* error messages when doing VT-d device passthrough
@ 2010-08-30 23:57 Kay, Allen M
2010-08-31 0:08 ` Kay, Allen M
0 siblings, 1 reply; 10+ messages in thread
From: Kay, Allen M @ 2010-08-30 23:57 UTC (permalink / raw)
To: xen-devel@lists.xensource.com; +Cc: tim.deegan@eu.citrix.com, Keir Fraser
[-- Attachment #1.1: Type: text/plain, Size: 418 bytes --]
I'm getting the following error messages when doing Vt-d device passthrough:
...
(XEN) p2m.c:2626:d0 clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=000f303b
...
This message is printed out for each MMIO page used by the device. This seems to be cause by the code change from "if ( INVALID_MFN == mfn)" to "if (!mfn_valid(mfn) )" in p2m.c/clear_mmio_p2m_entry().
What is the reason for the change?
Allen
[-- Attachment #1.2: Type: text/html, Size: 5230 bytes --]
[-- Attachment #2: Type: text/plain, Size: 138 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] 10+ messages in thread
* RE: error messages when doing VT-d device passthrough
2010-08-30 23:57 error messages when doing VT-d device passthrough Kay, Allen M
@ 2010-08-31 0:08 ` Kay, Allen M
2010-08-31 1:58 ` [PATCH] re-enable HVM PCI passthrough functionality Kay, Allen M
0 siblings, 1 reply; 10+ messages in thread
From: Kay, Allen M @ 2010-08-31 0:08 UTC (permalink / raw)
To: xen-devel@lists.xensource.com
Cc: tim.deegan@eu.citrix.com, Christoph.Egger@amd.com, Keir Fraser
[-- Attachment #1.1: Type: text/plain, Size: 845 bytes --]
Cc'ing Christoph Egger since this change was part of the "nested Virtualization: p2m infrastructure" in cs# 21940.
From: xen-devel-bounces@lists.xensource.com [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Kay, Allen M
Sent: Monday, August 30, 2010 4:57 PM
To: xen-devel@lists.xensource.com
Cc: tim.deegan@eu.citrix.com; Keir Fraser
Subject: [Xen-devel] error messages when doing VT-d device passthrough
I'm getting the following error messages when doing Vt-d device passthrough:
...
(XEN) p2m.c:2626:d0 clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=000f303b
...
This message is printed out for each MMIO page used by the device. This seems to be cause by the code change from "if ( INVALID_MFN == mfn)" to "if (!mfn_valid(mfn) )" in p2m.c/clear_mmio_p2m_entry().
What is the reason for the change?
Allen
[-- Attachment #1.2: Type: text/html, Size: 6412 bytes --]
[-- Attachment #2: Type: text/plain, Size: 138 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] 10+ messages in thread
* [PATCH] re-enable HVM PCI passthrough functionality
2010-08-31 0:08 ` Kay, Allen M
@ 2010-08-31 1:58 ` Kay, Allen M
2010-08-31 9:17 ` Tim Deegan
0 siblings, 1 reply; 10+ messages in thread
From: Kay, Allen M @ 2010-08-31 1:58 UTC (permalink / raw)
To: xen-devel@lists.xensource.com
Cc: tim.deegan@eu.citrix.com, Christoph.Egger@amd.com, Keir Fraser
[-- Attachment #1: Type: text/plain, Size: 151 bytes --]
Attached patch reverts back to INVALID_MFN. PCI passthrough functionality works with this patch.
Signed-off-by: Allen Kay allen.m.kay@intel.com
[-- Attachment #2: mm.patch --]
[-- Type: application/octet-stream, Size: 419 bytes --]
diff -r 32c9a19ac98b xen/arch/x86/mm/p2m.c
--- a/xen/arch/x86/mm/p2m.c Mon Aug 30 14:59:12 2010 +0100
+++ b/xen/arch/x86/mm/p2m.c Mon Aug 30 11:56:12 2010 -0700
@@ -2620,7 +2620,7 @@
return 0;
mfn = gfn_to_mfn(p2m, gfn, &t);
- if ( !mfn_valid(mfn) )
+ if ( INVALID_MFN == mfn_x(mfn) )
{
gdprintk(XENLOG_ERR,
"clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=%08lx\n", gfn);
[-- Attachment #3: Type: text/plain, Size: 138 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] re-enable HVM PCI passthrough functionality
2010-08-31 1:58 ` [PATCH] re-enable HVM PCI passthrough functionality Kay, Allen M
@ 2010-08-31 9:17 ` Tim Deegan
2010-08-31 9:35 ` Christoph Egger
0 siblings, 1 reply; 10+ messages in thread
From: Tim Deegan @ 2010-08-31 9:17 UTC (permalink / raw)
To: Kay, Allen M
Cc: Christoph.Egger@amd.com, xen-devel@lists.xensource.com,
Keir Fraser
At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> Attached patch reverts back to INVALID_MFN. PCI passthrough functionality works with this patch.
>
Apologies for missing this - I did ask for this enormous patch to
contain only what it said on the tin (and I did read it to check!) but
this one got through.
> Signed-off-by: Allen Kay allen.m.kay@intel.com
>
This is fine, but please add a comment explaining the rather subtle use
of INVALID_MFN here so the next tidy-minded person doesn't "fix" it
again. :)
In fact would it be better to check the returned type == p2m_mmio_direct
instead? That seems like it would fit better with the intention. Or
do other callers use this to clean non-mmio entries too?
Cheers,
Tim.
--
Tim Deegan <Tim.Deegan@citrix.com>
Principal Software Engineer, XenServer Engineering
Citrix Systems UK Ltd. (Company #02937203, SL9 0BG)
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] re-enable HVM PCI passthrough functionality
2010-08-31 9:17 ` Tim Deegan
@ 2010-08-31 9:35 ` Christoph Egger
2010-08-31 16:13 ` Kay, Allen M
0 siblings, 1 reply; 10+ messages in thread
From: Christoph Egger @ 2010-08-31 9:35 UTC (permalink / raw)
To: Tim Deegan; +Cc: xen-devel@lists.xensource.com, Kay, Allen M, Keir Fraser
On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote:
> At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> > Attached patch reverts back to INVALID_MFN. PCI passthrough
> > functionality works with this patch.
>
> Apologies for missing this - I did ask for this enormous patch to
> contain only what it said on the tin (and I did read it to check!) but
> this one got through.
Also apologies from my side. I did what Tim requested for, but that
one slipped through.
> > Signed-off-by: Allen Kay allen.m.kay@intel.com
>
> This is fine, but please add a comment explaining the rather subtle use
> of INVALID_MFN here so the next tidy-minded person doesn't "fix" it
> again. :)
>
> In fact would it be better to check the returned type == p2m_mmio_direct
> instead? That seems like it would fit better with the intention. Or
> do other callers use this to clean non-mmio entries too?
I'm interested in if this patch fixes the SR-IOV issue. We are still about
investigation...
Christoph
--
---to satisfy European Law for business letters:
Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach b. Muenchen
Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
Registergericht Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 10+ messages in thread
* RE: [PATCH] re-enable HVM PCI passthrough functionality
2010-08-31 9:35 ` Christoph Egger
@ 2010-08-31 16:13 ` Kay, Allen M
2010-09-01 8:56 ` Tim Deegan
0 siblings, 1 reply; 10+ messages in thread
From: Kay, Allen M @ 2010-08-31 16:13 UTC (permalink / raw)
To: Christoph Egger, Tim Deegan; +Cc: Keir, xen-devel@lists.xensource.com, Fraser
[-- Attachment #1: Type: text/plain, Size: 2014 bytes --]
I have updated the patch to indicate valid_mfn() cannot be used here as MMIO pages are always above max_mem. Also added sanity checking for type == p2m_mmio_direct before clearing page table entry. This should fix both VT-d and SR-IOV issues reported recently as there are no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV virtual function is just another PCI device.
Signed-off-by: Allen Kay allen.m.kay@intel.com
-----Original Message-----
From: Christoph Egger [mailto:Christoph.Egger@amd.com]
Sent: Tuesday, August 31, 2010 2:35 AM
To: Tim Deegan
Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser
Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality
On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote:
> At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> > Attached patch reverts back to INVALID_MFN. PCI passthrough
> > functionality works with this patch.
>
> Apologies for missing this - I did ask for this enormous patch to
> contain only what it said on the tin (and I did read it to check!) but
> this one got through.
Also apologies from my side. I did what Tim requested for, but that
one slipped through.
> > Signed-off-by: Allen Kay allen.m.kay@intel.com
>
> This is fine, but please add a comment explaining the rather subtle use
> of INVALID_MFN here so the next tidy-minded person doesn't "fix" it
> again. :)
>
> In fact would it be better to check the returned type == p2m_mmio_direct
> instead? That seems like it would fit better with the intention. Or
> do other callers use this to clean non-mmio entries too?
I'm interested in if this patch fixes the SR-IOV issue. We are still about
investigation...
Christoph
--
---to satisfy European Law for business letters:
Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach b. Muenchen
Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
Registergericht Muenchen, HRB Nr. 43632
[-- Attachment #2: mm.patch --]
[-- Type: application/octet-stream, Size: 528 bytes --]
diff -r 32c9a19ac98b xen/arch/x86/mm/p2m.c
--- a/xen/arch/x86/mm/p2m.c Mon Aug 30 14:59:12 2010 +0100
+++ b/xen/arch/x86/mm/p2m.c Tue Aug 31 02:08:24 2010 -0700
@@ -2620,7 +2620,9 @@
return 0;
mfn = gfn_to_mfn(p2m, gfn, &t);
- if ( !mfn_valid(mfn) )
+
+ /* Do not use mfn_valid() here as MMIO pages are always above max_page */
+ if ( (INVALID_MFN == mfn_x(mfn)) || (t != p2m_mmio_direct) )
{
gdprintk(XENLOG_ERR,
"clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=%08lx\n", gfn);
[-- Attachment #3: Type: text/plain, Size: 138 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] re-enable HVM PCI passthrough functionality
2010-08-31 16:13 ` Kay, Allen M
@ 2010-09-01 8:56 ` Tim Deegan
2010-09-02 2:26 ` Zhang, Yang Z
0 siblings, 1 reply; 10+ messages in thread
From: Tim Deegan @ 2010-09-01 8:56 UTC (permalink / raw)
To: Kay, Allen M; +Cc: Christoph Egger, xen-devel@lists.xensource.com, Keir Fraser
At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote:
> I have updated the patch to indicate valid_mfn() cannot be used here
> as MMIO pages are always above max_mem. Also added sanity checking
> for type == p2m_mmio_direct before clearing page table entry. This
> should fix both VT-d and SR-IOV issues reported recently as there are
> no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV
> virtual function is just another PCI device.
Applied; thanks for the fix.
Tim.
> Signed-off-by: Allen Kay allen.m.kay@intel.com
>
> -----Original Message-----
> From: Christoph Egger [mailto:Christoph.Egger@amd.com]
> Sent: Tuesday, August 31, 2010 2:35 AM
> To: Tim Deegan
> Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser
> Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality
>
> On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote:
> > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> > > Attached patch reverts back to INVALID_MFN. PCI passthrough
> > > functionality works with this patch.
> >
> > Apologies for missing this - I did ask for this enormous patch to
> > contain only what it said on the tin (and I did read it to check!) but
> > this one got through.
>
> Also apologies from my side. I did what Tim requested for, but that
> one slipped through.
>
> > > Signed-off-by: Allen Kay allen.m.kay@intel.com
> >
> > This is fine, but please add a comment explaining the rather subtle use
> > of INVALID_MFN here so the next tidy-minded person doesn't "fix" it
> > again. :)
> >
> > In fact would it be better to check the returned type == p2m_mmio_direct
> > instead? That seems like it would fit better with the intention. Or
> > do other callers use this to clean non-mmio entries too?
>
> I'm interested in if this patch fixes the SR-IOV issue. We are still about
> investigation...
>
> Christoph
>
>
>
> --
> ---to satisfy European Law for business letters:
> Advanced Micro Devices GmbH
> Einsteinring 24, 85609 Dornach b. Muenchen
> Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
> Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
> Registergericht Muenchen, HRB Nr. 43632
>
--
Tim Deegan <Tim.Deegan@citrix.com>
Principal Software Engineer, XenServer Engineering
Citrix Systems UK Ltd. (Company #02937203, SL9 0BG)
^ permalink raw reply [flat|nested] 10+ messages in thread
* RE: Re: [PATCH] re-enable HVM PCI passthrough functionality
2010-09-01 8:56 ` Tim Deegan
@ 2010-09-02 2:26 ` Zhang, Yang Z
2010-09-02 8:34 ` Christoph Egger
0 siblings, 1 reply; 10+ messages in thread
From: Zhang, Yang Z @ 2010-09-02 2:26 UTC (permalink / raw)
To: Tim Deegan, Kay, Allen M
Cc: Christoph Egger, xen-devel@lists.xensource.com, Keir Fraser
With allen's patch, both vt-d and sr-iov can work now. Thanks allen.
best regards
yang
> -----Original Message-----
> From: xen-devel-bounces@lists.xensource.com
> [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan
> Sent: Wednesday, September 01, 2010 4:57 PM
> To: Kay, Allen M
> Cc: Christoph Egger; xen-devel@lists.xensource.com; Keir Fraser
> Subject: [Xen-devel] Re: [PATCH] re-enable HVM PCI passthrough functionality
>
> At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote:
> > I have updated the patch to indicate valid_mfn() cannot be used here
> > as MMIO pages are always above max_mem. Also added sanity checking
> > for type == p2m_mmio_direct before clearing page table entry. This
> > should fix both VT-d and SR-IOV issues reported recently as there are
> > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV
> > virtual function is just another PCI device.
>
> Applied; thanks for the fix.
>
> Tim.
>
> > Signed-off-by: Allen Kay allen.m.kay@intel.com
> >
> > -----Original Message-----
> > From: Christoph Egger [mailto:Christoph.Egger@amd.com]
> > Sent: Tuesday, August 31, 2010 2:35 AM
> > To: Tim Deegan
> > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser
> > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality
> >
> > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote:
> > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> > > > Attached patch reverts back to INVALID_MFN. PCI passthrough
> > > > functionality works with this patch.
> > >
> > > Apologies for missing this - I did ask for this enormous patch to
> > > contain only what it said on the tin (and I did read it to check!) but
> > > this one got through.
> >
> > Also apologies from my side. I did what Tim requested for, but that
> > one slipped through.
> >
> > > > Signed-off-by: Allen Kay allen.m.kay@intel.com
> > >
> > > This is fine, but please add a comment explaining the rather subtle use
> > > of INVALID_MFN here so the next tidy-minded person doesn't "fix" it
> > > again. :)
> > >
> > > In fact would it be better to check the returned type == p2m_mmio_direct
> > > instead? That seems like it would fit better with the intention. Or
> > > do other callers use this to clean non-mmio entries too?
> >
> > I'm interested in if this patch fixes the SR-IOV issue. We are still about
> > investigation...
> >
> > Christoph
> >
> >
> >
> > --
> > ---to satisfy European Law for business letters:
> > Advanced Micro Devices GmbH
> > Einsteinring 24, 85609 Dornach b. Muenchen
> > Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
> > Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
> > Registergericht Muenchen, HRB Nr. 43632
> >
>
>
>
> --
> Tim Deegan <Tim.Deegan@citrix.com>
> Principal Software Engineer, XenServer Engineering
> Citrix Systems UK Ltd. (Company #02937203, SL9 0BG)
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xensource.com
> http://lists.xensource.com/xen-devel
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Re: [PATCH] re-enable HVM PCI passthrough functionality
2010-09-02 2:26 ` Zhang, Yang Z
@ 2010-09-02 8:34 ` Christoph Egger
2010-09-02 9:07 ` Tim Deegan
0 siblings, 1 reply; 10+ messages in thread
From: Christoph Egger @ 2010-09-02 8:34 UTC (permalink / raw)
To: Zhang, Yang Z
Cc: xen-devel@lists.xensource.com, Kay, Allen M, Tim Deegan,
Keir Fraser
On Thursday 02 September 2010 04:26:32 Zhang, Yang Z wrote:
> With allen's patch, both vt-d and sr-iov can work now. Thanks allen.
We were not able to reproduce SR-IOV failures with and without the fix
on AMD machines. I am wondering if there are differences in memory
mappings between AMD and Intel PCI passthrough.
Nonetheless, good to know this has been fixed.
Thanks,
Christoph
> best regards
> yang
>
> > -----Original Message-----
> > From: xen-devel-bounces@lists.xensource.com
> > [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan
> > Sent: Wednesday, September 01, 2010 4:57 PM
> > To: Kay, Allen M
> > Cc: Christoph Egger; xen-devel@lists.xensource.com; Keir Fraser
> > Subject: [Xen-devel] Re: [PATCH] re-enable HVM PCI passthrough
> > functionality
> >
> > At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote:
> > > I have updated the patch to indicate valid_mfn() cannot be used here
> > > as MMIO pages are always above max_mem. Also added sanity checking
> > > for type == p2m_mmio_direct before clearing page table entry. This
> > > should fix both VT-d and SR-IOV issues reported recently as there are
> > > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV
> > > virtual function is just another PCI device.
> >
> > Applied; thanks for the fix.
> >
> > Tim.
> >
> > > Signed-off-by: Allen Kay allen.m.kay@intel.com
> > >
> > > -----Original Message-----
> > > From: Christoph Egger [mailto:Christoph.Egger@amd.com]
> > > Sent: Tuesday, August 31, 2010 2:35 AM
> > > To: Tim Deegan
> > > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser
> > > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality
> > >
> > > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote:
> > > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> > > > > Attached patch reverts back to INVALID_MFN. PCI passthrough
> > > > > functionality works with this patch.
> > > >
> > > > Apologies for missing this - I did ask for this enormous patch to
> > > > contain only what it said on the tin (and I did read it to check!)
> > > > but this one got through.
> > >
> > > Also apologies from my side. I did what Tim requested for, but that
> > > one slipped through.
> > >
> > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com
> > > >
> > > > This is fine, but please add a comment explaining the rather subtle
> > > > use of INVALID_MFN here so the next tidy-minded person doesn't "fix"
> > > > it again. :)
> > > >
> > > > In fact would it be better to check the returned type ==
> > > > p2m_mmio_direct instead? That seems like it would fit better with
> > > > the intention. Or do other callers use this to clean non-mmio
> > > > entries too?
> > >
> > > I'm interested in if this patch fixes the SR-IOV issue. We are still
> > > about investigation...
> > >
> > > Christoph
--
---to satisfy European Law for business letters:
Advanced Micro Devices GmbH
Einsteinring 24, 85609 Dornach b. Muenchen
Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
Registergericht Muenchen, HRB Nr. 43632
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Re: [PATCH] re-enable HVM PCI passthrough functionality
2010-09-02 8:34 ` Christoph Egger
@ 2010-09-02 9:07 ` Tim Deegan
0 siblings, 0 replies; 10+ messages in thread
From: Tim Deegan @ 2010-09-02 9:07 UTC (permalink / raw)
To: Christoph Egger
Cc: Zhang, Yang Z, xen-devel@lists.xensource.com, Kay, Allen M,
Keir Fraser
At 09:34 +0100 on 02 Sep (1283420058), Christoph Egger wrote:
> On Thursday 02 September 2010 04:26:32 Zhang, Yang Z wrote:
> > With allen's patch, both vt-d and sr-iov can work now. Thanks allen.
>
> We were not able to reproduce SR-IOV failures with and without the fix
> on AMD machines. I am wondering if there are differences in memory
> mappings between AMD and Intel PCI passthrough.
I expect that you tested on machines with >4GiB of RAM, passing through
32-bit MMIO addresses (which would then pass mfn_valid()) and Intel
either had less RAM or higher BARs in their test (so their MMIO
addresses were !mfn_valid() but != INVALID_MFN).
Cheers,
Tim.
> Nonetheless, good to know this has been fixed.
>
> Thanks,
> Christoph
>
> > best regards
> > yang
> >
> > > -----Original Message-----
> > > From: xen-devel-bounces@lists.xensource.com
> > > [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan
> > > Sent: Wednesday, September 01, 2010 4:57 PM
> > > To: Kay, Allen M
> > > Cc: Christoph Egger; xen-devel@lists.xensource.com; Keir Fraser
> > > Subject: [Xen-devel] Re: [PATCH] re-enable HVM PCI passthrough
> > > functionality
> > >
> > > At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote:
> > > > I have updated the patch to indicate valid_mfn() cannot be used here
> > > > as MMIO pages are always above max_mem. Also added sanity checking
> > > > for type == p2m_mmio_direct before clearing page table entry. This
> > > > should fix both VT-d and SR-IOV issues reported recently as there are
> > > > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV
> > > > virtual function is just another PCI device.
> > >
> > > Applied; thanks for the fix.
> > >
> > > Tim.
> > >
> > > > Signed-off-by: Allen Kay allen.m.kay@intel.com
> > > >
> > > > -----Original Message-----
> > > > From: Christoph Egger [mailto:Christoph.Egger@amd.com]
> > > > Sent: Tuesday, August 31, 2010 2:35 AM
> > > > To: Tim Deegan
> > > > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser
> > > > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality
> > > >
> > > > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote:
> > > > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote:
> > > > > > Attached patch reverts back to INVALID_MFN. PCI passthrough
> > > > > > functionality works with this patch.
> > > > >
> > > > > Apologies for missing this - I did ask for this enormous patch to
> > > > > contain only what it said on the tin (and I did read it to check!)
> > > > > but this one got through.
> > > >
> > > > Also apologies from my side. I did what Tim requested for, but that
> > > > one slipped through.
> > > >
> > > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com
> > > > >
> > > > > This is fine, but please add a comment explaining the rather subtle
> > > > > use of INVALID_MFN here so the next tidy-minded person doesn't "fix"
> > > > > it again. :)
> > > > >
> > > > > In fact would it be better to check the returned type ==
> > > > > p2m_mmio_direct instead? That seems like it would fit better with
> > > > > the intention. Or do other callers use this to clean non-mmio
> > > > > entries too?
> > > >
> > > > I'm interested in if this patch fixes the SR-IOV issue. We are still
> > > > about investigation...
> > > >
> > > > Christoph
>
>
> --
> ---to satisfy European Law for business letters:
> Advanced Micro Devices GmbH
> Einsteinring 24, 85609 Dornach b. Muenchen
> Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd
> Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen
> Registergericht Muenchen, HRB Nr. 43632
>
--
Tim Deegan <Tim.Deegan@citrix.com>
Principal Software Engineer, XenServer Engineering
Citrix Systems UK Ltd. (Company #02937203, SL9 0BG)
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2010-09-02 9:07 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-08-30 23:57 error messages when doing VT-d device passthrough Kay, Allen M
2010-08-31 0:08 ` Kay, Allen M
2010-08-31 1:58 ` [PATCH] re-enable HVM PCI passthrough functionality Kay, Allen M
2010-08-31 9:17 ` Tim Deegan
2010-08-31 9:35 ` Christoph Egger
2010-08-31 16:13 ` Kay, Allen M
2010-09-01 8:56 ` Tim Deegan
2010-09-02 2:26 ` Zhang, Yang Z
2010-09-02 8:34 ` Christoph Egger
2010-09-02 9:07 ` Tim Deegan
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.