From: Robin Murphy <robin.murphy@arm.com>
To: "Suthikulpanit, Suravee" <suravee.suthikulpanit@amd.com>,
iommu@lists.linux-foundation.org
Cc: ashish.kalra@amd.com, vasant.hegde@amd.com
Subject: Re: [PATCH 5/7] iommu: Add domain_type_supported() callback in iommu_ops
Date: Tue, 14 Jun 2022 10:51:18 +0100 [thread overview]
Message-ID: <9a984e22-6624-e4ea-689b-7e37094c5b87@arm.com> (raw)
In-Reply-To: <b6d64153-9dc4-372f-8c2b-a844199d3cb6@amd.com>
On 2022-06-13 15:38, Suthikulpanit, Suravee wrote:
> Robin,
>
> On 6/13/2022 4:31 PM, Robin Murphy wrote:
>> On 2022-06-13 02:25, Suravee Suthikulpanit wrote:
>>> When user requests to change IOMMU domain to a new type, IOMMU generic
>>> layer checks the requested type against the default domain type returned
>>> by vendor-specific IOMMU driver.
>>>
>>> However, there is only one default domain type, and current mechanism
>>> does not allow if the requested type does not match the default type.
>>
>> I don't really follow the reasoning here. If a driver's
>> def_domain_type callback returns a specific type, it's saying that the
>> device *has* to have that specific domain type for
>> driver/platform-specific reasons.
>
> Agree, and I understand this part.
>
>> If
>> that's not the case, then the driver shouldn't say so in the first place.
>
> Considering the case:
> 1. Boot w/ default domain = IOMMU_DOMAIN_DMA_FQ
> 2. User wants to change to IOMMU_DOMAIN_IDENTITY, which is not supported
> by IOMMU driver. In this case, IOMMU driver can return
> IOMMU_DOMAIN_DMA_FQ and prevent the mode change.
> 3. However, if user want to change to IOMMU_DOMAIN_DMA. The driver can
> support this. However, since the def_domain_type() returns
> IOMMU_DOMAIN_DMA_FQ, it ends up prevent the mode change.
Why would a driver be forcing IOMMU_DOMAIN_DMA_FQ for a device though?
Nobody's doing that today, and semantically it wouldn't really make
sense - forcing translation to deny passthrough on a device-specific
basis (beyond the common handling of untrusted devices) *might* be a
thing, but the performance/strictness tradeoff of using a flush queue or
not is surely a subjective user decision, not an objective platform one.
> IIUC, we should support step 3 above. Basically, with the newly proposed
> interface, it allows us to check with IOMMU driver if it can support
> certain domain types before trying
> to allocate the domain.
Indeed we could do that - as a much more comprehensive change to the
internal domain_alloc interfaces - but do we really need to? If we
succeed at allocating a domain then we know it's supported; if it fails
then we can't give the user what they asked for, regardless of the exact
reason why - what do we gain from doubling the number of potential
failure paths that we have to handle?
>>> Introducing check_domain_type_supported() callback in iommu_ops,
>>> which allows IOMMU generic layer to check with vendor-specific IOMMU driver
>>>
>>> whether the requested type is supported. This allows user to request
>>> types other than the default type.
>>
>> Note also that you're only adding this in the sysfs path - what about
>> the "iommu.passthrough=" parameter or CONFIG_IOMMU_DEFAULT_PASSTHROUGH?
>
> For SNP case, we cannot enable SNP if iommu=off or iommu=pt or
> iommu.passthrough=1 or CONFIG_IOMMU_DEFAULT_PASSTHROUGH=y.
> So, when another driver tries to enable SNP, the IOMMU driver prevents
> it (see iommu_sev_snp_supported() in patch 3).
Ugh, I hadn't looked too closely at the other patches, but an interface
that looks like a simple "is this feature supported?" check with a
secret side-effect of changing global behaviour as well? Yuck :(
What external drivers are expected to have the authority to affect the
entire system and call that? The fact that you're exporting it suggests
they could be loaded from modules *after* v2 features have been enabled
and/or the user has configured a non-default identity domain for a group
via sysfs... Fun!
> Instead, if we boot with iommu.passhthrough=0, when another driver tries
> to enable SNP, the IOMMU driver allows this and switch to SNP enable mode.
> Subsequently, if user tries to switch a domain (via sysfs) to
> IOMMU_DOMAIN_IDENTITY, the IOMMU needs to prevent this because it has
> already switch
> to SNP-enabled mode.
>
>> AFAICS there shouldn't need to be any core-level changes to support
>> this. We already have drivers which don't support passthrough at all,
>> so conditionally not supporting it should be no big deal. What should
>> happen currently is that def_domain_type returns 0 for "don't care",
>> then domain_alloc rejects IOMMU_DOMAIN_IDENTITY and and returns NULL,
>> so iommu_group_alloc_default_domain() falls back to IOMMU_DOMAIN_DMA.
>
> Technically, we can do it the way you suggest. But isn't this confusing?
> At first, def_domain_type() returns 0 for "don't care",
> but then it rejects the request to change to IOMMU_DOMAIN_IDENTITY when
> trying to call domain_alloc().
Yes, that's how it works; def_domain_type is responsible for quirking
individual *devices* that need to have a specific domain type (in
practice, devices which need identity mapping), while domain_alloc is
responsible for saying which domain types the driver supports as a
whole, by allocating them or not as appropriate.
We don't have a particularly neat way to achieve the negative of
def_domain_type - i.e. saying that a specific device *can't* use a
specific otherwise-supported domain type - other than subsequently
failing in attach_dev, but so far we've not needed such a thing. And if
SNP is expected to be mutually exclusive with identity domain support
globally, then we still shouldn't need it.
Thanks,
Robin.
_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu
next prev parent reply other threads:[~2022-06-14 9:51 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-06-13 1:24 [PATCH 0/7] iommu/amd: Enforce IOMMU restrictions for SNP-enabled system Suravee Suthikulpanit via iommu
2022-06-13 1:24 ` [PATCH 1/7] iommu/amd: Process all IVHDs before enabling IOMMU features Suravee Suthikulpanit via iommu
2022-06-13 1:24 ` [PATCH 2/7] iommu/amd: Introduce a global variable for tracking SNP enable status Suravee Suthikulpanit via iommu
2022-06-13 1:24 ` [PATCH 3/7] iommu/amd: Introduce function to check SEV-SNP support Suravee Suthikulpanit via iommu
2022-06-13 14:40 ` Suthikulpanit, Suravee via iommu
2022-06-13 1:24 ` [PATCH 4/7] iommu/amd: Set translation valid bit only when IO page tables are in use Suravee Suthikulpanit via iommu
2022-06-13 1:25 ` [PATCH 5/7] iommu: Add domain_type_supported() callback in iommu_ops Suravee Suthikulpanit via iommu
2022-06-13 9:31 ` Robin Murphy
2022-06-13 14:38 ` Suthikulpanit, Suravee via iommu
2022-06-14 9:51 ` Robin Murphy [this message]
2022-06-15 1:25 ` Suthikulpanit, Suravee via iommu
2022-06-13 1:25 ` [PATCH 6/7] iommu/amd: Do not support IOMMU_DOMAIN_IDENTITY when SNP is enabled Suravee Suthikulpanit via iommu
2022-06-13 1:25 ` [PATCH 7/7] iommu/amd: Do not support IOMMUv2 APIs " Suravee Suthikulpanit via iommu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9a984e22-6624-e4ea-689b-7e37094c5b87@arm.com \
--to=robin.murphy@arm.com \
--cc=ashish.kalra@amd.com \
--cc=iommu@lists.linux-foundation.org \
--cc=suravee.suthikulpanit@amd.com \
--cc=vasant.hegde@amd.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox