WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

RE: [Xen-devel] [VTD][PATCH] Support intra-domain shared interrupt

To: "Keir Fraser" <Keir.Fraser@xxxxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: RE: [Xen-devel] [VTD][PATCH] Support intra-domain shared interrupt
From: "Han, Weidong" <weidong.han@xxxxxxxxx>
Date: Wed, 7 Nov 2007 23:16:19 +0800
Cc: "Kay, Allen M" <allen.m.kay@xxxxxxxxx>
Delivery-date: Wed, 07 Nov 2007 07:16:57 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <C357859A.180CE%Keir.Fraser@xxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <08DF4D958216244799FC84F3514D70F0BB24FA@xxxxxxxxxxxxxxxxxxxxxxxxxxxx> <C357859A.180CE%Keir.Fraser@xxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcgfbbYOsSWYB6MMQDuBGkYt+XjCJwAEwx4KAAASPxAAAXKGpgAAClDAAAJfMewAbWqM0AACgKoiAAAWh5A=
Thread-topic: [Xen-devel] [VTD][PATCH] Support intra-domain shared interrupt
Keir,

I found changeset 16331 breaks VT-d. When create guest with VT-d, qemu
window is white, and we see following messages on serial console:

(XEN) intel-iommu.c:1374:d0 reassign_device-1:0:0- source = 0 target = 1
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2214196 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2510520 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2515634 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2510520 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2515634 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2525556 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2513768 messages suppressed.
(XEN) mm.c:684:d2 Attempt to change cache attributes of Xen heap page
(XEN) printk: 2510754 messages suppressed.

Keir Fraser wrote:
> Yes, I'll slip this one in.
> 
>  K.
> 
> On 7/11/07 15:02, "Han, Weidong" <weidong.han@xxxxxxxxx> wrote:
> 
>> Keir, how about this intra-domain shared interrupt patch? Attached
>> patch fixes memory leak issue and updates timeout function. Thanks.
>> 
>> -- Weidong
>> 
>> Keir Fraser wrote:
>>> On 5/11/07 08:52, "Han, Weidong" <weidong.han@xxxxxxxxx> wrote:
>>> 
>>>> that situation two devices with different pyhsical IRQs getting
>>>> aliased to the same guest GSI is hard to occur. And we need one
>>>> guest GSI mapped to only one physical IRQ, or we can't know which
>>>> device issues the guest GSI. Ideally, if we can make 1:1 mapping
>>>> between guest GSI and physcial IRQ, the intra-domain shared
>>>> interrupt can naturally handled by guest.
>>> 
>>> Ah, that's true. I suppose you can assign virtual devfn locations
>>> for devices to purposely avoid aliasing in GSI space. What do you
>>> do about aliasing into the ISA IRQ space?
>>> 
>>>  -- Keir

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel