virtualization.lists.linux-foundation.org archive mirror
 help / color / mirror / Atom feed
From: Will Deacon <will.deacon@arm.com>
To: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Robin Murphy <robin.murphy@arm.com>,
	linux-arm-kernel@lists.infradead.org, luto@kernel.org,
	virtualization@lists.linux-foundation.org
Subject: Re: [PATCH v2 2/2] vring: Force use of DMA API for ARM-based systems
Date: Fri, 13 Jan 2017 17:21:54 +0000	[thread overview]
Message-ID: <20170113172154.GL3253@arm.com> (raw)
In-Reply-To: <20170113183222-mutt-send-email-mst@kernel.org>

On Fri, Jan 13, 2017 at 06:46:32PM +0200, Michael S. Tsirkin wrote:
> On Fri, Jan 13, 2017 at 09:25:22AM +0000, Will Deacon wrote:
> > On Fri, Jan 13, 2017 at 12:12:56AM +0200, Michael S. Tsirkin wrote:
> > > On Wed, Jan 11, 2017 at 10:01:39AM +0000, Will Deacon wrote:
> > > > On Wed, Jan 11, 2017 at 01:33:31AM +0200, Michael S. Tsirkin wrote:
> > > > > On Tue, Jan 10, 2017 at 05:51:18PM +0000, Robin Murphy wrote:
> > > > > > From: Will Deacon <will.deacon@arm.com>
> > > > > > 
> > > > > > Booting Linux on an ARM fastmodel containing an SMMU emulation results
> > > > > > in an unexpected I/O page fault from the legacy virtio-blk PCI device:
> > > > > > 
> > > > > > [    1.211721] arm-smmu-v3 2b400000.smmu: event 0x10 received:
> > > > > > [    1.211800] arm-smmu-v3 2b400000.smmu:	0x00000000fffff010
> > > > > > [    1.211880] arm-smmu-v3 2b400000.smmu:	0x0000020800000000
> > > > > > [    1.211959] arm-smmu-v3 2b400000.smmu:	0x00000008fa081002
> > > > > > [    1.212075] arm-smmu-v3 2b400000.smmu:	0x0000000000000000
> > > > > > [    1.212155] arm-smmu-v3 2b400000.smmu: event 0x10 received:
> > > > > > [    1.212234] arm-smmu-v3 2b400000.smmu:	0x00000000fffff010
> > > > > > [    1.212314] arm-smmu-v3 2b400000.smmu:	0x0000020800000000
> > > > > > [    1.212394] arm-smmu-v3 2b400000.smmu:	0x00000008fa081000
> > > > > > [    1.212471] arm-smmu-v3 2b400000.smmu:	0x0000000000000000
> > > > > > 
> > > > > > <system hangs failing to read partition table>
> > > > > > 
> > > > > > This is because the virtio-blk is behind an SMMU, so we have consequently
> > > > > > swizzled its DMA ops and configured the SMMU to translate accesses. This
> > > > > > then requires the vring code to use the DMA API to establish translations,
> > > > > > otherwise all transactions will result in fatal faults and termination.
> > > > > > 
> > > > > > Given that ARM-based systems only see an SMMU if one is really present
> > > > > > (the topology is all described by firmware tables such as device-tree or
> > > > > > IORT), then we can safely use the DMA API for all virtio devices.
> > > > > > 
> > > > > > Cc: Andy Lutomirski <luto@kernel.org>
> > > > > > Cc: Michael S. Tsirkin <mst@redhat.com>
> > > > > > Signed-off-by: Will Deacon <will.deacon@arm.com>
> > > > > 
> > > > > I'd like to better understand then need for this one.
> > > > > Can't the device in question just set VIRTIO_F_IOMMU_PLATFORM ?
> > > > > 
> > > > > I'd rather we avoided need for more hacks and just
> > > > > have everyone switch to that.
> > > > 
> > > > There are a couple of problems with VIRTIO_F_IOMMU_PLATFORM:
> > > > 
> > > > 1. It doesn't exist for legacy devices, which are all we have on the
> > > >    platform in question.
> > > > 
> > > > 2. It's not documented in the virtio sp^H^HSTOP PRESS. I see you applied
> > > >    my patch ;). Thanks.
> > > > 
> > > > In which case, for non-legacy devices we should definitely be using
> > > > VIRTIO_F_IOMMU_PLATFORM, but since this platform hasn't yet moved to the
> > > > world of flying cars, could we unconditionally set the DMA ops on ARM
> > > > for legacy devices? The alternative is disabling the SMMU altogether,
> > > > but that's less than ideal because there are non-virtio devices on the
> > > > same PCI bus.
> > > > 
> > > 
> > > I'd rather people didn't use SMMU with legacy devices.
> > 
> > I'm afraid we've been doing that for two years and the model already
> > exists in a mature state, being actively used for development and
> > validation by ARM and our partners. One of the big things its used for
> > is to develop SMMU and GIC (our interrupt controller) code with PCI, so
> > dropping the SMMU from the picture isn't an option.
> 
> Oh so this fixes a regression?  This is something I didn't realize.

Yes, thanks. The regression came about because we implemented SMMU-backed
DMA ops and only then was it apparent that the virtio stuff was bypassing
even with translation enabled (because it wasn't using the DMA API).

> A "Fixes:" tag can't hurt here.  I then wonder
> might DMA ops ever use a DMA address which isn't a physical address
> from QEMU point of view? If that happens, this hack breaks
> because in legacy mode QEMU still uses the GPA.

If QEMU doesn't advertise an SMMU, then it will work fine with the GPA,
because we won't swizzle the DMA ops for the master device. If QEMU does
advertise an SMMU, then we'll allocate DMA addresses to fit within the
the intersection of the SMMU aperture and device's DMA mask.

> > > Can't you guys just code up the virtio 1 layout in QEMU?
> > > I took a look and it's not a big deal now that two other
> > > transports converted, except mmio code in QEMU doesn't
> > > use linux header to it's a bit messy.
> > > I'll send a patch to clean that up.
> > 
> > If the model ever changes in this area (which isn't planned atm), the
> > right thing to do would be to move to modern virtio. However, we're stuck
> > with what we have for the forseeable future and it works just fine if we
> > use the DMA API. If we don't use it, Linux no longer boots because it
> > installs the SMMU-backed DMA ops for the virtio devices and everything
> > faults.
> > 
> > I really don't understand why this is controversial.
> > 
> I agree we need to keep working things working. I just don't yet
> understand what change broke things and how did it happen - legacy
> devices used to just poke at guest PA from QEMU, what does it matter
> that there are changes in DMA ops if neither host nor guest use them for
> legacy setups?

The problem is that platforms which advertise an SMMU downstream of the
(virtual) PCI-RC now automatically have their PCI devices attached to the
SMMU, so if they don't use the DMA ops then they will fault.

> I guess that's just me now knowing about how DMA ops work on SMMU
> or missing some other basic point about SMMU.
> 
> I take your word that it's the right thing to do, but I'd like to figure
> it out before merging this.  I'll read up in the coming days to make
> sure I understand what the patch does, any pointers welcome.

Ok, thanks. Just shout if you have more questions. I'm also happy with
only doing this for legacy devices, given that modern virtio has the
IOMMU flag.

Will

  reply	other threads:[~2017-01-13 17:21 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-01-10 17:51 [PATCH v2 1/2] virtio_mmio: Set DMA masks appropriately Robin Murphy
2017-01-10 17:51 ` [PATCH v2 2/2] vring: Force use of DMA API for ARM-based systems Robin Murphy
2017-01-10 23:33   ` Michael S. Tsirkin
2017-01-11 10:01     ` Will Deacon
2017-01-11 18:12       ` Andy Lutomirski
2017-01-13  9:40         ` Will Deacon
2017-01-13 16:59         ` Michael S. Tsirkin
2017-01-12 22:12       ` Michael S. Tsirkin
2017-01-13  9:25         ` Will Deacon
2017-01-13 16:46           ` Michael S. Tsirkin
2017-01-13 17:21             ` Will Deacon [this message]
2017-01-13 18:23               ` Michael S. Tsirkin
2017-01-16 10:40                 ` Will Deacon
2017-01-16 14:18                   ` Michael S. Tsirkin
2017-01-16 14:21                     ` Will Deacon
2017-01-16 14:27                       ` Michael S. Tsirkin
2017-01-16 14:34                         ` Will Deacon
2017-01-19 21:51                           ` Michael S. Tsirkin
2017-01-20 10:33                             ` Will Deacon
2017-01-24 16:04                               ` Marc Zyngier
     [not found]                               ` <5ad8ce42-a469-7417-d2c5-58cc0da89e8d@arm.com>
2017-01-24 16:06                                 ` Michael S. Tsirkin
2017-01-24 16:10                                   ` Marc Zyngier
2017-01-10 23:30 ` [PATCH v2 1/2] virtio_mmio: Set DMA masks appropriately Michael S. Tsirkin
2017-01-11 10:31 ` Jean-Philippe Brucker

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170113172154.GL3253@arm.com \
    --to=will.deacon@arm.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=luto@kernel.org \
    --cc=mst@redhat.com \
    --cc=robin.murphy@arm.com \
    --cc=virtualization@lists.linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).