* error messages when doing VT-d device passthrough @ 2010-08-30 23:57 Kay, Allen M 2010-08-31 0:08 ` Kay, Allen M 0 siblings, 1 reply; 10+ messages in thread From: Kay, Allen M @ 2010-08-30 23:57 UTC (permalink / raw) To: xen-devel@lists.xensource.com; +Cc: tim.deegan@eu.citrix.com, Keir Fraser [-- Attachment #1.1: Type: text/plain, Size: 418 bytes --] I'm getting the following error messages when doing Vt-d device passthrough: ... (XEN) p2m.c:2626:d0 clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=000f303b ... This message is printed out for each MMIO page used by the device. This seems to be cause by the code change from "if ( INVALID_MFN == mfn)" to "if (!mfn_valid(mfn) )" in p2m.c/clear_mmio_p2m_entry(). What is the reason for the change? Allen [-- Attachment #1.2: Type: text/html, Size: 5230 bytes --] [-- Attachment #2: Type: text/plain, Size: 138 bytes --] _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel ^ permalink raw reply [flat|nested] 10+ messages in thread
* RE: error messages when doing VT-d device passthrough 2010-08-30 23:57 error messages when doing VT-d device passthrough Kay, Allen M @ 2010-08-31 0:08 ` Kay, Allen M 2010-08-31 1:58 ` [PATCH] re-enable HVM PCI passthrough functionality Kay, Allen M 0 siblings, 1 reply; 10+ messages in thread From: Kay, Allen M @ 2010-08-31 0:08 UTC (permalink / raw) To: xen-devel@lists.xensource.com Cc: tim.deegan@eu.citrix.com, Christoph.Egger@amd.com, Keir Fraser [-- Attachment #1.1: Type: text/plain, Size: 845 bytes --] Cc'ing Christoph Egger since this change was part of the "nested Virtualization: p2m infrastructure" in cs# 21940. From: xen-devel-bounces@lists.xensource.com [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Kay, Allen M Sent: Monday, August 30, 2010 4:57 PM To: xen-devel@lists.xensource.com Cc: tim.deegan@eu.citrix.com; Keir Fraser Subject: [Xen-devel] error messages when doing VT-d device passthrough I'm getting the following error messages when doing Vt-d device passthrough: ... (XEN) p2m.c:2626:d0 clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=000f303b ... This message is printed out for each MMIO page used by the device. This seems to be cause by the code change from "if ( INVALID_MFN == mfn)" to "if (!mfn_valid(mfn) )" in p2m.c/clear_mmio_p2m_entry(). What is the reason for the change? Allen [-- Attachment #1.2: Type: text/html, Size: 6412 bytes --] [-- Attachment #2: Type: text/plain, Size: 138 bytes --] _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel ^ permalink raw reply [flat|nested] 10+ messages in thread
* [PATCH] re-enable HVM PCI passthrough functionality 2010-08-31 0:08 ` Kay, Allen M @ 2010-08-31 1:58 ` Kay, Allen M 2010-08-31 9:17 ` Tim Deegan 0 siblings, 1 reply; 10+ messages in thread From: Kay, Allen M @ 2010-08-31 1:58 UTC (permalink / raw) To: xen-devel@lists.xensource.com Cc: tim.deegan@eu.citrix.com, Christoph.Egger@amd.com, Keir Fraser [-- Attachment #1: Type: text/plain, Size: 151 bytes --] Attached patch reverts back to INVALID_MFN. PCI passthrough functionality works with this patch. Signed-off-by: Allen Kay allen.m.kay@intel.com [-- Attachment #2: mm.patch --] [-- Type: application/octet-stream, Size: 419 bytes --] diff -r 32c9a19ac98b xen/arch/x86/mm/p2m.c --- a/xen/arch/x86/mm/p2m.c Mon Aug 30 14:59:12 2010 +0100 +++ b/xen/arch/x86/mm/p2m.c Mon Aug 30 11:56:12 2010 -0700 @@ -2620,7 +2620,7 @@ return 0; mfn = gfn_to_mfn(p2m, gfn, &t); - if ( !mfn_valid(mfn) ) + if ( INVALID_MFN == mfn_x(mfn) ) { gdprintk(XENLOG_ERR, "clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=%08lx\n", gfn); [-- Attachment #3: Type: text/plain, Size: 138 bytes --] _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] re-enable HVM PCI passthrough functionality 2010-08-31 1:58 ` [PATCH] re-enable HVM PCI passthrough functionality Kay, Allen M @ 2010-08-31 9:17 ` Tim Deegan 2010-08-31 9:35 ` Christoph Egger 0 siblings, 1 reply; 10+ messages in thread From: Tim Deegan @ 2010-08-31 9:17 UTC (permalink / raw) To: Kay, Allen M Cc: Christoph.Egger@amd.com, xen-devel@lists.xensource.com, Keir Fraser At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > Attached patch reverts back to INVALID_MFN. PCI passthrough functionality works with this patch. > Apologies for missing this - I did ask for this enormous patch to contain only what it said on the tin (and I did read it to check!) but this one got through. > Signed-off-by: Allen Kay allen.m.kay@intel.com > This is fine, but please add a comment explaining the rather subtle use of INVALID_MFN here so the next tidy-minded person doesn't "fix" it again. :) In fact would it be better to check the returned type == p2m_mmio_direct instead? That seems like it would fit better with the intention. Or do other callers use this to clean non-mmio entries too? Cheers, Tim. -- Tim Deegan <Tim.Deegan@citrix.com> Principal Software Engineer, XenServer Engineering Citrix Systems UK Ltd. (Company #02937203, SL9 0BG) ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] re-enable HVM PCI passthrough functionality 2010-08-31 9:17 ` Tim Deegan @ 2010-08-31 9:35 ` Christoph Egger 2010-08-31 16:13 ` Kay, Allen M 0 siblings, 1 reply; 10+ messages in thread From: Christoph Egger @ 2010-08-31 9:35 UTC (permalink / raw) To: Tim Deegan; +Cc: xen-devel@lists.xensource.com, Kay, Allen M, Keir Fraser On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote: > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > > Attached patch reverts back to INVALID_MFN. PCI passthrough > > functionality works with this patch. > > Apologies for missing this - I did ask for this enormous patch to > contain only what it said on the tin (and I did read it to check!) but > this one got through. Also apologies from my side. I did what Tim requested for, but that one slipped through. > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > This is fine, but please add a comment explaining the rather subtle use > of INVALID_MFN here so the next tidy-minded person doesn't "fix" it > again. :) > > In fact would it be better to check the returned type == p2m_mmio_direct > instead? That seems like it would fit better with the intention. Or > do other callers use this to clean non-mmio entries too? I'm interested in if this patch fixes the SR-IOV issue. We are still about investigation... Christoph -- ---to satisfy European Law for business letters: Advanced Micro Devices GmbH Einsteinring 24, 85609 Dornach b. Muenchen Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen Registergericht Muenchen, HRB Nr. 43632 ^ permalink raw reply [flat|nested] 10+ messages in thread
* RE: [PATCH] re-enable HVM PCI passthrough functionality 2010-08-31 9:35 ` Christoph Egger @ 2010-08-31 16:13 ` Kay, Allen M 2010-09-01 8:56 ` Tim Deegan 0 siblings, 1 reply; 10+ messages in thread From: Kay, Allen M @ 2010-08-31 16:13 UTC (permalink / raw) To: Christoph Egger, Tim Deegan; +Cc: Keir, xen-devel@lists.xensource.com, Fraser [-- Attachment #1: Type: text/plain, Size: 2014 bytes --] I have updated the patch to indicate valid_mfn() cannot be used here as MMIO pages are always above max_mem. Also added sanity checking for type == p2m_mmio_direct before clearing page table entry. This should fix both VT-d and SR-IOV issues reported recently as there are no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV virtual function is just another PCI device. Signed-off-by: Allen Kay allen.m.kay@intel.com -----Original Message----- From: Christoph Egger [mailto:Christoph.Egger@amd.com] Sent: Tuesday, August 31, 2010 2:35 AM To: Tim Deegan Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote: > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > > Attached patch reverts back to INVALID_MFN. PCI passthrough > > functionality works with this patch. > > Apologies for missing this - I did ask for this enormous patch to > contain only what it said on the tin (and I did read it to check!) but > this one got through. Also apologies from my side. I did what Tim requested for, but that one slipped through. > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > This is fine, but please add a comment explaining the rather subtle use > of INVALID_MFN here so the next tidy-minded person doesn't "fix" it > again. :) > > In fact would it be better to check the returned type == p2m_mmio_direct > instead? That seems like it would fit better with the intention. Or > do other callers use this to clean non-mmio entries too? I'm interested in if this patch fixes the SR-IOV issue. We are still about investigation... Christoph -- ---to satisfy European Law for business letters: Advanced Micro Devices GmbH Einsteinring 24, 85609 Dornach b. Muenchen Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen Registergericht Muenchen, HRB Nr. 43632 [-- Attachment #2: mm.patch --] [-- Type: application/octet-stream, Size: 528 bytes --] diff -r 32c9a19ac98b xen/arch/x86/mm/p2m.c --- a/xen/arch/x86/mm/p2m.c Mon Aug 30 14:59:12 2010 +0100 +++ b/xen/arch/x86/mm/p2m.c Tue Aug 31 02:08:24 2010 -0700 @@ -2620,7 +2620,9 @@ return 0; mfn = gfn_to_mfn(p2m, gfn, &t); - if ( !mfn_valid(mfn) ) + + /* Do not use mfn_valid() here as MMIO pages are always above max_page */ + if ( (INVALID_MFN == mfn_x(mfn)) || (t != p2m_mmio_direct) ) { gdprintk(XENLOG_ERR, "clear_mmio_p2m_entry: gfn_to_mfn failed! gfn=%08lx\n", gfn); [-- Attachment #3: Type: text/plain, Size: 138 bytes --] _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH] re-enable HVM PCI passthrough functionality 2010-08-31 16:13 ` Kay, Allen M @ 2010-09-01 8:56 ` Tim Deegan 2010-09-02 2:26 ` Zhang, Yang Z 0 siblings, 1 reply; 10+ messages in thread From: Tim Deegan @ 2010-09-01 8:56 UTC (permalink / raw) To: Kay, Allen M; +Cc: Christoph Egger, xen-devel@lists.xensource.com, Keir Fraser At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote: > I have updated the patch to indicate valid_mfn() cannot be used here > as MMIO pages are always above max_mem. Also added sanity checking > for type == p2m_mmio_direct before clearing page table entry. This > should fix both VT-d and SR-IOV issues reported recently as there are > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV > virtual function is just another PCI device. Applied; thanks for the fix. Tim. > Signed-off-by: Allen Kay allen.m.kay@intel.com > > -----Original Message----- > From: Christoph Egger [mailto:Christoph.Egger@amd.com] > Sent: Tuesday, August 31, 2010 2:35 AM > To: Tim Deegan > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality > > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote: > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > > > Attached patch reverts back to INVALID_MFN. PCI passthrough > > > functionality works with this patch. > > > > Apologies for missing this - I did ask for this enormous patch to > > contain only what it said on the tin (and I did read it to check!) but > > this one got through. > > Also apologies from my side. I did what Tim requested for, but that > one slipped through. > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > This is fine, but please add a comment explaining the rather subtle use > > of INVALID_MFN here so the next tidy-minded person doesn't "fix" it > > again. :) > > > > In fact would it be better to check the returned type == p2m_mmio_direct > > instead? That seems like it would fit better with the intention. Or > > do other callers use this to clean non-mmio entries too? > > I'm interested in if this patch fixes the SR-IOV issue. We are still about > investigation... > > Christoph > > > > -- > ---to satisfy European Law for business letters: > Advanced Micro Devices GmbH > Einsteinring 24, 85609 Dornach b. Muenchen > Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd > Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen > Registergericht Muenchen, HRB Nr. 43632 > -- Tim Deegan <Tim.Deegan@citrix.com> Principal Software Engineer, XenServer Engineering Citrix Systems UK Ltd. (Company #02937203, SL9 0BG) ^ permalink raw reply [flat|nested] 10+ messages in thread
* RE: Re: [PATCH] re-enable HVM PCI passthrough functionality 2010-09-01 8:56 ` Tim Deegan @ 2010-09-02 2:26 ` Zhang, Yang Z 2010-09-02 8:34 ` Christoph Egger 0 siblings, 1 reply; 10+ messages in thread From: Zhang, Yang Z @ 2010-09-02 2:26 UTC (permalink / raw) To: Tim Deegan, Kay, Allen M Cc: Christoph Egger, xen-devel@lists.xensource.com, Keir Fraser With allen's patch, both vt-d and sr-iov can work now. Thanks allen. best regards yang > -----Original Message----- > From: xen-devel-bounces@lists.xensource.com > [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan > Sent: Wednesday, September 01, 2010 4:57 PM > To: Kay, Allen M > Cc: Christoph Egger; xen-devel@lists.xensource.com; Keir Fraser > Subject: [Xen-devel] Re: [PATCH] re-enable HVM PCI passthrough functionality > > At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote: > > I have updated the patch to indicate valid_mfn() cannot be used here > > as MMIO pages are always above max_mem. Also added sanity checking > > for type == p2m_mmio_direct before clearing page table entry. This > > should fix both VT-d and SR-IOV issues reported recently as there are > > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV > > virtual function is just another PCI device. > > Applied; thanks for the fix. > > Tim. > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > -----Original Message----- > > From: Christoph Egger [mailto:Christoph.Egger@amd.com] > > Sent: Tuesday, August 31, 2010 2:35 AM > > To: Tim Deegan > > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser > > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality > > > > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote: > > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > > > > Attached patch reverts back to INVALID_MFN. PCI passthrough > > > > functionality works with this patch. > > > > > > Apologies for missing this - I did ask for this enormous patch to > > > contain only what it said on the tin (and I did read it to check!) but > > > this one got through. > > > > Also apologies from my side. I did what Tim requested for, but that > > one slipped through. > > > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > > > This is fine, but please add a comment explaining the rather subtle use > > > of INVALID_MFN here so the next tidy-minded person doesn't "fix" it > > > again. :) > > > > > > In fact would it be better to check the returned type == p2m_mmio_direct > > > instead? That seems like it would fit better with the intention. Or > > > do other callers use this to clean non-mmio entries too? > > > > I'm interested in if this patch fixes the SR-IOV issue. We are still about > > investigation... > > > > Christoph > > > > > > > > -- > > ---to satisfy European Law for business letters: > > Advanced Micro Devices GmbH > > Einsteinring 24, 85609 Dornach b. Muenchen > > Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd > > Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen > > Registergericht Muenchen, HRB Nr. 43632 > > > > > > -- > Tim Deegan <Tim.Deegan@citrix.com> > Principal Software Engineer, XenServer Engineering > Citrix Systems UK Ltd. (Company #02937203, SL9 0BG) > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xensource.com > http://lists.xensource.com/xen-devel ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Re: [PATCH] re-enable HVM PCI passthrough functionality 2010-09-02 2:26 ` Zhang, Yang Z @ 2010-09-02 8:34 ` Christoph Egger 2010-09-02 9:07 ` Tim Deegan 0 siblings, 1 reply; 10+ messages in thread From: Christoph Egger @ 2010-09-02 8:34 UTC (permalink / raw) To: Zhang, Yang Z Cc: xen-devel@lists.xensource.com, Kay, Allen M, Tim Deegan, Keir Fraser On Thursday 02 September 2010 04:26:32 Zhang, Yang Z wrote: > With allen's patch, both vt-d and sr-iov can work now. Thanks allen. We were not able to reproduce SR-IOV failures with and without the fix on AMD machines. I am wondering if there are differences in memory mappings between AMD and Intel PCI passthrough. Nonetheless, good to know this has been fixed. Thanks, Christoph > best regards > yang > > > -----Original Message----- > > From: xen-devel-bounces@lists.xensource.com > > [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan > > Sent: Wednesday, September 01, 2010 4:57 PM > > To: Kay, Allen M > > Cc: Christoph Egger; xen-devel@lists.xensource.com; Keir Fraser > > Subject: [Xen-devel] Re: [PATCH] re-enable HVM PCI passthrough > > functionality > > > > At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote: > > > I have updated the patch to indicate valid_mfn() cannot be used here > > > as MMIO pages are always above max_mem. Also added sanity checking > > > for type == p2m_mmio_direct before clearing page table entry. This > > > should fix both VT-d and SR-IOV issues reported recently as there are > > > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV > > > virtual function is just another PCI device. > > > > Applied; thanks for the fix. > > > > Tim. > > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > > > -----Original Message----- > > > From: Christoph Egger [mailto:Christoph.Egger@amd.com] > > > Sent: Tuesday, August 31, 2010 2:35 AM > > > To: Tim Deegan > > > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser > > > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality > > > > > > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote: > > > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > > > > > Attached patch reverts back to INVALID_MFN. PCI passthrough > > > > > functionality works with this patch. > > > > > > > > Apologies for missing this - I did ask for this enormous patch to > > > > contain only what it said on the tin (and I did read it to check!) > > > > but this one got through. > > > > > > Also apologies from my side. I did what Tim requested for, but that > > > one slipped through. > > > > > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > > > > > This is fine, but please add a comment explaining the rather subtle > > > > use of INVALID_MFN here so the next tidy-minded person doesn't "fix" > > > > it again. :) > > > > > > > > In fact would it be better to check the returned type == > > > > p2m_mmio_direct instead? That seems like it would fit better with > > > > the intention. Or do other callers use this to clean non-mmio > > > > entries too? > > > > > > I'm interested in if this patch fixes the SR-IOV issue. We are still > > > about investigation... > > > > > > Christoph -- ---to satisfy European Law for business letters: Advanced Micro Devices GmbH Einsteinring 24, 85609 Dornach b. Muenchen Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen Registergericht Muenchen, HRB Nr. 43632 ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Re: [PATCH] re-enable HVM PCI passthrough functionality 2010-09-02 8:34 ` Christoph Egger @ 2010-09-02 9:07 ` Tim Deegan 0 siblings, 0 replies; 10+ messages in thread From: Tim Deegan @ 2010-09-02 9:07 UTC (permalink / raw) To: Christoph Egger Cc: Zhang, Yang Z, xen-devel@lists.xensource.com, Kay, Allen M, Keir Fraser At 09:34 +0100 on 02 Sep (1283420058), Christoph Egger wrote: > On Thursday 02 September 2010 04:26:32 Zhang, Yang Z wrote: > > With allen's patch, both vt-d and sr-iov can work now. Thanks allen. > > We were not able to reproduce SR-IOV failures with and without the fix > on AMD machines. I am wondering if there are differences in memory > mappings between AMD and Intel PCI passthrough. I expect that you tested on machines with >4GiB of RAM, passing through 32-bit MMIO addresses (which would then pass mfn_valid()) and Intel either had less RAM or higher BARs in their test (so their MMIO addresses were !mfn_valid() but != INVALID_MFN). Cheers, Tim. > Nonetheless, good to know this has been fixed. > > Thanks, > Christoph > > > best regards > > yang > > > > > -----Original Message----- > > > From: xen-devel-bounces@lists.xensource.com > > > [mailto:xen-devel-bounces@lists.xensource.com] On Behalf Of Tim Deegan > > > Sent: Wednesday, September 01, 2010 4:57 PM > > > To: Kay, Allen M > > > Cc: Christoph Egger; xen-devel@lists.xensource.com; Keir Fraser > > > Subject: [Xen-devel] Re: [PATCH] re-enable HVM PCI passthrough > > > functionality > > > > > > At 17:13 +0100 on 31 Aug (1283274786), Kay, Allen M wrote: > > > > I have updated the patch to indicate valid_mfn() cannot be used here > > > > as MMIO pages are always above max_mem. Also added sanity checking > > > > for type == p2m_mmio_direct before clearing page table entry. This > > > > should fix both VT-d and SR-IOV issues reported recently as there are > > > > no SR-IOV specific code in Xen. As far as Xen is concern, SR-IOV > > > > virtual function is just another PCI device. > > > > > > Applied; thanks for the fix. > > > > > > Tim. > > > > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > > > > > -----Original Message----- > > > > From: Christoph Egger [mailto:Christoph.Egger@amd.com] > > > > Sent: Tuesday, August 31, 2010 2:35 AM > > > > To: Tim Deegan > > > > Cc: Kay, Allen M; xen-devel@lists.xensource.com; Keir Fraser > > > > Subject: Re: [PATCH] re-enable HVM PCI passthrough functionality > > > > > > > > On Tuesday 31 August 2010 11:17:27 Tim Deegan wrote: > > > > > At 02:58 +0100 on 31 Aug (1283223494), Kay, Allen M wrote: > > > > > > Attached patch reverts back to INVALID_MFN. PCI passthrough > > > > > > functionality works with this patch. > > > > > > > > > > Apologies for missing this - I did ask for this enormous patch to > > > > > contain only what it said on the tin (and I did read it to check!) > > > > > but this one got through. > > > > > > > > Also apologies from my side. I did what Tim requested for, but that > > > > one slipped through. > > > > > > > > > > Signed-off-by: Allen Kay allen.m.kay@intel.com > > > > > > > > > > This is fine, but please add a comment explaining the rather subtle > > > > > use of INVALID_MFN here so the next tidy-minded person doesn't "fix" > > > > > it again. :) > > > > > > > > > > In fact would it be better to check the returned type == > > > > > p2m_mmio_direct instead? That seems like it would fit better with > > > > > the intention. Or do other callers use this to clean non-mmio > > > > > entries too? > > > > > > > > I'm interested in if this patch fixes the SR-IOV issue. We are still > > > > about investigation... > > > > > > > > Christoph > > > -- > ---to satisfy European Law for business letters: > Advanced Micro Devices GmbH > Einsteinring 24, 85609 Dornach b. Muenchen > Geschaeftsfuehrer: Alberto Bozzo, Andrew Bowd > Sitz: Dornach, Gemeinde Aschheim, Landkreis Muenchen > Registergericht Muenchen, HRB Nr. 43632 > -- Tim Deegan <Tim.Deegan@citrix.com> Principal Software Engineer, XenServer Engineering Citrix Systems UK Ltd. (Company #02937203, SL9 0BG) ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2010-09-02 9:07 UTC | newest] Thread overview: 10+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2010-08-30 23:57 error messages when doing VT-d device passthrough Kay, Allen M 2010-08-31 0:08 ` Kay, Allen M 2010-08-31 1:58 ` [PATCH] re-enable HVM PCI passthrough functionality Kay, Allen M 2010-08-31 9:17 ` Tim Deegan 2010-08-31 9:35 ` Christoph Egger 2010-08-31 16:13 ` Kay, Allen M 2010-09-01 8:56 ` Tim Deegan 2010-09-02 2:26 ` Zhang, Yang Z 2010-09-02 8:34 ` Christoph Egger 2010-09-02 9:07 ` Tim Deegan
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.