[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] docs: Improve documentation for dom0= and dom0-iommu=
commit 3914f12727a53c677fbde68a25f6a5c46d1029fb Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Fri Dec 7 13:43:27 2018 +0000 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Mon Jan 21 18:11:34 2019 +0000 docs: Improve documentation for dom0= and dom0-iommu= Update to the latest metadata style, and discuss the options more completely where appropriate. Drop the redundant comment beside parse_dom0_param() - it is already out of sync with the main documentation. Also drop the individual documentation for deprecated options which refer to their newer versions, for the same reason. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> --- docs/misc/xen-command-line.pandoc | 130 ++++++++++++++++++++------------------ xen/arch/x86/dom0_build.c | 6 -- 2 files changed, 67 insertions(+), 69 deletions(-) diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index d39bcee928..f70015e995 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -636,61 +636,83 @@ trace feature is only enabled in debugging builds of Xen. Specify the bit width of the DMA heap. -### dom0 (x86) -> `= List of [ pvh | shadow | verbose ]` +### dom0 + = List of [ pvh=<bool>, shadow=<bool>, verbose=<bool> ] -> Sub-options: + Applicability: x86 -> `pvh` +Controls for how dom0 is constructed on x86 systems. -> Default: `false` +* The `pvh` boolean controls whether dom0 is constructed as a PV or a PVH + guest. The default is PV. In addition, the following requirements must + be met: -Flag that makes a dom0 boot in PVHv2 mode. + * The dom0 kernel selected by the boot loader must be capable of the + selected mode. + * For a PV dom0, Xen must have been compiled with `CONFIG_PV` enabled. + * For a PVH dom0, Xen must have been compiled with `CONFIG_HVM` enabled, + and the hardware must have VT-x/SVM extensions available. -> `shadow` +* The `shadow` boolean is only applicable when dom0 is constructed as a PVH + guest, and controls whether dom0 uses hardware assisted paging, or shadow + paging. The default is HAP when available, and shadow otherwise. -> Default: `false` + This option is unavailable when `CONFIG_SHADOW_PAGING` is disabled. Such + builds of Xen require HAP-capable hardware to use a PVH dom0. -Flag that makes a dom0 use shadow paging. Only works when "pvh" is -enabled. +* The `verbose` boolean is intended for diagnostics, and prints out extra + information during the dom0 build. It defaults to false. -> `verbose` +### dom0-iommu + = List of [ passthrough=<bool>, strict=<bool>, map-inclusive=<bool>, + map-reserved=<bool> ] -> Default: `false` +Controls for the dom0 IOMMU setup. -Print debug information during dom0 build. +* The `passthrough` boolean controls whether IOMMU translation functionality + is disabled for devices in dom0 (`passthrough=1`) or whether the IOMMU is + used to ensure that dom0 can only DMA to its permitted areas of RAM + (`passthrough=0`). -### dom0-iommu -> `= List of [ passthrough | strict | map-inclusive ]` - -This list of booleans controls the iommu usage by Dom0: - -* `passthrough`: disables DMA remapping for Dom0. Default is `false`. Note that - this option is hard coded to `false` for a PVH Dom0 and any attempt to - overwrite it from the command line is ignored. - -* `strict`: sets up DMA remapping only for the RAM Dom0 actually got assigned. - Default is `false` which means Dom0 will get mappings for all the host - RAM except regions in use by Xen. Note that this option is hard coded to - `true` for a PVH Dom0 and any attempt to overwrite it from the command line - is ignored. - -* `map-inclusive`: sets up DMA remapping for all the non-RAM regions below 4GB - except for unusable ranges. Use this to work around firmware issues providing - incorrect RMRR/IVMD entries. Rather than only mapping RAM pages for IOMMU - accesses for Dom0, with this option all pages up to 4GB, not marked as - unusable in the E820 table, will get a mapping established. Note that this - option is only applicable to a PV Dom0 and is enabled by default on Intel - hardware. - -* `map-reserved`: sets up DMA remapping for all the reserved regions in the - memory map for Dom0. Use this to work around firmware issues providing - incorrect RMRR/IVMD entries. Rather than only mapping RAM pages for IOMMU - accesses for Dom0, all memory regions marked as reserved in the memory map - that don't overlap with any MMIO region from emulated devices will be - identity mapped. This option maps a subset of the memory that would be - mapped when using the `map-inclusive` option. This option is available to all - Dom0 modes and is enabled by default on Intel hardware. + This option is only applicable to x86 PV dom0's, and defaults to false. + + Some older Intel VT-d hardware isn't capable of disabling translation + functionality on a per-device basis, and will cause this option to be + ignored and assumed to be 0. Similar behaviour on such systems is only + available by fully disabling all IOMMUs. + + This option is hardwired to false for x86 PVH dom0's (where a non-identity + transform is required for dom0 to function), and is ignored for ARM. + +* The `strict` boolean is applicable to x86 PV dom0's only and defaults to + false. It controls whether dom0 can have IOMMU mappings for all domain + RAM in the system, or only for its allocated RAM (and grant mappings etc.) + + This option is hardwired to true for x86 PVH dom0's (as RAM belonging to + other domains in the system don't live in a compatible address space), and + is ignored for ARM. + +* The `map-inclusive` boolean is applicable to x86 PV dom0's, and sets up + identity IOMMU mappings for all non-RAM regions below 4GB except for + unusable ranges, and ranges belonging to Xen. + + Typically, some devices in a system use bits of RAM for communication, and + these areas should be listed as reserved in the E820 table and identified + via RMRR or IVMD entries in the APCI tables, so Xen can ensure that they + are identity-mapped in the IOMMU. However, some firmware makes mistakes, + and this option is a coarse-grain workaround for those errors. + + Where possible, finer grain corrections should be made with the `rmrr=`, + `ivrs_hpet=` or `ivrs_ioapic=` command line options. + + This option is enabled by default on x86 systems, and invalid on ARM + systems. + +* The `map-reserved` functionality is very similar to `map-inclusive`. + + The differences from `map-inclusive` are that `map-reserved` is applicable + to both x86 PV and PVH dom0's, and represents a subset of the correction + by only mapping reserved memory regions rather than all non-RAM regions. ### dom0_ioports_disable (x86) > `= List of <hex>-<hex>` @@ -1181,20 +1203,11 @@ detection of systems known to misbehave upon accesses to that port. > **WARNING: This command line option is deprecated, and superseded by > _dom0-iommu=passthrough_ - using both options in combination is undefined.** -> Default: `false` - ->> Control whether to disable DMA remapping for Dom0. - > `dom0-strict` > **WARNING: This command line option is deprecated, and superseded by > _dom0-iommu=strict_ - using both options in combination is undefined.** -> Default: `false` - ->> Control whether to set up DMA remapping only for the memory Dom0 actually ->> got assigned. Implies `no-dom0-passthrough`. - > `amd-iommu-perdev-intremap` > Default: `true` @@ -1241,21 +1254,12 @@ Specify the timeout of the device IOTLB invalidation in milliseconds. By default, the timeout is 1000 ms. When you see error 'Queue invalidate wait descriptor timed out', try increasing this value. -### iommu_inclusive_mapping (VT-d) +### iommu_inclusive_mapping > `= <boolean>` **WARNING: This command line option is deprecated, and superseded by _dom0-iommu=map-inclusive_ - using both options in combination is undefined.** -> Default: `true` - -Use this to work around firmware issues providing incorrect RMRR entries. -Rather than only mapping RAM pages for IOMMU accesses for Dom0, with this -option all pages up to 4GB, not marked as unusable in the E820 table, will -get a mapping established. Note that this option is only applicable to a -PV dom0. Also note that if `dom0-strict` mode is enabled then conventional -RAM pages not assigned to dom0 will not be mapped. - ### irq_ratelimit (x86) > `= <integer>` diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c index c0bc022a83..7f6ee7f005 100644 --- a/xen/arch/x86/dom0_build.c +++ b/xen/arch/x86/dom0_build.c @@ -283,12 +283,6 @@ bool __initdata opt_dom0_shadow; bool __initdata dom0_pvh; bool __initdata dom0_verbose; -/* - * List of parameters that affect Dom0 creation: - * - * - pvh Create a PVHv2 Dom0. - * - shadow Use shadow paging for Dom0. - */ static int __init parse_dom0_param(const char *s) { const char *ss; -- generated by git-patchbot for /home/xen/git/xen.git#staging _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |