lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241105060531.3503788-1-Jiqian.Chen@amd.com>
Date: Tue, 5 Nov 2024 14:05:29 +0800
From: Jiqian Chen <Jiqian.Chen@....com>
To: Alex Deucher <alexander.deucher@....com>,
	Christian König <christian.koenig@....com>, Xinhui Pan
	<Xinhui.Pan@....com>
CC: <amd-gfx@...ts.freedesktop.org>, <linux-kernel@...r.kernel.org>,
	Pierre-Eric Pelloux-Prayer <pierre-eric.pelloux-prayer@....com>, Jiqian Chen
	<Jiqian.Chen@....com>
Subject: [PATCH 0/2] Fix some issues when using amdgpu on XEN PVH dom0

Hi all,
These two patches are to fix issues we encountered when using amdgpu on PVH dom0 with Xen hypervisor.
Patch 1 is to fix a address problem that PVH type domain does a second address translation for pcidev, then causes the address to be not physical address, so we need to set amdgpu to be passthrough mode.
Patch 2 is because PVH type domain uses VPCI of Xen, but VPCI doesn't support Resizable Bar capability, so just return success when discrete GPU tries to
resize bars.

Best regards,
Jiqian Chen.

Huang Rui (1):
  drm/amdgpu: set passthrough mode for xen pvh/hvm

Jiqian Chen (1):
  drm/amdgpu: Bypass resizing bars for PVH dom0

 drivers/gpu/drm/amd/amdgpu/amdgpu_device.c | 4 ++++
 drivers/gpu/drm/amd/amdgpu/amdgpu_virt.c   | 3 ++-
 2 files changed, 6 insertions(+), 1 deletion(-)

-- 
2.34.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ