|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] IOMMU: don't BUG() on exotic hardware
On x86, iommu_get_ops() BUG()s when running on non-Intel, non-AMD
hardware. While, with our current code, that's a correct prerequisite
assumption for IOMMU presence, this is wrong on systems without IOMMU.
Hence iommu_enabled (and alike) checks should be done prior to calling
that function, not after.
Also move iommu_suspend() next to iommu_resume() - it escapes me why
iommu_do_domctl() had got put between the two.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -337,11 +337,16 @@ int __init iommu_setup(void)
return rc;
}
+void iommu_suspend()
+{
+ if ( iommu_enabled )
+ iommu_get_ops()->suspend();
+}
+
void iommu_resume()
{
- const struct iommu_ops *ops = iommu_get_ops();
if ( iommu_enabled )
- ops->resume();
+ iommu_get_ops()->resume();
}
int iommu_do_domctl(
@@ -365,34 +370,28 @@ int iommu_do_domctl(
return ret;
}
-void iommu_suspend()
-{
- const struct iommu_ops *ops = iommu_get_ops();
- if ( iommu_enabled )
- ops->suspend();
-}
-
void iommu_share_p2m_table(struct domain* d)
{
- const struct iommu_ops *ops = iommu_get_ops();
-
if ( iommu_enabled && iommu_use_hap_pt(d) )
- ops->share_p2m(d);
+ iommu_get_ops()->share_p2m(d);
}
void iommu_crash_shutdown(void)
{
- const struct iommu_ops *ops = iommu_get_ops();
if ( iommu_enabled )
- ops->crash_shutdown();
+ iommu_get_ops()->crash_shutdown();
iommu_enabled = iommu_intremap = iommu_intpost = 0;
}
int iommu_get_reserved_device_memory(iommu_grdm_t *func, void *ctxt)
{
- const struct iommu_ops *ops = iommu_get_ops();
+ const struct iommu_ops *ops;
+
+ if ( !iommu_enabled )
+ return 0;
- if ( !iommu_enabled || !ops->get_reserved_device_memory )
+ ops = iommu_get_ops();
+ if ( !ops->get_reserved_device_memory )
return 0;
return ops->get_reserved_device_memory(func, ctxt);
--- a/xen/drivers/passthrough/pci.c
+++ b/xen/drivers/passthrough/pci.c
@@ -1241,16 +1241,15 @@ __initcall(setup_dump_pcidevs);
int iommu_update_ire_from_msi(
struct msi_desc *msi_desc, struct msi_msg *msg)
{
- const struct iommu_ops *ops = iommu_get_ops();
- return iommu_intremap ? ops->update_ire_from_msi(msi_desc, msg) : 0;
+ return iommu_intremap
+ ? iommu_get_ops()->update_ire_from_msi(msi_desc, msg) : 0;
}
void iommu_read_msi_from_ire(
struct msi_desc *msi_desc, struct msi_msg *msg)
{
- const struct iommu_ops *ops = iommu_get_ops();
if ( iommu_intremap )
- ops->read_msi_from_ire(msi_desc, msg);
+ iommu_get_ops()->read_msi_from_ire(msi_desc, msg);
}
int iommu_add_device(struct pci_dev *pdev)
Attachment:
IOMMU-defer-get-ops.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |