Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp5655894rwl; Tue, 21 Mar 2023 23:54:22 -0700 (PDT) X-Google-Smtp-Source: AK7set9M4q19Znw4fKQatEzLwcrNpobDb2pRztGuJCeyL++uP/wX6SddDwIT8p7SA9SwJz1JjLJe X-Received: by 2002:a17:906:f101:b0:932:748b:196e with SMTP id gv1-20020a170906f10100b00932748b196emr5853984ejb.45.1679468061729; Tue, 21 Mar 2023 23:54:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679468061; cv=none; d=google.com; s=arc-20160816; b=i6EYVIg3xSknHgqJvKFBzDd/Oy8yJ0dng0f7+/5gMNX3lqqtq758rqV8QUn+suxOVw HpAThFhKwg/IdAynO/6C7pMHorkSrOsj2x/lp7WsctK46pqkXV5EK+WQWsniKIO87mmF NaDpCmzASmXE3nAwbOXPOdyXX8s5KZq+tWfs1YIBsh3cYRgAhKFYSLjweaLxp11gbVYL 2AEFAudKt/4G7JYNTl7zI7wk/Xn0vTERVEbX9Ev6J1XCuSj5k1zo1YfMDGJHdw1FcsfN PSA7Ywj8oWO7VxwtHAPng3HnU6ClEd2a5PKEFdSxFtN/Pvieqkq1x+Wvx6PTB2J0SS0O Vl7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IZXEKKG5B/wSH5rBbV7DG1HYAFxtVNNCLEBl6hseq28=; b=S+ScAljIcXVuOwnpOWkTxhxGnvnF/eex+KnNvIRmv5y2Wo38ZqR2XTHBrVOXJBMMGn q1GoOzWCTv48KkL+4XQb9/8BYVXoIlPRhdZ5TIfPJJS2JDxuTy2bL4PVoJBiT+zpCNQE Jn5Es3/6zdjgDXweW3sc+DVArjBTgCpDG/HMKcsbt2hmtw/pZ34gGaBWFf1+1GM49+DO 1hTB/c++SZcaUzrq+cD3Tloi22HsfUPTnGyLlBPw59DxBdleBHqdIiXknrh9Jio9IenA uD3pWBHsNyqkZ7boAtTC1F3JYrrKJ2xercplDqNpiExCJiWwSGR/LF0J3cf4mP+rtPTf 5/3w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ayBn1ds8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id fy39-20020a1709069f2700b0093472dbf64asi6942023ejc.557.2023.03.21.23.53.57; Tue, 21 Mar 2023 23:54:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ayBn1ds8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229635AbjCVGuR (ORCPT + 99 others); Wed, 22 Mar 2023 02:50:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229784AbjCVGtx (ORCPT ); Wed, 22 Mar 2023 02:49:53 -0400 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 10E9156516 for ; Tue, 21 Mar 2023 23:49:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1679467787; x=1711003787; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=xP7VJduO7JMRCBdiR2gq1cP4nZMZAj/onHcGkgWCalY=; b=ayBn1ds8RFyAxQp+wWXjXPkcmCzhkNqA8UNBFBTb4MRkegi8wIXvSFUt 83hL8CV+d7Yd4JSPmF6p0r+Ldof+DrcbUhfAoKNOmKiAntVLiDxLJY4Wa 8ewzdzM3FzZsZzHTt0sgsWyfGqIN170kOuelPZs9+8IOTpP752VuUPPY6 aWtepSWmSzfxjdAd+nDRXB+g4SR3V0hCsarI6E9t4wC5o9FE0qqhc1QRT NIwgCHdWG/FUJ1J0xkV0tlD8PGKuycMy1AqmViGNfIHYP47bAVbAguxpY zSCyk/rBKFi3SAp9FayG4VAsbQibVc3HfWrhDvBaJPp8OrHYHH1yCiHmu w==; X-IronPort-AV: E=McAfee;i="6600,9927,10656"; a="337866763" X-IronPort-AV: E=Sophos;i="5.98,281,1673942400"; d="scan'208";a="337866763" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Mar 2023 23:49:46 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10656"; a="659080433" X-IronPort-AV: E=Sophos;i="5.98,281,1673942400"; d="scan'208";a="659080433" Received: from allen-box.sh.intel.com ([10.239.159.48]) by orsmga006.jf.intel.com with ESMTP; 21 Mar 2023 23:49:44 -0700 From: Lu Baolu To: Joerg Roedel Cc: Jason Gunthorpe , Robin Murphy , Christoph Hellwig , Kevin Tian , Will Deacon , iommu@lists.linux.dev, linux-kernel@vger.kernel.org, Lu Baolu Subject: [PATCH v4 4/6] iommu: Move lock from iommu_change_dev_def_domain() to its caller Date: Wed, 22 Mar 2023 14:49:54 +0800 Message-Id: <20230322064956.263419-5-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230322064956.263419-1-baolu.lu@linux.intel.com> References: <20230322064956.263419-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.4 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The intention is to make it possible to put group ownership check and default domain change in a same critical region protected by the group's mutex lock. No intentional functional change. Signed-off-by: Lu Baolu Reviewed-by: Jason Gunthorpe --- drivers/iommu/iommu.c | 29 ++++++++++++++--------------- 1 file changed, 14 insertions(+), 15 deletions(-) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 6d27fd585e75..54a5bd79d21b 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -2889,7 +2889,7 @@ static int iommu_change_dev_def_domain(struct iommu_group *group, int ret, dev_def_dom; struct device *dev; - mutex_lock(&group->mutex); + lockdep_assert_held(&group->mutex); if (group->default_domain != group->domain) { dev_err_ratelimited(prev_dev, "Group not assigned to default domain\n"); @@ -2978,28 +2978,15 @@ static int iommu_change_dev_def_domain(struct iommu_group *group, goto free_new_domain; group->domain = group->default_domain; - - /* - * Release the mutex here because ops->probe_finalize() call-back of - * some vendor IOMMU drivers calls arm_iommu_attach_device() which - * in-turn might call back into IOMMU core code, where it tries to take - * group->mutex, resulting in a deadlock. - */ - mutex_unlock(&group->mutex); - - /* Make sure dma_ops is appropriatley set */ - iommu_group_do_probe_finalize(dev, group->default_domain); iommu_domain_free(prev_dom); + return 0; free_new_domain: iommu_domain_free(group->default_domain); group->default_domain = prev_dom; group->domain = prev_dom; - out: - mutex_unlock(&group->mutex); - return ret; } @@ -3089,7 +3076,19 @@ static ssize_t iommu_group_store_type(struct iommu_group *group, goto out; } + mutex_lock(&group->mutex); ret = iommu_change_dev_def_domain(group, dev, req_type); + /* + * Release the mutex here because ops->probe_finalize() call-back of + * some vendor IOMMU drivers calls arm_iommu_attach_device() which + * in-turn might call back into IOMMU core code, where it tries to take + * group->mutex, resulting in a deadlock. + */ + mutex_unlock(&group->mutex); + + /* Make sure dma_ops is appropriatley set */ + if (!ret) + iommu_group_do_probe_finalize(dev, group->default_domain); ret = ret ?: count; out: -- 2.34.1