[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 6/6] x86/iommu: add map-reserved dom0-iommu option to map reserved memory ranges
>>> On 21.08.18 at 09:49, <roger.pau@xxxxxxxxxx> wrote: > --- a/docs/misc/xen-command-line.markdown > +++ b/docs/misc/xen-command-line.markdown > @@ -704,6 +704,15 @@ This list of booleans controls the iommu usage by Dom0: > option is only applicable to a PV Dom0 and is enabled by default on Intel > hardware. > > +* `map-reserved`: sets up DMA remapping for all the reserved regions in the > + memory map for Dom0. Use this to work around firmware issues providing > + incorrect RMRR/IVMD entries. Rather than only mapping RAM pages for IOMMU > + accesses for Dom0, all memory regions marked as reserved in the memory map > + that don't overlap with any MMIO region from emulated devices will be > + identity mapped. This option maps a subset of the memory that would be > + mapped when using the `map-inclusive` option. This option is available to a > + PVH Dom0 and is enabled by default on Intel hardware. This sounds as if the option was meaningless for PV, but I can't seem to see this being the case. The places setting iommu_hwdom_reserved don't look at domain type afaics, and the change to the default case in hwdom_iommu_map()'s switch() block has the is_hvm_domain() check independent of the iommu_hwdom_reserved one. I also wonder about the wording "is available to": For a domain type restriction, would "only takes effect on" or some such be more to the point? > @@ -138,16 +139,24 @@ static bool __hwdom_init hwdom_iommu_map(const struct > domain *d, > unsigned long pfn, > unsigned long max_pfn) > { > + unsigned int i, type; > + > /* > * Set up 1:1 mapping for dom0. Default to include only conventional RAM > * areas and let RMRRs include needed reserved regions. When set, the > * inclusive mapping additionally maps in every pfn up to 4GB except > those > - * that fall in unusable ranges. > + * that fall in unusable ranges for PV Dom0. > */ > - if ( (pfn > max_pfn && !mfn_valid(_mfn(pfn))) || xen_in_range(pfn) ) > + if ( (pfn > max_pfn && !mfn_valid(_mfn(pfn))) || xen_in_range(pfn) || > + /* > + * Ignore any address below 1MB, that's already identity mapped by > the > + * Dom0 builder for HVM. > + */ > + (!d->domain_id && is_hvm_domain(d) && pfn < PFN_DOWN(MB(1))) ) > return false; > > - switch ( page_get_ram_type(pfn) ) > + type = page_get_ram_type(pfn); > + switch ( type ) Any reason not to keep this a single line, putting the assignment inside the switch()? > @@ -158,10 +167,41 @@ static bool __hwdom_init hwdom_iommu_map(const struct > domain *d, > break; > > default: > - if ( !iommu_hwdom_inclusive || pfn > max_pfn ) > + if ( type & RAM_TYPE_RESERVED ) > + { > + if ( !iommu_hwdom_inclusive && !iommu_hwdom_reserved ) > + return false; > + } > + else if ( is_hvm_domain(d) || !iommu_hwdom_inclusive || pfn > > max_pfn ) > return false; > } > > + /* > + * Check that it doesn't overlap with the LAPIC > + * TODO: if the guest relocates the MMIO area of the LAPIC or IO-APIC Xen > + * should make sure there's nothing in the new address that would prevent > + * trapping. > + */ Hmm, now you even mention the IO-APIC here. Does our / qemu's chipset emulation allow for this in the first place? Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |