Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1001183pxb; Fri, 22 Jan 2021 04:58:01 -0800 (PST) X-Google-Smtp-Source: ABdhPJwmLCaboZq9sDWGtC2IWKakGun7J63B6yLddy33pMgRZBTODQw71Z7fRbVbQKbXrpLtxW+C X-Received: by 2002:aa7:d651:: with SMTP id v17mr3141819edr.91.1611320281204; Fri, 22 Jan 2021 04:58:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611320281; cv=none; d=google.com; s=arc-20160816; b=pq9r6dABqbAxN+JJlKb8bYTn6rs5+3c6uhbqyNzDD4seiB0vRd30CyU2VH7BRebzJ7 /21dtUgKLoHeoR22/JFJlqrZELcLa6Xv359Zc+UrMzW8+JO+xo4DnjVMkqoFnYoWMXB7 Zaj8D0EnfR40U0FF8K+UKY7mUxwGgSzyVcgv0M4x6j6T9VUmo00qG5lKxFCp6CHU+HYJ l3MEJs7SHQGrswdxiUoUjiH+wWdDotpJlXT/Nm3mG6qQY5y09ESIhczmYE98aSVmXebm eqhxNXgglbV9ip5M/4wnta1VMv+tblAfOSJkPFu7Z059LbD2f/1smMGihvJ+6kHu4y34 vTHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=vsMzQ6W/TGNBPigUK5vSkooSBPN0nDkh06yGEjaccwI=; b=H+kD1pY8lG2eadE+JshscFlzxf0Hf2HkYgWFI/mQU1/wpTqgi1CO7iqUNZlBI7TBRP 2dKL4BkM3DZ/qW7+uJXp/sPYivmnRoeQI+E3WtgWx7BujOiATHbnCJaqkBJEoUtmyeZP ftXYzwHTjPvs++e1+sABZKDVjVOsPr49FJkvm9pCP86tRCrP1DZegRSir0MGKC8jbYBU 23LAymSMn+zWpSFzvKL5d7XLWFhI6/8DszINBRvSxJTDN+dejyeDiFAfmigBxG5QiL7t kVtDiIxkSsfsslr5PLf8PdSGVwRFaE99U9NRh5fSMj+KzMudNbHgftK5RzsP/JK9qtqw lI/Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id da25si3453938edb.72.2021.01.22.04.57.32; Fri, 22 Jan 2021 04:58:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727697AbhAVMyo (ORCPT + 99 others); Fri, 22 Jan 2021 07:54:44 -0500 Received: from foss.arm.com ([217.140.110.172]:46288 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727533AbhAVMyd (ORCPT ); Fri, 22 Jan 2021 07:54:33 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9BD7511B3; Fri, 22 Jan 2021 04:53:41 -0800 (PST) Received: from [10.57.39.58] (unknown [10.57.39.58]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 2AF2D3F66E; Fri, 22 Jan 2021 04:53:18 -0800 (PST) Subject: Re: [PATCH v2 1/3] iommu/arm-smmu: Add support for driver IOMMU fault handlers To: Will Deacon , Jordan Crouse Cc: linux-arm-msm@vger.kernel.org, iommu@lists.linux-foundation.org, Greg Kroah-Hartman , Joerg Roedel , Krishna Reddy , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org References: <20201124191600.2051751-1-jcrouse@codeaurora.org> <20201124191600.2051751-2-jcrouse@codeaurora.org> <20210122124125.GA24102@willie-the-truck> From: Robin Murphy Message-ID: <8ba2f53d-abbf-af7f-07f6-48ad7f383a37@arm.com> Date: Fri, 22 Jan 2021 12:53:17 +0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.6.1 MIME-Version: 1.0 In-Reply-To: <20210122124125.GA24102@willie-the-truck> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-01-22 12:41, Will Deacon wrote: > On Tue, Nov 24, 2020 at 12:15:58PM -0700, Jordan Crouse wrote: >> Call report_iommu_fault() to allow upper-level drivers to register their >> own fault handlers. >> >> Signed-off-by: Jordan Crouse >> --- >> >> drivers/iommu/arm/arm-smmu/arm-smmu.c | 16 +++++++++++++--- >> 1 file changed, 13 insertions(+), 3 deletions(-) >> >> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c b/drivers/iommu/arm/arm-smmu/arm-smmu.c >> index 0f28a8614da3..7fd18bbda8f5 100644 >> --- a/drivers/iommu/arm/arm-smmu/arm-smmu.c >> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c >> @@ -427,6 +427,7 @@ static irqreturn_t arm_smmu_context_fault(int irq, void *dev) >> struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); >> struct arm_smmu_device *smmu = smmu_domain->smmu; >> int idx = smmu_domain->cfg.cbndx; >> + int ret; >> >> fsr = arm_smmu_cb_read(smmu, idx, ARM_SMMU_CB_FSR); >> if (!(fsr & ARM_SMMU_FSR_FAULT)) >> @@ -436,11 +437,20 @@ static irqreturn_t arm_smmu_context_fault(int irq, void *dev) >> iova = arm_smmu_cb_readq(smmu, idx, ARM_SMMU_CB_FAR); >> cbfrsynra = arm_smmu_gr1_read(smmu, ARM_SMMU_GR1_CBFRSYNRA(idx)); >> >> - dev_err_ratelimited(smmu->dev, >> - "Unhandled context fault: fsr=0x%x, iova=0x%08lx, fsynr=0x%x, cbfrsynra=0x%x, cb=%d\n", >> + ret = report_iommu_fault(domain, dev, iova, >> + fsynr & ARM_SMMU_FSYNR0_WNR ? IOMMU_FAULT_WRITE : IOMMU_FAULT_READ); >> + >> + if (ret == -ENOSYS) >> + dev_err_ratelimited(smmu->dev, >> + "Unhandled context fault: fsr=0x%x, iova=0x%08lx, fsynr=0x%x, cbfrsynra=0x%x, cb=%d\n", >> fsr, iova, fsynr, cbfrsynra, idx); >> >> - arm_smmu_cb_write(smmu, idx, ARM_SMMU_CB_FSR, fsr); >> + /* >> + * If the iommu fault returns an error (except -ENOSYS) then assume that >> + * they will handle resuming on their own >> + */ >> + if (!ret || ret == -ENOSYS) >> + arm_smmu_cb_write(smmu, idx, ARM_SMMU_CB_FSR, fsr); > > Hmm, I don't grok this part. If the fault handler returned an error and > we don't clear the FSR, won't we just re-take the irq immediately? If we don't touch the FSR at all, yes. Even if we clear the fault indicator bits, the interrupt *might* remain asserted until a stalled transaction is actually resolved - that's that lovely IMP-DEF corner. Robin. > I think > it would be better to do this unconditionally, and print the "Unhandled > context fault" message for any non-zero value of ret. > > Will >