File 61655b5a-AMD-IOMMU-hidden-devices-flush.patch of Package xen.33138
# Commit 036432e8b27e1ef21e0f0204ba9b0e3972a031c2
# Date 2021-10-12 11:54:34 +0200
# Author Jan Beulich <jbeulich@suse.com>
# Committer Jan Beulich <jbeulich@suse.com>
AMD/IOMMU: consider hidden devices when flushing device I/O TLBs
Hidden devices are associated with DomXEN but usable by the
hardware domain. Hence they need flushing as well when all devices are
to have flushes invoked.
While there drop a redundant ATS-enabled check and constify the first
parameter of the involved function.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Paul Durrant <paul@xen.org>
--- a/xen/drivers/passthrough/amd/iommu_cmd.c
+++ b/xen/drivers/passthrough/amd/iommu_cmd.c
@@ -313,14 +313,11 @@ void amd_iommu_flush_iotlb(u8 devfn, con
spin_unlock_irqrestore(&iommu->lock, flags);
}
-static void amd_iommu_flush_all_iotlbs(struct domain *d, daddr_t daddr,
+static void amd_iommu_flush_all_iotlbs(const struct domain *d, daddr_t daddr,
unsigned int order)
{
struct pci_dev *pdev;
- if ( !ats_enabled )
- return;
-
for_each_pdev( d, pdev )
{
u8 devfn = pdev->devfn;
@@ -351,7 +348,16 @@ static void _amd_iommu_flush_pages(struc
}
if ( ats_enabled )
+ {
amd_iommu_flush_all_iotlbs(d, daddr, order);
+
+ /*
+ * Hidden devices are associated with DomXEN but usable by the
+ * hardware domain. Hence they need dealing with here as well.
+ */
+ if ( is_hardware_domain(d) )
+ amd_iommu_flush_all_iotlbs(dom_xen, daddr, order);
+ }
}
void amd_iommu_flush_all_pages(struct domain *d)