Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4503037pxv; Tue, 6 Jul 2021 02:29:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjSfHGMeC961erdBY9En+Nyp1Z8rVZRtN/ilP9JB49OzYQT2WnqM6Vjctj/wiNnl1+GshI X-Received: by 2002:a05:6402:1297:: with SMTP id w23mr21104210edv.311.1625563741274; Tue, 06 Jul 2021 02:29:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625563741; cv=none; d=google.com; s=arc-20160816; b=CAjm09VAt3leWsMB0gb3XznNHDw4M5w1nsBkMuZWynFfkU0juzEHOMRf+oLWeK/Og8 Lvy19VSxBEC9JfXRPMcaawroC+BA7Vwt/dfY5LcbPTcnFQdd7gfv1H+kwVLks6cy9UdE dLweYioz5FCeqQQp0vtWo6BUPghFl3o6u6znSMfvJY4qF6PLVV5tFL1VhMRvuEraLH2k Bj6+DvbXkSwl4r3UOxZI+CEYEtpYJWoOVZ0wHUkIVxDXitpZOnNQvm9JX/U+P19nF51V oeFnVD/A12LXV4IBP5IOqK87A0NnsZotocwTWgxvBFaLe9hrGYv5v0g0TsGRhx/PXrtJ fhRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=JumrFbglFWnhy6w5X3N7kVwiVpksHLqsghgaQLhIkA8=; b=0Bslg2EXxeb1b8lBRHVqT9fMNFdFoPLOZDov5GL0DDAc2FjvcofY177NT7UOT5NZy0 SbYpUsX8QMVTy5qjOtrVk/R0y15PQVcrptnz+mnz4YDUhDubrz/3hG0xwhDGWZtY76ok dxx88bjXgIJBzx15n+cwwEXncEY5XaBPsr8Mim5FlvMRGMdTCl9svaxtbIfT2n5zzuRv d+qx7XxaXZMJwVxutMK5kee0xhHUOLZrKAXZFNW6h6IP08k6DD3i79so/oBF8bsuNSI6 yskl2x+MyEcDOf3FgWRerx48DwF3IjnjoHcJ3j6W/J+zaViktJ5qR5AUjCl3OPWLjNEA tFyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f20si12811722edv.578.2021.07.06.02.28.38; Tue, 06 Jul 2021 02:29:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231152AbhGFJaY (ORCPT + 99 others); Tue, 6 Jul 2021 05:30:24 -0400 Received: from foss.arm.com ([217.140.110.172]:35536 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230472AbhGFJaY (ORCPT ); Tue, 6 Jul 2021 05:30:24 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8D37E31B; Tue, 6 Jul 2021 02:27:45 -0700 (PDT) Received: from [10.57.40.45] (unknown [10.57.40.45]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B1E473F5A1; Tue, 6 Jul 2021 02:27:44 -0700 (PDT) Subject: Re: [PATCH] iommu: Fallback to default setting when def_domain_type() callback returns 0 To: Kai-Heng Feng , joro@8bytes.org, will@kernel.org Cc: "open list:IOMMU DRIVERS" , open list References: <20210706065106.271765-1-kai.heng.feng@canonical.com> From: Robin Murphy Message-ID: Date: Tue, 6 Jul 2021 10:27:43 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <20210706065106.271765-1-kai.heng.feng@canonical.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-07-06 07:51, Kai-Heng Feng wrote: > Commit 28b41e2c6aeb ("iommu: Move def_domain type check for untrusted > device into core") not only moved the check for untrusted device to > IOMMU core, it also introduced a behavioral change by returning > def_domain_type() directly without checking its return value. That makes > many devices no longer use the default IOMMU setting. > > So revert back to the old behavior which defaults to > iommu_def_domain_type when driver callback returns 0. > > Fixes: 28b41e2c6aeb ("iommu: Move def_domain type check for untrusted device into core") Are you sure about that? From that same commit: @@ -1507,7 +1509,7 @@ static int iommu_alloc_default_domain(struct iommu_group *group, if (group->default_domain) return 0; - type = iommu_get_def_domain_type(dev); + type = iommu_get_def_domain_type(dev) ? : iommu_def_domain_type; return iommu_group_alloc_default_domain(dev->bus, group, type); } AFAICS the other two callers should also handle 0 correctly. Have you seen a problem in practice? Robin. > Signed-off-by: Kai-Heng Feng > --- > drivers/iommu/iommu.c | 5 +++-- > 1 file changed, 3 insertions(+), 2 deletions(-) > > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index 5419c4b9f27a..faac4f795025 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -1507,14 +1507,15 @@ EXPORT_SYMBOL_GPL(fsl_mc_device_group); > static int iommu_get_def_domain_type(struct device *dev) > { > const struct iommu_ops *ops = dev->bus->iommu_ops; > + unsigned int type = 0; > > if (dev_is_pci(dev) && to_pci_dev(dev)->untrusted) > return IOMMU_DOMAIN_DMA; > > if (ops->def_domain_type) > - return ops->def_domain_type(dev); > + type = ops->def_domain_type(dev); > > - return 0; > + return (type == 0) ? iommu_def_domain_type : type; > } > > static int iommu_group_alloc_default_domain(struct bus_type *bus, >