[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 4/4] x86/iommu: add reserved dom0-iommu option to map reserved memory ranges
On Tue, Aug 07, 2018 at 04:02:43PM +0200, Roger Pau Monne wrote: > @@ -149,36 +204,9 @@ void __hwdom_init arch_iommu_hwdom_init(struct domain *d) > for ( i = 0; i < top; i++ ) > { > unsigned long pfn = pdx_to_pfn(i); > - bool map; > int rc; > > - /* > - * Set up 1:1 mapping for dom0. Default to include only > - * conventional RAM areas and let RMRRs include needed reserved > - * regions. When set, the inclusive mapping additionally maps in > - * every pfn up to 4GB except those that fall in unusable ranges. > - */ > - if ( pfn > max_pfn && !mfn_valid(_mfn(pfn)) ) > - continue; > - > - if ( iommu_dom0_inclusive && pfn <= max_pfn ) > - map = !page_is_ram_type(pfn, RAM_TYPE_UNUSABLE); > - else > - map = page_is_ram_type(pfn, RAM_TYPE_CONVENTIONAL); > - > - if ( !map ) > - continue; > - > - /* Exclude Xen bits */ > - if ( xen_in_range(pfn) ) > - continue; > - > - /* > - * If dom0-strict mode is enabled then exclude conventional RAM > - * and let the common code map dom0's pages. > - */ > - if ( iommu_dom0_strict && > - page_is_ram_type(pfn, RAM_TYPE_CONVENTIONAL) ) > + if ( !hwdom_iommu_map(d, pfn, max_pfn) ) > continue; > > rc = iommu_map_page(d, pfn, pfn, IOMMUF_readable|IOMMUF_writable); I've lost a chunk here during one of the rebases, so the following diff should be added to the patch in order to create maps if the iommu page tables are shared: diff --git a/xen/drivers/passthrough/x86/iommu.c b/xen/drivers/passthrough/x86/iommu.c index 6aec43ed1a..6271d8b671 100644 --- a/xen/drivers/passthrough/x86/iommu.c +++ b/xen/drivers/passthrough/x86/iommu.c @@ -209,7 +209,13 @@ void __hwdom_init arch_iommu_hwdom_init(struct domain *d) if ( !hwdom_iommu_map(d, pfn, max_pfn) ) continue; - rc = iommu_map_page(d, pfn, pfn, IOMMUF_readable|IOMMUF_writable); + if ( iommu_use_hap_pt(d) ) + { + ASSERT(is_hvm_domain(d)); + rc = set_identity_p2m_entry(d, pfn, p2m_access_rw, 0); + } + else + rc = iommu_map_page(d, pfn, pfn, IOMMUF_readable|IOMMUF_writable); if ( rc ) printk(XENLOG_WARNING " d%d: IOMMU mapping failed: %d\n", d->domain_id, rc); I can resend the series in order to ease review. Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |