[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230530053724.232765-15-baolu.lu@linux.intel.com>
Date: Tue, 30 May 2023 13:37:21 +0800
From: Lu Baolu <baolu.lu@...ux.intel.com>
To: Jason Gunthorpe <jgg@...pe.ca>, Kevin Tian <kevin.tian@...el.com>,
Joerg Roedel <joro@...tes.org>, Will Deacon <will@...nel.org>,
Robin Murphy <robin.murphy@....com>,
Jean-Philippe Brucker <jean-philippe@...aro.org>,
Nicolin Chen <nicolinc@...dia.com>,
Yi Liu <yi.l.liu@...el.com>,
Jacob Pan <jacob.jun.pan@...ux.intel.com>
Cc: iommu@...ts.linux.dev, linux-kselftest@...r.kernel.org,
virtualization@...ts.linux-foundation.org,
linux-kernel@...r.kernel.org, Lu Baolu <baolu.lu@...ux.intel.com>
Subject: [RFC PATCHES 14/17] iommufd: Drain all pending faults when destroying hwpt
When a HWPT is unexpectedly destroyed, drain all faults in the pending
lists. It is safe because the iommu domain has been released and there
will never be new io page faults anymore.
Signed-off-by: Lu Baolu <baolu.lu@...ux.intel.com>
---
drivers/iommu/iommufd/hw_pagetable.c | 21 ++++++++++++++++++---
1 file changed, 18 insertions(+), 3 deletions(-)
diff --git a/drivers/iommu/iommufd/hw_pagetable.c b/drivers/iommu/iommufd/hw_pagetable.c
index 8c441fd72e1f..7f18e6bd76ec 100644
--- a/drivers/iommu/iommufd/hw_pagetable.c
+++ b/drivers/iommu/iommufd/hw_pagetable.c
@@ -574,11 +574,26 @@ static struct hw_pgtable_fault *hw_pagetable_fault_alloc(int eventfd)
return ERR_PTR(rc);
}
+static void iommufd_fault_list_destroy(struct hw_pgtable_fault *fault,
+ struct list_head *list)
+{
+ struct iommufd_fault *ifault;
+
+ mutex_lock(&fault->mutex);
+ while (!list_empty(list)) {
+ ifault = list_first_entry(list, struct iommufd_fault, item);
+ if (iommufd_fault_timer_teardown(ifault))
+ drain_iopf_fault(ifault);
+ list_del_init(&ifault->item);
+ iommufd_put_fault(ifault);
+ }
+ mutex_unlock(&fault->mutex);
+}
+
static void hw_pagetable_fault_free(struct hw_pgtable_fault *fault)
{
- WARN_ON(!list_empty(&fault->deliver));
- WARN_ON(!list_empty(&fault->response));
-
+ iommufd_fault_list_destroy(fault, &fault->deliver);
+ iommufd_fault_list_destroy(fault, &fault->response);
eventfd_ctx_put(fault->trigger);
kfree(fault);
}
--
2.34.1
Powered by blists - more mailing lists