All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Roger Pau Monné" <roger.pau@citrix.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: "xen-devel@lists.xenproject.org" <xen-devel@lists.xenproject.org>,
	"Andrew Cooper" <andrew.cooper3@citrix.com>, Wei Liu <wl@xen.org>,
	Paul Durrant <paul@xen.org>
Subject: Re: [PATCH v2 1/3] x86/IOMMU: mark IOMMU / intremap not in use when ACPI tables are missing
Date: Fri, 22 Oct 2021 17:52:18 +0200	[thread overview]
Message-ID: <YXLeMsuykEhSdfUg@MacBook-Air-de-Roger.local> (raw)
In-Reply-To: <efe34081-c813-0e37-175c-8553b395e6d9@suse.com>

On Thu, Oct 21, 2021 at 11:58:18AM +0200, Jan Beulich wrote:
> x2apic_bsp_setup() gets called ahead of iommu_setup(), and since x2APIC
> mode (physical vs clustered) depends on iommu_intremap, that variable
> needs to be set to off as soon as we know we can't / won't enable
> interrupt remapping, i.e. in particular when parsing of the respective
> ACPI tables failed. Move the turning off of iommu_intremap from AMD
> specific code into acpi_iommu_init(), accompanying it by clearing of
> iommu_enable.
> 
> Take the opportunity and also fully skip ACPI table parsing logic on
> VT-d when both "iommu=off" and "iommu=no-intremap" are in effect anyway,
> like was already the case for AMD.
> 
> The tag below only references the commit uncovering a pre-existing
> anomaly.
> 
> Fixes: d8bd82327b0f ("AMD/IOMMU: obtain IVHD type to use earlier")
> Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>

Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>

> ---
> While the change here deals with apic_x2apic_probe() as called from
> x2apic_bsp_setup(), the check_x2apic_preenabled() path looks to be
> similarly affected. That call occurs before acpi_boot_init(), which is
> what calls acpi_iommu_init(). The ordering in setup.c is in part
> relatively fragile, which is why for the moment I'm still hesitant to
> move the generic_apic_probe() call down. Plus I don't have easy access
> to a suitable system to test this case. Thoughts?

Indeed, that seems it could go quite wrong, as apic_x2apic_probe will
see iommu_intremap == iommu_intremap_full (the default value) and thus
could choose cluster mode without real interrupt remapping support.

At first sight it would seem possible to move lower down, but as you
say, this is all quite fragile. It's even made worse because we lack a
strict ordering discipline or any kind of dependency checking, so even
if we mess up the order it's likely to go unnoticed unless someone
tests on an affected system.

While we can try to solve this for the upcoming release, long term we
need a stricter ordering, either as a comment, or even better enforced
somehow in code. The x2APIC vs IOMMU ordering has bitten us multiple
times and we should see about implementing a more robust solution.

Thanks, Roger.


  parent reply	other threads:[~2021-10-22 15:52 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-10-21  9:57 [PATCH v2 0/3] x86/IOMMU: enabled / intremap handling Jan Beulich
2021-10-21  9:58 ` [PATCH v2 1/3] x86/IOMMU: mark IOMMU / intremap not in use when ACPI tables are missing Jan Beulich
2021-10-22  5:59   ` Jan Beulich
2021-10-29  8:44     ` Tian, Kevin
2021-10-22 15:52   ` Roger Pau Monné [this message]
2021-11-02 10:07     ` Jan Beulich
2021-11-02 10:26       ` Roger Pau Monné
2021-10-21  9:58 ` [PATCH v2 2/3] x86/APIC: avoid iommu_supports_x2apic() on error path Jan Beulich
2021-10-25  8:41   ` Roger Pau Monné
2021-10-21  9:59 ` [PATCH v2 3/3] AMD/IOMMU: iommu_enable vs iommu_intremap Jan Beulich
2021-10-25 10:28   ` Roger Pau Monné
2021-11-02 10:13     ` Jan Beulich
2021-11-02 11:03       ` Roger Pau Monné
2021-11-02 14:00         ` Jan Beulich
2021-11-02 14:59           ` Roger Pau Monné
2021-11-03  9:46         ` Jan Beulich
2021-11-03 15:06           ` Roger Pau Monné
2021-11-03 15:15             ` Jan Beulich
2021-11-03 17:00               ` Roger Pau Monné
2021-11-02 10:17 ` [PATCH v2 0/3] x86/IOMMU: enabled / intremap handling Jan Beulich
2021-11-03 11:01   ` [PATCH v2 0/3][4.16] " Jan Beulich
2021-11-03 16:19     ` Ian Jackson
2021-11-04  8:15       ` Jan Beulich
2021-11-04 11:10         ` Ian Jackson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=YXLeMsuykEhSdfUg@MacBook-Air-de-Roger.local \
    --to=roger.pau@citrix.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=jbeulich@suse.com \
    --cc=paul@xen.org \
    --cc=wl@xen.org \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.