[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v11 9/9] mm / iommu: split need_iommu() into has_iommu_pt() and need_iommu_pt_sync()
>>> On 21.09.18 at 12:56, <paul.durrant@xxxxxxxxxx> wrote: > --- a/xen/arch/x86/hvm/mtrr.c > +++ b/xen/arch/x86/hvm/mtrr.c > @@ -783,7 +783,8 @@ HVM_REGISTER_SAVE_RESTORE(MTRR, hvm_save_mtrr_msr, > hvm_load_mtrr_msr, 1, > > void memory_type_changed(struct domain *d) > { > - if ( need_iommu(d) && d->vcpu && d->vcpu[0] ) > + if ( (has_iommu_pt(d) || iommu_use_hap_pt(d)) && > + d->vcpu && d->vcpu[0] ) > { > p2m_memory_type_changed(d); > flush_all(FLUSH_CACHE); > @@ -831,7 +832,7 @@ int epte_get_entry_emt(struct domain *d, unsigned long > gfn, mfn_t mfn, > return MTRR_TYPE_UNCACHABLE; > } > > - if ( !need_iommu(d) && !cache_flush_permitted(d) ) > + if ( !has_iommu_pt(d) && !cache_flush_permitted(d) ) > { > *ipat = 1; > return MTRR_TYPE_WRBACK; Considering how closely the two functions are related I'm struggling to understand why the conditions are no longer the inverse of one another. With iommu_use_hap_pt() including a has_iommu_pt() check I think the former can and should be simplified. > --- a/xen/arch/x86/x86_64/mm.c > +++ b/xen/arch/x86/x86_64/mm.c > @@ -1426,8 +1426,13 @@ int memory_add(unsigned long spfn, unsigned long epfn, > unsigned int pxm) > if ( ret ) > goto destroy_m2p; > > - if ( iommu_enabled && !iommu_hwdom_passthrough && > - !need_iommu(hardware_domain) ) > + /* > + * If hardware domain has IOMMU mappings but page tables are not > + * shared, and are not being kept in sync (which is the case when > + * in strict mode) then newly added memory needs to be mapped here. > + */ > + if ( has_iommu_pt(hardware_domain) && > + !iommu_use_hap_pt(hardware_domain) && !iommu_hwdom_strict ) iommu_use_hap_pt() includes a hap_enabled() check, but that is valid to be used on HVM domains only. It looks like there are other similar improper uses elsewhere - all new and pre-existing uses need auditing. > --- a/xen/drivers/passthrough/pci.c > +++ b/xen/drivers/passthrough/pci.c > @@ -1416,7 +1416,7 @@ static int assign_device(struct domain *d, u16 seg, u8 > bus, u8 devfn, u32 flag) > > /* Prevent device assign if mem paging or mem sharing have been > * enabled for this domain */ > - if ( unlikely(!need_iommu(d) && > + if ( unlikely(!has_iommu_pt(d) && > (d->arch.hvm.mem_sharing_enabled || > vm_event_check_ring(d->vm_event_paging) || > p2m_get_hostp2m(d)->global_logdirty)) ) This need_iommu() check looks rather unmotivated to me - wouldn't you better delete it instead of finding a suitable replacement? Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |