95ba48d973
I have no good explanation why it happens, but I found that in B2B mode at least Xeon v4 NTB leaks accesses to its configuration memory at BAR0 originated from the link side to its host side. DMAR predictably blocks those, making access to remote scratchpad registers in B2B mode impossible. This change creates identity mapping in DMAR covering the BAR0 addresses, making the NTB work fine with DMAR enabled. It seems like allowing single 4KB range at 32KB offset may be enough, but I don't see a reason to be so specific. MFC after: 1 week Sponsored by: iXsystems, Inc. |
||
---|---|---|
.. | ||
ntb_hw_amd.c | ||
ntb_hw_amd.h | ||
ntb_hw_intel.c | ||
ntb_hw_intel.h | ||
ntb_hw_plx.c |