WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Question about backporting pci passthrough fix to 2.6.18

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Question about backporting pci passthrough fix to 2.6.18
From: Paraic Gallagher <paraic.gallagher@xxxxxxxxx>
Date: Thu, 1 Jul 2010 10:04:01 +0100
Delivery-date: Thu, 01 Jul 2010 02:05:10 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:date:message-id :subject:from:to:content-type; bh=QmvKhNjYMW5t8tjLr7ZZg8SY32S/mzsLhvP0FUHAJPs=; b=BcXYyj2R097mx5SUTVi78EW37NAENHEXwf3Qnr0e/+DuTE/dEYTu9dCvAbJbKoYP74 ScV6aOTaUQfvL7Hi35sN0+lIEsbBgDc8Z7+bfOATOnjBF4dr3CkuQCGq0YGQZXQUAeX4 En+bBAjLj+Njj0r0t5W7Cxe1t3mZMKJQa22CQ=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=GxecPFJS5EyrqkR6hS4VQjh4Uapluqcjf+M5IRD8jMTsw5NMhciXkaKR1U7k0CGvbP lRQe4RFbOIyT9tyPtUf2nIFOF0gJcufVsdBYUt1drGkxWlHALA5F0MQG9rEKPD6TJgew TsdeqqzbAJSPmpsuw7zojelBtcVtV0sGMPcZs=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi,

I have a question about the bug:
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1632

This is marked as fixed in the pv-ops kernel.

I am working for a company developing a xen based virtualisation solution.
Unfortunately the design is tied to CentOS and there is resistance to upgrade to > 2.6.31 kernel.

My question is whether it is possible for me to try to backport the fixes for this pci passthrough issue to a 2.6.18 kernel, or are there too many differences between the kernel versions to make this feasible/possible.

thanks all,
Páraic.


------- Comment #1 from konrad.wilk@xxxxxxxxxx  2010-06-30 07:54 -------
There is a fix for this in the pv-ops kernel.

Specifically:
 xen-pciback: Allocate IRQ handler for device that is shared with guest.
     xen-pciback: Add SysFS instrumentation for the fake IRQ handler.
     xen-pciback: When device transitions to MSI/MSI-X stop ACK-ing on the
legacy interrupt.
     xen-pciback: Enable interrupt handler when device is enabled.
     xen-pciback: Probe the IRQ line to check if it is not shared

Here is a howto on PV-OPS:http://wiki.xensource.com/xenwiki/XenParavirtOps
and how to migrate from RHEL5 to it
http://wiki.xensource.com/xenwiki/2.6.18-to-2.6.31-and-higher

Closing bug as FIXED in upstream.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>