|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 1/2] xen/dom0: Improve documentation for dom0= and dom0-iommu=
On 21/12/2018 12:08, Roger Pau Monné wrote:
> On Thu, Dec 20, 2018 at 11:40:51PM +0000, Andrew Cooper wrote:
>> Update to the latest metadata style, and expand each of the clauses with more
>> information, including applicable CONFIG_* options.
>>
>> Drop the redundant comment beside parse_dom0_param(), to avoid it getting out
>> of sync with the main documentation.
>>
>> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> Thanks! A couple of fixes below, because the original text is actually
> wrong...
TBH, that is my default assumption every time I do work like this :)
>
>> ---
>> CC: Jan Beulich <JBeulich@xxxxxxxx>
>> CC: Wei Liu <wei.liu2@xxxxxxxxxx>
>> CC: Roger Pau Monné <roger.pau@xxxxxxxxxx>
>> CC: Stefano Stabellini <sstabellini@xxxxxxxxxx>
>> CC: Julien Grall <julien.grall@xxxxxxx>
>>
>> Please double check for correctness. The text matches my
>> understanding/reading of the code, but some of it is rather subtle going.
>>
>> It occurs to me that:
>>
>> * The choice of dom0 boot mode should in part be derived from the available
>> CONFIG_* options, and ELF notes advertised in the dom0 kernel.
> This is indeed doable, but would require parsing the dom0 kernel
> before building the domain.
I don't see anything wrong with parsing the ELF headers ahead of
building the domain. From the overall boot time, its just an
order-of-operations issue.
>
>> * AMD probably needs to gain an `ivmd=` to mirror `rmrr=` on the Intel side,
>> because we know there are other errors in the IVRS table.
> Yes, albeit using rmrr is quite cumbersome because it's mostly a
> trial-and-error process until there are no more iommu faults (unless
> you can get the correct rmrr command for your hardware somewhere).
>
>> * Neither of map-{inclusive,reserved} should be active by default, even on
>> Intel hardware, and we should (wherever possible) have quirks like we have
>> for all other firmware screwups. Requiring the user to diagnose/work
>> around firmware problems like this is quite rude.
> That would indeed be nice, but I think there are too many vendor
> firmware versions to be able to correctly identify such quirks, the
> more that vendors don't even list missing RMRR as erratum.
I don't agree. We already have quirks based on DMI (at the moment,
mainly for reboot overrides), and the vast majority of the offending
cases are the BMC shared mailbox, which will be in a fixed per-platform
location.
I don't expect we'll ever find and fix all quirks, but where we do find
suitable ones, we should put them into the boot code.
>
>> +Controls for the dom0 IOMMU setup.
>> +
>> +* The `passthrough` boolean is applicable to x86 PV dom0's only and
>> defaults
>> + to false. It controls whether the IOMMU is fully disabled for devices
>> + belonging to dom0 (`passthrough=1`), or whether the IOMMU is set up with
>> + an identity transform for dom0 (`passthrough=0`) to prevent dom0 from
>> + DMA'ing outside of its permitted areas.
>> +
>> + This option is hardwired to false for x86 PVH dom0's (where a
>> non-identity
>> + transform is required for dom0 to function), and is ignored for ARM.
>> +
>> +* The `strict` boolean is applicable to x86 PV dom0's only and defaults to
>> + false. It controls whether dom0 can have IOMMU mappings for all domain
>> + RAM in the system, or only for its allocated RAM (and grant mappings
>> etc.)
>> +
>> + This option is hardwired to true for x86 PVH dom0's (as RAM belonging to
>> + other domains in the system don't live in a compatible address space),
>> and
>> + is ignored for ARM.
>> +
>> +* The `map-inclusive` boolean is applicable to x86 PV dom0's, and sets up
>> DMA
>> + remapping for all non-RAM regions below 4GB except for unusable ranges.
>> +
>> + Typically, some devices in a system use bits of RAM for communication,
>> and
>> + these areas should be listed via RMRR or IVMD entries in the APCI
>> tables,
>> + so Xen can ensure that they are identity-mapped in the IOMMU. However,
>> + some firmware makes mistakes writing its APCI tables, and this option
>> is a
>> + coarse-grain workaround for those errors.
>> +
>> + Where possible, finer grain corrections should be made with the `rmrr=`,
>> + `ivrs_hpet=` or `ivrs_ioapic=` command line options.
>> +
>> + This option is enabled by default on x86 Intel systems, disabled by
>> + default on other x86 systems, and invalid on ARM systems.
> I'm afraid the previous text was wrong. I later discovered that AMD
> also had such workarounds applied by default, and unified the code,
> but failed to update the documentation, sorry.
>
> map-inclusive is enabled by default on x86 for a PV dom0. See
> xen/drivers/passthrough/x86/iommu.c:215 (arch_iommu_hwdom_init).
>
>> +
>> +* The `map-reserved` functionality is very similar to `map-inclusive`,
>> but is
>> + applicable to both x86 PV and PVH dom0's, and represents a subset of the
>> + correction by only mapping reserved memory regions rather than all
>> non-RAM
>> + regions.
>> +
>> + This option is enabled by default on x86 Intel systems, disabled by
>> + default on other x86 systems, and invalid on ARM systems.
> map-reserved is enabled by default on x86,
> xen/drivers/passthrough/x86/iommu.c:218 (arch_iommu_hwdom_init).
Ok for both. Will fix up.
~Andrew
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |