[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v7 10/10] IOMMU: patch certain indirect calls to direct ones
This is intentionally not touching hooks used rarely (or not at all) during the lifetime of a VM, unless perhaps sitting on an error path next to a call which gets changed (in which case I think the error path better remains consistent with the respective main path). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Wei Liu <wei.liu2@xxxxxxxxxx> --- v7: Re-base once again. v6: Re-base. v5: Re-base over type-safe changes and dropped IOMMU_MIXED patch. Also patch the new lookup_page() hook. v4: New. --- a/xen/drivers/passthrough/iommu.c +++ b/xen/drivers/passthrough/iommu.c @@ -307,8 +307,8 @@ int iommu_map(struct domain *d, dfn_t df for ( i = 0; i < (1ul << page_order); i++ ) { - rc = hd->platform_ops->map_page(d, dfn_add(dfn, i), mfn_add(mfn, i), - flags, flush_flags); + rc = iommu_call(hd->platform_ops, map_page, d, dfn_add(dfn, i), + mfn_add(mfn, i), flags, flush_flags); if ( likely(!rc) ) continue; @@ -321,8 +321,8 @@ int iommu_map(struct domain *d, dfn_t df while ( i-- ) /* if statement to satisfy __must_check */ - if ( hd->platform_ops->unmap_page(d, dfn_add(dfn, i), - flush_flags) ) + if ( iommu_call(hd->platform_ops, unmap_page, d, dfn_add(dfn, i), + flush_flags) ) continue; if ( !is_hardware_domain(d) ) @@ -366,8 +366,8 @@ int iommu_unmap(struct domain *d, dfn_t for ( i = 0; i < (1ul << page_order); i++ ) { - int err = hd->platform_ops->unmap_page(d, dfn_add(dfn, i), - flush_flags); + int err = iommu_call(hd->platform_ops, unmap_page, d, dfn_add(dfn, i), + flush_flags); if ( likely(!err) ) continue; @@ -415,7 +415,7 @@ int iommu_lookup_page(struct domain *d, if ( !iommu_enabled || !hd->platform_ops ) return -EOPNOTSUPP; - return hd->platform_ops->lookup_page(d, dfn, mfn, flags); + return iommu_call(hd->platform_ops, lookup_page, d, dfn, mfn, flags); } static void iommu_free_pagetables(unsigned long unused) @@ -428,7 +428,7 @@ static void iommu_free_pagetables(unsign spin_unlock(&iommu_pt_cleanup_lock); if ( !pg ) return; - iommu_get_ops()->free_page_table(pg); + iommu_vcall(iommu_get_ops(), free_page_table, pg); } while ( !softirq_pending(smp_processor_id()) ); tasklet_schedule_on_cpu(&iommu_pt_cleanup_tasklet, @@ -448,7 +448,8 @@ int iommu_iotlb_flush(struct domain *d, if ( dfn_eq(dfn, INVALID_DFN) ) return -EINVAL; - rc = hd->platform_ops->iotlb_flush(d, dfn, page_count, flush_flags); + rc = iommu_call(hd->platform_ops, iotlb_flush, d, dfn, page_count, + flush_flags); if ( unlikely(rc) ) { if ( !d->is_shutting_down && printk_ratelimit() ) @@ -476,7 +477,7 @@ int iommu_iotlb_flush_all(struct domain * The operation does a full flush so we don't need to pass the * flush_flags in. */ - rc = hd->platform_ops->iotlb_flush_all(d); + rc = iommu_call(hd->platform_ops, iotlb_flush_all, d); if ( unlikely(rc) ) { if ( !d->is_shutting_down && printk_ratelimit() ) --- a/xen/drivers/passthrough/pci.c +++ b/xen/drivers/passthrough/pci.c @@ -1337,14 +1337,14 @@ int iommu_update_ire_from_msi( struct msi_desc *msi_desc, struct msi_msg *msg) { return iommu_intremap - ? iommu_get_ops()->update_ire_from_msi(msi_desc, msg) : 0; + ? iommu_call(&iommu_ops, update_ire_from_msi, msi_desc, msg) : 0; } void iommu_read_msi_from_ire( struct msi_desc *msi_desc, struct msi_msg *msg) { if ( iommu_intremap ) - iommu_get_ops()->read_msi_from_ire(msi_desc, msg); + iommu_vcall(&iommu_ops, read_msi_from_ire, msi_desc, msg); } static int iommu_add_device(struct pci_dev *pdev) --- a/xen/drivers/passthrough/x86/iommu.c +++ b/xen/drivers/passthrough/x86/iommu.c @@ -28,14 +28,12 @@ struct iommu_ops iommu_ops; void iommu_update_ire_from_apic( unsigned int apic, unsigned int reg, unsigned int value) { - const struct iommu_ops *ops = iommu_get_ops(); - ops->update_ire_from_apic(apic, reg, value); + iommu_vcall(&iommu_ops, update_ire_from_apic, apic, reg, value); } unsigned int iommu_read_apic_from_ire(unsigned int apic, unsigned int reg) { - const struct iommu_ops *ops = iommu_get_ops(); - return ops->read_apic_from_ire(apic, reg); + return iommu_call(&iommu_ops, read_apic_from_ire, apic, reg); } int __init iommu_setup_hpet_msi(struct msi_desc *msi) --- a/xen/include/asm-x86/iommu.h +++ b/xen/include/asm-x86/iommu.h @@ -61,6 +61,12 @@ int amd_iov_detect(void); extern struct iommu_ops iommu_ops; +#ifdef NDEBUG +# include <asm/alternative.h> +# define iommu_call(ops, fn, args...) alternative_call(iommu_ops.fn, ## args) +# define iommu_vcall(ops, fn, args...) alternative_vcall(iommu_ops.fn, ## args) +#endif + static inline const struct iommu_ops *iommu_get_ops(void) { BUG_ON(!iommu_ops.init); --- a/xen/include/xen/iommu.h +++ b/xen/include/xen/iommu.h @@ -236,6 +236,11 @@ struct iommu_ops { #include <asm/iommu.h> +#ifndef iommu_call +# define iommu_call(ops, fn, args...) ((ops)->fn(args)) +# define iommu_vcall iommu_call +#endif + enum iommu_status { IOMMU_STATUS_disabled, _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |