In amd_iommu_setup_domain_device, we redefine req_id and ivrs_dev
without using it the first time we read it. This is effectively dead
logic that we can refactor.
Signed-off-by: Teddy Astie <teddy.astie@vates.tech>
---
xen/drivers/passthrough/amd/pci_amd_iommu.c | 11 ++++-------
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git a/xen/drivers/passthrough/amd/pci_amd_iommu.c b/xen/drivers/passthrough/amd/pci_amd_iommu.c
index f96f59440b..1511a2a099 100644
--- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
+++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
@@ -147,17 +147,14 @@ static int __must_check amd_iommu_setup_domain_device(
if ( rc )
return rc;
- req_id = get_dma_requestor_id(iommu->seg, pdev->sbdf.bdf);
- ivrs_dev = &get_ivrs_mappings(iommu->seg)[req_id];
- sr_flags = (iommu_hwdom_passthrough && is_hardware_domain(domain)
- ? 0 : SET_ROOT_VALID)
- | (ivrs_dev->unity_map ? SET_ROOT_WITH_UNITY_MAP : 0);
-
- /* get device-table entry */
req_id = get_dma_requestor_id(iommu->seg, PCI_BDF(bus, devfn));
table = iommu->dev_table.buffer;
+ /* get device-table entry */
dte = &table[req_id];
ivrs_dev = &get_ivrs_mappings(iommu->seg)[req_id];
+ sr_flags = (iommu_hwdom_passthrough && is_hardware_domain(domain)
+ ? 0 : SET_ROOT_VALID)
+ | (ivrs_dev->unity_map ? SET_ROOT_WITH_UNITY_MAP : 0);
if ( domain != dom_io )
{
--
2.47.2
Teddy Astie | Vates XCP-ng Developer
XCP-ng & Xen Orchestra - Vates solutions
web: https://vates.tech
Le 06/02/2025 à 11:49, Teddy Astie a écrit : > In amd_iommu_setup_domain_device, we redefine req_id and ivrs_dev > without using it the first time we read it. This is effectively dead > logic that we can refactor. > > Signed-off-by: Teddy Astie <teddy.astie@vates.tech> > --- > xen/drivers/passthrough/amd/pci_amd_iommu.c | 11 ++++------- > 1 file changed, 4 insertions(+), 7 deletions(-) > > diff --git a/xen/drivers/passthrough/amd/pci_amd_iommu.c b/xen/drivers/passthrough/amd/pci_amd_iommu.c > index f96f59440b..1511a2a099 100644 > --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c > +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c > @@ -147,17 +147,14 @@ static int __must_check amd_iommu_setup_domain_device( > if ( rc ) > return rc; > > - req_id = get_dma_requestor_id(iommu->seg, pdev->sbdf.bdf); > - ivrs_dev = &get_ivrs_mappings(iommu->seg)[req_id]; > - sr_flags = (iommu_hwdom_passthrough && is_hardware_domain(domain) > - ? 0 : SET_ROOT_VALID) > - | (ivrs_dev->unity_map ? SET_ROOT_WITH_UNITY_MAP : 0); > - > - /* get device-table entry */ > req_id = get_dma_requestor_id(iommu->seg, PCI_BDF(bus, devfn)); > table = iommu->dev_table.buffer; > + /* get device-table entry */ > dte = &table[req_id]; > ivrs_dev = &get_ivrs_mappings(iommu->seg)[req_id]; > + sr_flags = (iommu_hwdom_passthrough && is_hardware_domain(domain) > + ? 0 : SET_ROOT_VALID) > + | (ivrs_dev->unity_map ? SET_ROOT_WITH_UNITY_MAP : 0); > > if ( domain != dom_io ) > { Looks like there is a subtle issue with this change when mapping a phantom device. In this case, we have bus,devfn not matching pdev->sbdf, but we want to know if there are unity regions for the actual device (not its phantom bdf). But there is only one check for SET_ROOT_WITH_UNITY_MAP (when req_id is different than PCI_BDF(bus, devfn). So I am not sure how problematic it is. Teddy Thanks Teddy Astie | Vates XCP-ng Developer XCP-ng & Xen Orchestra - Vates solutions web: https://vates.tech
On 06.02.2025 12:04, Teddy Astie wrote: > Le 06/02/2025 à 11:49, Teddy Astie a écrit : >> In amd_iommu_setup_domain_device, we redefine req_id and ivrs_dev >> without using it the first time we read it. This is effectively dead >> logic that we can refactor. >> >> Signed-off-by: Teddy Astie <teddy.astie@vates.tech> >> --- >> xen/drivers/passthrough/amd/pci_amd_iommu.c | 11 ++++------- >> 1 file changed, 4 insertions(+), 7 deletions(-) >> >> diff --git a/xen/drivers/passthrough/amd/pci_amd_iommu.c b/xen/drivers/passthrough/amd/pci_amd_iommu.c >> index f96f59440b..1511a2a099 100644 >> --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c >> +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c >> @@ -147,17 +147,14 @@ static int __must_check amd_iommu_setup_domain_device( >> if ( rc ) >> return rc; >> >> - req_id = get_dma_requestor_id(iommu->seg, pdev->sbdf.bdf); >> - ivrs_dev = &get_ivrs_mappings(iommu->seg)[req_id]; >> - sr_flags = (iommu_hwdom_passthrough && is_hardware_domain(domain) >> - ? 0 : SET_ROOT_VALID) >> - | (ivrs_dev->unity_map ? SET_ROOT_WITH_UNITY_MAP : 0); >> - >> - /* get device-table entry */ >> req_id = get_dma_requestor_id(iommu->seg, PCI_BDF(bus, devfn)); >> table = iommu->dev_table.buffer; >> + /* get device-table entry */ >> dte = &table[req_id]; >> ivrs_dev = &get_ivrs_mappings(iommu->seg)[req_id]; >> + sr_flags = (iommu_hwdom_passthrough && is_hardware_domain(domain) >> + ? 0 : SET_ROOT_VALID) >> + | (ivrs_dev->unity_map ? SET_ROOT_WITH_UNITY_MAP : 0); >> >> if ( domain != dom_io ) >> { > > Looks like there is a subtle issue with this change when mapping a > phantom device. > In this case, we have bus,devfn not matching pdev->sbdf, but we want to > know if there are unity regions for the actual device (not its phantom bdf). Which is the whole reason why req_id and ivrs_dev are calculated twice. Note how the fix for XSA-400 deliberately added this 2nd instance. Jan
© 2016 - 2025 Red Hat, Inc.