xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: "Chen, Tiejun" <tiejun.chen@intel.com>
To: Tamas K Lengyel <tamas.k.lengyel@gmail.com>,
	Jan Beulich <JBeulich@suse.com>
Cc: Kevin Tian <kevin.tian@intel.com>,
	xen-devel@lists.xensource.com, Wei Liu <wei.liu2@citrix.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	George Dunlap <George.Dunlap@eu.citrix.com>,
	Ian Jackson <ian.jackson@eu.citrix.com>,
	Yang Zhang <yang.z.zhang@intel.com>
Subject: Re: [PATCH 15/16] xen/vtd: prevent from assign the device with shared rmrr
Date: Sun, 6 Sep 2015 10:16:09 +0800	[thread overview]
Message-ID: <55EBA1E9.5040509@intel.com> (raw)
In-Reply-To: <CABfawh=760O-zoP4a_aogRP59Mu9kKT_3GmqsSyuvcE0mMhHzQ@mail.gmail.com>

Sorry for this delay response because I was on vacation.

On 9/5/2015 5:52 AM, Tamas K Lengyel wrote:
> On Fri, Sep 4, 2015 at 2:17 AM, Jan Beulich <JBeulich@suse.com> wrote:
>
>> >>> On 03.09.15 at 21:39, <tamas.k.lengyel@gmail.com> wrote:
>> > So this change in 4.6 prevents me from passing through devices that have
>> > worked previously with VT-d:
>> >
>> > (XEN) [VT-D] cannot assign 0000:00:1a.0 with shared RMRR at ae8a9000 for
>> > Dom30.
>> > (XEN) [VT-D] cannot assign 0000:00:1d.0 with shared RMRR at ae8a9000 for
>> > Dom31.
>> >
>> > The devices are the USB 2.0 devices on a DQ67SW motherboard:
>> >
>> > 00:1a.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset
>> > Family USB Enhanced Host Controller #2 (rev 04)
>> > 00:1d.0 USB controller: Intel Corporation 6 Series/C200 Series Chipset
>> > Family USB Enhanced Host Controller #1 (rev 04)
>>
>> Please don't top post. And I'm also puzzled by you sending this to
>> Ian rather than the author.
>>
>
> Hm, I've just hit reply-all to the latest message I've found in the thread.
>
>
>>
>> Technically - Tiejun, should this perhaps be permitted in relaxed
>> mode, at least until group assignment gets implemented? (Or

I agree. What about this?

diff --git a/xen/drivers/passthrough/vtd/iommu.c 
b/xen/drivers/passthrough/vtd/iommu.c
index 836aed5..038776a 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -2310,12 +2310,16 @@ static int intel_iommu_assign_device(
               PCI_DEVFN2(bdf) == devfn &&
               rmrr->scope.devices_cnt > 1 )
          {
+            u32 relaxed = flag & XEN_DOMCTL_DEV_RDM_RELAXED;
+
              printk(XENLOG_G_ERR VTDPREFIX
-                   " cannot assign %04x:%02x:%02x.%u"
+                   " Currently its %s to assign %04x:%02x:%02x.%u"
                     " with shared RMRR at %"PRIx64" for Dom%d.\n",
+                   relaxed ? "disallowed" : "risky",
                     seg, bus, PCI_SLOT(devfn), PCI_FUNC(devfn),
                     rmrr->base_address, d->domain_id);
-            return -EPERM;
+            if ( !relaxed )
+                return -EPERM;
          }
      }


>> Tamas, do you actually mean to assign these to _different_
>> guests, considering the log fragment above?)
>>
>
> No, I actually want to assign them to the same domain. The domain creation
> fails with either of those devices specified for passthrough whether they
> are to be attached to the same domain or not.
>

Tamas, could you try this in your case?

Thanks
Tiejun

  reply	other threads:[~2015-09-06  2:16 UTC|newest]

Thread overview: 46+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-07-22 15:44 [PATCH v13 00/16] Fix RMRR (avoid RDM) Ian Jackson
2015-07-22 15:44 ` [PATCH 01/16] introduce XENMEM_reserved_device_memory_map Ian Jackson
2015-07-22 15:44 ` [PATCH 02/16] xen/vtd: create RMRR mapping Ian Jackson
2015-07-22 15:44 ` [PATCH 03/16] xen/passthrough: extend hypercall to support rdm reservation policy Ian Jackson
2015-07-23 11:45   ` Ian Jackson
2015-07-23 11:54     ` Jan Beulich
2015-07-23 11:54     ` Ian Campbell
2015-07-23 12:15     ` Chen, Tiejun
2015-07-23 12:19       ` Ian Jackson
2015-07-23 12:27         ` Ian Campbell
2015-07-23 12:40           ` Chen, Tiejun
2015-07-23 12:43           ` Ian Jackson
2015-07-22 15:44 ` [PATCH 04/16] xen: enable XENMEM_memory_map in hvm Ian Jackson
2015-07-22 15:44 ` [PATCH 05/16] hvmloader: get guest memory map into memory_map[] Ian Jackson
2015-07-22 15:44 ` [PATCH 06/16] hvmloader/pci: try to avoid placing BARs in RMRRs Ian Jackson
2015-07-22 15:44 ` [PATCH 07/16] hvmloader/e820: construct guest e820 table Ian Jackson
2015-07-22 15:44 ` [PATCH 08/16] tools/libxc: Expose new hypercall xc_reserved_device_memory_map Ian Jackson
2015-07-22 15:51   ` Wei Liu
2015-07-22 15:44 ` [PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy Ian Jackson
2015-07-22 15:44 ` [PATCH 10/16] tools: introduce some new parameters to set rdm policy Ian Jackson
2015-07-22 15:44 ` [PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM Ian Jackson
2015-07-22 15:53   ` Wei Liu
2015-07-23 11:05     ` Ian Jackson
2015-07-23  0:52   ` Chen, Tiejun
2015-07-23  7:35     ` Wei Liu
2015-07-23  7:51       ` Chen, Tiejun
2015-07-23 11:09     ` Ian Jackson
2015-07-22 15:44 ` [PATCH 12/16] tools: introduce a new parameter to set a predefined rdm boundary Ian Jackson
2015-07-22 15:44 ` [PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest Ian Jackson
2015-07-22 15:44 ` [PATCH 14/16] xen/vtd: enable USB device assignment Ian Jackson
2015-07-22 15:44 ` [PATCH 15/16] xen/vtd: prevent from assign the device with shared rmrr Ian Jackson
2015-09-03 19:39   ` Tamas K Lengyel
2015-09-04  8:17     ` Jan Beulich
2015-09-04 21:52       ` Tamas K Lengyel
2015-09-06  2:16         ` Chen, Tiejun [this message]
2015-09-06  3:19           ` Tamas K Lengyel
2015-09-06  4:19             ` Chen, Tiejun
2015-09-06  4:21               ` Tamas K Lengyel
2015-09-06 21:27               ` Wei Liu
2015-09-07  9:45               ` Jan Beulich
2015-07-22 15:44 ` [PATCH 16/16] tools: parse to enable new rdm policy parameters Ian Jackson
2015-07-22 15:51 ` [PATCH v13 00/16] Fix RMRR (avoid RDM) Ian Jackson
2015-07-23  2:15 ` Chen, Tiejun
2015-07-23 11:10   ` Ian Jackson
2015-07-23 12:53     ` Ian Jackson
2015-07-23  7:36 ` Wei Liu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55EBA1E9.5040509@intel.com \
    --to=tiejun.chen@intel.com \
    --cc=George.Dunlap@eu.citrix.com \
    --cc=JBeulich@suse.com \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=kevin.tian@intel.com \
    --cc=tamas.k.lengyel@gmail.com \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xensource.com \
    --cc=yang.z.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).