Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp517527pxv; Thu, 8 Jul 2021 07:45:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzMeIb0uqzL4MEDaFU2Gb7ZIrrRgRnUcGql1mREjqD3eQY2Gd7brjofxq8NwFlmvasBDCcf X-Received: by 2002:a05:6638:3882:: with SMTP id b2mr15473960jav.15.1625755536065; Thu, 08 Jul 2021 07:45:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625755536; cv=none; d=google.com; s=arc-20160816; b=paZcKUh26St8ETN/pYxwwWydB0ka2Ip/+kKU/GjMRJ8Rh8mQVDKYVWaf2v18YWk+P+ tvJt03aLvR0pRvBHozuEDpnfFR6JE/KT2PR5zVnHLMJgCltWw3RtEbGByLkn7i+EaxnU n/2OXGWvVD9vgRCclVfdW4DeCQ+NA1E9iCw4Ya3AeiULNZmpOSCC7XPeKhLKVFpDmgPi WBcugM5p7ez/PEeIM7debbvJvltNVl4z/b0gGZH5XrarYvA1zzXuaMQIUDNUnKrUqW/H QELoYVGAo4n6gFMEMo8fvwZfOchuig8De91/mNMP9DEB2n7ZUHwi7Vj7ei26xb0HCwf/ fjwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=DS2kTglPR5PwuDbTSMketBIZrDZS4ydBw4ifhoQUtQ0=; b=BvfKuI9GR/W3guQb+wJ6wHkfDd84FKIgiSsb2/QppVwBuz/Fx+qJFo9dfXRaBX1Iio jhoTpDYCPESBJpejoRVMcgz91hqnFBhnI5BFfydOUC3Ohf6ClsassiM/JONa5rvazPMv NFPBLAZaIk/flG4bJ4DP6wvrgKbtINkTSZOvALygdsedD9HJ4PRiFnfKoxjfpyw3gr18 BlSho1wGoqsnyQjZ8FWHhfq+Ne0+cPiJfxlZ/nBikuM3VE8T5jEHv7y+LUKWCAAUhRv0 nvG1Riz19TRPk3Gif2QD2HyjDBm49oZCbUg8CjKeQtPRHYmR4DqTN+NdyMRVZR4CbVMJ gvLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a24si2356074iol.81.2021.07.08.07.45.24; Thu, 08 Jul 2021 07:45:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231836AbhGHOqe (ORCPT + 99 others); Thu, 8 Jul 2021 10:46:34 -0400 Received: from foss.arm.com ([217.140.110.172]:60604 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229738AbhGHOqd (ORCPT ); Thu, 8 Jul 2021 10:46:33 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A4B321424; Thu, 8 Jul 2021 07:43:51 -0700 (PDT) Received: from [10.57.35.192] (unknown [10.57.35.192]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id C709D3F66F; Thu, 8 Jul 2021 07:43:50 -0700 (PDT) Subject: Re: [PATCH] iommu/amd: Enable swiotlb if any device supports iommu v2 and uses identity mapping To: Kai-Heng Feng Cc: will@kernel.org, "open list:AMD IOMMU (AMD-VI)" , open list , Joerg Roedel References: <20210708074232.924844-1-kai.heng.feng@canonical.com> From: Robin Murphy Message-ID: Date: Thu, 8 Jul 2021 15:43:42 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-07-08 14:57, Kai-Heng Feng wrote: > On Thu, Jul 8, 2021 at 6:18 PM Robin Murphy wrote: >> >> On 2021-07-08 10:28, Joerg Roedel wrote: >>> On Thu, Jul 08, 2021 at 03:42:32PM +0800, Kai-Heng Feng wrote: >>>> @@ -344,6 +344,9 @@ static int iommu_init_device(struct device *dev) >>>> >>>> iommu = amd_iommu_rlookup_table[dev_data->devid]; >>>> dev_data->iommu_v2 = iommu->is_iommu_v2; >>>> + >>>> + if (dev_data->iommu_v2) >>>> + swiotlb = 1; >>> >>> This looks like the big hammer, as it will affect all other systems >>> where the AMD GPUs are in their own group. >>> >>> What is needed here is an explicit check whether a non-iommu-v2 device >>> is direct-mapped because it shares a group with the GPU, and only enable >>> swiotlb in this case. >> >> Right, it's basically about whether any DMA-limited device might at any >> time end up in an IOMMU_DOMAIN_IDENTITY domain. And given the >> possibility of device hotplug and the user being silly with the sysfs >> interface, I don't think we can categorically determine that at boot time. >> >> Also note that Intel systems are likely to be similarly affected (in >> fact intel-iommu doesn't even have the iommu_default_passthough() check >> so it's probably even easier to blow up). > > swiotlb is enabled by pci_swiotlb_detect_4gb() and intel-iommu doesn't > disable it. Oh, right... I did say I found this dance hard to follow. Clearly I shouldn't have trusted what I thought I remembered from looking at it yesterday :) Also not helped by the fact that it sets iommu_detected which *does* disable SWIOTLB, but only on IA-64. > I wonder if we can take the same approach in amd-iommu? Certainly if there's a precedent for leaving SWIOTLB enabled even if it *might* be redundant, that seems like the easiest option (it's what we do on arm64 too, but then we have system topologies where some devices may not be behind IOMMUs even when others are). More fun would be to try to bring it up at the first sign of IOMMU_DOMAIN_IDENTITY if it was disabled previously, but I don't have the highest hope of that being practical. Robin.