[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH for-4.18 v2] x86/pvh: fix identity mapping of low 1MB
Hi Roger, > On Oct 13, 2023, at 16:56, Roger Pau Monne <roger.pau@xxxxxxxxxx> wrote: > > The mapping of memory regions below the 1MB mark was all done by the PVH dom0 > builder code, causing the region to be avoided by the arch specific IOMMU > hardware domain initialization code. That lead to the IOMMU being enabled > without reserved regions in the low 1MB identity mapped in the p2m for PVH > hardware domains. Firmware which happens to be missing RMRR/IVMD ranges > describing E820 reserved regions in the low 1MB would transiently trigger > IOMMU > faults until the p2m is populated by the PVH dom0 builder: > > AMD-Vi: IO_PAGE_FAULT: 0000:00:13.1 d0 addr 00000000000eb380 flags 0x20 RW > AMD-Vi: IO_PAGE_FAULT: 0000:00:13.1 d0 addr 00000000000eb340 flags 0 > AMD-Vi: IO_PAGE_FAULT: 0000:00:13.2 d0 addr 00000000000ea1c0 flags 0 > AMD-Vi: IO_PAGE_FAULT: 0000:00:14.5 d0 addr 00000000000eb480 flags 0x20 RW > AMD-Vi: IO_PAGE_FAULT: 0000:00:12.0 d0 addr 00000000000eb080 flags 0x20 RW > AMD-Vi: IO_PAGE_FAULT: 0000:00:14.5 d0 addr 00000000000eb400 flags 0 > AMD-Vi: IO_PAGE_FAULT: 0000:00:12.0 d0 addr 00000000000eb040 flags 0 > > Those errors have been observed on the osstest pinot{0,1} boxes (AMD Fam15h > Opteron(tm) Processor 3350 HE). > > Mostly remove the special handling of the low 1MB done by the PVH dom0 > builder, > leaving just the data copy between RAM regions. Otherwise rely on the IOMMU > arch init code to create any identity mappings for reserved regions in that > range (like it already does for reserved regions elsewhere). > > Note there's a small difference in behavior, as holes in the low 1MB will no > longer be identity mapped to the p2m. > > Fixes: 6b4f6a31ace1 ('x86/PVH: de-duplicate mappings for first Mb of Dom0 > memory') > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Release-acked-by: Henry Wang <Henry.Wang@xxxxxxx> Kind regards, Henry > --- > Changes since v1: > - Reword commit message. > --- > xen/arch/x86/hvm/dom0_build.c | 22 ---------------------- > xen/drivers/passthrough/x86/iommu.c | 8 +------- > 2 files changed, 1 insertion(+), 29 deletions(-) > > diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch/x86/hvm/dom0_build.c > index bc0e290db612..979db7d1ec4d 100644 > --- a/xen/arch/x86/hvm/dom0_build.c > +++ b/xen/arch/x86/hvm/dom0_build.c > @@ -449,28 +449,6 @@ static int __init pvh_populate_p2m(struct domain *d) > } > } > > - /* Non-RAM regions of space below 1MB get identity mapped. */ > - for ( i = rc = 0; i < MB1_PAGES; ++i ) > - { > - p2m_type_t p2mt; > - mfn_t mfn = get_gfn_query(d, i, &p2mt); > - > - if ( mfn_eq(mfn, INVALID_MFN) ) > - rc = set_mmio_p2m_entry(d, _gfn(i), _mfn(i), PAGE_ORDER_4K); > - else > - /* > - * If the p2m entry is already set it must belong to a RMRR and > - * already be identity mapped, or be a RAM region. > - */ > - ASSERT(p2mt == p2m_ram_rw || mfn_eq(mfn, _mfn(i))); > - put_gfn(d, i); > - if ( rc ) > - { > - printk("Failed to identity map PFN %x: %d\n", i, rc); > - return rc; > - } > - } > - > if ( cpu_has_vmx && paging_mode_hap(d) && !vmx_unrestricted_guest(v) ) > { > /* > diff --git a/xen/drivers/passthrough/x86/iommu.c > b/xen/drivers/passthrough/x86/iommu.c > index c85549ccad6e..857dccb6a465 100644 > --- a/xen/drivers/passthrough/x86/iommu.c > +++ b/xen/drivers/passthrough/x86/iommu.c > @@ -400,13 +400,7 @@ void __hwdom_init arch_iommu_hwdom_init(struct domain *d) > max_pfn = (GB(4) >> PAGE_SHIFT) - 1; > top = max(max_pdx, pfn_to_pdx(max_pfn) + 1); > > - /* > - * First Mb will get mapped in one go by pvh_populate_p2m(). Avoid > - * setting up potentially conflicting mappings here. > - */ > - start = paging_mode_translate(d) ? PFN_DOWN(MB(1)) : 0; > - > - for ( i = pfn_to_pdx(start), count = 0; i < top; ) > + for ( i = 0, start = 0, count = 0; i < top; ) > { > unsigned long pfn = pdx_to_pfn(i); > unsigned int perms = hwdom_iommu_map(d, pfn, max_pfn); > -- > 2.42.0 >
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |