|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 03/10] IOMMU/MMU: enhance the call trees of IOMMU unmapping and mapping
On May 04, 2016 4:41 PM, Jan Beulich <JBeulich@xxxxxxxx> wrote:
> >>> On 04.05.16 at 03:45, <kevin.tian@xxxxxxxxx> wrote:
> >> From: Xu, Quan
> >> Sent: Friday, April 29, 2016 5:25 PM
> >> --- a/xen/arch/x86/mm.c
> >> +++ b/xen/arch/x86/mm.c
> >> @@ -2467,7 +2467,7 @@ static int __get_page_type(struct page_info
> >> *page, unsigned long type,
> >> int preemptible) {
> >> unsigned long nx, x, y = page->u.inuse.type_info;
> >> - int rc = 0;
> >> + int rc = 0, ret = 0;
> >>
> >> ASSERT(!(type & ~(PGT_type_mask | PGT_pae_xen_l2)));
> >>
> >> @@ -2578,11 +2578,11 @@ static int __get_page_type(struct page_info
> >> *page, unsigned long type,
> >> if ( d && is_pv_domain(d) && unlikely(need_iommu(d)) )
> >> {
> >> if ( (x & PGT_type_mask) == PGT_writable_page )
> >> - iommu_unmap_page(d, mfn_to_gmfn(d, page_to_mfn(page)));
> >> + ret = iommu_unmap_page(d, mfn_to_gmfn(d,
> >> + page_to_mfn(page)));
> >> else if ( type == PGT_writable_page )
> >> - iommu_map_page(d, mfn_to_gmfn(d, page_to_mfn(page)),
> >> - page_to_mfn(page),
> >> - IOMMUF_readable|IOMMUF_writable);
> >> + ret = iommu_map_page(d, mfn_to_gmfn(d, page_to_mfn(page)),
> >> + page_to_mfn(page),
> >> +
> >> + IOMMUF_readable|IOMMUF_writable);
> >> }
> >> }
> >>
> >> @@ -2599,6 +2599,9 @@ static int __get_page_type(struct page_info
> >> *page, unsigned long type,
> >> if ( (x & PGT_partial) && !(nx & PGT_partial) )
> >> put_page(page);
> >>
> >> + if ( !rc )
> >> + rc = ret;
> >> +
> >> return rc;
> >> }
> >
> > I know there were quite some discussions before around above change
> > (sorry I didn't remember all of them). Just based on mental picture we
> > should return error where it firstly occurs. However above change
> > looks favoring errors in later "rc = alloc_page_type" over earlier
> > iommu_map/unmap_page error. Is it what we want?
>
> Yes, as that's the primary operation here.
>
> > If there is a reason that we cannot return immediately upon
> > iommu_map/unmap,
>
> Since for Dom0 we don't call domain_crash(), we must not bypass
> alloc_page_type() here. And even for DomU it would seem at least fragile if we
> did - we better don't alter the refcounting behavior.
>
A little bit confused.
Check it, for this __get_page_type(), can I leave my modification as is?
> >> --- a/xen/arch/x86/mm/p2m-ept.c
> >> +++ b/xen/arch/x86/mm/p2m-ept.c
> >> @@ -821,6 +821,8 @@ out:
> >> if ( needs_sync )
> >> ept_sync_domain(p2m);
> >>
> >> + ret = 0;
> >> +
> >> /* For host p2m, may need to change VT-d page table.*/
> >> if ( rc == 0 && p2m_is_hostp2m(p2m) && need_iommu(d) &&
> >> need_modify_vtd_table )
> >> @@ -831,11 +833,29 @@ out:
> >> {
> >> if ( iommu_flags )
> >> for ( i = 0; i < (1 << order); i++ )
> >> - iommu_map_page(d, gfn + i, mfn_x(mfn) + i,
> >> iommu_flags);
> >> + {
> >> + rc = iommu_map_page(d, gfn + i, mfn_x(mfn) + i,
> >> + iommu_flags);
> >> +
> >> + if ( !ret && unlikely(rc) )
> >
> > I think you should move check of ret before iommu_map_page, since we
> > should stop map against any error (either from best-effort unmap error
> side).
>
> Considering ret getting set to zero ahead of the loop plus ...
>
> >> + {
> >> + while ( i-- )
> >> + iommu_unmap_page(d, gfn + i);
> >> +
> >> + ret = rc;
> >> + break;
>
> ... this, it looks to me as if the checking of ret above is simply
> unnecessary.
>
Make sense. I'll drop ret check.
Quan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |