WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] Problem with pv-ops dom0 and pci-stub to hide devices: i

To: Bruce Edge <bruce.edge@xxxxxxxxx>, "Cinco, Dante" <Dante.Cinco@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] Problem with pv-ops dom0 and pci-stub to hide devices: improper device assignment specified
From: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Date: Tue, 13 Oct 2009 17:36:10 +0100
Cc:
Delivery-date: Tue, 13 Oct 2009 09:36:35 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <45c43ef50910130912h2e144d36l868f9580e7bc7fcc@xxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcpMIBidjhsu/fMXTRu3z9Ffpqg1vgAAyx0z
Thread-topic: [Xen-devel] Problem with pv-ops dom0 and pci-stub to hide devices: improper device assignment specified
User-agent: Microsoft-Entourage/12.20.0.090605
On 13/10/2009 17:12, "Bruce Edge" <bruce.edge@xxxxxxxxx> wrote:

>> Why use pci-stub? It just hides devices, but does not do anything else?
>> 
> 
> I admit some confusion here. What is the difference between these?
> - pciback/pcifront
> - pci passthorugh
> - pci-stub
> 
> I'll gladly RTFM if somone could refer me to the appropriate link.
> 
> We're running 2.6.31.1 pv-ops dom0, and hvm 2.6.30.1 for the domU.

In this case pci passthrough is done without assistance from dom0 kernel,
except that the pci-stub driver is used to 'steal' the device from dom0
(it's just a dummy driver that binds to the device and prevents it being
taken by any other real driver in dom0). Xen-unstable's xend should know how
to drive pci-stub in recent pv_ops Linux kernels. Pciback has this function
in older kernels, and xend knows how to drive that too. Pcifront doesn't
come into it for you -- that's the domU pci driver for PV guests, but in HVM
guests the PCI access method is as native and emulated in qemu.

 -- Keir





_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel