[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] iommu: setup inclusive mappings before enabling iommu
commit a8bee8afb7dcac7a235f656d9895cdb5afbe8826 Author: Roger Pau Monné <roger.pau@xxxxxxxxxx> AuthorDate: Fri Sep 21 12:22:38 2018 +0200 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Fri Sep 21 12:22:38 2018 +0200 iommu: setup inclusive mappings before enabling iommu Or else it can lead to freezes when enabling the iommu on certain Intel hardware: [...] (XEN) ELF: addresses: (XEN) virt_base = 0xffffffff80000000 (XEN) elf_paddr_offset = 0x0 (XEN) virt_offset = 0xffffffff80000000 (XEN) virt_kstart = 0xffffffff81000000 (XEN) virt_kend = 0xffffffff82953000 (XEN) virt_entry = 0xffffffff8274e180 (XEN) p2m_base = 0x8000000000 (XEN) Xen kernel: 64-bit, lsb, compat32 (XEN) Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x295300 <freeze> This restores the behavior before commit 66a9274cc3435 that changed the order and enabled the iommu without having the inclusive mappings setup. Note that on AMD hardware the order is also changed to add inclusive mappings before adding any devices. Reported-by: Dario Faggioli <dfaggioli@xxxxxxxx> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Tested-by: Dario Faggioli <dfaggioli@xxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> Acked-by: Julien Grall <julien.grall@xxxxxxx> --- xen/drivers/passthrough/amd/pci_amd_iommu.c | 2 ++ xen/drivers/passthrough/arm/smmu.c | 2 ++ xen/drivers/passthrough/iommu.c | 10 ---------- xen/drivers/passthrough/vtd/iommu.c | 2 ++ xen/drivers/passthrough/x86/iommu.c | 8 ++++++++ 5 files changed, 14 insertions(+), 10 deletions(-) diff --git a/xen/drivers/passthrough/amd/pci_amd_iommu.c b/xen/drivers/passthrough/amd/pci_amd_iommu.c index 330f9ce386..4a633ca940 100644 --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c @@ -300,6 +300,8 @@ static void __hwdom_init amd_iommu_hwdom_init(struct domain *d) IOMMU_MMIO_REGION_LENGTH - 1)) ) BUG(); + /* Make sure workarounds are applied (if needed) before adding devices. */ + arch_iommu_hwdom_init(d); setup_hwdom_pci_devices(d, amd_iommu_add_device); } diff --git a/xen/drivers/passthrough/arm/smmu.c b/xen/drivers/passthrough/arm/smmu.c index 43ece42a50..8f91807b1b 100644 --- a/xen/drivers/passthrough/arm/smmu.c +++ b/xen/drivers/passthrough/arm/smmu.c @@ -2736,6 +2736,8 @@ static void __hwdom_init arm_smmu_iommu_hwdom_init(struct domain *d) printk(XENLOG_WARNING "map-reserved dom0-iommu option is not supported on ARM\n"); iommu_hwdom_reserved = 0; + + arch_iommu_hwdom_init(d); } static void arm_smmu_iommu_domain_teardown(struct domain *d) diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c index ee3f523fdf..ae6cf2f0ff 100644 --- a/xen/drivers/passthrough/iommu.c +++ b/xen/drivers/passthrough/iommu.c @@ -238,16 +238,6 @@ void __hwdom_init iommu_hwdom_init(struct domain *d) } hd->platform_ops->hwdom_init(d); - - ASSERT(iommu_hwdom_inclusive != -1 && iommu_hwdom_inclusive != -1); - if ( iommu_hwdom_inclusive && !is_pv_domain(d) ) - { - printk(XENLOG_WARNING - "IOMMU inclusive mappings are only supported on PV Dom0\n"); - iommu_hwdom_inclusive = 0; - } - - arch_iommu_hwdom_init(d); } void iommu_teardown(struct domain *d) diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c index adc70f205a..bb422ec58c 100644 --- a/xen/drivers/passthrough/vtd/iommu.c +++ b/xen/drivers/passthrough/vtd/iommu.c @@ -1313,6 +1313,8 @@ static void __hwdom_init intel_iommu_hwdom_init(struct domain *d) setup_hwdom_pci_devices(d, setup_hwdom_device); setup_hwdom_rmrr(d); + /* Make sure workarounds are applied before enabling the IOMMU(s). */ + arch_iommu_hwdom_init(d); if ( iommu_flush_all() ) printk(XENLOG_WARNING VTDPREFIX diff --git a/xen/drivers/passthrough/x86/iommu.c b/xen/drivers/passthrough/x86/iommu.c index 47a078272a..b7c8b5be41 100644 --- a/xen/drivers/passthrough/x86/iommu.c +++ b/xen/drivers/passthrough/x86/iommu.c @@ -210,6 +210,14 @@ void __hwdom_init arch_iommu_hwdom_init(struct domain *d) BUG_ON(!is_hardware_domain(d)); + ASSERT(iommu_hwdom_inclusive != -1 && iommu_hwdom_inclusive != -1); + if ( iommu_hwdom_inclusive && !is_pv_domain(d) ) + { + printk(XENLOG_WARNING + "IOMMU inclusive mappings are only supported on PV Dom0\n"); + iommu_hwdom_inclusive = 0; + } + if ( iommu_hwdom_passthrough ) return; -- generated by git-patchbot for /home/xen/git/xen.git#staging _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |