Displaying 20 results from an estimated 20000 matches similar to: "[PATCH] VT-d: flush iotlb of selective iommu when a domain''s VT-d table is changed"
2008 May 27
3
[PATCH] VT-d: IOTLB flush fixups
On map: only flush when old PTE was valid or invalid PTE may be cached.
On unmap: always flush old entry, but skip flush for unaffected IOMMUs.
Signed-off-by: Espen Skoglund <espen.skoglund@netronome.com>
--
iommu.c | 17 +++++++++++------
1 file changed, 11 insertions(+), 6 deletions(-)
--
diff -r 8187fd8113f9 xen/drivers/passthrough/vtd/iommu.c
---
2008 May 23
0
[PATCH] VT-d: remove Xen and tboot range from dom0''s VT-d table
This a step forward to fix the security hole introduced by dom0''s 1:1
mapping VT-d table: remove the critical code and data from it. The more
flexible solution is to update dom0''s VT-d table on demand as what will
be done for other PV domains. However, there could bring a performance
issue even with software optimization. Iotlb flush of some hardware is
time-consuming.
2012 Jul 11
3
[PATCH] vt-d: fix wrong addr in IOTLB invalidation descriptor
According to vt-d specs, the addr in IOTLB invalidation descriptor should be 4K page aligned.
Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com>
diff -r 0455d8317631 xen/drivers/passthrough/vtd/qinval.c
--- a/xen/drivers/passthrough/vtd/qinval.c Thu Jun 28 18:43:28 2012 +0100
+++ b/xen/drivers/passthrough/vtd/qinval.c Wed Jul 11 08:43:24 2012 +0800
@@ -140,7 +140,7 @@ static int
2005 Oct 26
1
[PATCH][VT] Multithread IDE device model ( was: RE: [PATCH]Make IDE dma tranfer run in another thread inqemu)
Keir:
This is to to make the IDE device model multithreading so that
the VMX domain IO access completion (triggering DMA operation) can be
asynchronize with the completion of DMA operation. With this patch we
get 8%--14% performance gain for kernel build.
Thanks,
eddie
Yang, Xiaowei wrote:
> Originally in qemu when a IDE dma transfer is started which is
> triggered by access to 0xc000
2008 May 19
21
[PATCH 0/5] VT-d support for PV guests
Hi,
I''ve added some preliminary support for VT-d for paravirtualized
guests. This must be enabled using an ''iommu_pv'' boot parameter
(disabled by default).
I''ve added some python bindigs to allow xend to assign PCI devices to
IOMMU for PV guests. For HVM guests this is handled in ioemu. Not
sure if it makes sense to handle both cases in one place.
The
2006 Oct 23
1
[PATCH] Move ACPI timer to HV
Keir,
The patch moves ACPI timer to HV, which is the last platform timer in
Qemu.
We found Vista polls ACPI timer very frequently (about 15 times
averagely) when handling timer (RTC @ 64HZ) interrupt routine. Though
the exact reason is known, it should be related to system time
adjustment. When it''s in Qemu, the overhead is big. After moving,
Vista''s idle overhead decreases
2006 Jul 17
3
[Patch] Fix cirrus and rt8139 co-exist issue
Keir,
This patch fixes cirrus and rt8139 co-exist issue in new qemu-dm. The
root cause is that if two MMIO spaces are continuous, qemu may misuse
last MMIO space''s read/write to handle current request.
Thanks,
Xiaowei
Signed-off-by: Yang Xiaowei <xiaowei.yang@intel.com>
diff -r ecb8ff1fcf1f tools/ioemu/target-i386-dm/exec-dm.c
--- a/tools/ioemu/target-i386-dm/exec-dm.c Fri
2014 Jun 18
0
xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code
Hello,
Are you going to fix https://bugs.debian.org/730254 or what is the status? I
would like to close old issues in case these are not going to get fixed.
---
Henri Salo
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL:
2013 Nov 23
1
Bug#730254: xen: CVE-2013-6375: Insufficient TLB flushing in VT-d (iommu) code
Package: xen
Version: 4.0.1-5.11
Severity: important
Tags: security, patch, fixed-upstream
http://www.openwall.com/lists/oss-security/2013/11/21/2
Description:
An inverted boolean parameter resulted in TLB flushes not happening
upon clearing of a present translation table entry. Retaining stale
TLB entries could allow guests access to memory that ought to have
been revoked, or grant greater
2006 Oct 15
0
[PATCH] Fix MOVS handling memory spanning multiple pages
This patch fixes MOVS handling memory spanning multiple pages.
Signed-off-by: Eddie Dong <eddie.dong@intel.com>
Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com>
Signed-off-by: Xin Li <xin.b.li@intel.com>
Thanks,
Xiaowei
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Dec 14
0
[PATCH] Xenoprof: Fix more than one events can''t be sampled concurrently for Intel CPU with family equal to 6
The original code only sets EN bit of IA32_PERFEVTSEL0 when profiling is
started.
Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com>
Regards,
Xiaowei
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2006 Jul 06
0
Fwd: RE: xenoprof passive profiling and "mode" setting
See below...
---------- Forwarded Message ----------
Subject: RE: [Xen-devel] xenoprof passive profiling and "mode" setting
Date: Wednesday 05 July 2006 21:53
From: "Yang, Xiaowei" <xiaowei.yang@intel.com>
To: "Keir Fraser" <Keir.Fraser@cl.cam.ac.uk>, "Ray Bryant"
<raybry@mpdtxmail.amd.com>
Cc: xen-devel@lists.xensource.com
2008 Aug 21
0
[PATCH]fix a little problem in formats file of xentrace
This patch (attached) fixes a small problem in xentrace_format.
Signed-off-by: Yang Xiaowei <xiaowei.yang@intel.com>
Zhou Ting <ting.g.zhou@intel.com>
---
diff -r 0df3bf8aac1e tools/xentrace/formats
--- a/tools/xentrace/formats Mon Jun 16 16:35:17 2008 +0100
+++ b/tools/xentrace/formats Thu Aug 21 17:36:03 2008 +0800
@@ -23,8 +23,8 @@ 0x00081001 CPU%(cpu)d
2016 Jan 05
1
[PATCH RFC] vhost: basic device IOTLB support
On 2016/1/4 14:22, Jason Wang wrote:
>
>
> On 01/04/2016 09:39 AM, Yang Zhang wrote:
>> On 2015/12/31 15:13, Jason Wang wrote:
>>> This patch tries to implement an device IOTLB for vhost. This could be
>>> used with for co-operation with userspace(qemu) implementation of
>>> iommu for a secure DMA environment in guest.
>>>
>>> The idea is
2016 Jan 05
1
[PATCH RFC] vhost: basic device IOTLB support
On 2016/1/4 14:22, Jason Wang wrote:
>
>
> On 01/04/2016 09:39 AM, Yang Zhang wrote:
>> On 2015/12/31 15:13, Jason Wang wrote:
>>> This patch tries to implement an device IOTLB for vhost. This could be
>>> used with for co-operation with userspace(qemu) implementation of
>>> iommu for a secure DMA environment in guest.
>>>
>>> The idea is
2020 Apr 14
0
[PATCH v2 04/33] iommu/vt-d: Wire up iommu_ops->def_domain_type
From: Joerg Roedel <jroedel at suse.de>
The Intel VT-d driver already has a matching function to determine the
default domain type for a device. Wire it up in intel_iommu_ops.
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
drivers/iommu/intel-iommu.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
index
2006 Oct 12
9
[PATCH] an obvious fix to PIC IO intercept
an obvious fix to PIC IO intercept.
In PIC IO, address from send_pio_req is physical address already.
Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com>
Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com>
Signed-off-by: Xin Li <xin.b.li@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2020 Apr 14
0
[PATCH v2 16/33] iommu/vt-d: Convert to probe/release_device() call-backs
From: Joerg Roedel <jroedel at suse.de>
Convert the Intel IOMMU driver to use the probe_device() and
release_device() call-backs of iommu_ops, so that the iommu core code
does the group and sysfs setup.
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
drivers/iommu/intel-iommu.c | 67 ++++---------------------------------
1 file changed, 6 insertions(+), 61 deletions(-)
diff
2012 Jul 30
3
[PATCH] Intel VT-d: Dump IOMMU supported page sizes
diff -r e6266fc76d08 -r 6feac926cf80 xen/drivers/passthrough/vtd/iommu.c
--- a/xen/drivers/passthrough/vtd/iommu.c Fri Jul 27 12:22:13 2012 +0200
+++ b/xen/drivers/passthrough/vtd/iommu.c Mon Jul 30 15:35:16 2012 -0700
@@ -2137,6 +2137,15 @@ int __init intel_vtd_setup(void)
{
iommu = drhd->iommu;
+ printk("Intel VT-d supported page sizes: 4kB");
+ if
2016 Jan 04
1
[PATCH RFC] vhost: basic device IOTLB support
On 2015/12/31 15:13, Jason Wang wrote:
> This patch tries to implement an device IOTLB for vhost. This could be
> used with for co-operation with userspace(qemu) implementation of
> iommu for a secure DMA environment in guest.
>
> The idea is simple. When vhost meets an IOTLB miss, it will request
> the assistance of userspace to do the translation, this is done
> through: