Displaying 20 results from an estimated 700 matches similar to: "[PATCH 0/4] Various VT-d code cleanup"
2008 Jul 25
1
[PATCH 1/4] Various VT-d code cleanup
This patch maps RMRR in intel_iommu_add_device() if the device has RMRR;
move domain_context_mapping() to be in front of list_move() in
reassign_device_ownership().
Currently, hypervisor sets up devices and RMRR for dom0, and dom0 also
adds devices for itself via hypercall. This is obviously duplicate. In
order to allow old dom0 kernels to work with iommu-capable platforms,
maybe it cannot be
2009 Feb 13
12
VT-D RMRR is incorrect
I try pci pci passthrough with xen 3.3.1 and CentOS 5.2(64bit)
on a SUPERMICRO C7X58 board
I see the following the error in my boot log.
(XEN) [VT-D]dmar.c:372: RMRR is incorrect.
This problem is caused by this condition in dmr.c:372.
if ( rmrr->base_address >= rmrr->end_address )
{
dprintk(XENLOG_ERR VTDPREFIX, "RMRR is incorrect.\n");
return -EFAULT;
}
As an
2009 Feb 13
12
VT-D RMRR is incorrect
I try pci pci passthrough with xen 3.3.1 and CentOS 5.2(64bit)
on a SUPERMICRO C7X58 board
I see the following the error in my boot log.
(XEN) [VT-D]dmar.c:372: RMRR is incorrect.
This problem is caused by this condition in dmr.c:372.
if ( rmrr->base_address >= rmrr->end_address )
{
dprintk(XENLOG_ERR VTDPREFIX, "RMRR is incorrect.\n");
return -EFAULT;
}
As an
2012 Nov 28
2
[PATCH] VT-d: make scope parsing code type safe
Rather than requiring the scopes to be the first members of their
respective structures (so that casts can be used to switch between the
different views), properly use types and container_of().
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/drivers/passthrough/vtd/dmar.c
+++ b/xen/drivers/passthrough/vtd/dmar.c
@@ -304,13 +304,15 @@ static int __init scope_device_count(con
2012 Apr 10
0
VT-d BIOS problem with DMAR/ACPI tables | Sabertooth X58
Hi,
I''m not able to activate VT-d on my PC due to a buggy BIOS. Xen fails
to parse ACPI DMAR table. There is a problem with RMRR address range.
My configuration is :
- Debian Weezy
- Xen version 4.1.2 (Debian 4.1.2-2)
- Sabertooth X58 with last bios (1304)
- i7 - 960
I have the following message :
(XEN) [VT-D]dmar.c:704: Host address width 39
(XEN) [VT-D]dmar.c:719: found
2008 Oct 29
34
iommu: mapping reserved region failed - Q35 - VT-D Issue
Xen 3.4 xen-unstable.hg from yesterday with debian etch on 64bit arch
Intel/Lenovo Q35 Mainboard with VT-d enabled
Bootoptions iommu=1 vtd=1
pci.backhide for a PCI-E nvidia graphiccard
xm dmesg Error messages includes:
[VT-D] iommu.c: 1694:d32767 iommu: mapping reserved region failed
[VT-D] iommu.c: 1542:d0 intel_iommu_add_device: context mapping failed
If i try to start my HVM by xm create
2009 Mar 04
1
pv_ops kernel 2.6.29-rc6 boot failure
Hi,
I did a git pull on pv_ops tree this morning and now get a crash when
eth0 is started, here is the full boot log:
Booting ''Xen 3.4 / Linux 2.6.29-rc6-tip''
root (hd0,0)
Filesystem type is ext2fs, partition type 0x83
kernel /xen.gz com1=115200,8n1 console=com1,vga iommu=1
[Multiboot-elf, <0x100000:0x131748:0x8e8b8>, shtab=0x2c0078, entry=0x100000]
module
2007 Dec 25
1
[VTD][PATCH] Fix addr_to_dma_page() and rmrr mapping issues
Fix addr_to_dma_page() issue to return l1e correctly, and also clean up
rmrr mapping code, make sure setup rmrr identify mapping just once per
domain.
This patch fixes the VT-d bug (Fail to boot smp Linux guest with VT-d
NIC assigned on IA32e platform).
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
2008 Jul 23
0
[PATCH] [VTD] Add RMRR check in DMAR parsing
During parsing DMAR table, if find RMRR is incorrect, return error.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Nov 24
0
[VTD][PATCH] Some fixes of Intel iommu
This patch removes a wrong if condition judgement to setup rmrr identify
mapping for guests, and passes page count rather than address size to
iommu_flush_iotlb_psi().
Signed-off-by: Weidong Han <weidong.han@intel.com>
Signed-off-by: Anthony Xu <Anthony.xu@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2012 Mar 05
0
P6T RMRR clarification please
I''m using
(XEN) Xen version 4.1.2 (Debian 4.1.2-2) (waldi at debian dot org)
(gcc version 4.6.2 (Debian 4.6.2-6) ) Sat Dec 10 19:58:21 UTC 2011
With VT-d enabled in BIOS the ACPI Direct Memory Access remapping
(DMAR) in the P6T Deluxe V2 (BIOS 1202, 2011/10/10) reports
RMRR (Reserved Memory Region Reporting Structure) is bf7dc000 -
bf7dbfff
e820 table:
2012 Dec 12
2
[PATCH v7 1/2] xen: unify domain locking in domctl code
These two patches were originally part of the XSM series that I have
posted, and remain prerequisites for that series. However, they are
independent of the XSM changes and are a useful simplification
regardless of the use of XSM.
The Acked-bys on these patches were provided before rebasing them over
the copyback changes in 26268:1b72138bddda, which had minor conflicts
that I resolved.
[PATCH
2016 Jun 22
0
PCI Passthrough not working
More information...
I have pcifront showing as a module in the DomU and the usb shows in dmesg as:
[ 3.167543] usbcore: registered new interface driver usbfs
[ 3.167563] usbcore: registered new interface driver hub
[ 3.167585] usbcore: registered new device driver usb
[ 3.196056] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002
[ 3.196060] usb usb1: New USB device strings:
2020 Apr 14
0
[PATCH v2 16/33] iommu/vt-d: Convert to probe/release_device() call-backs
From: Joerg Roedel <jroedel at suse.de>
Convert the Intel IOMMU driver to use the probe_device() and
release_device() call-backs of iommu_ops, so that the iommu core code
does the group and sysfs setup.
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
drivers/iommu/intel-iommu.c | 67 ++++---------------------------------
1 file changed, 6 insertions(+), 61 deletions(-)
diff
2016 Jun 24
2
PCI Passthrough not working
On Wed, Jun 22, 2016 at 11:49 AM, Francis Greaves <francis at choughs.net> wrote:
> More information...
> I have pcifront showing as a module in the DomU and the usb shows in dmesg
> as:
> [ 3.167543] usbcore: registered new interface driver usbfs
> [ 3.167563] usbcore: registered new interface driver hub
> [ 3.167585] usbcore: registered new device driver usb
>
2019 Dec 21
0
[PATCH 2/8] iommu/vt-d: Use default dma_direct_* mapping functions for direct mapped devices
We should only assign intel_dma_ops to devices which will actually use
the iommu and let the default fall back dma_direct_* functions handle
all other devices. This won't change any behaviour but will just use the
generic implementations for direct mapped devices rather than intel
specific ones.
Signed-off-by: Tom Murphy <murphyt7 at tcd.ie>
---
drivers/iommu/intel-iommu.c | 52
2017 Sep 21
0
[RFC] virtio-iommu version 0.4
> From: Jean-Philippe Brucker
> Sent: Wednesday, September 6, 2017 7:55 PM
>
> Hi Kevin,
>
> On 28/08/17 08:39, Tian, Kevin wrote:
> > Here comes some comments:
> >
> > 1.1 Motivation
> >
> > You describe I/O page faults handling as future work. Seems you
> considered
> > only recoverable fault (since "aka. PCI PRI" being used).
2017 Sep 06
2
[RFC] virtio-iommu version 0.4
Hi Kevin,
On 28/08/17 08:39, Tian, Kevin wrote:
> Here comes some comments:
>
> 1.1 Motivation
>
> You describe I/O page faults handling as future work. Seems you considered
> only recoverable fault (since "aka. PCI PRI" being used). What about other
> unrecoverable faults e.g. what to do if a virtual DMA request doesn't find
> a valid mapping? Even when
2017 Sep 06
2
[RFC] virtio-iommu version 0.4
Hi Kevin,
On 28/08/17 08:39, Tian, Kevin wrote:
> Here comes some comments:
>
> 1.1 Motivation
>
> You describe I/O page faults handling as future work. Seems you considered
> only recoverable fault (since "aka. PCI PRI" being used). What about other
> unrecoverable faults e.g. what to do if a virtual DMA request doesn't find
> a valid mapping? Even when
2008 Dec 23
1
DQ35JO (Q35 chipset), Q6600, xen-unstable (~12/21), RMRR/DMAR error
Purchased DQ35JO on Vt-d/PCI passthrough wiki''s recommendations. Built
latest xen-unstable and am getting the following via ''xm dmesg'':
(XEN) [VT-D]dmar.c:374: RMRR error: base_addr d0000000 end_address
cfffffff
(XEN) Failed to parse ACPI DMAR. Disabling VT-d.
My grub.conf looks like this:
kernel /xen.gz vga=mode-0x0317 vtd=1 iommu=1