|
@@ -555,6 +555,18 @@ static bool vfio_get_section_iova_range(VFIOContainerBase *bcontainer,
|
|
return true;
|
|
return true;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
+static void vfio_device_error_append(VFIODevice *vbasedev, Error **errp)
|
|
|
|
+{
|
|
|
|
+ /*
|
|
|
|
+ * MMIO region mapping failures are not fatal but in this case PCI
|
|
|
|
+ * peer-to-peer transactions are broken.
|
|
|
|
+ */
|
|
|
|
+ if (vbasedev && vbasedev->type == VFIO_DEVICE_TYPE_PCI) {
|
|
|
|
+ error_append_hint(errp, "%s: PCI peer-to-peer transactions "
|
|
|
|
+ "on BARs are not supported.\n", vbasedev->name);
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
static void vfio_listener_region_add(MemoryListener *listener,
|
|
static void vfio_listener_region_add(MemoryListener *listener,
|
|
MemoryRegionSection *section)
|
|
MemoryRegionSection *section)
|
|
{
|
|
{
|
|
@@ -670,7 +682,10 @@ static void vfio_listener_region_add(MemoryListener *listener,
|
|
strerror(-ret));
|
|
strerror(-ret));
|
|
if (memory_region_is_ram_device(section->mr)) {
|
|
if (memory_region_is_ram_device(section->mr)) {
|
|
/* Allow unexpected mappings not to be fatal for RAM devices */
|
|
/* Allow unexpected mappings not to be fatal for RAM devices */
|
|
- error_report_err(err);
|
|
|
|
|
|
+ VFIODevice *vbasedev =
|
|
|
|
+ vfio_get_vfio_device(memory_region_owner(section->mr));
|
|
|
|
+ vfio_device_error_append(vbasedev, &err);
|
|
|
|
+ warn_report_err_once(err);
|
|
return;
|
|
return;
|
|
}
|
|
}
|
|
goto fail;
|
|
goto fail;
|