From: Dmitry Baryshkov <dmitry.baryshkov@linaro.org>
To: Jason Gunthorpe <jgg@nvidia.com>, Rob Clark <robdclark@gmail.com>
Cc: Heiko Stuebner <heiko@sntech.de>,
Matthew Rosato <mjrosato@linux.ibm.com>,
Jerry Snitselaar <jsnitsel@redhat.com>,
Matthias Brugger <matthias.bgg@gmail.com>,
Thierry Reding <thierry.reding@gmail.com>,
Jernej Skrabec <jernej.skrabec@gmail.com>,
Alim Akhtar <alim.akhtar@samsung.com>,
Dmitry Osipenko <digetx@gmail.com>,
Steven Price <steven.price@arm.com>,
Will Deacon <will@kernel.org>,
Marek Szyprowski <m.szyprowski@samsung.com>,
linux-s390@vger.kernel.org, linux-samsung-soc@vger.kernel.org,
Samuel Holland <samuel@sholland.org>,
Joerg Roedel <joro@8bytes.org>,
Russell King <linux@armlinux.org.uk>,
Jonathan Hunter <jonathanh@nvidia.com>,
linux-rockchip@lists.infradead.org, iommu@lists.linux.dev,
Andy Gross <agross@kernel.org>,
Nicolin Chen <nicolinc@nvidia.com>,
Yong Wu <yong.wu@mediatek.com>, Orson Zhai <orsonzhai@gmail.com>,
Gerald Schaefer <gerald.schaefer@linux.ibm.com>,
Thierry Reding <treding@nvidia.com>,
linux-sunxi@lists.linux.dev, Kevin Tian <kevin.tian@intel.com>,
Niklas S chnelle <schnelle@linux.ibm.com>,
linux-arm-msm@vger.kernel.org,
Nicholas Piggin <npiggin@gmail.com>,
Krishna Reddy <vdumpa@nvidia.com>,
linux-mediatek@lists.infradead.org,
Baolin Wang <baolin.wang@linux.alibaba.com>,
linux-tegra@vger.kernel.org, Chen-Yu Tsai <wens@csie.org>,
linux-arm-kernel@lists.infradead.org,
AngeloGioacchino Del Regno
<angelogioacchino.delregno@collabora.com>,
Robin Murphy <robin.murphy@arm.com>,
Bjorn Andersson <andersson@kernel.org>,
Konrad Dybcio <konrad.dybcio@linaro.org>,
Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>,
Chunyan Zhang <zhang.lyra@gmail.com>,
linuxppc-dev@lists.ozlabs.org,
Lu Baolu <baolu.lu@linux.intel.com>
Subject: Re: [PATCH v8 20/24] iommu: Require a default_domain for all iommu drivers
Date: Tue, 3 Oct 2023 00:21:59 +0300 [thread overview]
Message-ID: <CAA8EJprz7VVmBG68U9zLuqPd0UdSRHYoLDJSP6tCj6H6qanuTQ@mail.gmail.com> (raw)
In-Reply-To: <20-v8-81230027b2fa+9d-iommu_all_defdom_jgg@nvidia.com>
On Wed, 13 Sept 2023 at 16:45, Jason Gunthorpe <jgg@nvidia.com> wrote:
>
> At this point every iommu driver will cause a default_domain to be
> selected, so we can finally remove this gap from the core code.
>
> The following table explains what each driver supports and what the
> resulting default_domain will be:
>
> ops->defaut_domain
> IDENTITY DMA PLATFORM v ARM32 dma-iommu ARCH
> amd/iommu.c Y Y N/A either
> apple-dart.c Y Y N/A either
> arm-smmu.c Y Y IDENTITY either
> qcom_iommu.c G Y IDENTITY either
> arm-smmu-v3.c Y Y N/A either
> exynos-iommu.c G Y IDENTITY either
> fsl_pamu_domain.c Y Y N/A N/A PLATFORM
> intel/iommu.c Y Y N/A either
> ipmmu-vmsa.c G Y IDENTITY either
> msm_iommu.c G IDENTITY N/A
Unfortunately this patch breaks msm_iommu platforms. This driver
doesn't select ARM_DMA_USE_IOMMU, so iommu_get_default_domain_type()
returns 0, bus_iommu_probe() fails with -ENODEV.
If I make MSM_IOMMU select ARM_DMA_USE_IOMMU, then GPU probing fails
with -EBUSY.
> mtk_iommu.c G Y IDENTITY either
> mtk_iommu_v1.c G IDENTITY N/A
> omap-iommu.c G IDENTITY N/A
> rockchip-iommu.c G Y IDENTITY either
> s390-iommu.c Y Y N/A N/A PLATFORM
> sprd-iommu.c Y N/A DMA
> sun50i-iommu.c G Y IDENTITY either
> tegra-smmu.c G Y IDENTITY IDENTITY
> virtio-iommu.c Y Y N/A either
> spapr Y Y N/A N/A PLATFORM
> * G means ops->identity_domain is used
> * N/A means the driver will not compile in this configuration
>
> ARM32 drivers select an IDENTITY default domain through either the
> ops->identity_domain or directly requesting an IDENTIY domain through
> alloc_domain().
>
> In ARM64 mode tegra-smmu will still block the use of dma-iommu.c and
> forces an IDENTITY domain.
>
> S390 uses a PLATFORM domain to represent when the dma_ops are set to the
> s390 iommu code.
>
> fsl_pamu uses an PLATFORM domain.
>
> POWER SPAPR uses PLATFORM and blocking to enable its weird VFIO mode.
>
> The x86 drivers continue unchanged.
>
> After this patch group->default_domain is only NULL for a short period
> during bus iommu probing while all the groups are constituted. Otherwise
> it is always !NULL.
>
> This completes changing the iommu subsystem driver contract to a system
> where the current iommu_domain always represents some form of translation
> and the driver is continuously asserting a definable translation mode.
>
> It resolves the confusion that the original ops->detach_dev() caused
> around what translation, exactly, is the IOMMU performing after
> detach. There were at least three different answers to that question in
> the tree, they are all now clearly named with domain types.
>
> Tested-by: Heiko Stuebner <heiko@sntech.de>
> Tested-by: Niklas Schnelle <schnelle@linux.ibm.com>
> Tested-by: Steven Price <steven.price@arm.com>
> Tested-by: Marek Szyprowski <m.szyprowski@samsung.com>
> Tested-by: Nicolin Chen <nicolinc@nvidia.com>
> Reviewed-by: Lu Baolu <baolu.lu@linux.intel.com>
> Reviewed-by: Jerry Snitselaar <jsnitsel@redhat.com>
> Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
> ---
> drivers/iommu/iommu.c | 22 +++++++---------------
> 1 file changed, 7 insertions(+), 15 deletions(-)
>
> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
> index 42a4585dd76da6..cfb597751f5bad 100644
> --- a/drivers/iommu/iommu.c
> +++ b/drivers/iommu/iommu.c
> @@ -1865,7 +1865,6 @@ static int iommu_get_def_domain_type(struct iommu_group *group,
> static int iommu_get_default_domain_type(struct iommu_group *group,
> int target_type)
> {
> - const struct iommu_ops *ops = group_iommu_ops(group);
> struct device *untrusted = NULL;
> struct group_device *gdev;
> int driver_type = 0;
> @@ -1876,11 +1875,13 @@ static int iommu_get_default_domain_type(struct iommu_group *group,
> * ARM32 drivers supporting CONFIG_ARM_DMA_USE_IOMMU can declare an
> * identity_domain and it will automatically become their default
> * domain. Later on ARM_DMA_USE_IOMMU will install its UNMANAGED domain.
> - * Override the selection to IDENTITY if we are sure the driver supports
> - * it.
> + * Override the selection to IDENTITY.
> */
> - if (IS_ENABLED(CONFIG_ARM_DMA_USE_IOMMU) && ops->identity_domain)
> + if (IS_ENABLED(CONFIG_ARM_DMA_USE_IOMMU)) {
> + static_assert(!(IS_ENABLED(CONFIG_ARM_DMA_USE_IOMMU) &&
> + IS_ENABLED(CONFIG_IOMMU_DMA)));
> driver_type = IOMMU_DOMAIN_IDENTITY;
> + }
>
> for_each_group_device(group, gdev) {
> driver_type = iommu_get_def_domain_type(group, gdev->dev,
> @@ -3016,18 +3017,9 @@ static int iommu_setup_default_domain(struct iommu_group *group,
> if (req_type < 0)
> return -EINVAL;
>
> - /*
> - * There are still some drivers which don't support default domains, so
> - * we ignore the failure and leave group->default_domain NULL.
> - */
> dom = iommu_group_alloc_default_domain(group, req_type);
> - if (!dom) {
> - /* Once in default_domain mode we never leave */
> - if (group->default_domain)
> - return -ENODEV;
> - group->default_domain = NULL;
> - return 0;
> - }
> + if (!dom)
> + return -ENODEV;
>
> if (group->default_domain == dom)
> return 0;
> --
> 2.42.0
>
--
With best wishes
Dmitry
next prev parent reply other threads:[~2023-10-02 21:23 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-09-13 13:43 [PATCH v8 00/24] iommu: Make default_domain's mandatory Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 01/24] iommu: Add iommu_ops->identity_domain Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 02/24] iommu: Add IOMMU_DOMAIN_PLATFORM Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 03/24] powerpc/iommu: Setup a default domain and remove set_platform_dma_ops Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 04/24] iommu: Add IOMMU_DOMAIN_PLATFORM for S390 Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 05/24] iommu/fsl_pamu: Implement a PLATFORM domain Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 06/24] iommu/tegra-gart: Remove tegra-gart Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 07/24] iommu/mtk_iommu_v1: Implement an IDENTITY domain Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 08/24] iommu: Reorganize iommu_get_default_domain_type() to respect def_domain_type() Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 09/24] iommu: Allow an IDENTITY domain as the default_domain in ARM32 Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 10/24] iommu/exynos: Implement an IDENTITY domain Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 11/24] iommu/tegra-smmu: " Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 12/24] iommu/tegra-smmu: Support DMA domains in tegra Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 13/24] iommu/omap: Implement an IDENTITY domain Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 14/24] iommu/msm: " Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 15/24] iommu: Remove ops->set_platform_dma_ops() Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 16/24] iommu/qcom_iommu: Add an IOMMU_IDENTITIY_DOMAIN Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 17/24] iommu/ipmmu: " Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 18/24] iommu/mtk_iommu: " Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 19/24] iommu/sun50i: " Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 20/24] iommu: Require a default_domain for all iommu drivers Jason Gunthorpe
2023-10-02 21:21 ` Dmitry Baryshkov [this message]
2023-10-02 23:00 ` Jason Gunthorpe
2023-10-03 8:34 ` Dmitry Baryshkov
2023-09-13 13:43 ` [PATCH v8 21/24] iommu: Add __iommu_group_domain_alloc() Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 22/24] iommu: Add ops->domain_alloc_paging() Jason Gunthorpe
2023-09-13 13:43 ` [PATCH v8 23/24] iommu: Convert simple drivers with DOMAIN_DMA to domain_alloc_paging() Jason Gunthorpe
2023-09-19 10:44 ` Yong Wu (吴勇)
2023-09-13 13:43 ` [PATCH v8 24/24] iommu: Convert remaining simple drivers " Jason Gunthorpe
2023-09-25 9:41 ` [PATCH v8 00/24] iommu: Make default_domain's mandatory Joerg Roedel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAA8EJprz7VVmBG68U9zLuqPd0UdSRHYoLDJSP6tCj6H6qanuTQ@mail.gmail.com \
--to=dmitry.baryshkov@linaro.org \
--cc=agross@kernel.org \
--cc=alim.akhtar@samsung.com \
--cc=andersson@kernel.org \
--cc=angelogioacchino.delregno@collabora.com \
--cc=baolin.wang@linux.alibaba.com \
--cc=baolu.lu@linux.intel.com \
--cc=digetx@gmail.com \
--cc=gerald.schaefer@linux.ibm.com \
--cc=heiko@sntech.de \
--cc=iommu@lists.linux.dev \
--cc=jernej.skrabec@gmail.com \
--cc=jgg@nvidia.com \
--cc=jonathanh@nvidia.com \
--cc=joro@8bytes.org \
--cc=jsnitsel@redhat.com \
--cc=kevin.tian@intel.com \
--cc=konrad.dybcio@linaro.org \
--cc=krzysztof.kozlowski@linaro.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-arm-msm@vger.kernel.org \
--cc=linux-mediatek@lists.infradead.org \
--cc=linux-rockchip@lists.infradead.org \
--cc=linux-s390@vger.kernel.org \
--cc=linux-samsung-soc@vger.kernel.org \
--cc=linux-sunxi@lists.linux.dev \
--cc=linux-tegra@vger.kernel.org \
--cc=linux@armlinux.org.uk \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=m.szyprowski@samsung.com \
--cc=matthias.bgg@gmail.com \
--cc=mjrosato@linux.ibm.com \
--cc=nicolinc@nvidia.com \
--cc=npiggin@gmail.com \
--cc=orsonzhai@gmail.com \
--cc=robdclark@gmail.com \
--cc=robin.murphy@arm.com \
--cc=samuel@sholland.org \
--cc=schnelle@linux.ibm.com \
--cc=steven.price@arm.com \
--cc=thierry.reding@gmail.com \
--cc=treding@nvidia.com \
--cc=vdumpa@nvidia.com \
--cc=wens@csie.org \
--cc=will@kernel.org \
--cc=yong.wu@mediatek.com \
--cc=zhang.lyra@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).