Displaying 20 results from an estimated 10000 matches similar to: "Critical bug: VT-d fault causes disk corruption or Dom0 kernel panic."
2007 Sep 30
6
[VTD][PATCH] a time out mechanism for the shared interrupt issue for vtd
Attached is a patch for shared interrupt between dom0 and HVM domain for
vtd.
Most of problem is caused by that we should inject interrupt to both
domains and the
physical interrupt deassertion then may be delayed by the device
assigned to the HVM.
The patch adds a timer, and the time out value is sufficient large to
tolerant
the delaying used to wait for the physical interrupt deassertion.
2011 Jul 30
22
[bug] ''VT-d 1G super page'' feature is blocked
Hi Tim,
Could you please have a look at this bug? Thanks a lot.
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1774
Best Regards,
Yongjie Ren (Jay)
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Oct 17
7
[VTD][RESEND]add a timer for the shared interrupt issue for vt-d
Keir,
It''s a resending patch for the timeout mechanism to deal with the shared
interrupt issue for vt-d enabled hvm guest.
We modify the patch following your comments last time and make some
other small fix:
1) We don''t touch the locking around the hvm_dpci_eoi().
2) Remove the HZ from the TIME_OUT_PERIOD macro which may confuse
others.
3) Add some
2007 Dec 05
13
[PATCH] unshadow the page table page which are used as data page
The patch deals with the situation which guest OS uses unused page table
pages as data pages and write data to them. The pages will still be
grabbed by Xen as page table pages, and lots of unnecessary page faults
occur.
The patch will check if the data guest writes to the page table contains
valid mfn or not, if not, we believe it is a data page now and then
unshadow the page.
The patch
2007 May 30
30
[VTD][patch 0/5] HVM device assignment using vt-d
The following 5 patches are re-submissions of the vt-d patch.
This set of patches has been tested against cs# 15080 and is
now much more mature and tested against more environments than
the original patch. Specifically, we have successfully tested
the patch with following environements:
- 32/64-bit Linux HVM guest
- 32-bit Windows XP/Vista (64-bit should work but did not test)
-
2008 Mar 05
4
Intel VT-d Support
Hello all,
please tell me, how can I be sure that
my Xen installation is built with Intel VT-d support?
Something like
xm info | grep -i KEY-REGULAR-EXPRESSION
xm dmesg | grep -i KEY-REGULAR-EXPRESSION
What a line should I look for?
And if my installation was really built with VT-d support,
how can I be sure, that Xen has successfully
initialized VT-d hardware?
I have read [1] and the
2008 May 15
7
PCI Passthrough using GART on AMD CPUs?
Hey everyone,
I realize that people asking about PCI passthrough has been thoroughly beaten to
death many a time, however I couldn''t find the answer to these questions
anywhere (and I''d really like to know :P) so please just bare with me.
I know the GART built into AMD chipsets can act as a "mini IOMMU" and do DMA
translation but not protection/isolation. However,
2008 May 23
6
VMX status report. Xen: #17702 & Xen0: #559 -- no new issue
Hi all,
This is today''s nightly testing report; no new issue found, bug #1259
got fixed.
Some vt-d cases failed in first round testing, but can get pass in
retesting.
Fixed issue:
==============================================
1. booting windows guest causes Xen HV crash
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1259
Old issues:
2008 Nov 18
6
[PATCH] fix memory allocation from NUMA node for VT-d.
The memory relating guest domain should be allocated from NUMA node on
which the guest runs.
Because the latency of the same NUMA node is faster than that of a
different one.
This patch fixes memory allocation for Address Translation Structure
of VT-d.
VT-d uses two types of Structures for DMA address translation.
The one is Device Assignment Structure.
The other is Address Translation
2009 Jan 22
8
[PATCH 2/2] Enhance MTRR/PAT virtualization for EPT & VT-d enabled both
The patch attached is to set effective memory type for EPT according to the VT-d snoop control capability, and also includes some cleansup for EPT & VT-d both enabled.
Signed-off-by: Zhai, Edwin Edwin.Zhai@intel.com<mailto:Edwin.Zhai@intel.com>
Signed-off-by: Xin, Xiaohui xiaohui.xin@intel.com<mailto:xiaohui.xin@intel.com>
_______________________________________________
2008 Mar 24
21
VMX status report. Xen: #17270 & Xen0: #488 -- no new issue
Hi all,
This is today''s nightly testing report; no new issue today. Most of case
failures are due to bug #1183 and #1194 listed below.
For bug #1194, the issue `Linux booting hangs with "hda: dma..." errors`
got fixed on this c/s; but neither Windows nor Linux X can boot up with
setting sdl=1 and opengl=1 if guest''s resolution is set as 800 * 600 or
higher.
Old
2008 May 19
21
[PATCH 0/5] VT-d support for PV guests
Hi,
I''ve added some preliminary support for VT-d for paravirtualized
guests. This must be enabled using an ''iommu_pv'' boot parameter
(disabled by default).
I''ve added some python bindigs to allow xend to assign PCI devices to
IOMMU for PV guests. For HVM guests this is handled in ioemu. Not
sure if it makes sense to handle both cases in one place.
The
2008 Jul 11
10
Will Xen support PCI add-on card for serial ports?
hi,
It looks that Xen currently only support ISA serial port, which is onboard.
Is there any plan to support the PCI serial port?
Thanks,
Neo
--
I would remember that if researchers were not ambitious
probably today we haven''t the technology we are using!
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2005 May 28
4
bitopts functions overflowing page boundarys
u.inuse.type_info is at the end of the pfn_info structure, and is
u32 for both x86_32 and x86_64--in this location it can also be the
last 32 bits of a page.
several functions use bitopts.h functions to manipulate this member, and
on x86_64 these functions use u64 instructions, which will overflow the
page boundary, and possibly the end of memory as we see here:
(XEN)
2008 Jul 01
4
VMX status report. Xen: #17917 & Xen0: #583 -- no new issue
Hi all,
This is our nightly testing report for c/s 17917; no new issue today,
and bug #1286 got fixed.
Fixed issue:
==============================================
1. guest cannot be created with two disks appended.
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1286
Old issues:
==============================================
1. dom0 hangs with io errors printed while booting hvm
2008 Dec 08
4
[PATCH][VTD] pci mmcfg patch for x86-64 - version 2
Fixes made in version 2:
1) Use PML4[257] for ioremap of PCI mmcfg. As full 16-bit segment support would require 44-bits. Since each slot only has 39-bits, we support 2048 PCI segments for now. This can be easily expanded if deemed necessary in the future.
2) Integrated PCI mmcfg access with existing PCI config interface for x86_64. Use MMCFG interface if offset is greater than 256.
2008 Apr 10
8
[PATCH][RFC]Move PCI Configuration Spaces from Dom0 to Xen
Hi, Keir,
This patch will move reading and writing of PCI configuration spaces
from dom0 to Xen. It also changes VTD code, so that they can touch the
PCI configuration spaces with proper lock.
This will also benefit MSI support in Xen.
Can you give some comments? Thanks!
<<pci_conf_xen.patch>>
Best Regards
Haitao Shan
_______________________________________________
Xen-devel
2009 Feb 23
8
[PATCH] Included reserved memory regions in dom0 iommu mappings
This adds a boolean boot parameter to xen to allow reserved memory
regions to be added to the iommu mappings for dom0. The parameter
is "iommu_include_reserved" and is off by default. A warning is
also traced when incorrect RMRR to system memory map values are
detected. This is being added to address some incorrect BIOS''s that
do not report correctly the requied reserved memory
2006 Oct 12
9
[PATCH] an obvious fix to PIC IO intercept
an obvious fix to PIC IO intercept.
In PIC IO, address from send_pio_req is physical address already.
Signed-off-by: Xiaohui Xin <xiaohui.xin@intel.com>
Signed-off-by: Xiaowei Yang <xiaowei.yang@intel.com>
Signed-off-by: Xin Li <xin.b.li@intel.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 May 09
14
[PATCH] patch to support super page (2M) with EPT
Attached are the patches to support super page with EPT. We only support
2M size. And shadow may still work fine with 4K pages.
The patches can be split into 3 parts. Apply order is as attached.
tool.diff
To allocate 2M physical contiguous memory in guest except the first 2M
and the last 2M.
The first 2M covers special memory, and Xen use the last few pages in
guest memory to do special