Displaying 20 results from an estimated 200 matches similar to: "VTD-XML 2.3 released"
2009 Feb 10
0
[PATCH] vtd: fix compilation error on ia64 for 19185:1eb6afcad849.
Hi,
The staging tree 19185:1eb6afcad849 cannot be compiled on ia64:
vtd.c: In function `alloc_pgtable_maddr'':
vtd.c:60: error: too few arguments to function `iommu_flush_cache_page''
The attached patch fixes it.
Signed-off-by: KUWAMURA Shin''ya <kuwa@jp.fujitsu.com>
Best regards,
--
KUWAMURA Shin''ya
2008 Dec 10
2
VTd not showing PCI device in VM
I''m having trouble actually seeing a PCI device in my VMs. I''ve
resolved several of my issues using previous posts and using the
VTdHowTo wiki page. I have both VT and VTd BIOS options enabled. I
have pciback hiding the devices and xm can list and assign the devices
to VMs. I don''t see the PCI devices in my VMs though. I have tried a
windows and a Linux vm, without
2008 Oct 25
2
VTd - PCI Passthrough - VMError: fail to assign device
Dear Users,
Debian Etch 2.6.18.8-xen from xensource.com with Xen 3.3.0 on AMD64:
After i want to start the HVM i get:
VmError: fail to assign device(1:0.0): maybe it has already been
assigned to other domain, or maybe it doesn''t exist.
[2008-10-25 19:59:30 2460] DEBUG (__init__:1072)
XendDomainInfo.destroy: domid=5
[2008-10-25 19:59:30 2460] DEBUG (__init__:1072)
2007 Sep 30
6
[VTD][PATCH] a time out mechanism for the shared interrupt issue for vtd
Attached is a patch for shared interrupt between dom0 and HVM domain for
vtd.
Most of problem is caused by that we should inject interrupt to both
domains and the
physical interrupt deassertion then may be delayed by the device
assigned to the HVM.
The patch adds a timer, and the time out value is sufficient large to
tolerant
the delaying used to wait for the physical interrupt deassertion.
2014 Feb 20
0
Request for help with pci passthrough with VTd on Debian Jessie
Hi,
I am having great difficulties in getting pci passthrough with VTd to
work, surely I am doing something stupid but I cannot see what.
"tangram" (https://www.blogger.com/profile/06588030231546523539) has
been a huge help, but despite his efforts I am still stuck.
Hardware: Intel S3200SHV motherboard
BIOS : S3200X38.86B.00.00.0052
CPU : Intel Core 2
2013 Jan 15
14
[PATCH] VTD/Intremap: Disable Intremap on Chipset 5500/5520/X58 due to errata
http://www.intel.com/content/www/us/en/chipsets/5520-and-5500-chipset-ioh-specification-update.html
Stepping B-3 has two errata (#47 and #53) related to Interrupt
remapping, to which the workaround is for the BIOS to completely disable
interrupt remapping. These errata are fixed in stepping C-2.
Unfortunately this chipset is very common and many BIOSes are not
disabling remapping. We can
2011 Jan 26
9
[PATCH]vtd: Fix for irq bind failure after PCI attaching 32 times
vtd: Fix for irq bind failure after PCI attaching 32 times
Originally when detaching a PCI device, pirq_to_emuirq and pirq_to_irq are freed via hypercall do_physdev_op. Now in function pt_irq_destroy_bind_vtd, duplicated logic is added to free pirq_to_emuirq, but not pirq_to_irq. This causes do_physdev_op fail to free both emuirq and irq. After attaching a PCI device for 32 times, irq resources
2008 Sep 26
1
[PATCH] [VTD] Add a check for interrupt remapping of ioapic RTE
For IOAPIC interrupt remapping, it only needs to remap ioapci RTE,
should not remap other IOAPIC registers, which are IOAPIC ID, VERSION
and Arbitration ID. This patch adds the check for this and only remap
ioapci RTE.
Signed-off-by: Anthony Xu <anthony.xu@intel.com>
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing
2007 Nov 24
0
[VTD][PATCH] Some fixes of Intel iommu
This patch removes a wrong if condition judgement to setup rmrr identify
mapping for guests, and passes page count rather than address size to
iommu_flush_iotlb_psi().
Signed-off-by: Weidong Han <weidong.han@intel.com>
Signed-off-by: Anthony Xu <Anthony.xu@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 Jul 23
0
[PATCH] [VTD] Add RMRR check in DMAR parsing
During parsing DMAR table, if find RMRR is incorrect, return error.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Dec 25
1
[VTD][PATCH] Fix addr_to_dma_page() and rmrr mapping issues
Fix addr_to_dma_page() issue to return l1e correctly, and also clean up
rmrr mapping code, make sure setup rmrr identify mapping just once per
domain.
This patch fixes the VT-d bug (Fail to boot smp Linux guest with VT-d
NIC assigned on IA32e platform).
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
2008 Aug 29
0
[PATCH] vtd: fix Dom0 S3 when VT-d is enabled.
Now if VT-d is enabled, when Dom0 does S3, Xen doesn''t suspend/resume
the IOMMU states.
The patch adds the missing invocations of iommu_suspend()/iommu_resume()
and makes some nesessary fixes:
1) In iommu_set_root_entry(), we should not re-allocate the root-entry
when Xen returns from S3;
2) Define the array iommu_state correctly (u8 -> u32);
3) Only save/restore the necessary IOMMU
2007 Oct 29
0
[VTD][PATCH] Move out isa irq mapping from hvm_do_IRQ_dpci()
Setting isa irq mapping in hvm_do_IRQ_dpci() costs time when each
interrupt occurs, and it doesn''t update isa irq mapping when pci_link is
updated. This patch fixes this issue.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Oct 15
0
[PATCH] [VTD] Fix MSI-x interrupt remapping
MSI-x may have multiple vectors, however in current interrupt remapping
code, one device only has one entry in interrupt remapping table.
This patch adds ''remap_index'' in msi_desc structure to track its index
in interrupt remapping table.
Signed-off-by: Haitao Shan <haitao.shan@intel.com>
Signed-off-by: Weidong Han <weidong.han@intel.com>
2008 Sep 08
1
[PATCH] [VTD] Enable pass-through translation for Dom0
If pass-through field in extended capability register is set, set
pass-through translation type for Dom0, that means DMA requests with
Untranslated addresses are
processed as pass-through in Dom0, needn''t translate DMA requests
through a multi-level page-table.
Signed-off-by: Anthony Xu <anthony.xu@intel.com>
Signed-off-by: Weidong Han <weidong.han@intel.com>
2008 Oct 09
1
[PATCH] vtd: Define a struct IO_xAPIC_route_entry to accommodate both ioapic and iosapic
The patch makes some pci access functions architecture independent.
It only moves the 2 functions from xen/arch/x86/pci.c to xen/drivers/pci/pci.c.
Thanks,
-- Dexuan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Jun 27
0
[PATCH][VTD] Minor fixing of interrupt remapping
When ir_ctrl->iremap_index == -1, it means there is no remap entry. So
it needn''t to convert from remap format to normal ioapic format.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Oct 09
0
[VTD][PATCH] iommu code cleanup
This patch cleans up iommu code.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Nov 07
0
[PATCH]vtd, one more fix about PMR disable
One more fix about PMR disable.
Move PMR disable into per-iommu enable function, instead of in
current iommu_setup which only takes effect on first VT-d engine.
This change also enlightens S3 resume path.
Signed-off-by Gang Wei (Jimmy) <gang.wei@intel.com>
Signed-off-by Kevin Tian <kevin.tian@intel.com>
Thanks,
Kevin
_______________________________________________
Xen-devel
2008 Nov 20
0
[PATCH 2/2][VTD] ats support for Intel64 with VT-d
This patch turns on ATS in VT-d context entries and devices with ATS capability. It also contain minor code clean up.
Signed-off-by: Allen Kay <allen.m.kay@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel