[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v2][PATCH 1/1] xen:vtd: missing RMRR mapping while share EPT
On 24/07/14 09:50, Tiejun Chen wrote: > intel_iommu_map_page() does nothing if VT-d shares EPT page table. > So rmrr_identity_mapping() never create RMRR mapping but in some > cases like some GFX drivers it still need to access RMRR. > > Here we will create those RMRR mappings even in shared EPT case. > > Signed-off-by: Tiejun Chen <tiejun.chen@xxxxxxxxx> > --- > xen/drivers/passthrough/vtd/iommu.c | 18 ++++++++++++++++-- > 1 file changed, 16 insertions(+), 2 deletions(-) > > v2: > > * Fix coding style. > * Still need to abide intel_iommu_map_page(), so we should do nothing > if dom0 and iommu supports pass thru. > > diff --git a/xen/drivers/passthrough/vtd/iommu.c > b/xen/drivers/passthrough/vtd/iommu.c > index 042b882..aca79db 100644 > --- a/xen/drivers/passthrough/vtd/iommu.c > +++ b/xen/drivers/passthrough/vtd/iommu.c > @@ -41,6 +41,7 @@ > #include "extern.h" > #include "vtd.h" > #include "../ats.h" > +#include "../../../arch/x86/mm/mm-locks.h" <asm/mm/mm-locks.h> ~Andrew > > struct mapped_rmrr { > struct list_head list; > @@ -1842,6 +1843,7 @@ static int rmrr_identity_mapping(struct domain *d, > unsigned long base_pfn, end_pfn; > struct mapped_rmrr *mrmrr; > struct hvm_iommu *hd = domain_hvm_iommu(d); > + struct p2m_domain *p2m = p2m_get_hostp2m(d); > > ASSERT(spin_is_locked(&pcidevs_lock)); > ASSERT(rmrr->base_address < rmrr->end_address); > @@ -1867,8 +1869,20 @@ static int rmrr_identity_mapping(struct domain *d, > > while ( base_pfn < end_pfn ) > { > - if ( intel_iommu_map_page(d, base_pfn, base_pfn, > - IOMMUF_readable|IOMMUF_writable) ) > + if ( iommu_use_hap_pt(d) && (!iommu_passthrough || > + !is_hardware_domain(d)) ) > + { > + p2m_lock(p2m); > + if ( p2m_set_entry(p2m, base_pfn, _mfn(base_pfn), PAGE_ORDER_4K, > + p2m_mmio_direct, p2m_access_rw) ) > + { > + p2m_unlock(p2m); > + return -1; > + } > + p2m_unlock(p2m); > + } > + else if ( intel_iommu_map_page(d, base_pfn, base_pfn, > + IOMMUF_readable|IOMMUF_writable) ) > return -1; > base_pfn++; > } _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |