Displaying 6 results from an estimated 6 matches for "x2apic_enabled".
2011 Jan 21
11
[PATCH]x86:x2apic: Disable x2apic on x86-32 permanently
...2bf280 xen/arch/x86/apic.c
--- a/xen/arch/x86/apic.c Mon Jan 17 18:05:52 2011 +0000
+++ b/xen/arch/x86/apic.c Wed Jan 19 03:24:16 2011 -0500
@@ -961,6 +961,22 @@
if ( !cpu_has_x2apic )
return;
+#ifdef __i386__
+ clear_bit(X86_FEATURE_X2APIC, boot_cpu_data.x86_capability);
+ if (x2apic_enabled) {
+ uint64_t msr_content;
+
+ rdmsrl(MSR_IA32_APICBASE, msr_content);
+ msr_content &= ~(MSR_IA32_APICBASE_ENABLE | MSR_IA32_APICBASE_EXTD);
+ wrmsrl(MSR_IA32_APICBASE, msr_content);
+ msr_content |= MSR_IA32_APICBASE_ENABLE;
+ wrmsrl(MSR_IA32_APICBASE...
2012 Oct 02
3
[PATCH] VT-d: make remap_entry_to_msi_msg() return consistent message
...ction.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/vtd/intremap.c
+++ b/xen/drivers/passthrough/vtd/intremap.c
@@ -504,7 +504,11 @@ static int remap_entry_to_msi_msg(
MSI_ADDR_REDIRECTION_CPU:
MSI_ADDR_REDIRECTION_LOWPRI);
if ( x2apic_enabled )
+ {
msg->dest32 = iremap_entry->lo.dst;
+ msg->address_lo |=
+ (iremap_entry->lo.dst & 0xff) << MSI_ADDR_DEST_ID_SHIFT;
+ }
else
msg->address_lo |=
((iremap_entry->lo.dst >> 8) & 0xff ) << MSI_...
2010 Jul 28
22
ACPI-Tables corrupted?
Hi,
on a Nehalem system with VT-d enabled we are seeing strange ACPI-Table
contents, especially a corrupted DMAR entry.
The hypervisor shows following data on boot:
(XEN) ACPI: RSDP 000F80E0, 0024 (r2 PTLTD )
(XEN) ACPI: XSDT BF7C469E, 00D4 (r1 PTLTD XSDT 60000 LTP 0)
(XEN) ACPI: FACP BF7C9CC9, 00F4 (r3 FSC TYLERBRG 60000 PTL F4240)
(XEN) ACPI: DSDT BF7C4772, 54D3 (r1
2012 Sep 11
1
[PATCH 3/3] VT-d: use msi_compose_msg()
...or) & 0xff;
- msg.data |= 1 << 14;
- msg.data |= (INT_DELIVERY_MODE != dest_LowestPrio) ?
- MSI_DATA_DELIVERY_FIXED:
- MSI_DATA_DELIVERY_LOWPRI;
-
- /* Follow MSI setting */
+ msi_compose_msg(desc, &msg);
+ /* Are these overrides really needed? */
if (x2apic_enabled)
msg.address_hi = dest & 0xFFFFFF00;
- msg.address_lo = (MSI_ADDRESS_HEADER << (MSI_ADDRESS_HEADER_SHIFT + 8));
- msg.address_lo |= INT_DEST_MODE ? MSI_ADDR_DESTMODE_LOGIC:
- MSI_ADDR_DESTMODE_PHYS;
- msg.address_lo |= (INT_DELIVERY_MODE != dest_Lowest...
2012 Dec 12
7
[PATCH V5] x86/kexec: Change NMI and MCE handling on kexec path
..._this_cpu();
+
+ this_cpu(crash_save_done) = 1;
+ atomic_dec(&waiting_for_crash_ipi);
+ }
+
+ /* Poor mans self_nmi(). __stop_this_cpu() has reverted the LAPIC
+ * back to its boot state, so we are unable to rely on the regular
+ * apic_* functions, due to ''x2apic_enabled'' being possibly wrong.
+ * (The likely scenario is that we have reverted from x2apic mode to
+ * xapic, at which point #GPFs will occur if we use the apic_*
+ * functions)
+ *
+ * The ICR and APIC ID of the LAPIC are still valid even during
+ * software disable (Int...
2010 Mar 11
17
Panic on boot on Sun Blade 6270
Hi All,
I''m getting the attached panic in the hypervisor on a Sun 6270 running
xen-testing.hg changeset 19913:6063c16aeeaa. I can run xen-3.3.1 from
the standard SLES 11 distribution (which says that it''s changeset
18546 but it has many patches). Any ideas?
thanks,
dan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com