[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86: allow Dom0 read-only access to IO-APICs
>>> On 02.05.13 at 08:55, Keir Fraser <keir.xen@xxxxxxxxx> wrote: > On 02/05/2013 07:31, "Jan Beulich" <JBeulich@xxxxxxxx> wrote: > >> There are BIOSes that want to map the IO-APIC MMIO region from some >> ACPI method(s), and there is at least one BIOS flavor that wants to >> use this mapping to clear an RTE's mask bit. While we can't allow the >> latter, we can permit reads and simply drop write attempts, leveraging >> the already existing infrastructure introduced for dealing with AMD >> IOMMUs' representation as PCI devices. >> >> This fixes an interrupt setup problem on a system where _CRS evaluation >> involved the above described BIOS/ACPI behavior, and is expected to >> also deal with a boot time crash of pv-ops Linux upon encountering the >> same kind of system. >> >> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> > > mmio_ro_ranges is not specific to ioapic handling, so its initialisation > should probably not go to init_ioapic_mappings()? If it is x86 specific (for > now at least) then it could just go in __start_xen()? Can certainly do that - I just followed it originally having been done by its first user (which now happens to be IO-APIC code). If I do so, I shall then also move declaration and definition into x86 specific files... Jan >> --- a/xen/arch/x86/domain_build.c >> +++ b/xen/arch/x86/domain_build.c >> @@ -1114,7 +1114,7 @@ int __init construct_dom0( >> for ( i = 0; i < nr_ioapics; i++ ) >> { >> mfn = paddr_to_pfn(mp_ioapics[i].mpc_apicaddr); >> - if ( smp_found_config ) >> + if ( !rangeset_contains_singleton(mmio_ro_ranges, mfn) ) >> rc |= iomem_deny_access(dom0, mfn, mfn); >> } >> >> --- a/xen/arch/x86/io_apic.c >> +++ b/xen/arch/x86/io_apic.c >> @@ -2468,6 +2468,9 @@ void __init init_ioapic_mappings(void) >> unsigned int i, idx = FIX_IO_APIC_BASE_0; >> union IO_APIC_reg_01 reg_01; >> >> + mmio_ro_ranges = rangeset_new(NULL, "r/o mmio ranges", >> + RANGESETF_prettyprint_hex); >> + >> if ( smp_found_config ) >> nr_irqs_gsi = 0; >> for ( i = 0; i < nr_ioapics; i++ ) >> @@ -2507,6 +2510,11 @@ void __init init_ioapic_mappings(void) >> reg_01.raw = io_apic_read(i, 1); >> nr_ioapic_entries[i] = reg_01.bits.entries + 1; >> nr_irqs_gsi += nr_ioapic_entries[i]; >> + >> + if ( rangeset_add_singleton(mmio_ro_ranges, >> + ioapic_phys >> PAGE_SHIFT) ) >> + printk(KERN_ERR "Failed to mark IO-APIC page %lx >> read-only\n", >> + ioapic_phys); >> } >> } >> >> --- a/xen/drivers/passthrough/pci.c >> +++ b/xen/drivers/passthrough/pci.c >> @@ -105,8 +105,6 @@ void __init pt_pci_init(void) >> radix_tree_init(&pci_segments); >> if ( !alloc_pseg(0) ) >> panic("Could not initialize PCI segment 0\n"); >> - mmio_ro_ranges = rangeset_new(NULL, "r/o mmio ranges", >> - RANGESETF_prettyprint_hex); >> } >> >> int __init pci_add_segment(u16 seg) >> >> >> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |