|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v6][PATCH 2/2] xen:vtd: missing RMRR mapping while share EPT
>>> On 30.07.14 at 10:59, <tiejun.chen@xxxxxxxxx> wrote:
> On 2014/7/30 16:36, Jan Beulich wrote:
>>>>> On 30.07.14 at 03:36, <tiejun.chen@xxxxxxxxx> wrote:
>>> --- a/xen/drivers/passthrough/vtd/iommu.c
>>> +++ b/xen/drivers/passthrough/vtd/iommu.c
>>> @@ -1867,8 +1867,14 @@ static int rmrr_identity_mapping(struct domain *d,
>>>
>>> while ( base_pfn < end_pfn )
>>> {
>>> - if ( intel_iommu_map_page(d, base_pfn, base_pfn,
>>> - IOMMUF_readable|IOMMUF_writable) )
>>> + if ( iommu_use_hap_pt(d) )
>>> + {
>>> + ASSERT(!iommu_passthrough || !is_hardware_domain(d));
>>> + if ( set_identity_p2m_entry(d, base_pfn) )
>>> + return -1;
>>> + }
>>> + else if ( intel_iommu_map_page(d, base_pfn, base_pfn,
>>> + IOMMUF_readable|IOMMUF_writable) )
>>> return -1;
>>> base_pfn++;
>>> }
>>
>> So I wonder how this plays together with
>>
>> /* FIXME: Because USB RMRR conflicts with guest bios region,
>> * ignore USB RMRR temporarily.
>> */
>> seg = pdev->seg;
>> bus = pdev->bus;
>> if ( is_usb_device(seg, bus, pdev->devfn) )
>> {
>> ret = 0;
>> goto done;
>> }
>>
>> later in the same file (in intel_iommu_assign_device()). I.e. the
>> improvement you claim won't be achieved for passed through USB
>
> I think we can remove this chunk of codes since these two patches
> already check if they conflicts.
Causing an apparent regression for anyone wanting to pass through
a USB devices associated with an RMRR? I agree this is the more
correct thing to do, but I'm not sure all our users would agree.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |