From mboxrd@z Thu Jan 1 00:00:00 1970 From: Julien Grall Subject: Re: [PATCH v3 4/5] tools, libxl: parse optional start gfn from the iomem config option Date: Mon, 17 Mar 2014 12:24:19 +0000 Message-ID: <5326E973.70903@linaro.org> References: <1394914286-29713-1-git-send-email-avanzini.arianna@gmail.com> <1394914286-29713-5-git-send-email-avanzini.arianna@gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1394914286-29713-5-git-send-email-avanzini.arianna@gmail.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Arianna Avanzini Cc: julien.grall@citrix.com, paolo.valente@unimore.it, keir@xen.org, stefano.stabellini@eu.citrix.com, tim@xen.org, dario.faggioli@citrix.com, Ian.Jackson@eu.citrix.com, xen-devel@lists.xen.org, Ian.Campbell@eu.citrix.com, etrudeau@broadcom.com, JBeulich@suse.com, viktor.kleinik@globallogic.com List-Id: xen-devel@lists.xenproject.org Hello Arianna, Few other comments on this patch :) On 03/15/2014 08:11 PM, Arianna Avanzini wrote: > diff --git a/docs/man/xl.cfg.pod.5 b/docs/man/xl.cfg.pod.5 > index a6663b9..d9684f2 100644 > --- a/docs/man/xl.cfg.pod.5 > +++ b/docs/man/xl.cfg.pod.5 > @@ -602,12 +602,13 @@ is given in hexadecimal and may either a span e.g. C<2f8-2ff> > It is recommended to use this option only for trusted VMs under > administrator control. > > -=item B > +=item B > > Allow guest to access specific hardware I/O memory pages. B > is a physical page number. B is the number > -of pages beginning with B to allow access. Both values > -must be given in hexadecimal. > +of pages beginning with B to allow access. B specifies > +the guest frame number where the mapping will start in the domU's > +address space. All of these values must be given in hexadecimal. I'm wondering if we should add something about IOMMU. On ARM (I don't know for x86), the IOMMU won't be updated. That would mean every device protected by an IOMMU *should not* be passthrough via "iomem" parameter. Regards, -- Julien Grall