Linux IOMMU Development
 help / color / mirror / Atom feed
From: Robin Murphy <robin.murphy@arm.com>
To: Jason Gunthorpe <jgg@nvidia.com>,
	iommu@lists.linux.dev, Joerg Roedel <joro@8bytes.org>,
	Will Deacon <will@kernel.org>
Subject: Re: [PATCH 1/2] iommu/fsl: Do not use iommu_group_remove_device() under ops->device_group()
Date: Tue, 16 May 2023 16:00:47 +0100	[thread overview]
Message-ID: <33b25946-8970-6711-41a5-8b07ccff77c3@arm.com> (raw)
In-Reply-To: <1-v1-8fb05192ea02+e5-fsl_rm_groups_jgg@nvidia.com>

On 2023-05-16 01:27, Jason Gunthorpe wrote:
> This API is expected to be used only by POWER and VFIO no-iommu that
> manually manage the group lifecycle. It should not be called under
> ops->device_group().
> 
> This is already buggy as is since the core code does not expect a probed
> driver to loose it's iommu_group without also releasing the device.
> 
> FSL seems to be trying to block the platform_device that represents the
> pci_controller, eg the thing passed to fsl_add_bridge(), from having an
> iommu_group.
> 
> Instead of creating an iommu_group that we don't want and then later
> removing it, just don't create it at all in the first place.
> 
> For the 'pci_endpt_partitioning' case every PCI device already gets its
> own iommu_group through the standard code, so it is unclear why having a
> dedicated group for the controller could be problematic.
> 
> For the other case, the controller group was being used to bizarrely
> de-duplicate the group in it's hose. Instead just directly create a group
> for the hose the first time we encounter it. The code already searches the
> entire hose to find any iommu_group. Again, it is unclear why having the
> pci_controller inside the same iommu_group as the PCI devices would be
> harmful.

It's harmful in that case because it prevents VFIO from working at all - 
even now that VFIO no longer rejects cross-bus groups on principle, the 
fsl-pci driver being bound to the platform device would then deny VFIO 
from taking ownership.

> In any case, this is a cleaner way to not enable iommu support for the
> platform_device.
> 
> Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
> ---
>   drivers/iommu/fsl_pamu_domain.c | 42 ++++++++++++++++-----------------
>   1 file changed, 20 insertions(+), 22 deletions(-)
> 
> diff --git a/drivers/iommu/fsl_pamu_domain.c b/drivers/iommu/fsl_pamu_domain.c
> index bce37229709965..bf045f58cd50ae 100644
> --- a/drivers/iommu/fsl_pamu_domain.c
> +++ b/drivers/iommu/fsl_pamu_domain.c
> @@ -11,6 +11,7 @@
>   
>   #include <linux/platform_device.h>
>   #include <sysdev/fsl_pci.h>
> +#include <linux/pci.h>
>   
>   /*
>    * Global spinlock that needs to be held while
> @@ -379,7 +380,21 @@ static struct iommu_group *get_shared_pci_device_group(struct pci_dev *pdev)
>   		bus = bus->parent;
>   	}
>   
> -	return NULL;
> +	return iommu_group_alloc();
> +}
> +
> +static int __is_pci_controller_parent(struct device *dev, void *data)
> +{
> +	struct pci_dev *pdev = to_pci_dev(dev);
> +	struct pci_controller *pci_ctl = pci_bus_to_host(pdev->bus);
> +
> +	return dev == pci_ctl->parent;

If I'm not mistaken, this is testing every *PCI* device to see any of 
them are their own host bridge's platform parent...

> +}
> +
> +static bool is_pci_controller_parent(struct device *dev)
> +{
> +	return bus_for_each_dev(&pci_bus_type, NULL, NULL,
> +				__is_pci_controller_parent);

for_each_pci_dev() might be easier to handle, however for what I think 
this is ultimately trying to do, device_find_child() would seem even better.

>   }
>   
>   static struct iommu_group *get_pci_device_group(struct pci_dev *pdev)
> @@ -393,30 +408,12 @@ static struct iommu_group *get_pci_device_group(struct pci_dev *pdev)
>   	/* We can partition PCIe devices so assign device group to the device */
>   	if (pci_endpt_partitioning) {
>   		group = pci_device_group(&pdev->dev);
> -
> -		/*
> -		 * PCIe controller is not a paritionable entity
> -		 * free the controller device iommu_group.
> -		 */
> -		if (pci_ctl->parent->iommu_group)
> -			iommu_group_remove_device(pci_ctl->parent);
>   	} else {
>   		/*
>   		 * All devices connected to the controller will share the
> -		 * PCI controllers device group. If this is the first
> -		 * device to be probed for the pci controller, copy the
> -		 * device group information from the PCI controller device
> -		 * node and remove the PCI controller iommu group.
> -		 * For subsequent devices, the iommu group information can
> -		 * be obtained from sibling devices (i.e. from the bus_devices
> -		 * link list).
> +		 * same device group.
>   		 */
> -		if (pci_ctl->parent->iommu_group) {
> -			group = get_device_iommu_group(pci_ctl->parent);
> -			iommu_group_remove_device(pci_ctl->parent);
> -		} else {
> -			group = get_shared_pci_device_group(pdev);
> -		}
> +		group = get_shared_pci_device_group(pdev);

It would be nice if we could still associate the "PCI group" directly 
with the pci_controller some other way, and avoid all the 
slightly-confusing bus walks altogether, but I don't see a sufficiently 
clean way to achieve that :(

Thanks,
Robin.

>   	}
>   
>   	if (!group)
> @@ -436,7 +433,8 @@ static struct iommu_group *fsl_pamu_device_group(struct device *dev)
>   	 */
>   	if (dev_is_pci(dev))
>   		group = get_pci_device_group(to_pci_dev(dev));
> -	else if (of_get_property(dev->of_node, "fsl,liodn", &len))
> +	else if (of_get_property(dev->of_node, "fsl,liodn", &len) &&
> +		 !is_pci_controller_parent(dev))
>   		group = get_device_iommu_group(dev);
>   
>   	return group;

  reply	other threads:[~2023-05-16 15:00 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-05-16  0:27 [PATCH 0/2] Remove iommu_group_remove_device() from fsl Jason Gunthorpe
2023-05-16  0:27 ` [PATCH 1/2] iommu/fsl: Do not use iommu_group_remove_device() under ops->device_group() Jason Gunthorpe
2023-05-16 15:00   ` Robin Murphy [this message]
2023-05-16 16:09     ` Jason Gunthorpe
2023-05-16 18:24       ` Robin Murphy
2023-05-16 19:52         ` Jason Gunthorpe
2023-05-16  0:27 ` [PATCH 2/2] iommu/fsl: Always allocate a group for non-pci devices Jason Gunthorpe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=33b25946-8970-6711-41a5-8b07ccff77c3@arm.com \
    --to=robin.murphy@arm.com \
    --cc=iommu@lists.linux.dev \
    --cc=jgg@nvidia.com \
    --cc=joro@8bytes.org \
    --cc=will@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox