From: Jan Beulich Date: Wed, 24 Nov 2021 10:12:44 +0000 (+0100) Subject: VT-d: conditionalize IOTLB register offset check X-Git-Tag: archive/raspbian/4.17.0-1+rpi1^2~33^2~1320 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=5449ba84e99849ee2339fd79f9717e10113d702d;p=xen.git VT-d: conditionalize IOTLB register offset check As of commit 6773b1a7584a ("VT-d: Don't assume register-based invalidation is always supported") we don't (try to) use register based invalidation anymore when that's not supported by hardware. Hence there's also no point in the respective check, avoiding pointless IOMMU initialization failure. After all the spec (version 3.3 at the time of writing) doesn't say what the respective Extended Capability Register field would contain in such a case. Signed-off-by: Jan Beulich Reviewed-by: Kevin Tian --- diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c index c1bf48cbcb..b33697e36b 100644 --- a/xen/drivers/passthrough/vtd/iommu.c +++ b/xen/drivers/passthrough/vtd/iommu.c @@ -1274,7 +1274,8 @@ int __init iommu_alloc(struct acpi_drhd_unit *drhd) if ( cap_fault_reg_offset(iommu->cap) + cap_num_fault_regs(iommu->cap) * PRIMARY_FAULT_REG_LEN > PAGE_SIZE || - ecap_iotlb_offset(iommu->ecap) >= PAGE_SIZE ) + (has_register_based_invalidation(iommu) && + ecap_iotlb_offset(iommu->ecap) >= PAGE_SIZE) ) { printk(XENLOG_ERR VTDPREFIX "IOMMU: unsupported\n"); print_iommu_regs(drhd);