[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 2/2] AMD/IOMMU: without XT, x2APIC needs to be forced into physical mode
> From: Jan Beulich <jbeulich@xxxxxxxx> > Sent: Monday, March 9, 2020 4:59 PM > > On 28.02.2020 13:12, Jan Beulich wrote: > > The wider cluster mode APIC IDs aren't generally representable. Convert > > the iommu_intremap variable into a tristate, allowing the AMD IOMMU > > driver to signal this special restriction to the apic_x2apic_probe(). > > (Note: assignments to the variable get adjusted, while existing > > consumers - all assuming a boolean property - are left alone.) > > > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> > > Kevin, > > I see you've looked over and acked Xen patches over the weekend. Did > you miss this one? It doesn't look controversial, so it'd be nice to > have your ack, for it to go in. > > Jan It is in my list. My review process was interrupted by other tasks yesterday, and now is resumed. 😊 Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> > > > --- a/xen/arch/x86/genapic/x2apic.c > > +++ b/xen/arch/x86/genapic/x2apic.c > > @@ -236,12 +236,21 @@ const struct genapic *__init apic_x2apic > > x2apic_phys = !iommu_intremap || > > (acpi_gbl_FADT.flags & ACPI_FADT_APIC_PHYSICAL); > > } > > - else if ( !x2apic_phys && !iommu_intremap ) > > - { > > - printk("WARNING: x2APIC cluster mode is not supported without > interrupt remapping\n" > > - "x2APIC: forcing phys mode\n"); > > - x2apic_phys = true; > > - } > > + else if ( !x2apic_phys ) > > + switch ( iommu_intremap ) > > + { > > + case iommu_intremap_off: > > + case iommu_intremap_restricted: > > + printk("WARNING: x2APIC cluster mode is not supported %s > interrupt remapping\n" > > + "x2APIC: forcing phys mode\n", > > + iommu_intremap == iommu_intremap_off ? "without" > > + : "with > > restricted"); > > + x2apic_phys = true; > > + break; > > + > > + case iommu_intremap_full: > > + break; > > + } > > > > if ( x2apic_phys ) > > return &apic_x2apic_phys; > > --- a/xen/drivers/passthrough/amd/iommu_init.c > > +++ b/xen/drivers/passthrough/amd/iommu_init.c > > @@ -1139,7 +1139,7 @@ static void __init amd_iommu_init_cleanu > > > > iommu_enabled = 0; > > iommu_hwdom_passthrough = false; > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > iommuv2_enabled = 0; > > } > > > > @@ -1413,6 +1413,9 @@ int __init amd_iommu_prepare(bool xt) > > iommu->ctrl.int_cap_xt_en = xt && has_xt; > > } > > > > + if ( iommu_intremap && !has_xt ) > > + iommu_intremap = iommu_intremap_restricted; > > + > > rc = amd_iommu_update_ivrs_mapping_acpi(); > > > > error_out: > > --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c > > +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c > > @@ -157,7 +157,7 @@ int __init acpi_ivrs_init(void) > > > > if ( (amd_iommu_detect_acpi() !=0) || (iommu_found() == 0) ) > > { > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > return -ENODEV; > > } > > > > --- a/xen/drivers/passthrough/iommu.c > > +++ b/xen/drivers/passthrough/iommu.c > > @@ -35,7 +35,7 @@ bool __read_mostly iommu_quarantine = tr > > bool_t __read_mostly iommu_igfx = 1; > > bool_t __read_mostly iommu_snoop = 1; > > bool_t __read_mostly iommu_qinval = 1; > > -bool_t __read_mostly iommu_intremap = 1; > > +enum iommu_intremap __read_mostly iommu_intremap = > iommu_intremap_full; > > bool_t __read_mostly iommu_crash_disable; > > > > static bool __hwdom_initdata iommu_hwdom_none; > > @@ -91,7 +91,7 @@ static int __init parse_iommu_param(cons > > else if ( (val = parse_boolean("qinval", s, ss)) >= 0 ) > > iommu_qinval = val; > > else if ( (val = parse_boolean("intremap", s, ss)) >= 0 ) > > - iommu_intremap = val; > > + iommu_intremap = val ? iommu_intremap_full : > iommu_intremap_off; > > else if ( (val = parse_boolean("intpost", s, ss)) >= 0 ) > > iommu_intpost = val; > > #ifdef CONFIG_KEXEC > > @@ -475,7 +475,7 @@ int __init iommu_setup(void) > > iommu_enabled = (rc == 0); > > } > > if ( !iommu_enabled ) > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > > > if ( (force_iommu && !iommu_enabled) || > > (force_intremap && !iommu_intremap) ) > > @@ -557,7 +557,8 @@ void iommu_crash_shutdown(void) > > > > if ( iommu_enabled ) > > iommu_get_ops()->crash_shutdown(); > > - iommu_enabled = iommu_intremap = iommu_intpost = 0; > > + iommu_enabled = iommu_intpost = 0; > > + iommu_intremap = iommu_intremap_off; > > } > > > > int iommu_get_reserved_device_memory(iommu_grdm_t *func, void > *ctxt) > > --- a/xen/drivers/passthrough/vtd/iommu.c > > +++ b/xen/drivers/passthrough/vtd/iommu.c > > @@ -2177,7 +2177,7 @@ static int __must_check init_vtd_hw(void > > { > > if ( ioapic_to_iommu(IO_APIC_ID(apic)) == NULL ) > > { > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > dprintk(XENLOG_ERR VTDPREFIX, > > "ioapic_to_iommu: ioapic %#x (id: %#x) is NULL! " > > "Will not try to enable Interrupt Remapping.\n", > > @@ -2193,7 +2193,7 @@ static int __must_check init_vtd_hw(void > > iommu = drhd->iommu; > > if ( enable_intremap(iommu, 0) != 0 ) > > { > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > dprintk(XENLOG_WARNING VTDPREFIX, > > "Interrupt Remapping not enabled\n"); > > > > @@ -2295,7 +2295,7 @@ static int __init vtd_setup(void) > > iommu_qinval = 0; > > > > if ( iommu_intremap && !ecap_intr_remap(iommu->ecap) ) > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > > > /* > > * We cannot use posted interrupt if X86_FEATURE_CX16 is > > @@ -2320,7 +2320,7 @@ static int __init vtd_setup(void) > > > > if ( !iommu_qinval && iommu_intremap ) > > { > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > dprintk(XENLOG_WARNING VTDPREFIX, "Interrupt Remapping > disabled " > > "since Queued Invalidation isn't supported or enabled.\n"); > > } > > @@ -2347,7 +2347,7 @@ static int __init vtd_setup(void) > > iommu_snoop = 0; > > iommu_hwdom_passthrough = false; > > iommu_qinval = 0; > > - iommu_intremap = 0; > > + iommu_intremap = iommu_intremap_off; > > iommu_intpost = 0; > > return ret; > > } > > --- a/xen/include/xen/iommu.h > > +++ b/xen/include/xen/iommu.h > > @@ -54,7 +54,18 @@ static inline bool_t dfn_eq(dfn_t x, dfn > > > > extern bool_t iommu_enable, iommu_enabled; > > extern bool force_iommu, iommu_quarantine, iommu_verbose, > iommu_igfx; > > -extern bool_t iommu_snoop, iommu_qinval, iommu_intremap, > iommu_intpost; > > +extern bool_t iommu_snoop, iommu_qinval, iommu_intpost; > > +extern enum __packed iommu_intremap { > > + /* > > + * In order to allow traditional boolean uses of the iommu_intremap > > + * variable, the "off" value has to come first (yielding a value of > > zero). > > + */ > > + iommu_intremap_off, > > +#ifdef CONFIG_X86 > > + iommu_intremap_restricted, > > +#endif > > + iommu_intremap_full, > > +} iommu_intremap; > > > > #if defined(CONFIG_IOMMU_FORCE_PT_SHARE) > > #define iommu_hap_pt_share true > > > > > > _______________________________________________ > > Xen-devel mailing list > > Xen-devel@xxxxxxxxxxxxxxxxxxxx > > https://lists.xenproject.org/mailman/listinfo/xen-devel > > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |