|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] AMD/IOMMU: introduce a "valid" flag for IVRS mappings
commit 34c0dcf84ff6347424808d2740398c892b8ff8e4
Author: Jan Beulich <jbeulich@xxxxxxxx>
AuthorDate: Tue Sep 17 16:05:01 2019 +0200
Commit: Jan Beulich <jbeulich@xxxxxxxx>
CommitDate: Tue Sep 17 16:05:01 2019 +0200
AMD/IOMMU: introduce a "valid" flag for IVRS mappings
For us to no longer blindly allocate interrupt remapping tables for
everything the ACPI tables name, we can't use struct ivrs_mappings'
intremap_table field anymore to also have the meaning of "this entry
is valid". Add a separate boolean field instead.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
xen/drivers/passthrough/amd/iommu_acpi.c | 2 ++
xen/drivers/passthrough/amd/iommu_init.c | 10 +++++-----
xen/drivers/passthrough/amd/pci_amd_iommu.c | 7 +++----
xen/include/asm-x86/amd-iommu.h | 1 +
4 files changed, 11 insertions(+), 9 deletions(-)
diff --git a/xen/drivers/passthrough/amd/iommu_acpi.c
b/xen/drivers/passthrough/amd/iommu_acpi.c
index 668a9805ef..197f3e6403 100644
--- a/xen/drivers/passthrough/amd/iommu_acpi.c
+++ b/xen/drivers/passthrough/amd/iommu_acpi.c
@@ -88,6 +88,8 @@ static void __init add_ivrs_mapping_entry(
}
}
+ ivrs_mappings[alias_id].valid = true;
+
/* Assign IOMMU hardware. */
ivrs_mappings[bdf].iommu = iommu;
}
diff --git a/xen/drivers/passthrough/amd/iommu_init.c
b/xen/drivers/passthrough/amd/iommu_init.c
index df7dded939..d6a5cf2e4a 100644
--- a/xen/drivers/passthrough/amd/iommu_init.c
+++ b/xen/drivers/passthrough/amd/iommu_init.c
@@ -1241,7 +1241,6 @@ static int __init amd_iommu_setup_device_table(
u16 seg, struct ivrs_mappings *ivrs_mappings)
{
unsigned int bdf;
- void *intr_tb, *dte;
BUG_ON( (ivrs_bdf_entries == 0) );
@@ -1261,16 +1260,17 @@ static int __init amd_iommu_setup_device_table(
/* Add device table entries */
for ( bdf = 0; bdf < ivrs_bdf_entries; bdf++ )
{
- intr_tb = ivrs_mappings[bdf].intremap_table;
-
- if ( intr_tb )
+ if ( ivrs_mappings[bdf].valid )
{
+ void *dte;
+
/* add device table entry */
dte = device_table.buffer + (bdf * IOMMU_DEV_TABLE_ENTRY_SIZE);
iommu_dte_add_device_entry(dte, &ivrs_mappings[bdf]);
amd_iommu_set_intremap_table(
- dte, (u64)virt_to_maddr(intr_tb), iommu_intremap);
+ dte, virt_to_maddr(ivrs_mappings[bdf].intremap_table),
+ iommu_intremap);
}
}
diff --git a/xen/drivers/passthrough/amd/pci_amd_iommu.c
b/xen/drivers/passthrough/amd/pci_amd_iommu.c
index 8d4a5fbc37..465a49798d 100644
--- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
+++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
@@ -69,8 +69,8 @@ struct amd_iommu *find_iommu_for_device(int seg, int bdf)
* table and I/O page table respectively. Such devices will have
* both alias entry and select entry in IVRS structure.
*
- * Return original device id, if device has valid interrupt remapping
- * table setup for both select entry and alias entry.
+ * Return original device id if both the specific entry and the alias entry
+ * have been marked valid.
*/
int get_dma_requestor_id(uint16_t seg, uint16_t bdf)
{
@@ -79,8 +79,7 @@ int get_dma_requestor_id(uint16_t seg, uint16_t bdf)
BUG_ON ( bdf >= ivrs_bdf_entries );
req_id = ivrs_mappings[bdf].dte_requestor_id;
- if ( (ivrs_mappings[bdf].intremap_table != NULL) &&
- (ivrs_mappings[req_id].intremap_table != NULL) )
+ if ( ivrs_mappings[bdf].valid && ivrs_mappings[req_id].valid )
req_id = bdf;
return req_id;
diff --git a/xen/include/asm-x86/amd-iommu.h b/xen/include/asm-x86/amd-iommu.h
index 951a012565..1ca6735a25 100644
--- a/xen/include/asm-x86/amd-iommu.h
+++ b/xen/include/asm-x86/amd-iommu.h
@@ -111,6 +111,7 @@ struct ivrs_mappings {
u8 unity_map_enable;
u8 write_permission;
u8 read_permission;
+ bool valid;
unsigned long addr_range_start;
unsigned long addr_range_length;
struct amd_iommu *iommu;
--
generated by git-patchbot for /home/xen/git/xen.git#staging
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/xen-changelog
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |