All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dario Faggioli <dario.faggioli@citrix.com>
To: Eric Trudeau <etrudeau@broadcom.com>
Cc: "paolo.valente@unimore.it" <paolo.valente@unimore.it>,
	Ian Campbell <Ian.Campbell@citrix.com>,
	"stefano.stabellini@eu.citrix.com"
	<stefano.stabellini@eu.citrix.com>,
	Julien Grall <julien.grall@linaro.org>, Tim Deegan <tim@xen.org>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>,
	"julien.grall@citrix.com" <julien.grall@citrix.com>,
	Arianna Avanzini <avanzini.arianna@gmail.com>,
	"viktor.kleinik@globallogic.com" <viktor.kleinik@globallogic.com>
Subject: Re: [RFC PATCH 2/3] arch, arm32: add the XEN_DOMCTL_memory_mapping hypercall
Date: Mon, 3 Mar 2014 17:35:05 +0100	[thread overview]
Message-ID: <1393864505.4058.119.camel@Solace> (raw)
In-Reply-To: <FF3E5629F9FF6745ADE4EE690CEC81AD2ADBD030@SJEXCHMB09.corp.ad.broadcom.com>


[-- Attachment #1.1: Type: text/plain, Size: 1644 bytes --]

On lun, 2014-03-03 at 16:25 +0000, Eric Trudeau wrote:

> > > Right. FTR, xen/arch/x86/domain_build.c, has this (also in
> > > construct_dom0):
> > >
> > >      /* DOM0 is permitted full I/O capabilities. */
> > >      rc |= ioports_permit_access(dom0, 0, 0xFFFF);
> > >      rc |= iomem_permit_access(dom0, 0UL, ~0UL);
> > >      rc |= irqs_permit_access(dom0, 1, nr_irqs_gsi - 1);
> > >
> > > Do you want a patch to that/similar effect?
> > 
> > Yes. Maybe a bit more smarter than permitting full I/0 caps for dom0.
> > 
> 
> Our implementation does not require Dom0 access permission in order
> for it to grant access permission to a DomU.  I suppose it wouldn't hurt
> for iomem_permit_access because we allow iomem regions to be mapped
> into multiple domains; however, I think the irqs_permit_access call keeps
> multiple domains from "owning" the same IRQ.  I might be wrong about that.
> 
As far as I understood it, it is not required here either. And in fact,
such permission is not there, and things works for Arianna too.

However, it seemed a sane check to have in place (e.g., the x86
implementation does check for that), that's why she's trying to
introduce it properly. :-)

After all, as far as I remember, you do have something like this:

    if ( current->domain->domain_id != 0 )
        break;

don't you?

Regards,
Dario

-- 
<<This happens because I choose it to happen!>> (Raistlin Majere)
-----------------------------------------------------------------
Dario Faggioli, Ph.D, http://about.me/dario.faggioli
Senior Software Engineer, Citrix Systems R&D Ltd., Cambridge (UK)


[-- Attachment #1.2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 198 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

  reply	other threads:[~2014-03-03 16:35 UTC|newest]

Thread overview: 33+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-02  0:49 [RFC PATCH 0/3] Implement the XEN_DOMCTL_memory_mapping hypecall for arm32 Arianna Avanzini
2014-03-02  0:49 ` [RFC PATCH 1/3] arch, arm32: add definition of paddr_bits Arianna Avanzini
2014-03-02  8:13   ` Julien Grall
2014-03-07  0:36     ` Arianna Avanzini
2014-03-02  0:49 ` [RFC PATCH 2/3] arch, arm32: add the XEN_DOMCTL_memory_mapping hypercall Arianna Avanzini
2014-03-02  9:56   ` Julien Grall
2014-03-03 11:56     ` Dario Faggioli
2014-03-03 15:20       ` Julien Grall
2014-03-03 15:33         ` Dario Faggioli
2014-03-04  2:42           ` Julien Grall
2014-03-07  0:47             ` Arianna Avanzini
2014-03-03 16:25         ` Eric Trudeau
2014-03-03 16:35           ` Dario Faggioli [this message]
2014-03-03 19:04             ` Eric Trudeau
2014-03-05 13:59     ` Arianna Avanzini
2014-03-06  3:41       ` Julien Grall
2014-03-07  0:57         ` Arianna Avanzini
2014-03-03 18:06   ` Eric Trudeau
2014-03-04  3:08     ` Julien Grall
2014-03-07  0:56       ` Arianna Avanzini
2014-03-07  3:41         ` Julien Grall
2014-03-07 19:49           ` Arianna Avanzini
2014-03-02  0:49 ` [RFC PATCH 3/3] tools, libxl: handle the iomem parameter with the memory_mapping hcall Arianna Avanzini
2014-03-02 10:33   ` Julien Grall
2014-03-02 11:27     ` Ian Campbell
2014-03-03 10:32       ` Dario Faggioli
2014-03-03 15:13         ` Julien Grall
2014-03-07  0:45           ` Arianna Avanzini
2014-03-07  4:03             ` Julien Grall
2014-03-07 19:54               ` Arianna Avanzini
2014-03-03 11:19     ` Dario Faggioli
2014-03-07  4:05       ` Julien Grall
2014-03-02  8:13 ` [RFC PATCH 0/3] Implement the XEN_DOMCTL_memory_mapping hypecall for arm32 Julien Grall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1393864505.4058.119.camel@Solace \
    --to=dario.faggioli@citrix.com \
    --cc=Ian.Campbell@citrix.com \
    --cc=avanzini.arianna@gmail.com \
    --cc=etrudeau@broadcom.com \
    --cc=julien.grall@citrix.com \
    --cc=julien.grall@linaro.org \
    --cc=paolo.valente@unimore.it \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=tim@xen.org \
    --cc=viktor.kleinik@globallogic.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.