All of lore.kernel.org
 help / color / mirror / Atom feed
From: Robin Murphy <robin.murphy-5wv7dgnIgG8@public.gmane.org>
To: Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org>,
	eric.auger-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org,
	joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org
Cc: iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org,
	linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
Subject: Re: [PATCH] iommu/arm-smmu: Fix stream-match conflict with IOMMU_DOMAIN_DMA
Date: Tue, 5 Apr 2016 11:48:20 +0100	[thread overview]
Message-ID: <570397F4.8080504@arm.com> (raw)
In-Reply-To: <1459527597-10740-1-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>

On 01/04/16 17:19, Will Deacon wrote:
> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass
> for now") ignores requests to attach a device to the default domain
> since, without IOMMU-basked DMA ops available everywhere, the default
> domain will just lead to unexpected transaction faults being reported.
>
> Unfortunately, the way this was implemented on SMMUv2 causes a
> regression with VFIO PCI device passthrough under KVM on AMD Seattle.
> On this system, the host controller device is associated with both a
> pci_dev *and* a platform_device, and can therefore end up with duplicate
> SMR entries, resulting in a stream-match conflict at runtime.
>
> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA
> is rejected even before configuring the SMRs. This restores the old
> behaviour for now, but we'll need to look at handing host controllers
> specially when we come to supporting the default domain fully.

FWIW this is already solved with the generic bindings, as in most cases 
the host controller won't need an "iommus" property - for those that do 
actually have their own IDs for the platform device side, any aliasing 
with the PCI-derived IDs from "iommu-map" is magically taken care of in 
the group allocation code. That cross-bus-grouping should also apply to 
legacy masters too, since they look the same by the time we get to that 
point, so there should be no more stream match conflicts either way. 
I'll be working on a v2 of that series this week, so I'll rebase on top 
of this fix.

Robin.

> Reported-by: Eric Auger <eric.auger-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
> Signed-off-by: Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org>
> ---
>   drivers/iommu/arm-smmu.c | 14 ++++++++------
>   1 file changed, 8 insertions(+), 6 deletions(-)
>
> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c
> index e933679a3266..2f186d22477f 100644
> --- a/drivers/iommu/arm-smmu.c
> +++ b/drivers/iommu/arm-smmu.c
> @@ -1098,18 +1098,20 @@ static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
>   	struct arm_smmu_device *smmu = smmu_domain->smmu;
>   	void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
>
> -	/* Devices in an IOMMU group may already be configured */
> -	ret = arm_smmu_master_configure_smrs(smmu, cfg);
> -	if (ret)
> -		return ret == -EEXIST ? 0 : ret;
> -
>   	/*
>   	 * FIXME: This won't be needed once we have IOMMU-backed DMA ops
> -	 * for all devices behind the SMMU.
> +	 * for all devices behind the SMMU. Note that we need to take
> +	 * care configuring SMRs for devices both a platform_device and
> +	 * and a PCI device (i.e. a PCI host controller)
>   	 */
>   	if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)
>   		return 0;
>
> +	/* Devices in an IOMMU group may already be configured */
> +	ret = arm_smmu_master_configure_smrs(smmu, cfg);
> +	if (ret)
> +		return ret == -EEXIST ? 0 : ret;
> +
>   	for (i = 0; i < cfg->num_streamids; ++i) {
>   		u32 idx, s2cr;
>
>

WARNING: multiple messages have this Message-ID (diff)
From: robin.murphy@arm.com (Robin Murphy)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] iommu/arm-smmu: Fix stream-match conflict with IOMMU_DOMAIN_DMA
Date: Tue, 5 Apr 2016 11:48:20 +0100	[thread overview]
Message-ID: <570397F4.8080504@arm.com> (raw)
In-Reply-To: <1459527597-10740-1-git-send-email-will.deacon@arm.com>

On 01/04/16 17:19, Will Deacon wrote:
> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass
> for now") ignores requests to attach a device to the default domain
> since, without IOMMU-basked DMA ops available everywhere, the default
> domain will just lead to unexpected transaction faults being reported.
>
> Unfortunately, the way this was implemented on SMMUv2 causes a
> regression with VFIO PCI device passthrough under KVM on AMD Seattle.
> On this system, the host controller device is associated with both a
> pci_dev *and* a platform_device, and can therefore end up with duplicate
> SMR entries, resulting in a stream-match conflict at runtime.
>
> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA
> is rejected even before configuring the SMRs. This restores the old
> behaviour for now, but we'll need to look at handing host controllers
> specially when we come to supporting the default domain fully.

FWIW this is already solved with the generic bindings, as in most cases 
the host controller won't need an "iommus" property - for those that do 
actually have their own IDs for the platform device side, any aliasing 
with the PCI-derived IDs from "iommu-map" is magically taken care of in 
the group allocation code. That cross-bus-grouping should also apply to 
legacy masters too, since they look the same by the time we get to that 
point, so there should be no more stream match conflicts either way. 
I'll be working on a v2 of that series this week, so I'll rebase on top 
of this fix.

Robin.

> Reported-by: Eric Auger <eric.auger@linaro.org>
> Signed-off-by: Will Deacon <will.deacon@arm.com>
> ---
>   drivers/iommu/arm-smmu.c | 14 ++++++++------
>   1 file changed, 8 insertions(+), 6 deletions(-)
>
> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c
> index e933679a3266..2f186d22477f 100644
> --- a/drivers/iommu/arm-smmu.c
> +++ b/drivers/iommu/arm-smmu.c
> @@ -1098,18 +1098,20 @@ static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
>   	struct arm_smmu_device *smmu = smmu_domain->smmu;
>   	void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
>
> -	/* Devices in an IOMMU group may already be configured */
> -	ret = arm_smmu_master_configure_smrs(smmu, cfg);
> -	if (ret)
> -		return ret == -EEXIST ? 0 : ret;
> -
>   	/*
>   	 * FIXME: This won't be needed once we have IOMMU-backed DMA ops
> -	 * for all devices behind the SMMU.
> +	 * for all devices behind the SMMU. Note that we need to take
> +	 * care configuring SMRs for devices both a platform_device and
> +	 * and a PCI device (i.e. a PCI host controller)
>   	 */
>   	if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)
>   		return 0;
>
> +	/* Devices in an IOMMU group may already be configured */
> +	ret = arm_smmu_master_configure_smrs(smmu, cfg);
> +	if (ret)
> +		return ret == -EEXIST ? 0 : ret;
> +
>   	for (i = 0; i < cfg->num_streamids; ++i) {
>   		u32 idx, s2cr;
>
>

  parent reply	other threads:[~2016-04-05 10:48 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-04-01 16:19 [PATCH] iommu/arm-smmu: Fix stream-match conflict with IOMMU_DOMAIN_DMA Will Deacon
2016-04-01 16:19 ` Will Deacon
     [not found] ` <1459527597-10740-1-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2016-04-04  9:40   ` Eric Auger
2016-04-04  9:40     ` Eric Auger
     [not found]     ` <5702368D.6060706-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
2016-04-07 14:46       ` Will Deacon
2016-04-07 14:46         ` Will Deacon
     [not found]         ` <20160407144601.GJ5657-5wv7dgnIgG8@public.gmane.org>
2016-04-07 14:50           ` Eric Auger
2016-04-07 14:50             ` Eric Auger
2016-04-05 10:48   ` Robin Murphy [this message]
2016-04-05 10:48     ` Robin Murphy
     [not found]     ` <570397F4.8080504-5wv7dgnIgG8@public.gmane.org>
2016-04-05 11:33       ` Eric Auger
2016-04-05 11:33         ` Eric Auger
     [not found]         ` <5703A289.30308-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
2016-04-13 14:46           ` [PATCH] iommu/arm-smmu: Don't allocate resources for bypass domains Robin Murphy
2016-04-13 14:46             ` Robin Murphy
     [not found]             ` <491c885f61c509d959b04cfb63676bd07e481dea.1460558667.git.robin.murphy-5wv7dgnIgG8@public.gmane.org>
2016-04-15 13:05               ` Will Deacon
2016-04-15 13:05                 ` Will Deacon
     [not found]                 ` <20160415130520.GH22906-5wv7dgnIgG8@public.gmane.org>
2016-04-15 15:11                   ` Eric Auger
2016-04-15 15:11                     ` Eric Auger
2016-04-15 15:09               ` Eric Auger
2016-04-15 15:09                 ` Eric Auger
2016-04-15 15:09   ` [PATCH] iommu/arm-smmu: Fix stream-match conflict with IOMMU_DOMAIN_DMA Eric Auger
2016-04-15 15:09     ` Eric Auger
2016-04-15 17:53     ` Shi, Yang
2016-04-15 17:53       ` Shi, Yang

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=570397F4.8080504@arm.com \
    --to=robin.murphy-5wv7dgnigg8@public.gmane.org \
    --cc=eric.auger-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org \
    --cc=iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
    --cc=joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org \
    --cc=linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org \
    --cc=will.deacon-5wv7dgnIgG8@public.gmane.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.