Skip to content

Commit

Permalink
Merge pull request #501 from jyao1/image
Browse files Browse the repository at this point in the history
fix image location.
  • Loading branch information
ved-rivos authored Mar 7, 2025
2 parents 0c8b3ce + 81916d3 commit 16718e1
Show file tree
Hide file tree
Showing 2 changed files with 9 additions and 9 deletions.
6 changes: 3 additions & 3 deletions src/iommu_data_structures.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -152,7 +152,7 @@ next device-directory-table.
A valid leaf device-directory-table entry holds the device-context (`DC`).

.Three, two and single-level device directory with extended format `DC`
image::ddt-ext.svg[width=800,height=400, align="center"]
image::images/ddt-ext.svg[width=800,height=400, align="center"]
//["ditaa",shadows=false, separation=false, font=courier, fontsize: 16]
//....
// +-------+-------+-------+ +-------+-------+ +-------+
Expand All @@ -176,7 +176,7 @@ image::ddt-ext.svg[width=800,height=400, align="center"]
//....
.Three, two and single-level device directory with base format `DC`
image::ddt-base.svg[width=800,height=400, align="center"]
image::images/ddt-base.svg[width=800,height=400, align="center"]
//["ditaa",shadows=false, separation=false, font=courier, fontsize: 16]
//....
// +-------+-------+-------+ +-------+-------+ +-------+
Expand Down Expand Up @@ -764,7 +764,7 @@ provides the PPN of the next level process-directory-table. The leaf
process-directory-table entry holds the process-context (`PC`).
.Three, two and single-level process directory
image::pdt.svg[width=800,height=400]
image::images/pdt.svg[width=800,height=400]
//["ditaa",shadows=false, separation=false, font=courier, fontsize: 16]
//....
// +-------+-------+-------+ +-------+-------+ +-------+
Expand Down
12 changes: 6 additions & 6 deletions src/iommu_intro.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -291,7 +291,7 @@ allowed by the page table.

[[fig:device-isolation]]
.Device isolation in non-virtualized OS
image::non-virt-OS.svg[width=300,height=300, align="center"]
image::images/non-virt-OS.svg[width=300,height=300, align="center"]

Legacy 32-bit devices cannot access the memory above 4 GiB. The IOMMU, through
its address remapping capability, offers a simple mechanism for the device to
Expand Down Expand Up @@ -357,7 +357,7 @@ and from D2 to VM-2 associated memory.
[[fig:dma-translation-direct-device-assignment]]
.DMA translation to enable direct device assignment
image::hypervisor.svg[width=300,height=300, align="center"]
image::images/hypervisor.svg[width=300,height=300, align="center"]
//["ditaa",shadows=false, separation=false, fontsize: 16]
//....
//+----------------+ +----------------+
Expand Down Expand Up @@ -391,7 +391,7 @@ address, the same as supported by regular RISC-V page-based address translation.
[[MSI_REDIR]]
.MSI address translation to direct guest programmed MSI to IMSIC guest interrupt files
image::msi-imsic.svg[width=500,height=400, align="center"]
image::images/msi-imsic.svg[width=500,height=400, align="center"]
//["ditaa",shadows=false, separation=false, font=courier, fontsize: 16]
//....
// +-----------------------+
Expand Down Expand Up @@ -439,7 +439,7 @@ hypervisor.
[[fig:iommu-for-guest-os]]
.Address translation in IOMMU for Guest OS
image::guest-OS.svg[width=500,height=400, align="center"]
image::images/guest-OS.svg[width=500,height=400, align="center"]
The IOMMU is configured to perform address translation using a first-stage
and second-stage page table for device D1. The second-stage is typically used by
Expand Down Expand Up @@ -519,7 +519,7 @@ The IOMMU is not invoked for outbound transactions.
[[fig:example-soc-with-iommu]]
.Example of IOMMUs integration in SoC.
image::placement.svg[width=800]
image::images/placement.svg[width=800]
The IOMMU is invoked by the IO Bridge for address translation and protection for
inbound transactions. The data associated with the inbound transactions is not
Expand Down Expand Up @@ -591,7 +591,7 @@ generating the associated _notice_ MSI are implementation-specific.
[[fig:iommu-interfaces]]
.IOMMU interfaces.
image::interfaces.svg[width=800]
image::images/interfaces.svg[width=800]
Similar to the RISC-V harts, physical memory attributes (PMA) and physical
memory protection (PMP) checks must be completed on all inbound IO transactions
Expand Down

0 comments on commit 16718e1

Please sign in to comment.