[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] x86/iommu: remove usage of {set/clear}_identity_p2m_entry against PV domains
Switch rmrr_identity_mapping to use iommu_{un}map in order to establish RMRR mappings for PV domains, like it's done in arch_iommu_hwdom_init. This solves the issue of a PV hardware domain not getting RMRR mappings because {set/clear}_identity_p2m_entry was not properly updating the iommu page tables. As rmrr_identity_mapping was the last user of {set/clear}_identity_p2m_entry against PV domains modify the function so it's only usable against translated domains, as the other p2m related functions. Reported-by: Roman Shaposhnik <roman@xxxxxxxxxx> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> --- Cc: George Dunlap <george.dunlap@xxxxxxxxxxxxx> Cc: Jan Beulich <jbeulich@xxxxxxxx> Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Cc: Wei Liu <wl@xxxxxxx> Cc: Kevin Tian <kevin.tian@xxxxxxxxx> Cc: Paul Durrant <paul.durrant@xxxxxxxxxx> Cc: Roman Shaposhnik <roman@xxxxxxxxxx> --- xen/arch/x86/mm/p2m.c | 11 ++++------- xen/drivers/passthrough/vtd/iommu.c | 23 ++++++++++++++++++----- 2 files changed, 22 insertions(+), 12 deletions(-) diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c index fef97c82f6..d36a58b1a6 100644 --- a/xen/arch/x86/mm/p2m.c +++ b/xen/arch/x86/mm/p2m.c @@ -1341,10 +1341,8 @@ int set_identity_p2m_entry(struct domain *d, unsigned long gfn_l, if ( !paging_mode_translate(p2m->domain) ) { - if ( !need_iommu_pt_sync(d) ) - return 0; - return iommu_legacy_map(d, _dfn(gfn_l), _mfn(gfn_l), PAGE_ORDER_4K, - IOMMUF_readable | IOMMUF_writable); + ASSERT_UNREACHABLE(); + return -ENXIO; } gfn_lock(p2m, gfn, 0); @@ -1432,9 +1430,8 @@ int clear_identity_p2m_entry(struct domain *d, unsigned long gfn_l) if ( !paging_mode_translate(d) ) { - if ( !need_iommu_pt_sync(d) ) - return 0; - return iommu_legacy_unmap(d, _dfn(gfn_l), PAGE_ORDER_4K); + ASSERT_UNREACHABLE(); + return -ENXIO; } gfn_lock(p2m, gfn, 0); diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c index 5d72270c5b..62df5ca5aa 100644 --- a/xen/drivers/passthrough/vtd/iommu.c +++ b/xen/drivers/passthrough/vtd/iommu.c @@ -1969,6 +1969,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map, unsigned long end_pfn = PAGE_ALIGN_4K(rmrr->end_address) >> PAGE_SHIFT_4K; struct mapped_rmrr *mrmrr; struct domain_iommu *hd = dom_iommu(d); + unsigned int flush_flags = 0; ASSERT(pcidevs_locked()); ASSERT(rmrr->base_address < rmrr->end_address); @@ -1982,7 +1983,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map, if ( mrmrr->base == rmrr->base_address && mrmrr->end == rmrr->end_address ) { - int ret = 0; + int ret = 0, err; if ( map ) { @@ -1995,13 +1996,20 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map, while ( base_pfn < end_pfn ) { - if ( clear_identity_p2m_entry(d, base_pfn) ) - ret = -ENXIO; + if ( paging_mode_translate(d) ) + ret = clear_identity_p2m_entry(d, base_pfn); + else + ret = iommu_unmap(d, _dfn(base_pfn), PAGE_ORDER_4K, + &flush_flags); base_pfn++; } list_del(&mrmrr->list); xfree(mrmrr); + /* Keep the previous error code if there's one. */ + err = iommu_iotlb_flush_all(d, flush_flags); + if ( !ret ) + ret = err; return ret; } } @@ -2011,8 +2019,13 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map, while ( base_pfn < end_pfn ) { - int err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag); + int err; + if ( paging_mode_translate(d) ) + err = set_identity_p2m_entry(d, base_pfn, p2m_access_rw, flag); + else + err = iommu_map(d, _dfn(base_pfn), _mfn(base_pfn), PAGE_ORDER_4K, + IOMMUF_readable | IOMMUF_writable, &flush_flags); if ( err ) return err; base_pfn++; @@ -2026,7 +2039,7 @@ static int rmrr_identity_mapping(struct domain *d, bool_t map, mrmrr->count = 1; list_add_tail(&mrmrr->list, &hd->arch.mapped_rmrrs); - return 0; + return iommu_iotlb_flush_all(d, flush_flags); } static int intel_iommu_add_device(u8 devfn, struct pci_dev *pdev) -- 2.20.1 (Apple Git-117) _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |