[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v4 0/3] VT-d Device-TLB flush issue
This patches are based on Kevin Tian's previous discussion 'Revisit VT-d asynchronous flush issue'. Fix current timeout concern and also allow limited ATS support in a light way: 1. Check VT-d Device-TLB flush error. This patch checks all kinds of error and all the way up the call trees of VT-d Device-TLB flush. 2. Reduce spin timeout to 1ms, which can be boot-time changed with 'iommu_qi_timeout_ms'. For example: multiboot /boot/xen.gz ats=1 iommu_qi_timeout_ms=100 3. Fix vt-d Device-TLB flush timeout issue. Now if IOTLB/Context/IETC flush is timeout, panic hypervisor. The coming patch set will fix it. If Device-TLB flush is timeout, we'll hide the target ATS device and crash the domain owning this ATS device. If impacted domain is hardware domain, just throw out a warning. The hided Device will be disallowed to be further assigned to any domain. -- * DMAR_OPERATION_TIMEOUT should be also chopped down to a low number of milliseconds. As Kevin Tian mentioned in 'Revisit VT-d asynchronous flush issue', We also confirmed with hardware team that 1ms is large enough for IOMMU internal flush. So I can change DMAR_OPERATION_TIMEOUT from 1000 ms to 1 ms. IOMMU_WAIT_OP() is only for VT-d registers read/write, and there is also a panic. We need a further discussion whether or how to remove this panic in next patch set. * if IOTLB/Context/IETC flush is timeout, panic hypervisor. The coming patch set will fix it. Quan Xu (3): VT-d: Check VT-d Device-TLB flush error. VT-d: Reduce spin timeout to 1ms, which can be boot-time changed. VT-d: Fix vt-d Device-TLB flush timeout issue. xen/arch/x86/acpi/power.c | 8 +- xen/arch/x86/crash.c | 3 +- xen/arch/x86/domain_build.c | 5 +- xen/arch/x86/mm.c | 15 ++- xen/arch/x86/mm/p2m-ept.c | 14 ++- xen/arch/x86/mm/p2m-pt.c | 14 ++- xen/arch/x86/mm/p2m.c | 19 +++- xen/arch/x86/x86_64/mm.c | 7 +- xen/common/domain.c | 3 +- xen/common/grant_table.c | 5 +- xen/common/memory.c | 13 ++- xen/drivers/passthrough/amd/iommu_init.c | 4 +- xen/drivers/passthrough/amd/pci_amd_iommu.c | 4 +- xen/drivers/passthrough/arm/smmu.c | 13 ++- xen/drivers/passthrough/iommu.c | 47 +++++--- xen/drivers/passthrough/pci.c | 2 +- xen/drivers/passthrough/vtd/extern.h | 6 +- xen/drivers/passthrough/vtd/iommu.c | 157 ++++++++++++++++++++------ xen/drivers/passthrough/vtd/qinval.c | 93 ++++++++++++++- xen/drivers/passthrough/vtd/quirks.c | 26 +++-- xen/drivers/passthrough/vtd/x86/ats.c | 13 +++ xen/drivers/passthrough/vtd/x86/vtd.c | 13 ++- xen/drivers/passthrough/x86/iommu.c | 6 +- xen/include/asm-x86/hvm/svm/amd-iommu-proto.h | 4 +- xen/include/asm-x86/iommu.h | 2 +- xen/include/xen/iommu.h | 20 ++-- 26 files changed, 403 insertions(+), 113 deletions(-) -- 1.9.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |