From: Andrew Cooper <andrew.cooper3@citrix.com>
To: David Vrabel <david.vrabel@citrix.com>,
Xen-devel <xen-devel@lists.xen.org>
Cc: Yang Zhang <yang.z.zhang@intel.com>, Kevin Tian <kevin.tian@intel.com>
Subject: Re: [PATCH] VTd/dmar: Tweak how the DMAR table is clobbered
Date: Thu, 9 Apr 2015 10:48:36 +0100 [thread overview]
Message-ID: <55264AF4.9090207@citrix.com> (raw)
In-Reply-To: <55263D7C.6030308@citrix.com>
On 09/04/15 09:51, David Vrabel wrote:
> On 08/04/15 20:44, Andrew Cooper wrote:
>> Intead of clobbering DMAR -> XMAR and back, clobber to RMAD instead. This
>> means that changing the signature does not alter the checksum, which allows
>> the clobbering/unclobbering to be peformed atomically and idempotently, which
>> is an advantage on the kexec path which can reenter acpi_dmar_reinstate().
> Could RMAD be specified as a real table in the future? Does the
> clobbered name have to start with X to avoid future conflicts?
>
> David
I am not aware of any restrictions imposed by the APCI spec. Any
clobbered signature is potentially a real table in the future.
This DMAR clobbering was introduced by
83904107a33c9badc34ecdd1f8ca0f9271e5e370 which claims that the dom0 VT-d
driver was capable of playing with the IOMMU(s) while Xen was also using
them. An alternative approach might be to leave the DMAR table alone
and sprinkle some iomem_deny_access() around to forcibly prevent dom0
from playing.
~Andrew
next prev parent reply other threads:[~2015-04-09 9:48 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-04-08 19:44 [PATCH] VTd/dmar: Tweak how the DMAR table is clobbered Andrew Cooper
2015-04-09 8:51 ` David Vrabel
2015-04-09 9:48 ` Andrew Cooper [this message]
2015-04-10 1:23 ` Tian, Kevin
2015-04-10 9:08 ` Andrew Cooper
2015-04-14 7:50 ` Jan Beulich
2015-04-14 9:09 ` Andrew Cooper
2015-04-16 16:44 ` Tian, Kevin
2015-04-17 6:32 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=55264AF4.9090207@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=david.vrabel@citrix.com \
--cc=kevin.tian@intel.com \
--cc=xen-devel@lists.xen.org \
--cc=yang.z.zhang@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.