 ++++++++++++------------------------------------
hw/device-assignment.h | 7 +-
hw/msix.c | 9 ++-
hw/pci.h
2009 May 20
0
[PATCHv2-RFC 2/2] qemu-kvm: use common code for assigned msix
For assigned devices, use common code to enable msi-x. We need a special
"assigned" option as assigned devices lack a standard way to get vector
usage.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
hw/device-assignment.c | 329 ++++++++++++------------------------------------
hw/device-assignment.h | 7 +-
hw/msix.c | 9 ++-
hw/pci.h
2009 May 11
0
[PATCH 2/2] qemu-kvm: use common code for assigned msix
For assigned devices, use common code to enable msi-x.
Add "hack" option as assigned devices lack a standard way to get vector usage.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
hw/device-assignment.c | 336 ++++++++++++------------------------------------
hw/device-assignment.h | 8 +-
hw/msix.c | 11 ++-
hw/pci.h | 4 +
4 files
2009 May 11
0
[PATCH 2/2] qemu-kvm: use common code for assigned msix
For assigned devices, use common code to enable msi-x.
Add "hack" option as assigned devices lack a standard way to get vector usage.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
hw/device-assignment.c | 336 ++++++++++++------------------------------------
hw/device-assignment.h | 8 +-
hw/msix.c | 11 ++-
hw/pci.h | 4 +
4 files
2013 Jan 16
1
rombios unable to loaded MPT BIOS
Hi All,
When tried to pass through 2 mpt2sas HBA to hvm guest, hvmloader
paused with below:
MPT BIOS Fault 09h encountered at adapter PCI(00h,04h,00h)
Press any key to continue...
Checked related codes and mostly like it caused by rombios did not
loaded MPT BIOS properly, and lead MPT BIOS failed to bootup.
config-file of the guest as below:
----------------------------------
# cat vm.cfg
2007 May 30
30
[VTD][patch 0/5] HVM device assignment using vt-d
The following 5 patches are re-submissions of the vt-d patch.
This set of patches has been tested against cs# 15080 and is
now much more mature and tested against more environments than
the original patch. Specifically, we have successfully tested
the patch with following environements:
- 32/64-bit Linux HVM guest
- 32-bit Windows XP/Vista (64-bit should work but did not test)
-