[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v7 2/2] VT-d: Fix vt-d Device-TLB flush timeout issue
> From: Xu, Quan > Sent: Thursday, March 17, 2016 3:13 PM > diff --git a/xen/drivers/passthrough/vtd/qinval.c > b/xen/drivers/passthrough/vtd/qinval.c > index 37a15fb..2a5c638 100644 > --- a/xen/drivers/passthrough/vtd/qinval.c > +++ b/xen/drivers/passthrough/vtd/qinval.c > @@ -233,6 +233,57 @@ int qinval_device_iotlb(struct iommu *iommu, > return 0; > } > > +static void dev_invalidate_iotlb_timeout(struct iommu *iommu, u16 did, > + u16 seg, u8 bus, u8 devfn) > +{ > + struct domain *d = NULL; > + struct pci_dev *pdev; > + > + if ( test_bit(did, iommu->domid_bitmap) ) > + d = rcu_lock_domain_by_id(iommu->domid_map[did]); > + > + if ( d == NULL ) > + return; > + > + pcidevs_lock(); > + for_each_pdev(d, pdev) we need a 'safe' version here since you're deleting nodes when walking list. for_each_pdev today is based on list_for_each_entry. Or if it's sure that only one pdev can match, we can break out of the loop to do removal. > + { > + if ( ( pdev->seg == seg ) && > + ( pdev->bus == bus ) && > + ( pdev->devfn == devfn ) ) > + { > + ASSERT ( pdev->domain ); > + list_del(&pdev->domain_list); > + pdev->domain = NULL; > + pci_hide_existing_device(pdev); > + break; > + } > + } > + > + pcidevs_unlock(); > + > + if ( !is_hardware_domain(d) ) > + domain_crash(d); > + > + rcu_unlock_domain(d); > +} > + > +int dev_invalidate_iotlb_sync(struct iommu *iommu, u16 did, > + u16 seg, u8 bus, u8 devfn) > +{ > + struct qi_ctrl *qi_ctrl = iommu_qi_ctrl(iommu); > + int rc = 0; > + > + if ( qi_ctrl->qinval_maddr ) > + { > + rc = queue_invalidate_wait(iommu, 0, 1, 1); > + if ( rc == -ETIMEDOUT ) > + dev_invalidate_iotlb_timeout(iommu, did, seg, bus, devfn); > + } > + > + return rc; > +} > + Is this function a temporary one which will be removed later once we can handle timeout for all types of flushes (at that time suppose this logic will be reflected in invalidate_sync directly)? > static void queue_invalidate_iec(struct iommu *iommu, u8 granu, u8 im, u16 > iidx) > { > unsigned long flags; > @@ -342,8 +393,6 @@ static int flush_iotlb_qi( > > if ( qi_ctrl->qinval_maddr != 0 ) > { > - int rc; > - > /* use queued invalidation */ > if (cap_write_drain(iommu->cap)) > dw = 1; > @@ -353,11 +402,17 @@ static int flush_iotlb_qi( > queue_invalidate_iotlb(iommu, > type >> DMA_TLB_FLUSH_GRANU_OFFSET, dr, > dw, did, size_order, 0, addr); > + > + /* > + * Before Device-TLB invalidation we need to synchronize > + * invalidation completions with hardware. > + */ > + ret = invalidate_sync(iommu); > + if ( ret ) > + return ret; > + > if ( flush_dev_iotlb ) > ret = dev_invalidate_iotlb(iommu, did, addr, size_order, type); > - rc = invalidate_sync(iommu); > - if ( !ret ) > - ret = rc; Current change looks not consistent. For IOMMU iotlb flush, we have invalidate_sync out of invalidate operation, however below... > } > return ret; > } > diff --git a/xen/drivers/passthrough/vtd/x86/ats.c > b/xen/drivers/passthrough/vtd/x86/ats.c > index 334b9c1..c87ffe3 100644 > --- a/xen/drivers/passthrough/vtd/x86/ats.c > +++ b/xen/drivers/passthrough/vtd/x86/ats.c > @@ -162,6 +162,18 @@ int dev_invalidate_iotlb(struct iommu *iommu, u16 did, > return -EOPNOTSUPP; > } > > + /* > + * Synchronize with hardware for Device-TLB invalidate > + * descriptor. > + */ > + rc = dev_invalidate_iotlb_sync(iommu, did, pdev->seg, > + pdev->bus, pdev->devfn); > + if ( rc ) > + printk(XENLOG_ERR > + "Flush error %d on device %04x:%02x:%02x.%u.\n", > + ret, pdev->seg, pdev->bus, PCI_SLOT(pdev->devfn), > + PCI_FUNC(pdev->devfn)); > + > if ( !ret ) for device iotlb flush, you moved the invalidate_sync inside the invalidate operation. If this is only temporary as I guessed earlier, is it clearer to change like below: > @@ -353,11 +402,17 @@ static int flush_iotlb_qi( queue_invalidate_iotlb(iommu, type >> DMA_TLB_FLUSH_GRANU_OFFSET, dr, dw, did, size_order, 0, addr); /* * Before Device-TLB invalidation we need to synchronize * invalidation completions with hardware. * TODO: timeout error handling to be added later */ ret = invalidate_sync(iommu); if ( ret ) return ret; if ( flush_dev_iotlb ) ret = dev_invalidate_iotlb(iommu, did, addr, size_order, type); rc = invalidate_sync(iommu); if ( rc == -ETIMEDOUT ) dev_invalidate_iotlb_timeout(iommu, did, seg, bus, devfn); if ( !ret ) ret = rc; This way later when we have invalidate_sync handling timeout error for all types of flushes, above two lines of timeout handling can be removed. Thanks Kevin _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |