|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/2] IOMMU/MMU: Adjust low level functions for VT-d Device-TLB flush error.
>>> On 17.03.16 at 07:54, <quan.xu@xxxxxxxxx> wrote:
> --- a/xen/drivers/passthrough/amd/iommu_init.c
> +++ b/xen/drivers/passthrough/amd/iommu_init.c
> @@ -1339,12 +1339,14 @@ static void invalidate_all_devices(void)
> iterate_ivrs_mappings(_invalidate_all_devices);
> }
>
> -void amd_iommu_suspend(void)
> +int amd_iommu_suspend(void)
> {
> struct amd_iommu *iommu;
>
> for_each_amd_iommu ( iommu )
> disable_iommu(iommu);
> +
> + return 0;
> }
>
> void amd_iommu_resume(void)
> @@ -1368,3 +1370,11 @@ void amd_iommu_resume(void)
> invalidate_all_domain_pages();
> }
> }
> +
> +void amd_iommu_crash_shutdown(void)
> +{
> + struct amd_iommu *iommu;
> +
> + for_each_amd_iommu ( iommu )
> + disable_iommu(iommu);
> +}
One of the two should clearly call the other - no need to have the
same code twice.
> --- a/xen/drivers/passthrough/iommu.c
> +++ b/xen/drivers/passthrough/iommu.c
> @@ -182,7 +182,11 @@ void __hwdom_init iommu_hwdom_init(struct domain *d)
> ((page->u.inuse.type_info & PGT_type_mask)
> == PGT_writable_page) )
> mapping |= IOMMUF_writable;
> - hd->platform_ops->map_page(d, gfn, mfn, mapping);
> + if ( hd->platform_ops->map_page(d, gfn, mfn, mapping) )
> + printk(XENLOG_G_ERR
> + "IOMMU: Map page gfn: 0x%lx(mfn: 0x%lx) failed.\n",
> + gfn, mfn);
> +
Printing one message here is certainly necessary, but what if the
failure repeats for very many pages? Also %#lx instead of 0x%lx
please, and a blank before the opening parenthesis.
> @@ -554,11 +555,24 @@ static void iommu_flush_all(void)
> iommu = drhd->iommu;
> iommu_flush_context_global(iommu, 0);
> flush_dev_iotlb = find_ats_dev_drhd(iommu) ? 1 : 0;
> - iommu_flush_iotlb_global(iommu, 0, flush_dev_iotlb);
> + rc = iommu_flush_iotlb_global(iommu, 0, flush_dev_iotlb);
> +
> + if ( rc > 0 )
> + {
> + iommu_flush_write_buffer(iommu);
Why is this needed all of the sudden? (Note that if you did a
more fine grained split, it might also be easier for you to note/
explain all the not directly related changes in the respective
commit messages. Unless of course they fix actual bugs, in
which case they should be split out anyway; such individual
fixes would also likely have a much faster route to commit,
relieving you earlier from the burden of at least some of the
changes you have to carry and re-base.)
> + rc = 0;
> + }
> + else if ( rc < 0 )
> + {
> + printk(XENLOG_G_ERR "IOMMU: IOMMU flush all failed.\n");
> + break;
> + }
Is a log message really advisable here?
> -static void __intel_iommu_iotlb_flush(struct domain *d, unsigned long gfn,
> +static int __intel_iommu_iotlb_flush(struct domain *d, unsigned long gfn,
While I'm not VT-d maintainer, I think changes like this would be a
good opportunity to also drop the stray double underscores: You
need to touch all callers anyway.
> @@ -584,37 +599,40 @@ static void __intel_iommu_iotlb_flush(struct domain *d,
> unsigned long gfn,
> continue;
>
> if ( page_count != 1 || gfn == INVALID_GFN )
> - {
> - if ( iommu_flush_iotlb_dsi(iommu, iommu_domid,
> - 0, flush_dev_iotlb) )
> - iommu_flush_write_buffer(iommu);
> - }
> + rc = iommu_flush_iotlb_dsi(iommu, iommu_domid,
> + 0, flush_dev_iotlb);
> else
> + rc = iommu_flush_iotlb_psi(iommu, iommu_domid,
> + (paddr_t)gfn << PAGE_SHIFT_4K, 0,
> + !dma_old_pte_present,
> + flush_dev_iotlb);
> + if ( rc > 0 )
> {
> - if ( iommu_flush_iotlb_psi(iommu, iommu_domid,
> - (paddr_t)gfn << PAGE_SHIFT_4K, PAGE_ORDER_4K,
Note how this used PAGE_ORDER_4K so far?
> - !dma_old_pte_present, flush_dev_iotlb) )
> - iommu_flush_write_buffer(iommu);
> + iommu_flush_write_buffer(iommu);
Same question again: Why is this all of the sudden needed on
both paths?
> @@ -622,7 +640,7 @@ static void dma_pte_clear_one(struct domain *domain, u64
> addr)
> if ( pg_maddr == 0 )
> {
> spin_unlock(&hd->arch.mapping_lock);
> - return;
> + return -ENOMEM;
> }
addr_to_dma_page_maddr() gets called with "alloc" being false, so
there can't be any memory allocation failure here. There simply is
nothing to do in this case.
> -void me_wifi_quirk(struct domain *domain, u8 bus, u8 devfn, int map)
> +int me_wifi_quirk(struct domain *domain, u8 bus, u8 devfn, int map)
> {
> u32 id;
> + int rc = 0;
>
> id = pci_conf_read32(0, 0, 0, 0, 0);
> if ( IS_CTG(id) )
> {
> /* quit if ME does not exist */
> if ( pci_conf_read32(0, 0, 3, 0, 0) == 0xffffffff )
> - return;
> + return -ENOENT;
Is this really an error? IOW, do all systems which satisfy IS_CTG()
have such a device?
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |