[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 6/7] xen/arm: don't iomem_permit_access for reserved-memory regions
On Mon, 12 Aug 2019, Julien Grall wrote: > On 09/08/2019 23:56, Stefano Stabellini wrote: > > On Thu, 8 Aug 2019, Volodymyr Babchuk wrote: > > > Hi Stefano, > > > > > > Stefano Stabellini writes: > > > > > > > Don't allow reserved-memory regions to be remapped into any guests, > > > > until reserved-memory regions are properly supported in Xen. For now, > > > > do not call iomem_permit_access for them. > > > > > > > > Signed-off-by: Stefano Stabellini <stefanos@xxxxxxxxxx> > > > > --- > > > > > > > > Changes in v4: > > > > - compare the parent name with reserved-memory > > > > - use dt_node_cmp > > > > > > > > Changes in v3: > > > > - new patch > > > > --- > > > > xen/arch/arm/domain_build.c | 24 ++++++++++++++++-------- > > > > 1 file changed, 16 insertions(+), 8 deletions(-) > > > > > > > > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c > > > > index 4c8404155a..267e0549e2 100644 > > > > --- a/xen/arch/arm/domain_build.c > > > > +++ b/xen/arch/arm/domain_build.c > > > > @@ -1153,17 +1153,25 @@ static int __init map_range_to_domain(const > > > > struct dt_device_node *dev, > > > > struct map_range_data *mr_data = data; > > > > struct domain *d = mr_data->d; > > > > bool need_mapping = !dt_device_for_passthrough(dev); > > > > + const struct dt_device_node *parent = dt_get_parent(dev); > > > > int res; > > > > > > > > - res = iomem_permit_access(d, paddr_to_pfn(addr), > > > > - paddr_to_pfn(PAGE_ALIGN(addr + len - > > > > 1))); > > > > - if ( res ) > > > > + /* > > > > + * Don't give iomem permissions for reserved-memory ranges until > > > > + * reserved-memory support is complete. > > > > + */ > > > > + if ( dt_node_cmp(dt_node_name(parent), "reserved-memory") == 0 ) > > > Am I missing something, or you are permitting access only if it from a > > > "reserved-memory" node? This contradicts with patch description. > > > > Well spotted! I inverted the condition by mistake. > > > > > > > > { > > > > - printk(XENLOG_ERR "Unable to permit to dom%d access to" > > > > - " 0x%"PRIx64" - 0x%"PRIx64"\n", > > > > - d->domain_id, > > > > - addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1); > > > > - return res; > > > > + res = iomem_permit_access(d, paddr_to_pfn(addr), > > > > + paddr_to_pfn(PAGE_ALIGN(addr + len - > > > > 1))); > > > > + if ( res ) > > > > + { > > > > + printk(XENLOG_ERR "Unable to permit to dom%d access to" > > > > + " 0x%"PRIx64" - 0x%"PRIx64"\n", > > > > + d->domain_id, > > > > + addr & PAGE_MASK, PAGE_ALIGN(addr + len) - 1); > > > > + return res; > > > > + } > > > > } > > > > > > > > if ( need_mapping ) > > > So, this region cold be mapped, but without the access? > > IOMEM access and mapping are two different things. The former gives a domain > control over managing the region (i.e mapping, unmapping, giving access to > another domain). The latter will map the region in the P2M so the domain can > read/write into it. > > > > > I'll change it to return early from the function for reserved-memory > > regions. > > I am not sure to understand you suggestion here... You still need to have > reserved-regions mapped into the hardware domain. The only thing we want to > prevent is the domain to manage the region. I forgot that giving iomem permission to dom0 automatically means that the toolstack can give iomem permission to a domU for the same region. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |