[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v12 0/6] VT-d Device-TLB flush issue
From: Quan Xu <quan.xu@xxxxxxxxx> This patches fix current timeout concern and also allow limited ATS support: 1. add a timeout parameter for device IOTLB invalidation The parameter 'iommu_dev_iotlb_timeout' specifies the timeout of device IOTLB invalidation in milliseconds. By default, the timeout is 1000 milliseconds, which can be boot-time changed. We also confirmed with VT-d hardware team that 1 milliseconds is large enough for VT-d IOMMU internal invalidation. the existing panic() is eliminated and we bubble up the timeout of device IOTLB invalidation for further processing, as the PCI-e Address Translation Services (ATS) mandates a timeout of 60 seconds for device IOTLB invalidation. Obviously we can't spin for 60 seconds or otherwise Xen hypervisor hangs. 2. today we do Device-TLB flush synchronization after issuing flush requests for all ATS devices belonging to a VM. Doing so however imposes a limitation, i.e. that we can not figure out which flush request is blocked in the flush queue list, based on VT-d spec. To prepare correct Device-TLB flush timeout handling in next patch, we change the behavior to synchronize for every Device-TLB flush request. So the Device-TLB flush interface is changed a little bit, by checking timeout within the function instead of outside of function. Accordingly we also do a similar change for flush interfaces of IOTLB/IEC/Context, i.e. moving synchronization into the function. Since there is no user of a non-synced interface, we just rename existing ones with _sync suffix. 3. move the domain crash logic up to the generic IOMMU layer 4. If Device-TLB flush timed out, we hide the target ATS device immediately and crash the domain owning this ATS device. If impacted domain is hardware domain, just throw out a warning. By hiding the device, we make sure it can't be assigned to any domain any longer (see device_assigned). --- Not covered in this series: a) Eliminate the panic() in IOMMU_WAIT_OP, used only in VT-d register read/write. Further discussion is required on whether and how to improve it. b) Handle IOTLB/Context/IEC flush timeout (after v12 review, I try to send out brain storming). --- Quan Xu (6): IOMMU: add a timeout parameter for device IOTLB invalidation vt-d: synchronize for Device-TLB flush one by one vt-d: convert conditionals of qi_ctrl->qinval_maddr into ASSERT()s IOMMU/x86: using a struct pci_dev* instead of SBDF IOMMU: move the domain crash logic up to the generic IOMMU layer vt-d: fix vt-d Device-TLB flush timeout issue docs/misc/xen-command-line.markdown | 9 ++ xen/drivers/passthrough/amd/iommu_cmd.c | 11 +- xen/drivers/passthrough/amd/pci_amd_iommu.c | 2 +- xen/drivers/passthrough/ats.h | 6 +- xen/drivers/passthrough/iommu.c | 33 +++++- xen/drivers/passthrough/pci.c | 6 +- xen/drivers/passthrough/vtd/extern.h | 6 +- xen/drivers/passthrough/vtd/iommu.c | 19 +++- xen/drivers/passthrough/vtd/qinval.c | 168 +++++++++++++++++++--------- xen/drivers/passthrough/vtd/x86/ats.c | 23 ++-- xen/drivers/passthrough/x86/ats.c | 52 ++++++--- xen/include/xen/iommu.h | 2 + xen/include/xen/pci.h | 1 + 13 files changed, 238 insertions(+), 100 deletions(-) -- 1.9.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |