[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [PATCH v2 1/3] x86/IOMMU: mark IOMMU / intremap not in use when ACPI tables are missing
> From: Jan Beulich <jbeulich@xxxxxxxx> > Sent: Friday, October 22, 2021 1:59 PM > > On 21.10.2021 11:58, Jan Beulich wrote: > > x2apic_bsp_setup() gets called ahead of iommu_setup(), and since x2APIC > > mode (physical vs clustered) depends on iommu_intremap, that variable > > needs to be set to off as soon as we know we can't / won't enable > > interrupt remapping, i.e. in particular when parsing of the respective > > ACPI tables failed. Move the turning off of iommu_intremap from AMD > > specific code into acpi_iommu_init(), accompanying it by clearing of > > iommu_enable. > > > > Take the opportunity and also fully skip ACPI table parsing logic on > > VT-d when both "iommu=off" and "iommu=no-intremap" are in effect > anyway, > > like was already the case for AMD. > > > > The tag below only references the commit uncovering a pre-existing > > anomaly. > > > > Fixes: d8bd82327b0f ("AMD/IOMMU: obtain IVHD type to use earlier") > > Reported-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> > > Ouch, forgot to Cc Kevin; now added. Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx> > > Jan > > > --- > > While the change here deals with apic_x2apic_probe() as called from > > x2apic_bsp_setup(), the check_x2apic_preenabled() path looks to be > > similarly affected. That call occurs before acpi_boot_init(), which is > > what calls acpi_iommu_init(). The ordering in setup.c is in part > > relatively fragile, which is why for the moment I'm still hesitant to > > move the generic_apic_probe() call down. Plus I don't have easy access > > to a suitable system to test this case. Thoughts? > > --- > > v2: Treat iommu_enable and iommu_intremap as separate options. > > > > --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c > > +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c > > @@ -183,9 +183,6 @@ int __init acpi_ivrs_init(void) > > { > > int rc; > > > > - if ( !iommu_enable && !iommu_intremap ) > > - return 0; > > - > > rc = amd_iommu_get_supported_ivhd_type(); > > if ( rc < 0 ) > > return rc; > > @@ -193,10 +190,7 @@ int __init acpi_ivrs_init(void) > > ivhd_type = rc; > > > > if ( (amd_iommu_detect_acpi() !=0) || (iommu_found() == 0) ) > > - { > > - iommu_intremap = iommu_intremap_off; > > return -ENODEV; > > - } > > > > iommu_init_ops = &_iommu_init_ops; > > > > --- a/xen/drivers/passthrough/vtd/dmar.c > > +++ b/xen/drivers/passthrough/vtd/dmar.c > > @@ -777,11 +777,7 @@ static int __init acpi_parse_dmar(struct > > dmar = (struct acpi_table_dmar *)table; > > dmar_flags = dmar->flags; > > > > - if ( !iommu_enable && !iommu_intremap ) > > - { > > - ret = -EINVAL; > > - goto out; > > - } > > + ASSERT(iommu_enable || iommu_intremap); > > > > if ( !dmar->width ) > > { > > --- a/xen/drivers/passthrough/x86/iommu.c > > +++ b/xen/drivers/passthrough/x86/iommu.c > > @@ -41,6 +41,24 @@ enum iommu_intremap __read_mostly iommu_ > > bool __read_mostly iommu_intpost; > > #endif > > > > +void __init acpi_iommu_init(void) > > +{ > > + int ret; > > + > > + if ( !iommu_enable && !iommu_intremap ) > > + return; > > + > > + ret = acpi_dmar_init(); > > + if ( ret == -ENODEV ) > > + ret = acpi_ivrs_init(); > > + > > + if ( ret ) > > + { > > + iommu_enable = false; > > + iommu_intremap = iommu_intremap_off; > > + } > > +} > > + > > int __init iommu_hardware_setup(void) > > { > > struct IO_APIC_route_entry **ioapic_entries = NULL; > > --- a/xen/include/asm-x86/acpi.h > > +++ b/xen/include/asm-x86/acpi.h > > @@ -141,16 +141,10 @@ extern u32 x86_acpiid_to_apicid[]; > > extern u32 pmtmr_ioport; > > extern unsigned int pmtmr_width; > > > > +void acpi_iommu_init(void); > > int acpi_dmar_init(void); > > int acpi_ivrs_init(void); > > > > -static inline int acpi_iommu_init(void) > > -{ > > - int ret = acpi_dmar_init(); > > - > > - return ret == -ENODEV ? acpi_ivrs_init() : ret; > > -} > > - > > void acpi_mmcfg_init(void); > > > > /* Incremented whenever we transition through S3. Value is 1 during boot. > */ > > > >
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |