Message ID | 20190430002952.18909-3-tmurphy@arista.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | iommu/amd: Convert the AMD iommu driver to the dma-iommu api | expand |
On 30/04/2019 01:29, Tom Murphy wrote: > Handle devices which defer their attach to the iommu in the dma-iommu api I've just spent a while trying to understand what this is about... AFAICS it's a kdump thing where the regular default domain attachment may lead to ongoing DMA traffic from the crashed kernel raising a fault storm, so we put off the "real" attach of a given device until we know it's been reset and brought into a sane state, but the only way to reliably detect that is to wait until the kdump kernel driver starts making new DMA mappings. Is that about right? (I note that for SMMUv3 we now handle that situation with the slightly more heavy-handed approach of just turning off reporting and letting the 'rogue' devices fault silently, but I appreciate that not all IOMMUs may have that option) > Signed-off-by: Tom Murphy <tmurphy@arista.com> > --- > drivers/iommu/dma-iommu.c | 30 ++++++++++++++++++++++++++++++ > 1 file changed, 30 insertions(+) > > diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c > index 7a96c2c8f56b..c18f74ad1e8b 100644 > --- a/drivers/iommu/dma-iommu.c > +++ b/drivers/iommu/dma-iommu.c > @@ -322,6 +322,17 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, > return iova_reserve_iommu_regions(dev, domain); > } > > +static int handle_deferred_device(struct device *dev) > +{ > + struct iommu_domain *domain = iommu_get_domain_for_dev(dev); We don't want iommu_get_domain_for_dev() in fast-paths, as the contention on the group refcount has proven to have a surprisingly high overhead on some large systems. That's what iommu_get_dma_domain() solves, but ideally, can this be wrapped in is_kdump_kernel() such as to have no impact at all on the general case? > + const struct iommu_ops *ops = domain->ops; > + > + if (ops->is_attach_deferred && ops->is_attach_deferred(domain, dev)) > + return iommu_attach_device(domain, dev); > + > + return 0; > +} > + > /** > * dma_info_to_prot - Translate DMA API directions and attributes to IOMMU API > * page flags. > @@ -835,6 +846,8 @@ static dma_addr_t iommu_dma_map_page(struct device *dev, struct page *page, > bool coherent = dev_is_dma_coherent(dev); > dma_addr_t dma_handle; > > + handle_deferred_device(dev); > + > dma_handle =__iommu_dma_map(dev, phys, size, > dma_info_to_prot(dir, coherent, attrs), > iommu_get_dma_domain(dev)); > @@ -849,6 +862,8 @@ static void iommu_dma_unmap_page(struct device *dev, dma_addr_t dma_handle, > { > struct iommu_domain *domain = iommu_get_dma_domain(dev); > > + handle_deferred_device(dev); You don't need this - it's completely bogus to make an unmap call without having already called the corresponding map function, so we can assume it's already been dealt with. > + > if (!dev_is_dma_coherent(dev) && !(attrs & DMA_ATTR_SKIP_CPU_SYNC)) { > phys_addr_t phys = iommu_iova_to_phys(domain, dma_handle); > > @@ -873,6 +888,8 @@ static int __finalise_sg(struct device *dev, struct scatterlist *sg, int nents, > unsigned int cur_len = 0, max_len = dma_get_max_seg_size(dev); > int i, count = 0; > > + handle_deferred_device(dev); Hmm, this should be in iommu_dma_map_sg() - that's the guy that needs a valid domain, and it's impossible to get to __finalise_sg() without having been through there anyway. > + > for_each_sg(sg, s, nents, i) { > /* Restore this segment's original unaligned fields first */ > unsigned int s_iova_off = sg_dma_address(s); > @@ -1022,6 +1039,8 @@ static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg, > struct scatterlist *tmp; > int i; > > + handle_deferred_device(dev); Again, not necessary. > + > if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC) == 0) > iommu_dma_sync_sg_for_cpu(dev, sg, nents, dir); > > @@ -1042,6 +1061,8 @@ static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg, > static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, > size_t size, enum dma_data_direction dir, unsigned long attrs) > { > + handle_deferred_device(dev); Ditto. > + > return __iommu_dma_map(dev, phys, size, > dma_info_to_prot(dir, false, attrs) | IOMMU_MMIO, > iommu_get_dma_domain(dev)); > @@ -1050,12 +1071,15 @@ static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, > static void iommu_dma_unmap_resource(struct device *dev, dma_addr_t handle, > size_t size, enum dma_data_direction dir, unsigned long attrs) > { > + handle_deferred_device(dev); Ditto. > + > __iommu_dma_unmap(iommu_get_dma_domain(dev), handle, size); > } > > static void *iommu_dma_alloc(struct device *dev, size_t size, > dma_addr_t *dma_handle, gfp_t gfp, unsigned long attrs) > { > + handle_deferred_device(dev); > gfp |= __GFP_ZERO; > > #ifdef CONFIG_DMA_DIRECT_REMAP > @@ -1076,6 +1100,8 @@ static void iommu_dma_free(struct device *dev, size_t size, void *cpu_addr, > { > struct page *page; > > + handle_deferred_device(dev); Similarly, you can't free anything that hasn't already come from a successful call to iommu_dma_alloc()... > + > /* > * cpu_addr can be one of 4 things depending on how it was allocated: > * > @@ -1115,6 +1141,8 @@ static int iommu_dma_mmap(struct device *dev, struct vm_area_struct *vma, > unsigned long pfn; > int ret; > > + handle_deferred_device(dev); ...nor can you mmap() it... > + > vma->vm_page_prot = arch_dma_mmap_pgprot(dev, vma->vm_page_prot, attrs); > > if (dma_mmap_from_dev_coherent(dev, vma, cpu_addr, size, &ret)) > @@ -1143,6 +1171,8 @@ static int iommu_dma_get_sgtable(struct device *dev, struct sg_table *sgt, > struct page *page; > int ret; > > + handle_deferred_device(dev); ...nor attempt to export it. Robin. > + > #ifdef CONFIG_DMA_DIRECT_REMAP > if (is_vmalloc_addr(cpu_addr)) { > if (!(attrs & DMA_ATTR_FORCE_CONTIGUOUS)) >
On Tue, Apr 30, 2019 at 2:42 PM Robin Murphy <robin.murphy@arm.com> wrote: > > On 30/04/2019 01:29, Tom Murphy wrote: > > Handle devices which defer their attach to the iommu in the dma-iommu api > > I've just spent a while trying to understand what this is about... > > AFAICS it's a kdump thing where the regular default domain attachment > may lead to ongoing DMA traffic from the crashed kernel raising a fault > storm, so we put off the "real" attach of a given device until we know > it's been reset and brought into a sane state, but the only way to > reliably detect that is to wait until the kdump kernel driver starts > making new DMA mappings. Is that about right? That's the impression I got too. The many iterations of the patch series which contributed this code makes it hard to figure out exactly why it's doing what it's doing but AFAIK it works how you described it. > > (I note that for SMMUv3 we now handle that situation with the slightly > more heavy-handed approach of just turning off reporting and letting the > 'rogue' devices fault silently, but I appreciate that not all IOMMUs may > have that option) > > > Signed-off-by: Tom Murphy <tmurphy@arista.com> > > --- > > drivers/iommu/dma-iommu.c | 30 ++++++++++++++++++++++++++++++ > > 1 file changed, 30 insertions(+) > > > > diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c > > index 7a96c2c8f56b..c18f74ad1e8b 100644 > > --- a/drivers/iommu/dma-iommu.c > > +++ b/drivers/iommu/dma-iommu.c > > @@ -322,6 +322,17 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, > > return iova_reserve_iommu_regions(dev, domain); > > } > > > > +static int handle_deferred_device(struct device *dev) > > +{ > > + struct iommu_domain *domain = iommu_get_domain_for_dev(dev); > > We don't want iommu_get_domain_for_dev() in fast-paths, as the > contention on the group refcount has proven to have a surprisingly high > overhead on some large systems. That's what iommu_get_dma_domain() > solves, but ideally, can this be wrapped in is_kdump_kernel() such as to > have no impact at all on the general case? will do. > > > + const struct iommu_ops *ops = domain->ops; > > + > > + if (ops->is_attach_deferred && ops->is_attach_deferred(domain, dev)) > > + return iommu_attach_device(domain, dev); > > + > > + return 0; > > +} > > + > > /** > > * dma_info_to_prot - Translate DMA API directions and attributes to IOMMU API > > * page flags. > > @@ -835,6 +846,8 @@ static dma_addr_t iommu_dma_map_page(struct device *dev, struct page *page, > > bool coherent = dev_is_dma_coherent(dev); > > dma_addr_t dma_handle; > > > > + handle_deferred_device(dev); > > + > > dma_handle =__iommu_dma_map(dev, phys, size, > > dma_info_to_prot(dir, coherent, attrs), > > iommu_get_dma_domain(dev)); > > @@ -849,6 +862,8 @@ static void iommu_dma_unmap_page(struct device *dev, dma_addr_t dma_handle, > > { > > struct iommu_domain *domain = iommu_get_dma_domain(dev); > > > > + handle_deferred_device(dev); > > You don't need this - it's completely bogus to make an unmap call > without having already called the corresponding map function, so we can > assume it's already been dealt with. > > > + > > if (!dev_is_dma_coherent(dev) && !(attrs & DMA_ATTR_SKIP_CPU_SYNC)) { > > phys_addr_t phys = iommu_iova_to_phys(domain, dma_handle); > > > > @@ -873,6 +888,8 @@ static int __finalise_sg(struct device *dev, struct scatterlist *sg, int nents, > > unsigned int cur_len = 0, max_len = dma_get_max_seg_size(dev); > > int i, count = 0; > > > > + handle_deferred_device(dev); > > Hmm, this should be in iommu_dma_map_sg() - that's the guy that needs a > valid domain, and it's impossible to get to __finalise_sg() without > having been through there anyway. > > > + > > for_each_sg(sg, s, nents, i) { > > /* Restore this segment's original unaligned fields first */ > > unsigned int s_iova_off = sg_dma_address(s); > > @@ -1022,6 +1039,8 @@ static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg, > > struct scatterlist *tmp; > > int i; > > > > + handle_deferred_device(dev); > > Again, not necessary. > > > + > > if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC) == 0) > > iommu_dma_sync_sg_for_cpu(dev, sg, nents, dir); > > > > @@ -1042,6 +1061,8 @@ static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg, > > static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, > > size_t size, enum dma_data_direction dir, unsigned long attrs) > > { > > + handle_deferred_device(dev); > > Ditto. > > > + > > return __iommu_dma_map(dev, phys, size, > > dma_info_to_prot(dir, false, attrs) | IOMMU_MMIO, > > iommu_get_dma_domain(dev)); > > @@ -1050,12 +1071,15 @@ static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, > > static void iommu_dma_unmap_resource(struct device *dev, dma_addr_t handle, > > size_t size, enum dma_data_direction dir, unsigned long attrs) > > { > > + handle_deferred_device(dev); > > Ditto. > > > + > > __iommu_dma_unmap(iommu_get_dma_domain(dev), handle, size); > > } > > > > static void *iommu_dma_alloc(struct device *dev, size_t size, > > dma_addr_t *dma_handle, gfp_t gfp, unsigned long attrs) > > { > > + handle_deferred_device(dev); > > gfp |= __GFP_ZERO; > > > > #ifdef CONFIG_DMA_DIRECT_REMAP > > @@ -1076,6 +1100,8 @@ static void iommu_dma_free(struct device *dev, size_t size, void *cpu_addr, > > { > > struct page *page; > > > > + handle_deferred_device(dev); > > Similarly, you can't free anything that hasn't already come from a > successful call to iommu_dma_alloc()... > > > + > > /* > > * cpu_addr can be one of 4 things depending on how it was allocated: > > * > > @@ -1115,6 +1141,8 @@ static int iommu_dma_mmap(struct device *dev, struct vm_area_struct *vma, > > unsigned long pfn; > > int ret; > > > > + handle_deferred_device(dev); > > ...nor can you mmap() it... > > > + > > vma->vm_page_prot = arch_dma_mmap_pgprot(dev, vma->vm_page_prot, attrs); > > > > if (dma_mmap_from_dev_coherent(dev, vma, cpu_addr, size, &ret)) > > @@ -1143,6 +1171,8 @@ static int iommu_dma_get_sgtable(struct device *dev, struct sg_table *sgt, > > struct page *page; > > int ret; > > > > + handle_deferred_device(dev); > > ...nor attempt to export it. That all makes sense. Will fix. > > Robin. > > > + > > #ifdef CONFIG_DMA_DIRECT_REMAP > > if (is_vmalloc_addr(cpu_addr)) { > > if (!(attrs & DMA_ATTR_FORCE_CONTIGUOUS)) > >
diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 7a96c2c8f56b..c18f74ad1e8b 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -322,6 +322,17 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, return iova_reserve_iommu_regions(dev, domain); } +static int handle_deferred_device(struct device *dev) +{ + struct iommu_domain *domain = iommu_get_domain_for_dev(dev); + const struct iommu_ops *ops = domain->ops; + + if (ops->is_attach_deferred && ops->is_attach_deferred(domain, dev)) + return iommu_attach_device(domain, dev); + + return 0; +} + /** * dma_info_to_prot - Translate DMA API directions and attributes to IOMMU API * page flags. @@ -835,6 +846,8 @@ static dma_addr_t iommu_dma_map_page(struct device *dev, struct page *page, bool coherent = dev_is_dma_coherent(dev); dma_addr_t dma_handle; + handle_deferred_device(dev); + dma_handle =__iommu_dma_map(dev, phys, size, dma_info_to_prot(dir, coherent, attrs), iommu_get_dma_domain(dev)); @@ -849,6 +862,8 @@ static void iommu_dma_unmap_page(struct device *dev, dma_addr_t dma_handle, { struct iommu_domain *domain = iommu_get_dma_domain(dev); + handle_deferred_device(dev); + if (!dev_is_dma_coherent(dev) && !(attrs & DMA_ATTR_SKIP_CPU_SYNC)) { phys_addr_t phys = iommu_iova_to_phys(domain, dma_handle); @@ -873,6 +888,8 @@ static int __finalise_sg(struct device *dev, struct scatterlist *sg, int nents, unsigned int cur_len = 0, max_len = dma_get_max_seg_size(dev); int i, count = 0; + handle_deferred_device(dev); + for_each_sg(sg, s, nents, i) { /* Restore this segment's original unaligned fields first */ unsigned int s_iova_off = sg_dma_address(s); @@ -1022,6 +1039,8 @@ static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg, struct scatterlist *tmp; int i; + handle_deferred_device(dev); + if (!(attrs & DMA_ATTR_SKIP_CPU_SYNC) == 0) iommu_dma_sync_sg_for_cpu(dev, sg, nents, dir); @@ -1042,6 +1061,8 @@ static void iommu_dma_unmap_sg(struct device *dev, struct scatterlist *sg, static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, size_t size, enum dma_data_direction dir, unsigned long attrs) { + handle_deferred_device(dev); + return __iommu_dma_map(dev, phys, size, dma_info_to_prot(dir, false, attrs) | IOMMU_MMIO, iommu_get_dma_domain(dev)); @@ -1050,12 +1071,15 @@ static dma_addr_t iommu_dma_map_resource(struct device *dev, phys_addr_t phys, static void iommu_dma_unmap_resource(struct device *dev, dma_addr_t handle, size_t size, enum dma_data_direction dir, unsigned long attrs) { + handle_deferred_device(dev); + __iommu_dma_unmap(iommu_get_dma_domain(dev), handle, size); } static void *iommu_dma_alloc(struct device *dev, size_t size, dma_addr_t *dma_handle, gfp_t gfp, unsigned long attrs) { + handle_deferred_device(dev); gfp |= __GFP_ZERO; #ifdef CONFIG_DMA_DIRECT_REMAP @@ -1076,6 +1100,8 @@ static void iommu_dma_free(struct device *dev, size_t size, void *cpu_addr, { struct page *page; + handle_deferred_device(dev); + /* * cpu_addr can be one of 4 things depending on how it was allocated: * @@ -1115,6 +1141,8 @@ static int iommu_dma_mmap(struct device *dev, struct vm_area_struct *vma, unsigned long pfn; int ret; + handle_deferred_device(dev); + vma->vm_page_prot = arch_dma_mmap_pgprot(dev, vma->vm_page_prot, attrs); if (dma_mmap_from_dev_coherent(dev, vma, cpu_addr, size, &ret)) @@ -1143,6 +1171,8 @@ static int iommu_dma_get_sgtable(struct device *dev, struct sg_table *sgt, struct page *page; int ret; + handle_deferred_device(dev); + #ifdef CONFIG_DMA_DIRECT_REMAP if (is_vmalloc_addr(cpu_addr)) { if (!(attrs & DMA_ATTR_FORCE_CONTIGUOUS))
Handle devices which defer their attach to the iommu in the dma-iommu api Signed-off-by: Tom Murphy <tmurphy@arista.com> --- drivers/iommu/dma-iommu.c | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+)