From mboxrd@z Thu Jan 1 00:00:00 1970 From: Keir Fraser Subject: Re: [DOM0 KERNELS] pciback: Fix SR-IOV VF passthrough Date: Mon, 01 Mar 2010 09:45:26 +0000 Message-ID: References: <4B8B91AF0200007800031C75@vpn.id2.novell.com> Mime-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <4B8B91AF0200007800031C75@vpn.id2.novell.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Jan Beulich , "yu.zhao@intel.com" Cc: Ian Campbell , Ian Pratt , "xen-devel@lists.xensource.com" , Jeremy Fitzhardinge List-Id: xen-devel@lists.xenproject.org On 01/03/2010 09:06, "Jan Beulich" wrote: >> AFAIK, this patch should apply to any kernel that implements pciback: That >> includes pv_ops, SLES, and the XS/XCP kernels. It should be applied to all >> of them. It is already applied to linux-2.6.18-xen.hg as 998:693c40564c8d. >> >> Signed-off-by: Keir Fraser > > Some parts of this we had been given by Intel, but some were also > implemented differently there. I'm reproducing the patch below, and > I would appreciate clarification on the differences in the bar_read()/ > bar_write()/rom_write() vs. read_dev_bar() modifications. > > In any case I would think that the command_write() change would > be generally applicable. I never saw the Intel patch before. It looks fine to me. -- Keir