xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: 0bo0 <0.bugs.only.0@gmail.com>
To: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Cc: xen-devel@lists.xensource.com, horms@verge.net.au, dexuan.cui@intel.com
Subject: Re: with Xen4 config -> (pci-passthrough-strict-check no), DomU init reports "Error: pci: PCI Backend and pci-stub don't own device"
Date: Fri, 29 Jan 2010 15:11:24 -0800	[thread overview]
Message-ID: <c67eed301001291511h43503d42oa7e251dfcec912be@mail.gmail.com> (raw)
In-Reply-To: <20100129224445.GA5852@phenom.dumpdata.com>

I bleieve you have it backwards, no?

On Fri, Jan 29, 2010 at 2:44 PM, Konrad Rzeszutek Wilk
<konrad.wilk@oracle.com> wrote:
>>       grep passthrough /etc/xen/xend-config.sxp
>>               (pci-passthrough-strict-check no)
>>       grep hide /etc/modprobe.d/99-local.conf
>>               options pciback hide=(0000:04:07.0)(0000:04:06.0)
>
> That won't work. That option is only useful if pciback is compiled
> in the kernel. To be exact, you would need this in your bootline
> argument:
>  xen-pciback.hide=(04:07.0)(04:06.0) pci=resource_alignment=04:07.0
>
>
>>
>> and checking,
>>
>>       lsmod | egrep -i "pciback|xen"
>>               pciback                54471  0
>>               xenbus_be               3474  4 netbk,blkbk,blktap,pciback
>
> Since it is module you need to follow the documentation about how to
> seize and bind using pciback. Google is your friend.
>

reading @

http://wiki.xensource.com/xenwiki/Assign_hardware_to_DomU_with_PCIBack_as_module

"If the Dom0 XenLinux kernel is built with pciback as a module,
attempting to use the kernel command-line parameter pciback.hide won't
work. '

...

"If the Dom0 XenLinux kernel is built with pciback as a module,
attempting to use the kernel command-line parameter pciback.hide won't
work. This includes loading pciback in an initrd. This means that if
you wish to assign hardware to a DomU another method is needed.

There are two possibilities. ..."

since Dom0 is, apparently, "built with pciback as a module", the wiki
specifically instructs:

    Add a line to /etc/modprobe.conf to pass the hide parameter to pciback
    options pciback hide=(0000:05:02.0)

You'll also note, from the dmesg output i'd included above, that
there's no problem seizing the *1st* card, configured in the same
manner.

and, all of this worked just fine before the most recent Xen4 update
(this morning ...)

  reply	other threads:[~2010-01-29 23:11 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-01-29 22:10 with Xen4 config -> (pci-passthrough-strict-check no), DomU init reports "Error: pci: PCI Backend and pci-stub don't own device" 0bo0
2010-01-29 22:36 ` 0bo0
2010-01-29 22:44 ` Konrad Rzeszutek Wilk
2010-01-29 23:11   ` 0bo0 [this message]
2010-02-01 16:57     ` 0bo0
2010-02-01 18:28       ` 0bo0
2010-02-01 18:58         ` Pasi Kärkkäinen
2010-02-01 19:21           ` 0bo0

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c67eed301001291511h43503d42oa7e251dfcec912be@mail.gmail.com \
    --to=0.bugs.only.0@gmail.com \
    --cc=dexuan.cui@intel.com \
    --cc=horms@verge.net.au \
    --cc=konrad.wilk@oracle.com \
    --cc=xen-devel@lists.xensource.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).