[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] Revert c/s 17975 -- enumerate PCI devices in Xen allowing old dom0
# HG changeset patch # User Keir Fraser <keir.fraser@xxxxxxxxxx> # Date 1215443633 -3600 # Node ID 0d707feab01ed0f6b82f3243363aa248e96d39f8 # Parent 9b35ae586cb8587186f08be9acff2b76024ae65e Revert c/s 17975 -- enumerate PCI devices in Xen allowing old dom0 kernels to work with iommu-capable platforms. Signed-off-by: Keir Fraser <keir.fraser@xxxxxxxxxx> --- xen/drivers/passthrough/vtd/iommu.c | 60 ++++++++++++++++++++++++++++++++---- 1 files changed, 54 insertions(+), 6 deletions(-) diff -r 9b35ae586cb8 -r 0d707feab01e xen/drivers/passthrough/vtd/iommu.c --- a/xen/drivers/passthrough/vtd/iommu.c Mon Jul 07 10:45:50 2008 +0100 +++ b/xen/drivers/passthrough/vtd/iommu.c Mon Jul 07 16:13:53 2008 +0100 @@ -40,6 +40,9 @@ static spinlock_t domid_bitmap_lock; static spinlock_t domid_bitmap_lock; /* protect domain id bitmap */ static int domid_bitmap_size; /* domain id bitmap size in bits */ static unsigned long *domid_bitmap; /* iommu domain id bitmap */ + +static void setup_dom0_devices(struct domain *d); +static void setup_dom0_rmrr(struct domain *d); #define DID_FIELD_WIDTH 16 #define DID_HIGH_OFFSET 8 @@ -1042,6 +1045,10 @@ static int intel_iommu_domain_init(struc iommu_map_page(d, i, i); } + + setup_dom0_devices(d); + setup_dom0_rmrr(d); + iommu_flush_all(); for_each_drhd_unit ( drhd ) @@ -1326,18 +1333,12 @@ static int domain_context_unmap(u8 bus, break; case DEV_TYPE_PCIe_ENDPOINT: - gdprintk(XENLOG_INFO VTDPREFIX, "domain_context_unmap:PCIe: " - "bdf = %x:%x.%x\n", bus, PCI_SLOT(devfn), PCI_FUNC(devfn)); ret = domain_context_unmap_one(drhd->iommu, bus, devfn); break; case DEV_TYPE_PCI: if ( find_pcie_endpoint(&bus, &devfn) ) - { - gdprintk(XENLOG_INFO VTDPREFIX, "domain_context_unmap:PCI: " - "bdf = %x:%x.%x\n", bus, PCI_SLOT(devfn), PCI_FUNC(devfn)); ret = domain_context_unmap_one(drhd->iommu, bus, devfn); - } break; default: @@ -1592,6 +1593,38 @@ static int intel_iommu_remove_device(str return domain_context_unmap(pdev->bus, pdev->devfn); } +static void setup_dom0_devices(struct domain *d) +{ + struct hvm_iommu *hd; + struct pci_dev *pdev; + int bus, dev, func; + u32 l; + + hd = domain_hvm_iommu(d); + + write_lock(&pcidevs_lock); + for ( bus = 0; bus < 256; bus++ ) + { + for ( dev = 0; dev < 32; dev++ ) + { + for ( func = 0; func < 8; func++ ) + { + l = pci_conf_read32(bus, dev, func, PCI_VENDOR_ID); + /* some broken boards return 0 or ~0 if a slot is empty: */ + if ( (l == 0xffffffff) || (l == 0x00000000) || + (l == 0x0000ffff) || (l == 0xffff0000) ) + continue; + + pdev = alloc_pdev(bus, PCI_DEVFN(dev, func)); + pdev->domain = d; + list_add(&pdev->domain_list, &d->arch.pdev_list); + domain_context_mapping(d, pdev->bus, pdev->devfn); + } + } + } + write_unlock(&pcidevs_lock); +} + void clear_fault_bits(struct iommu *iommu) { u64 val; @@ -1654,6 +1687,21 @@ static int init_vtd_hw(void) } return 0; +} + +static void setup_dom0_rmrr(struct domain *d) +{ + struct acpi_rmrr_unit *rmrr; + u16 bdf; + int ret, i; + + for_each_rmrr_device ( rmrr, bdf, i ) + { + ret = iommu_prepare_rmrr_dev(d, rmrr, PCI_BUS(bdf), PCI_DEVFN2(bdf)); + if ( ret ) + gdprintk(XENLOG_ERR VTDPREFIX, + "IOMMU: mapping reserved region failed\n"); + } } int intel_vtd_setup(void) _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |