Displaying 20 results from an estimated 100000 matches similar to: "[VTD][PATCH] iommu code cleanup"
2007 Nov 24
0
[VTD][PATCH] Some fixes of Intel iommu
This patch removes a wrong if condition judgement to setup rmrr identify
mapping for guests, and passes page count rather than address size to
iommu_flush_iotlb_psi().
Signed-off-by: Weidong Han <weidong.han@intel.com>
Signed-off-by: Anthony Xu <Anthony.xu@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 Jul 25
1
[PATCH 1/4] Various VT-d code cleanup
This patch maps RMRR in intel_iommu_add_device() if the device has RMRR;
move domain_context_mapping() to be in front of list_move() in
reassign_device_ownership().
Currently, hypervisor sets up devices and RMRR for dom0, and dom0 also
adds devices for itself via hypercall. This is obviously duplicate. In
order to allow old dom0 kernels to work with iommu-capable platforms,
maybe it cannot be
2008 Sep 26
1
[PATCH] [VTD] Add a check for interrupt remapping of ioapic RTE
For IOAPIC interrupt remapping, it only needs to remap ioapci RTE,
should not remap other IOAPIC registers, which are IOAPIC ID, VERSION
and Arbitration ID. This patch adds the check for this and only remap
ioapci RTE.
Signed-off-by: Anthony Xu <anthony.xu@intel.com>
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing
2008 Sep 08
1
[PATCH] [VTD] Enable pass-through translation for Dom0
If pass-through field in extended capability register is set, set
pass-through translation type for Dom0, that means DMA requests with
Untranslated addresses are
processed as pass-through in Dom0, needn''t translate DMA requests
through a multi-level page-table.
Signed-off-by: Anthony Xu <anthony.xu@intel.com>
Signed-off-by: Weidong Han <weidong.han@intel.com>
2007 Dec 25
1
[VTD][PATCH] Fix addr_to_dma_page() and rmrr mapping issues
Fix addr_to_dma_page() issue to return l1e correctly, and also clean up
rmrr mapping code, make sure setup rmrr identify mapping just once per
domain.
This patch fixes the VT-d bug (Fail to boot smp Linux guest with VT-d
NIC assigned on IA32e platform).
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
2008 Oct 15
0
[PATCH] [VTD] Fix MSI-x interrupt remapping
MSI-x may have multiple vectors, however in current interrupt remapping
code, one device only has one entry in interrupt remapping table.
This patch adds ''remap_index'' in msi_desc structure to track its index
in interrupt remapping table.
Signed-off-by: Haitao Shan <haitao.shan@intel.com>
Signed-off-by: Weidong Han <weidong.han@intel.com>
2008 Jul 23
0
[PATCH] [VTD] Add RMRR check in DMAR parsing
During parsing DMAR table, if find RMRR is incorrect, return error.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Oct 29
0
[VTD][PATCH] Move out isa irq mapping from hvm_do_IRQ_dpci()
Setting isa irq mapping in hvm_do_IRQ_dpci() costs time when each
interrupt occurs, and it doesn''t update isa irq mapping when pci_link is
updated. This patch fixes this issue.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Jun 27
0
[PATCH][VTD] Minor fixing of interrupt remapping
When ir_ctrl->iremap_index == -1, it means there is no remap entry. So
it needn''t to convert from remap format to normal ioapic format.
Signed-off-by: Weidong Han <weidong.han@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Jul 25
0
[PATCH 0/4] Various VT-d code cleanup
The patches are as follows:
Patch 1: Map RMRR in intel_iommu_add_device() if the device has RMRR;
move domain_context_mapping() to be in front of list_move() in
reassign_device_ownership().
Patch 2: There is only one INCLUDE_ALL DMAR unit in system, but no
restriction on whether it''s the last unit.
Patch 3: Change code style of pci.c file, and add
spin_unlock(&pdev->lock) when
2008 Oct 29
34
iommu: mapping reserved region failed - Q35 - VT-D Issue
Xen 3.4 xen-unstable.hg from yesterday with debian etch on 64bit arch
Intel/Lenovo Q35 Mainboard with VT-d enabled
Bootoptions iommu=1 vtd=1
pci.backhide for a PCI-E nvidia graphiccard
xm dmesg Error messages includes:
[VT-D] iommu.c: 1694:d32767 iommu: mapping reserved region failed
[VT-D] iommu.c: 1542:d0 intel_iommu_add_device: context mapping failed
If i try to start my HVM by xm create
2008 May 15
7
PCI Passthrough using GART on AMD CPUs?
Hey everyone,
I realize that people asking about PCI passthrough has been thoroughly beaten to
death many a time, however I couldn''t find the answer to these questions
anywhere (and I''d really like to know :P) so please just bare with me.
I know the GART built into AMD chipsets can act as a "mini IOMMU" and do DMA
translation but not protection/isolation. However,
2008 Dec 08
4
[PATCH][VTD] pci mmcfg patch for x86-64 - version 2
Fixes made in version 2:
1) Use PML4[257] for ioremap of PCI mmcfg. As full 16-bit segment support would require 44-bits. Since each slot only has 39-bits, we support 2048 PCI segments for now. This can be easily expanded if deemed necessary in the future.
2) Integrated PCI mmcfg access with existing PCI config interface for x86_64. Use MMCFG interface if offset is greater than 256.
2008 Oct 25
2
VTd - PCI Passthrough - VMError: fail to assign device
Dear Users,
Debian Etch 2.6.18.8-xen from xensource.com with Xen 3.3.0 on AMD64:
After i want to start the HVM i get:
VmError: fail to assign device(1:0.0): maybe it has already been
assigned to other domain, or maybe it doesn''t exist.
[2008-10-25 19:59:30 2460] DEBUG (__init__:1072)
XendDomainInfo.destroy: domid=5
[2008-10-25 19:59:30 2460] DEBUG (__init__:1072)
2010 Aug 31
2
[PATCH 2/3 v2] XSAVE/XRSTOR: fix frozen states
If a guest sets a state and dirties the state, but later temporarily clears the state, and at this time if this vcpu is scheduled out, then other vcpus may corrupt the state before the vcpu is scheduled in again, thus the state cannot be restored correctly. To solve this issue, this patch save/restore all states unconditionally on vcpu context switch.
Signed-off-by: Weidong Han
2008 Aug 29
0
[PATCH] vtd: fix Dom0 S3 when VT-d is enabled.
Now if VT-d is enabled, when Dom0 does S3, Xen doesn''t suspend/resume
the IOMMU states.
The patch adds the missing invocations of iommu_suspend()/iommu_resume()
and makes some nesessary fixes:
1) In iommu_set_root_entry(), we should not re-allocate the root-entry
when Xen returns from S3;
2) Define the array iommu_state correctly (u8 -> u32);
3) Only save/restore the necessary IOMMU
2007 Dec 10
19
[VTD][PATCH] Change xc_assign_device()
Currently we assign devices with VT-d in Xend, this raises two issues:
1) assign devices regardless of they are hidden by pciback or not. If
the device is not hidden, it results in the device doesn''t work in Dom0;
2) device is assigned one by one, if assign multiple devices, some
devices may have been assigned when problem happens, it results in
assigned devices don''t work in
2008 Sep 17
7
Megaraid SAS driver failing in Xen-3.3.0 but was working in Xen-3.2.2-rc3
On Xen-3.3.0, domain0 Megaraid SAS (SAS 1068 controller) driver is not loading correctly if vtd support in Xen is enabled.
It fails at the point of initializing firmware.
I wasn''t seeing this error with Xen-3.2.2-rc3 (Unstable version), though with vtd disabled in Xen-3.3.0, it is working.
Looks like a degrade problem.
Any clues?
Thx,
Venkat
2008 Mar 18
1
Compilation failure
Compilation failure on c/s 17194 is as follows:
/root/randy/vtd-stage/xen/common/built_in.o: In function
`guest_remove_page'':
/root/randy/vtd-stage/xen/common/memory.c:172: undefined reference to
`__bitop_bad_size''
/root/randy/vtd-stage/xen/common/memory.c:172: relocation truncated to
fit: R_X86_64_PC32 against undefined symbol `__bitop_bad_size''
2007 Nov 07
0
[PATCH]vtd, one more fix about PMR disable
One more fix about PMR disable.
Move PMR disable into per-iommu enable function, instead of in
current iommu_setup which only takes effect on first VT-d engine.
This change also enlightens S3 resume path.
Signed-off-by Gang Wei (Jimmy) <gang.wei@intel.com>
Signed-off-by Kevin Tian <kevin.tian@intel.com>
Thanks,
Kevin
_______________________________________________
Xen-devel