|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen stable-4.12] VT-d: drop ownership checking from domain_context_mapping_one()
commit 243ed3a1b690b81d16ccab07d9bcbc480f73e102
Author: Jan Beulich <jbeulich@xxxxxxxx>
AuthorDate: Tue Apr 5 15:37:26 2022 +0200
Commit: Jan Beulich <jbeulich@xxxxxxxx>
CommitDate: Tue Apr 5 15:37:26 2022 +0200
VT-d: drop ownership checking from domain_context_mapping_one()
Despite putting in quite a bit of effort it was not possible to
establish why exactly this code exists (beyond possibly sanity
checking). Instead of a subsequent change further complicating this
logic, simply get rid of it.
Take the opportunity and move the respective unmap_vtd_domain_page() out
of the locked region.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Reviewed-by: Paul Durrant <paul@xxxxxxx>
Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx>
master commit: a680b8134b2d1828bbbf443a97feea66e8a85c75
master date: 2022-04-05 14:17:21 +0200
---
xen/drivers/passthrough/vtd/iommu.c | 66 ++-----------------------------------
1 file changed, 2 insertions(+), 64 deletions(-)
diff --git a/xen/drivers/passthrough/vtd/iommu.c
b/xen/drivers/passthrough/vtd/iommu.c
index 86cdd60886..d046b9a7dd 100644
--- a/xen/drivers/passthrough/vtd/iommu.c
+++ b/xen/drivers/passthrough/vtd/iommu.c
@@ -112,28 +112,6 @@ static int context_set_domain_id(struct context_entry
*context,
return 0;
}
-static int context_get_domain_id(struct context_entry *context,
- struct iommu *iommu)
-{
- unsigned long dom_index, nr_dom;
- int domid = -1;
-
- if (iommu && context)
- {
- nr_dom = cap_ndoms(iommu->cap);
-
- dom_index = context_domain_id(*context);
-
- if ( dom_index < nr_dom && iommu->domid_map )
- domid = iommu->domid_map[dom_index];
- else
- dprintk(XENLOG_DEBUG VTDPREFIX,
- "dom_index %lu exceeds nr_dom %lu or iommu has no
domid_map\n",
- dom_index, nr_dom);
- }
- return domid;
-}
-
static struct intel_iommu *__init alloc_intel_iommu(void)
{
struct intel_iommu *intel;
@@ -1433,49 +1411,9 @@ int domain_context_mapping_one(
if ( context_present(*context) )
{
- int res = 0;
-
- /* Try to get domain ownership from device structure. If that's
- * not available, try to read it from the context itself. */
- if ( pdev )
- {
- if ( pdev->domain != domain )
- {
- printk(XENLOG_G_INFO VTDPREFIX
- "d%d: %04x:%02x:%02x.%u owned by d%d!",
- domain->domain_id,
- seg, bus, PCI_SLOT(devfn), PCI_FUNC(devfn),
- pdev->domain ? pdev->domain->domain_id : -1);
- res = -EINVAL;
- }
- }
- else
- {
- int cdomain;
- cdomain = context_get_domain_id(context, iommu);
-
- if ( cdomain < 0 )
- {
- printk(XENLOG_G_WARNING VTDPREFIX
- "d%d: %04x:%02x:%02x.%u mapped, but can't find
owner!\n",
- domain->domain_id,
- seg, bus, PCI_SLOT(devfn), PCI_FUNC(devfn));
- res = -EINVAL;
- }
- else if ( cdomain != domain->domain_id )
- {
- printk(XENLOG_G_INFO VTDPREFIX
- "d%d: %04x:%02x:%02x.%u already mapped to d%d!",
- domain->domain_id,
- seg, bus, PCI_SLOT(devfn), PCI_FUNC(devfn),
- cdomain);
- res = -EINVAL;
- }
- }
-
- unmap_vtd_domain_page(context_entries);
spin_unlock(&iommu->lock);
- return res;
+ unmap_vtd_domain_page(context_entries);
+ return 0;
}
if ( iommu_hwdom_passthrough && is_hardware_domain(domain) )
--
generated by git-patchbot for /home/xen/git/xen.git#stable-4.12
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |