From patchwork Tue Jun 27 04:12:50 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Zhang, Xiong Y" X-Patchwork-Id: 9811429 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id B9EFD603D7 for ; Tue, 27 Jun 2017 11:14:55 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id AEB90283AF for ; Tue, 27 Jun 2017 11:14:55 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id A2D91285BE; Tue, 27 Jun 2017 11:14:55 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=BAYES_00, DATE_IN_PAST_06_12, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 4BA0B283AF for ; Tue, 27 Jun 2017 11:14:54 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPoPz-00075E-W8; Tue, 27 Jun 2017 11:12:27 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dPoPz-000753-GS for xen-devel@lists.xensource.com; Tue, 27 Jun 2017 11:12:27 +0000 Received: from [85.158.139.211] by server-12.bemta-5.messagelabs.com id EF/11-01735-A9D32595; Tue, 27 Jun 2017 11:12:26 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrKLMWRWlGSWpSXmKPExsVywNykQneWbVC kwZS9nBb3prxnd2D02N63iz2AMYo1My8pvyKBNePnxKiCo1wVs2Z1MTYwTuDoYuTiEBKYxiix 5mYPcxcjJ4eEAK/EkWUzWCFsf4lJN7YzgthCAlUS35f9ZwGx2QS0Jdb+PcUGYosIKEqsW/0OL M4s4Coxdcc+sDnCAhkSv27PYwexWQRUJR5f2Q5m8wq4S8yafRJqvpzEzXOdzBMYuRcwMqxi1C hOLSpLLdI1MtVLKspMzyjJTczM0TU0MNXLTS0uTkxPzUlMKtZLzs/dxAj0bj0DA+MOxl3tfoc YJTmYlER5V0sERQrxJeWnVGYkFmfEF5XmpBYfYpTh4FCS4PW2AcoJFqWmp1akZeYAwwwmLcHB oyTCW24BlOYtLkjMLc5Mh0idYlSUEud1AukTAElklObBtcFC+xKjrJQwLyMDA4MQT0FqUW5mC ar8K0ZxDkYlYV4/a6ApPJl5JXDTXwEtZgJazDIvAGRxSSJCSqqBUbN72yPGDq73hpy+hw3nNp pPVxDjWJWtEmuTrJddL2iUf83ju5m5tefWO6knn23eLZ3C8m6zSZmCwDH5uFcJfz8xTlbg+F9 XLay+ZXnuJgXxQ12C0toLOU++j1U5o5/o7vq98b6T0+dlaStytju9lbzo7Ni5mD190a2j5pfX /WkKXFi1eJueEktxRqKhFnNRcSIA6OJY/WgCAAA= X-Env-Sender: xiong.y.zhang@intel.com X-Msg-Ref: server-8.tower-206.messagelabs.com!1498561943!105132038!1 X-Originating-IP: [192.55.52.120] X-SpamReason: No, hits=0.8 required=7.0 tests=DATE_IN_PAST_06_12 X-StarScan-Received: X-StarScan-Version: 9.4.19; banners=-,-,- X-VirusChecked: Checked Received: (qmail 1827 invoked from network); 27 Jun 2017 11:12:25 -0000 Received: from mga04.intel.com (HELO mga04.intel.com) (192.55.52.120) by server-8.tower-206.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 27 Jun 2017 11:12:25 -0000 Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Jun 2017 04:12:22 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.39,399,1493708400"; d="scan'208";a="985666905" Received: from test-kbl.bj.intel.com ([10.238.158.145]) by orsmga003.jf.intel.com with ESMTP; 27 Jun 2017 04:12:20 -0700 From: Xiong Zhang To: xen-devel@lists.xensource.com Date: Tue, 27 Jun 2017 12:12:50 +0800 Message-Id: <1498536770-23566-1-git-send-email-xiong.y.zhang@intel.com> X-Mailer: git-send-email 2.7.4 Cc: Xiong Zhang , ian.jackson@eu.citrix.com Subject: [Xen-devel] [PATCH] hw/pt-graphics.c: Gave guest iomem permission for host opregion in qemu-xen-traditional X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Currently guest couldn't access host opregion when igd is passed through to guest with qemu-xen-traditional. Because guest lack of iomem permission to map guest allocated opregion pages to host opregion pages. So guest should get iomem permission for host opregion before mapping. Signed-off-by: Xiong Zhang --- hw/pt-graphics.c | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/hw/pt-graphics.c b/hw/pt-graphics.c index 7302b25..893bf12 100644 --- a/hw/pt-graphics.c +++ b/hw/pt-graphics.c @@ -78,10 +78,20 @@ void igd_write_opregion(struct pt_dev *real_dev, uint32_t val) igd_guest_opregion = (val & ~0xfff) | (host_opregion & 0xfff); PT_LOG("Map OpRegion: %x -> %x\n", host_opregion, igd_guest_opregion); + ret = xc_domain_iomem_permission(xc_handle, domid, + host_opregion >> XC_PAGE_SHIFT, 3, 1); + if (ret) + { + PT_LOG("Error[%d]: Can't enable to access IGD host opregion: 0x%x\n", + ret, host_opregion >> XC_PAGE_SHIFT); + igd_guest_opregion = 0; + return; + } + ret = xc_domain_memory_mapping(xc_handle, domid, igd_guest_opregion >> XC_PAGE_SHIFT, host_opregion >> XC_PAGE_SHIFT, - 2, + 3, DPCI_ADD_MAPPING); if ( ret != 0 )