aboutsummaryrefslogtreecommitdiffstats
path: root/xen/arch/x86/hvm/rtc.c
diff options
context:
space:
mode:
authorKeir Fraser <keir.fraser@citrix.com>2009-07-06 11:48:44 +0100
committerKeir Fraser <keir.fraser@citrix.com>2009-07-06 11:48:44 +0100
commit51dd9a1427a17dc9fdcc259a22dc5425b2ea323d (patch)
tree11601d7069844a7442e63ccd1cf6a141ae97f411 /xen/arch/x86/hvm/rtc.c
parent26bfb945fc0da7b4b1301414b8e3a05ec916bc06 (diff)
downloadxen-51dd9a1427a17dc9fdcc259a22dc5425b2ea323d.tar.gz
xen-51dd9a1427a17dc9fdcc259a22dc5425b2ea323d.tar.bz2
xen-51dd9a1427a17dc9fdcc259a22dc5425b2ea323d.zip
xend: allow pv_ops kernel driver pci-stub to hide devices for assignment
pciback is used by VT-d to hide device for assigment. But in pv-ops dom0, pciback is not supported yet. Fortunately, pci-stub module is used to hide device in Linux for KVM VT-d device assignment and it's included in pv-ops dom0. So can use pci-stub to hide devices for assignment. Device must be hidden before assignment. Control panel has checks if devices can be assigned or not, and can list assignable devices via reading devices owned by pciback. This patch changes the checks, and also list assignable devices which are owned by pci-stub. Use pci-stub to hide devices, and use this patch to pass checkes in control panel, device assignemnt with VT-d works on Xen with pv-ops dom0. Signed-off-by: Weidong Han <weidong.han@intel.com>
Diffstat (limited to 'xen/arch/x86/hvm/rtc.c')
0 files changed, 0 insertions, 0 deletions