[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH for-4.18] iommu: fix quarantine mode command line documentation


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Date: Thu, 19 Oct 2023 12:45:51 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IjpS+FYKGfARqI0AzJ0tD8nK2G71v5Eaq/qiMlHTqGY=; b=nBK5MVbqSKVlnu3VfQgdEz1jIHKWJ6oY3BSo8wqfXxl3DOpQHTOtDv1iPZjzmB7Y7Du3L2SWmv8ARswhaVEXrY65e9N62otrnz7ymAI3oP7+8HAG0afzzbl1i4LdLVQSG2hFG5BdCKi6xywpthYTS3wgdm74TcvJu0dIteHeirqXorMYUBgUOPGhnlmqQoYDoTXhZY645HZTeSxm+8Rapjb7oj6h1CcB6MDqQNOCR3CVA5KjnNNG5Y4WxfxJc5oMJDH17X0pcedjIa//I90RJZAXjfX6JRTyYBElVjZtVjiiXOcCoDpHZfwpmOdkCw5hG9gkf82UuZV+xLlG5OtpdQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=j73QVPq4/f0m4DZ5adB127h/pXb5egEkA0A+0yUr6vH+mxBYYBNMXICz57jA0PQhNO959D3iODLOUpYmft2WbPu/PPwRGNx7WQ03I+PSEKD8WNzFKfiUwqmmFZ87a2wRcHZvouThDj5fuC1jmSAnEc48ivlY+ixcvVQQNASvWLTEObih9BVtkWs/vyJeKIsS5JT+n0zaaxV+GGc7yAJzn2kIMn4ztw47lcQ9VQcjeX5CwZzw+Nl0v8maMy+Cxg836tqzZsp1L48cTcjbOpQp0rG8mGIMG27H3/AaHr04o2hF4SDib+oW7BdX3Aw4PMtkZRyxfYSQR4k9j0I8vl2OjA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Henry Wang <Henry.Wang@xxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Thu, 19 Oct 2023 10:47:06 +0000
  • Ironport-data: A9a23:mUfUNa+rCz8WsbZLkIeQDrUDWn+TJUtcMsCJ2f8bNWPcYEJGY0x3n 2VODWHTPK6OMGqjKNoiOoWx8UwGsceEzoNlTwY//H88E34SpcT7XtnIdU2Y0wF+jCHgZBk+s 5hBMImowOQcFCK0SsKFa+C5xZVE/fjVAOK6UKidYnwZqTZMEE8JkQhkl/MynrlmiN24BxLlk d7pqojUNUTNNwRcawr40Ird7ks01BjOkGlA5AdnPaka5Aa2e0Q9V/rzG4ngdxMUfaEMdgKKb 76r5K20+Grf4yAsBruN+losWhRXKlJ6FVHmZkt+A8BOsDAbzsAB+v9T2M4nQVVWk120c+VZk 72hg3ASpTABZcUgkMxFO/VR/roX0aduoNcrKlDn2SCfItGvn9IBDJyCAWlvVbD09NqbDklzq NgiGDkmPiqhxO+x+YqJEvNUgusKeZyD0IM34hmMzBn/JNN/GNXpZfWP4tVVmjAtmspJAPDSI dIDbiZiZwjBZBsJPUoLDJU5n6GjgXyXnz9w8QrJ4/ZopTWDilUvgNABM/KMEjCObd9SkUuC4 HrP4kzyAw0ANczZwj2Amp6prraVwX2nB9hKT9VU8NZb2ESa1kgxFyZOXAHihOeQhR+xavF2f hl8Fi0G6PJaGFaQZsnwWVi0rWCJujYYWsFMCKsq5QeV0K3W7g2FQG8eQVZpSNEgrt5wejUs2 XeAhdavDjtq2JWXQ3+A8rafrRupJDMYa2QFYEcsTxYB4tTliJE+iFTIVNkLOLWuktT/FDX0w jaLhCsznbMeiYgMzarT1U/DqyKhoN7OVAFd2+nMdmes7wc8boj1YYWtsAHf9awZctbfSUSdt n8ZncTY9PoJEZyGiC2KRqMKAa2t4PGGdjbbhDaDAqUcythkwFb7Fag43d20DB4B3hosEdMxX HLuhA==
  • Ironport-hdrordr: A9a23:jaW886PXzN/wO8BcTuWjsMiBIKoaSvp037BL7TESdfUxSKalfq +V7ZcmPHPP+U4ssVAb6Le90cu7MAjhHZ8c2/hpAV7KZmCP0wuVxelZjLcKqAeQfxEWmNQtsJ uIsJITNDQzNzVHZArBjzVQaOxQpuVvOZrHuc7bz3NgCR5ncLth6QARMHfgLnFL
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

With the addition of per-device quarantine page tables the sink page is now
exclusive for each device, and thus writable.  Update the documentation to
reflect the current implementation.

Fixes: 14dd241aad8a ('IOMMU/x86: use per-device page tables for quarantining')
Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
---
 docs/misc/xen-command-line.pandoc | 9 ++++-----
 1 file changed, 4 insertions(+), 5 deletions(-)

diff --git a/docs/misc/xen-command-line.pandoc 
b/docs/misc/xen-command-line.pandoc
index 604650aaeeef..9121d8a29404 100644
--- a/docs/misc/xen-command-line.pandoc
+++ b/docs/misc/xen-command-line.pandoc
@@ -1520,15 +1520,14 @@ boolean (e.g. `iommu=no`) can override this and leave 
the IOMMUs disabled.
     should be enabled.  Quarantining can be done in two ways: In its basic
     form, all in-flight DMA will simply be forced to encounter IOMMU
     faults.  Since there are systems where doing so can cause host lockup,
-    an alternative form is available where writes to memory will be made
-    fault, but reads will be directed to a scratch page.  The implication
-    here is that such reads will go unnoticed, i.e. an admin may not
-    become aware of the underlying problem.
+    an alternative form is available where accesses to memory will be directed
+    to a scratch page. The implication here is that such accesses will go
+    unnoticed, i.e. an admin may not become aware of the underlying problem.
 
     Therefore, if this option is set to true (the default), Xen always
     quarantines such devices; they must be explicitly assigned back to Dom0
     before they can be used there again.  If set to "scratch-page", still
-    active DMA reads will additionally be directed to a "scratch" page.  If
+    active DMA operations will additionally be directed to a "scratch" page.  
If
     set to false, Xen will only quarantine devices the toolstack has arranged
     for getting quarantined, and only in the "basic" form.
 
-- 
2.42.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.