Displaying 20 results from an estimated 20000 matches similar to: "[PATCH]xend: passthrough: loosen the pci co-assignment for pv guest"
2008 Oct 16
3
xen 3.3.0 pv pci passthrough co-assigned problem
After
upgrading from xen 3.2.x to xen 3.3.0 I get an error message
when
using pci passthrough with pv guests (my system is not vt-d
enabled):
xm create -c /etc/xen/domU/myguest
Using
config file "/etc/xen/domU/myguest".
Error: pci:
0000:0e:05.0 must be co-assigned to the same guest with 0000:0f:0a.0
Sharing diffrent pci devices behind a pci bridge used to work in
older
xen versions for
2009 Feb 24
4
[PATCH]xend: fix a typo in pci.py
The PCI_EXP_TYPE_PCI_BRIDGE should be PCI_EXP_FLAGS_TYPE here.
Also a tiny fix to the python comment.
Signed-off-by: Dexuan Cui <dexuan.cui@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Oct 09
5
Strange PCI Passthrough problem
I have successfully passed through a video card, network card,
USB mouse, and USB keyboard to a MS Vista guest. That
works well.
I am trying to add another PCI device, such as a audio card
or PCI USB hub, but I am running into a strange problem.
When I plug the PCI audio (or USB card) to the motherboard.
It makes it so that the PCI video card is no longer an
"assignable device" (xm
2008 Jul 25
1
[PATCH]xend: fix dual destroy
After changeset 18030 and 18064 were checked in, I found some issues
when creating HVM domains with devices assigned:
In XendDomainInfo.py, we have the call trace: the global function
create() => vm.start() => _constructDomain().
In _constructDomain(), we invoke xc.test_assign_device() and when the
function fails (maybe because iommu=1 is not specified in grub entry
since iommu is 0 by
2009 Jul 16
0
Re: Xen-devel Digest, Vol 52, Issue 178
Hi, all
I want to reduce the checkpoint size of a VM by memory exclusion. I try to find out all the free pages by reference count at VMM-level, As they declared that:
/* Page is on a free list: ((count_info & PGC_count_mask) == 0). */ , in struct page_info which is defined in /xen/include/asm-x86/mm.h, but unfortunately, all the pages in a idle VM accords with this condition.
2010 Mar 26
0
[PATCH] del xend entry when destroy pv usb host controller of a guest os with no pv-frontend driver
delete xend entry when destroying pv usb host controller of a guest os which
has no pv-frontend driver loaded.
-James (Song Wei)
Signed-off-by: James (Song Wei) <jsong@novell.com>
diff -r f42ff98a2cdc tools/python/xen/xend/XendDomainInfo.py
--- a/tools/python/xen/xend/XendDomainInfo.py Thu Mar 25 09:32:21 2010
+0000
+++ b/tools/python/xen/xend/XendDomainInfo.py Fri Mar 26 13:27:25
2006 Oct 16
2
[Patch] Fix a failure in PCI Compliance Test
The Xen platform device (introduced in changeset 11161) would cause
HCT''s PCI Compliance Test to generate a failure message. The patch fixes
this.
Thanks
Dexuan Cui
Signed-off-by: Dexuan Cui <dexuan.cui@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Jul 22
2
VM creation failure using passthrough with latest unstable
I have pulled a recent (today''s) clone of staging/xen-unstable.hg and I
get a failure when trying to create a domain with xend/xm. The failure I
get is:
Error: (''<domain GUID>'', ''VM_metrics'')
I have traced the problem down to where the pci = [ ''02:00.0'' ]
parameter (which is the value in my case) from my configuration
2011 May 09
0
RE: PCI passthrough on PV domU crashes with iommu=soft (fixed)
Fixed : Double amount of memory from 128 to 256 and iommu works it out fine.
RTFEM (read the fucking error message) :
[ 0.872160] Kernel panic - not syncing: Out of memory and no killable processes...
________________________________________________________________________________________________________________
Frédéric Abel| RTS France BeNeLux | Quantum Corporation
2009 Jul 31
8
[PATCH][ioemu] support the assignment of the VF of Intel 82599 10GbE Controller
The datasheet is available at
http://download.intel.com/design/network/datashts/82599_datasheet.pdf
See 'Table 9.7. VF PCIe Configuration Space' of the datasheet, the PCI
Express Capability Structure of the VF of Intel 82599 10GbE Controller looks
trivial, e.g., the PCI Express Capabilities Register is 0, so the Capability
Version is 0 and pt_pcie_size_init() would fail.
We should not
2006 Dec 21
0
[Patch 1/2] Add HPET emulation for HVM guest: add the HPET description table to ACPI
The attached patch adds the HPET description table to ACPI.
-- Dexuan
Signed-off-by: Dexuan Cui <dexuan.cui@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2016 Jan 30
0
Bug#810379: [Xen-devel] [BUG] pci-passthrough generates "xen:events: Failed to obtain physical IRQ" for some devices
On Wed, Jan 27, 2016 at 01:30:05PM -0500, Konrad Rzeszutek Wilk wrote:
> On Sat, Jan 23, 2016 at 05:12:04PM +0100, Tommi Airikka wrote:
> > Xen developers,
> >
> > After an upgrade of my Debian Jessie dom0 and domUs, my passthroughed
> > NIC stopped working.
I have very similar (the same?) problem with USB 3.0 controller. But on
different software versions.
> >
2008 Sep 28
7
[PATCH] Share the IO_APIC_route_entry with iosapic
The patch moves the struct IO_APIC_route_entry to a common place.
This allows us to share the struct with iosapic.
Thanks,
-- Dexuan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 May 13
2
[PATCH] Fix write parameter masking for 32-bit guests.
Changeset 15046:e527b4ff1948 breaks 32-bit HVM guest: when req->size is
4, "1UL << 32" returns 1 in IA32 system, so the mask becomes 0 wrongly.
The attached patch fixes this by using 64-bit left-shift.
Signed-off-by: Dexuan Cui <dexuan.cui@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 Oct 25
2
VTd - PCI Passthrough - VMError: fail to assign device
Dear Users,
Debian Etch 2.6.18.8-xen from xensource.com with Xen 3.3.0 on AMD64:
After i want to start the HVM i get:
VmError: fail to assign device(1:0.0): maybe it has already been
assigned to other domain, or maybe it doesn''t exist.
[2008-10-25 19:59:30 2460] DEBUG (__init__:1072)
XendDomainInfo.destroy: domid=5
[2008-10-25 19:59:30 2460] DEBUG (__init__:1072)
2006 Oct 30
1
RE: [Patch][RESEND] Add hardware CR8 acceleration for TPRaccessing
Any advice about the patch cr8-acceleration-3.patch?
Hi Keir, could you give some comments? Thanks!
-- Dexuan
-----Original Message-----
From: xen-devel-bounces@lists.xensource.com [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Cui, Dexuan
Sent: 2006年10月25日 11:12
To: Keir.Fraser@cl.cam.ac.uk
Cc: xen-devel@lists.xensource.com
Subject: [Xen-devel] [Patch][RESEND] Add hardware CR8
2008 Apr 29
2
PV DMA for PCI passthrough devices for KVM
This patchset implements PVDMA for handling DMA requests from
devices assigned to the guest from the host machine.
They're also available from
git-pull git://git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git pvdma
These patches are based on my pci-passthrough tree, which is available
from
git-pull git://git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git
and the userspace from
2008 Apr 29
2
PV DMA for PCI passthrough devices for KVM
This patchset implements PVDMA for handling DMA requests from
devices assigned to the guest from the host machine.
They're also available from
git-pull git://git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git pvdma
These patches are based on my pci-passthrough tree, which is available
from
git-pull git://git.kernel.org/pub/scm/linux/kernel/git/amit/kvm.git
and the userspace from
2008 Oct 08
6
pci pass-through failure on xen 3.3.0
Hi all,
I downloaded the xen 3.3.0 and now testing the pci pass-through with the
NIC.
Using late binding, the pci slot 0000:08:01.0 is assigned to pciback.
But pci related xm commands are not working.
For eg:
linux-242:/home/xen-3.3.0 # xm pci-list-assignable-devices
Unexpected error: <type ''exceptions.OSError''>
Please report to
2007 Jun 24
4
It seems the "machine check exception handling" breaks HVM guest
Hi Jan Beulich,
> changeset 15414: 3cf5052ba5e5 x86: machine check exception handling
With the c/s, when creating HVM guest, I can only see a white Qemu
window. :(
Can you have a look? Thanks.
PS: the serial log follows:
(XEN) HVM1: pci dev 02:0 bar 14 size 00001000: f2000000
(XEN) HVM1: pci dev 03:0 bar 10 size 00000100: 0000c101
(XEN) HVM1: pci dev 03:0 bar 14 size 01000000: