Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2768678pxb; Tue, 19 Jan 2021 05:49:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJyhMI0XTt5RpUkIysIsP/YXVzeb4Z2IAxeev3DpzMNKbyT0SSTLWDbrxOVxvYxpttb6mfVw X-Received: by 2002:aa7:d610:: with SMTP id c16mr3561742edr.354.1611064197879; Tue, 19 Jan 2021 05:49:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611064197; cv=none; d=google.com; s=arc-20160816; b=LgZFcsXgl9LRfXTnbVX7k5QI7Qj5c4YGysOzu2y2IsAFtsebPx9O2iO+zZhzdZraNF 2hjxGJ/0nmAJdC12Tsc0ENdiXo6mX6UPdkYwt3E0QT8K58Dt7lKxROPN+E/sg2W+yZ4p L2iaVKjdP+XzUO8hjKi+16HXATjSRZib4G+7PgoP58xQcN+IO3tY9tnmycF2I95kzowm r2WCRaINmSVkhEn1douTkcCcv/noI04iuTDsrm3navN46aV2hLBSNy44Y7NUsFPEye8w mfTJMIIIx1w6aUTxXGT0grpVu6VoBN0b2NRWamrry4ehv79ICfiIQ8JjPpV5E+qWWdPw iukw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=Cx3j61312LnfMvKNIhsLLy+rsYDuWxTQx8r5UFzFjO0=; b=oMzePTTFn+5rWEP0U/pg3WR3Lh1DWteOmEZLbGkpxAW2ka2XeuRp+UG2MQrk2EeYei ru0baDGdCcI74vWvY6GSOrrScmMGio8Y2bDN1WyMPkggBkUx4Fv9r/l6kjmdybloK4iv iuMgnOSvVkNZmpavmDAGiPiSHd3Pcp7+KFVKzNFn9YuygzXaUVJvaaY8DGA7BVGSQs2C Hm27WMEF1IpkDbTfFHo2xa5kahXSmdNqd9v6P7Nyx3pKZhlXGBfWTmF8DpXkF2vlIA+d pspjW1IWIkNqaihzFD1QE1sHQPkO06BR04sGn1P0cOte0jm/4sDJOZd1IzqwjumgqYYs 1Jzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z25si6638364edm.412.2021.01.19.05.49.15; Tue, 19 Jan 2021 05:49:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392331AbhASNpw (ORCPT + 99 others); Tue, 19 Jan 2021 08:45:52 -0500 Received: from foss.arm.com ([217.140.110.172]:59282 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393611AbhASNlG (ORCPT ); Tue, 19 Jan 2021 08:41:06 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4B8D211B3; Tue, 19 Jan 2021 05:40:13 -0800 (PST) Received: from [10.57.39.58] (unknown [10.57.39.58]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 0A3303F719; Tue, 19 Jan 2021 05:40:11 -0800 (PST) Subject: Re: [PATCH 2/2 v2] iommu: use the __iommu_attach_device() directly for deferred attach To: Lianbo Jiang , linux-kernel@vger.kernel.org Cc: joro@8bytes.org, will@kernel.org, iommu@lists.linux-foundation.org, jsnitsel@redhat.com, thomas.lendacky@amd.com, bhe@redhat.com References: <20210119111616.12761-1-lijiang@redhat.com> <20210119111616.12761-3-lijiang@redhat.com> From: Robin Murphy Message-ID: <1792a2eb-83e0-9849-082e-07a1602e25ed@arm.com> Date: Tue, 19 Jan 2021 13:40:10 +0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.6.1 MIME-Version: 1.0 In-Reply-To: <20210119111616.12761-3-lijiang@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-01-19 11:16, Lianbo Jiang wrote: > Currently, because domain attach allows to be deferred from iommu > driver to device driver, and when iommu initializes, the devices > on the bus will be scanned and the default groups will be allocated. > > Due to the above changes, some devices could be added to the same > group as below: > > [ 3.859417] pci 0000:01:00.0: Adding to iommu group 16 > [ 3.864572] pci 0000:01:00.1: Adding to iommu group 16 > [ 3.869738] pci 0000:02:00.0: Adding to iommu group 17 > [ 3.874892] pci 0000:02:00.1: Adding to iommu group 17 > > But when attaching these devices, it doesn't allow that a group has > more than one device, otherwise it will return an error. This conflicts > with the deferred attaching. Unfortunately, it has two devices in the > same group for my side, for example: > > [ 9.627014] iommu_group_device_count(): device name[0]:0000:01:00.0 > [ 9.633545] iommu_group_device_count(): device name[1]:0000:01:00.1 > ... > [ 10.255609] iommu_group_device_count(): device name[0]:0000:02:00.0 > [ 10.262144] iommu_group_device_count(): device name[1]:0000:02:00.1 > > Finally, which caused the failure of tg3 driver when tg3 driver calls > the dma_alloc_coherent() to allocate coherent memory in the tg3_test_dma(). > > [ 9.660310] tg3 0000:01:00.0: DMA engine test failed, aborting > [ 9.754085] tg3: probe of 0000:01:00.0 failed with error -12 > [ 9.997512] tg3 0000:01:00.1: DMA engine test failed, aborting > [ 10.043053] tg3: probe of 0000:01:00.1 failed with error -12 > [ 10.288905] tg3 0000:02:00.0: DMA engine test failed, aborting > [ 10.334070] tg3: probe of 0000:02:00.0 failed with error -12 > [ 10.578303] tg3 0000:02:00.1: DMA engine test failed, aborting > [ 10.622629] tg3: probe of 0000:02:00.1 failed with error -12 > > In addition, the similar situations also occur in other drivers such > as the bnxt_en driver. That can be reproduced easily in kdump kernel > when SME is active > > Let's move the handling currently in iommu_dma_deferred_attach() into > the iommu core code so that it can call the __iommu_attach_device() > directly instead of the iommu_attach_device(). The external interface > iommu_attach_device() is not suitable for handling this situation. Reviewed-by: Robin Murphy > Signed-off-by: Lianbo Jiang > --- > drivers/iommu/dma-iommu.c | 18 +++--------------- > drivers/iommu/iommu.c | 12 ++++++++++++ > include/linux/iommu.h | 2 ++ > 3 files changed, 17 insertions(+), 15 deletions(-) > > diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c > index 3711b4a6e4f9..fa6f9098e77d 100644 > --- a/drivers/iommu/dma-iommu.c > +++ b/drivers/iommu/dma-iommu.c > @@ -380,18 +380,6 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, > return iova_reserve_iommu_regions(dev, domain); > } > > -static int iommu_dma_deferred_attach(struct device *dev, > - struct iommu_domain *domain) > -{ > - const struct iommu_ops *ops = domain->ops; > - > - if (unlikely(ops->is_attach_deferred && > - ops->is_attach_deferred(domain, dev))) > - return iommu_attach_device(domain, dev); > - > - return 0; > -} > - > /** > * dma_info_to_prot - Translate DMA API directions and attributes to IOMMU API > * page flags. > @@ -535,7 +523,7 @@ static dma_addr_t __iommu_dma_map(struct device *dev, phys_addr_t phys, > dma_addr_t iova; > > if (static_branch_unlikely(&__deferred_attach) && > - iommu_dma_deferred_attach(dev, domain)) > + iommu_do_deferred_attach(dev, domain)) > return DMA_MAPPING_ERROR; > > size = iova_align(iovad, size + iova_off); > @@ -694,7 +682,7 @@ static void *iommu_dma_alloc_remap(struct device *dev, size_t size, > *dma_handle = DMA_MAPPING_ERROR; > > if (static_branch_unlikely(&__deferred_attach) && > - iommu_dma_deferred_attach(dev, domain)) > + iommu_do_deferred_attach(dev, domain)) > return NULL; > > min_size = alloc_sizes & -alloc_sizes; > @@ -1005,7 +993,7 @@ static int iommu_dma_map_sg(struct device *dev, struct scatterlist *sg, > int i; > > if (static_branch_unlikely(&__deferred_attach) && > - iommu_dma_deferred_attach(dev, domain)) > + iommu_do_deferred_attach(dev, domain)) > return 0; > > if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC)) > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index ffeebda8d6de..32164d355d2e 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -1980,6 +1980,18 @@ int iommu_attach_device(struct iommu_domain *domain, struct device *dev) > } > EXPORT_SYMBOL_GPL(iommu_attach_device); > > +int iommu_do_deferred_attach(struct device *dev, > + struct iommu_domain *domain) > +{ > + const struct iommu_ops *ops = domain->ops; > + > + if (unlikely(ops->is_attach_deferred && > + ops->is_attach_deferred(domain, dev))) > + return __iommu_attach_device(domain, dev); > + > + return 0; > +} > + > /* > * Check flags and other user provided data for valid combinations. We also > * make sure no reserved fields or unused flags are set. This is to ensure > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > index b3f0e2018c62..c04bbd30aa1d 100644 > --- a/include/linux/iommu.h > +++ b/include/linux/iommu.h > @@ -424,6 +424,8 @@ extern struct iommu_group *iommu_group_get_by_id(int id); > extern void iommu_domain_free(struct iommu_domain *domain); > extern int iommu_attach_device(struct iommu_domain *domain, > struct device *dev); > +extern int iommu_do_deferred_attach(struct device *dev, > + struct iommu_domain *domain); > extern void iommu_detach_device(struct iommu_domain *domain, > struct device *dev); > extern int iommu_uapi_cache_invalidate(struct iommu_domain *domain, >