From: Andrew Cooper Date: Fri, 7 Dec 2018 13:43:27 +0000 (+0000) Subject: xen/dom0: Add a dom0-iommu=none option X-Git-Tag: archive/raspbian/4.14.0+80-gd101b417b7-1+rpi1^2~63^2~2621 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=e1fe5f9c389286b16171c632b3063bcc65cec07e;p=xen.git xen/dom0: Add a dom0-iommu=none option For development purposes, it is very convenient to boot Xen as a PVH guest, with an XTF PV or PVH "dom0". The edit-compile-go cycle is a matter of seconds, and you can reasonably insert printk() debugging in places which which would be completely infeasible when booting fully-fledged guests. However, the PVH dom0 path insists on having a working IOMMU, which doesn't exist when virtualised as a PVH guest, and isn't necessary for XTF anyway. Introduce a developer mode to skip the IOMMU requirement. Signed-off-by: Andrew Cooper Reviewed-by: Roger Pau Monné Release-acked-by: Juergen Gross Acked-by: Jan Beulich --- diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index 139c4e1d8a..6a3377519b 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -667,7 +667,7 @@ Controls for how dom0 is constructed on x86 systems. ### dom0-iommu = List of [ passthrough=, strict=, map-inclusive=, - map-reserved= ] + map-reserved=, none ] Controls for the dom0 IOMMU setup. @@ -718,6 +718,12 @@ Controls for the dom0 IOMMU setup. subset of the correction by only mapping reserved memory regions rather than all non-RAM regions. +* The `none` option is intended for development purposes only, and skips + certain safety checks pertaining to the correct IOMMU configuration for + dom0 to boot. + + Incorrect use of this option may result in a malfunctioning system. + ### dom0_ioports_disable (x86) > `= List of -` diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c index febb69393a..17c0c729a6 100644 --- a/xen/drivers/passthrough/iommu.c +++ b/xen/drivers/passthrough/iommu.c @@ -36,6 +36,7 @@ bool_t __read_mostly iommu_snoop = 1; bool_t __read_mostly iommu_qinval = 1; bool_t __read_mostly iommu_intremap = 1; +static bool __hwdom_initdata iommu_hwdom_none; bool __hwdom_initdata iommu_hwdom_strict; bool __read_mostly iommu_hwdom_passthrough; bool __hwdom_initdata iommu_hwdom_inclusive; @@ -131,6 +132,8 @@ static int __init parse_dom0_iommu_param(const char *s) iommu_hwdom_inclusive = val; else if ( (val = parse_boolean("map-reserved", s, ss)) >= 0 ) iommu_hwdom_reserved = val; + else if ( !cmdline_strcmp(s, "none") ) + iommu_hwdom_none = true; else rc = -EINVAL; @@ -159,7 +162,7 @@ int iommu_domain_init(struct domain *d) static void __hwdom_init check_hwdom_reqs(struct domain *d) { - if ( !paging_mode_translate(d) ) + if ( iommu_hwdom_none || !paging_mode_translate(d) ) return; arch_iommu_check_autotranslated_hwdom(d);