Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp197008pxb; Tue, 15 Feb 2022 11:14:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJwqiCV2aApNg9ZmuELhbKIPieEyZiAlt3B184W8zWwojoaIb6Nx4ZYO1kbUu4fdUHTj7yEt X-Received: by 2002:a17:902:d346:: with SMTP id l6mr166985plk.31.1644952477591; Tue, 15 Feb 2022 11:14:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644952477; cv=none; d=google.com; s=arc-20160816; b=eTN6CZeUZblFY1gkgxw5QaVSzvBLUOUtiGvg5L9UQyp4NIT3kQZHqmIpA3wD/2+6ye UUBYrvxXhuu9cHnpOEVXywjJlOdpGL2e6nJsSk1ChrLnP0luZR6Zsk2ROZYXaM6tL4sd V593Gz93KiJSj5Ro5Mc6LaKg0CmKTF26E2x0fnaicVahYhpLgxegmNomDfK4JO1OF4Si H8pkv4iIb9uIE/hpeXLSOC3ewDZwfIWiHB369b8QbraAtCamOs5aNtK3ELUj+JwPH60f Vd62oTNHrNEz0wd7gL/x3YA8M6OXIJ8uu6Y3zTfSJsiXIexQpgspv6uuvEgsmqx+Uzdw CUqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=pLoFazgq9VuxL93NoaAJWK/ie9tby9DV6LUm8nbrOGI=; b=vk9Oa3DrLA87fgLgz2OQhKq7bXZAQlb9zZ77QnUtFNQl7y97Mh7Y60/H4gFuM5nnIp 13XbyrgfH7Wr3jZ88ArLVgvekCzCfRruNn82pEIJ0UqftYepiT5oThVBi069l4sg/KSk /KfiEdntgCrGwnWSF4iDAD2/mUm/DFso51tedpxaO+qQBdELBsRa5g9oibA5xKtykOV0 RZlIPnFFpr70NZudAQn1MsVpMseYuc1yq+sGSbj/FKeIIOgqm9CElXqBS+xbWFgYVy/c vdsarvuyLl5flu0Z4mm+Joxth23Pi/hm6FQ7lvsaDcl0+UDbuA0rqUD6j/fm2eEXmgxA iYUQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h14si15769158pjq.127.2022.02.15.11.14.21; Tue, 15 Feb 2022 11:14:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238604AbiBOO3t (ORCPT + 99 others); Tue, 15 Feb 2022 09:29:49 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:49450 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232774AbiBOO3r (ORCPT ); Tue, 15 Feb 2022 09:29:47 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 36EC9E1B4D; Tue, 15 Feb 2022 06:29:36 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 78DC11396; Tue, 15 Feb 2022 06:29:36 -0800 (PST) Received: from [10.57.70.89] (unknown [10.57.70.89]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 327793F718; Tue, 15 Feb 2022 06:29:32 -0800 (PST) Message-ID: <161e5005-ea12-fde4-0e31-ec871d2fe591@arm.com> Date: Tue, 15 Feb 2022 14:29:27 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Thunderbird/91.6.0 Subject: Re: [PATCH v3 8/8] iommu/arm-smmu-v3: Make default domain type of HiSilicon PTT device to identity Content-Language: en-GB To: Will Deacon Cc: Yicong Yang , mark.rutland@arm.com, prime.zeng@huawei.com, alexander.shishkin@linux.intel.com, linux-pci@vger.kernel.org, linuxarm@huawei.com, Yicong Yang , daniel.thompson@linaro.org, peterz@infradead.org, mingo@redhat.com, helgaas@kernel.org, liuqi115@huawei.com, mike.leach@linaro.org, suzuki.poulose@arm.com, coresight@lists.linaro.org, acme@kernel.org, zhangshaokun@hisilicon.com, linux-arm-kernel@lists.infradead.org, mathieu.poirier@linaro.org, gregkh@linuxfoundation.org, linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, iommu@lists.linux-foundation.org, leo.yan@linaro.org References: <20220124131118.17887-1-yangyicong@hisilicon.com> <20220124131118.17887-9-yangyicong@hisilicon.com> <20220215130044.GA7154@willie-the-truck> <9018a1d9-4d42-3a99-dbc6-c55139abcb1e@arm.com> <20220215134232.GA7592@willie-the-truck> From: Robin Murphy In-Reply-To: <20220215134232.GA7592@willie-the-truck> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-02-15 13:42, Will Deacon wrote: > On Tue, Feb 15, 2022 at 01:30:26PM +0000, Robin Murphy wrote: >> On 2022-02-15 13:00, Will Deacon wrote: >>> On Mon, Feb 14, 2022 at 08:55:20PM +0800, Yicong Yang wrote: >>>> On 2022/1/24 21:11, Yicong Yang wrote: >>>>> The DMA of HiSilicon PTT device can only work with identical >>>>> mapping. So add a quirk for the device to force the domain >>>>> passthrough. >>>>> >>>>> Signed-off-by: Yicong Yang >>>>> --- >>>>> drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 16 ++++++++++++++++ >>>>> 1 file changed, 16 insertions(+) >>>>> >>>>> diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>>>> index 6dc6d8b6b368..6f67a2b1dd27 100644 >>>>> --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>>>> +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>>>> @@ -2838,6 +2838,21 @@ static int arm_smmu_dev_disable_feature(struct device *dev, >>>>> } >>>>> } >>>>> +#define IS_HISI_PTT_DEVICE(pdev) ((pdev)->vendor == PCI_VENDOR_ID_HUAWEI && \ >>>>> + (pdev)->device == 0xa12e) >>>>> + >>>>> +static int arm_smmu_def_domain_type(struct device *dev) >>>>> +{ >>>>> + if (dev_is_pci(dev)) { >>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>> + >>>>> + if (IS_HISI_PTT_DEVICE(pdev)) >>>>> + return IOMMU_DOMAIN_IDENTITY; >>>>> + } >>>>> + >>>>> + return 0; >>>>> +} >>>>> + >>>>> static struct iommu_ops arm_smmu_ops = { >>>>> .capable = arm_smmu_capable, >>>>> .domain_alloc = arm_smmu_domain_alloc, >>>>> @@ -2863,6 +2878,7 @@ static struct iommu_ops arm_smmu_ops = { >>>>> .sva_unbind = arm_smmu_sva_unbind, >>>>> .sva_get_pasid = arm_smmu_sva_get_pasid, >>>>> .page_response = arm_smmu_page_response, >>>>> + .def_domain_type = arm_smmu_def_domain_type, >>>>> .pgsize_bitmap = -1UL, /* Restricted during device attach */ >>>>> .owner = THIS_MODULE, >>>>> }; >>>>> >>>> >>>> Is this quirk ok with the SMMU v3 driver? Just want to confirm that I'm on the >>>> right way to dealing with the issue of our device. >>> >>> I don't think the quirk should be in the SMMUv3 driver. Assumedly, you would >>> have the exact same problem if you stuck the PTT device behind a different >>> type of IOMMU, and so the quirk should be handled by a higher level of the >>> stack. >> >> Conceptually, yes, but I'm inclined to be pragmatic here. Default domain >> quirks could only move out as far as the other end of the call from >> iommu_get_def_domain_type() - it's not like we could rely on some flag in a >> driver which may not even be loaded yet, let alone matched to the device. >> And even then there's an equal and opposite argument for why the core code >> should have to maintain a list of platform-specific quirks rather than code >> specific to the relevant platforms. The fact is that a HiSilicon RCiEP is >> not going to end up behind anything other than a HiSilicon IOMMU, and if >> those ever stop being SMMUv3 *and* such a quirk still exists we can worry >> about it then. > > Perhaps, but you know that by adding this hook it's only a matter of time > before we get random compatible string matches in there, so I'd rather keep > the flood gates closed as long as we can. > > Given that this is a PCI device, why can't we have a PCI quirk for devices > which require an identity mapping and then handle that in the IOMMU core? Oh, don't think I *like* having quirks in the driver, it just seems like the least-worst choice from a bad bunch. All of the default domain quirks so far (including this one) exist for integrated devices and/or dodgy firmware setups such that they are platform-specific, so there is no technical reason for trying to split *some* of them off into a generic mechanism when the driver-based platform-specific mechanism still needs to exist anyway (some of them do depend on driver state as well). Feel free to test the waters with a patch punting qcom_smmu_def_domain_type() to core code, but I think you'll struggle to find a reason to give in the commit message other than "I don't like it". >> Ugly as it is, this is the status quo. I don't recall anyone ever arguing >> that the equivalent quirks for Intel integrated graphics should be made >> generic ;) > > I don't know anything about Intel integrated graphics. Have they solved this > problem in a better way, or could they equally make use of a generic quirk? See intel-iommu's device_def_domain_type() implementation. The shape of it may seem quite familiar... Robin.