All of lore.kernel.org
 help / color / mirror / Atom feed
From: Zhou Wang <wangzhou1@hisilicon.com>
To: Jean-Philippe Brucker <jean-philippe@linaro.org>
Cc: <joro@8bytes.org>, <will@kernel.org>, <vivek.gautam@arm.com>,
	<guohanjun@huawei.com>, <linux-acpi@vger.kernel.org>,
	<zhangfei.gao@linaro.org>, <lenb@kernel.org>,
	<devicetree@vger.kernel.org>, <kevin.tian@intel.com>,
	<robh+dt@kernel.org>, <linux-arm-kernel@lists.infradead.org>,
	<rjw@rjwysocki.net>, <iommu@lists.linux-foundation.org>,
	<sudeep.holla@arm.com>, <robin.murphy@arm.com>,
	<linux-accelerators@lists.ozlabs.org>
Subject: Re: [PATCH v12 10/10] iommu/arm-smmu-v3: Add stall support for platform devices
Date: Fri, 26 Feb 2021 17:43:27 +0800	[thread overview]
Message-ID: <fabffd28-7497-2758-c2bf-9d31aa562085@hisilicon.com> (raw)
In-Reply-To: <YBfij71tyYvh8LhB@myrica>

On 2021/2/1 19:14, Jean-Philippe Brucker wrote:
> Hi Zhou,
> 
> On Mon, Feb 01, 2021 at 09:18:42AM +0800, Zhou Wang wrote:
>>> @@ -1033,8 +1076,7 @@ int arm_smmu_write_ctx_desc(struct arm_smmu_domain *smmu_domain, int ssid,
>>>  			FIELD_PREP(CTXDESC_CD_0_ASID, cd->asid) |
>>>  			CTXDESC_CD_0_V;
>>>  
>>> -		/* STALL_MODEL==0b10 && CD.S==0 is ILLEGAL */
>>> -		if (smmu->features & ARM_SMMU_FEAT_STALL_FORCE)
>>> +		if (smmu_domain->stall_enabled)
>>
>> Could we add ssid checking here? like: if (smmu_domain->stall_enabled && ssid).
>> The reason is if not CD.S will also be set when ssid is 0, which is not needed.
> 
> Some drivers may want to get stall events on SSID 0:
> https://lore.kernel.org/kvm/20210125090402.1429-1-lushenming@huawei.com/#t
> 
> Are you seeing an issue with stall events on ssid 0?  Normally there
> shouldn't be any fault on this context, but if they happen and no handler
> is registered, the SMMU driver will just abort them and report them like a
> non-stall event.

Hi Jean,

I notice that there is problem. In my case, I expect that CD0 is for kernel
and other CDs are for user space. Normally there shouldn't be any fault in
kernel, however, we have RAS case which is for some reason there may has
invalid address access from hardware device.

So at least there are two different address access failures: 1. hardware RAS problem;
2. software fault fail(e.g. kill process when doing DMA). Handlings for these
two are different: for 1, we should reset hardware device; for 2, stop related
DMA is enough.

Currently if SMMU returns the same signal(by SMMU resume abort), master device
driver can not tell these two kinds of cases.

From the basic concept, if a CD is used for kernel, its S bit should not be set.
How about we add iommu domain check here too, if DMA domain we do not set S bit for
CD0, if unmanaged domain we set S bit for all CDs?

Thanks,
Zhou

> 
> Thanks,
> Jean
> 
> .
> 


WARNING: multiple messages have this Message-ID (diff)
From: Zhou Wang <wangzhou1@hisilicon.com>
To: Jean-Philippe Brucker <jean-philippe@linaro.org>
Cc: devicetree@vger.kernel.org, kevin.tian@intel.com,
	linux-acpi@vger.kernel.org, robin.murphy@arm.com,
	sudeep.holla@arm.com, rjw@rjwysocki.net, vivek.gautam@arm.com,
	iommu@lists.linux-foundation.org, robh+dt@kernel.org,
	linux-accelerators@lists.ozlabs.org, guohanjun@huawei.com,
	zhangfei.gao@linaro.org, will@kernel.org,
	linux-arm-kernel@lists.infradead.org, lenb@kernel.org
Subject: Re: [PATCH v12 10/10] iommu/arm-smmu-v3: Add stall support for platform devices
Date: Fri, 26 Feb 2021 17:43:27 +0800	[thread overview]
Message-ID: <fabffd28-7497-2758-c2bf-9d31aa562085@hisilicon.com> (raw)
In-Reply-To: <YBfij71tyYvh8LhB@myrica>

On 2021/2/1 19:14, Jean-Philippe Brucker wrote:
> Hi Zhou,
> 
> On Mon, Feb 01, 2021 at 09:18:42AM +0800, Zhou Wang wrote:
>>> @@ -1033,8 +1076,7 @@ int arm_smmu_write_ctx_desc(struct arm_smmu_domain *smmu_domain, int ssid,
>>>  			FIELD_PREP(CTXDESC_CD_0_ASID, cd->asid) |
>>>  			CTXDESC_CD_0_V;
>>>  
>>> -		/* STALL_MODEL==0b10 && CD.S==0 is ILLEGAL */
>>> -		if (smmu->features & ARM_SMMU_FEAT_STALL_FORCE)
>>> +		if (smmu_domain->stall_enabled)
>>
>> Could we add ssid checking here? like: if (smmu_domain->stall_enabled && ssid).
>> The reason is if not CD.S will also be set when ssid is 0, which is not needed.
> 
> Some drivers may want to get stall events on SSID 0:
> https://lore.kernel.org/kvm/20210125090402.1429-1-lushenming@huawei.com/#t
> 
> Are you seeing an issue with stall events on ssid 0?  Normally there
> shouldn't be any fault on this context, but if they happen and no handler
> is registered, the SMMU driver will just abort them and report them like a
> non-stall event.

Hi Jean,

I notice that there is problem. In my case, I expect that CD0 is for kernel
and other CDs are for user space. Normally there shouldn't be any fault in
kernel, however, we have RAS case which is for some reason there may has
invalid address access from hardware device.

So at least there are two different address access failures: 1. hardware RAS problem;
2. software fault fail(e.g. kill process when doing DMA). Handlings for these
two are different: for 1, we should reset hardware device; for 2, stop related
DMA is enough.

Currently if SMMU returns the same signal(by SMMU resume abort), master device
driver can not tell these two kinds of cases.

From the basic concept, if a CD is used for kernel, its S bit should not be set.
How about we add iommu domain check here too, if DMA domain we do not set S bit for
CD0, if unmanaged domain we set S bit for all CDs?

Thanks,
Zhou

> 
> Thanks,
> Jean
> 
> .
> 

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

WARNING: multiple messages have this Message-ID (diff)
From: Zhou Wang <wangzhou1@hisilicon.com>
To: Jean-Philippe Brucker <jean-philippe@linaro.org>
Cc: devicetree@vger.kernel.org, kevin.tian@intel.com,
	linux-acpi@vger.kernel.org, robin.murphy@arm.com,
	joro@8bytes.org, sudeep.holla@arm.com, rjw@rjwysocki.net,
	vivek.gautam@arm.com, iommu@lists.linux-foundation.org,
	robh+dt@kernel.org, linux-accelerators@lists.ozlabs.org,
	guohanjun@huawei.com, zhangfei.gao@linaro.org, will@kernel.org,
	linux-arm-kernel@lists.infradead.org, lenb@kernel.org
Subject: Re: [PATCH v12 10/10] iommu/arm-smmu-v3: Add stall support for platform devices
Date: Fri, 26 Feb 2021 17:43:27 +0800	[thread overview]
Message-ID: <fabffd28-7497-2758-c2bf-9d31aa562085@hisilicon.com> (raw)
In-Reply-To: <YBfij71tyYvh8LhB@myrica>

On 2021/2/1 19:14, Jean-Philippe Brucker wrote:
> Hi Zhou,
> 
> On Mon, Feb 01, 2021 at 09:18:42AM +0800, Zhou Wang wrote:
>>> @@ -1033,8 +1076,7 @@ int arm_smmu_write_ctx_desc(struct arm_smmu_domain *smmu_domain, int ssid,
>>>  			FIELD_PREP(CTXDESC_CD_0_ASID, cd->asid) |
>>>  			CTXDESC_CD_0_V;
>>>  
>>> -		/* STALL_MODEL==0b10 && CD.S==0 is ILLEGAL */
>>> -		if (smmu->features & ARM_SMMU_FEAT_STALL_FORCE)
>>> +		if (smmu_domain->stall_enabled)
>>
>> Could we add ssid checking here? like: if (smmu_domain->stall_enabled && ssid).
>> The reason is if not CD.S will also be set when ssid is 0, which is not needed.
> 
> Some drivers may want to get stall events on SSID 0:
> https://lore.kernel.org/kvm/20210125090402.1429-1-lushenming@huawei.com/#t
> 
> Are you seeing an issue with stall events on ssid 0?  Normally there
> shouldn't be any fault on this context, but if they happen and no handler
> is registered, the SMMU driver will just abort them and report them like a
> non-stall event.

Hi Jean,

I notice that there is problem. In my case, I expect that CD0 is for kernel
and other CDs are for user space. Normally there shouldn't be any fault in
kernel, however, we have RAS case which is for some reason there may has
invalid address access from hardware device.

So at least there are two different address access failures: 1. hardware RAS problem;
2. software fault fail(e.g. kill process when doing DMA). Handlings for these
two are different: for 1, we should reset hardware device; for 2, stop related
DMA is enough.

Currently if SMMU returns the same signal(by SMMU resume abort), master device
driver can not tell these two kinds of cases.

From the basic concept, if a CD is used for kernel, its S bit should not be set.
How about we add iommu domain check here too, if DMA domain we do not set S bit for
CD0, if unmanaged domain we set S bit for all CDs?

Thanks,
Zhou

> 
> Thanks,
> Jean
> 
> .
> 


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

  parent reply	other threads:[~2021-02-26  9:44 UTC|newest]

Thread overview: 78+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-01-27 15:43 [PATCH v12 00/10] iommu: I/O page faults for SMMUv3 Jean-Philippe Brucker
2021-01-27 15:43 ` Jean-Philippe Brucker
2021-01-27 15:43 ` Jean-Philippe Brucker
2021-01-27 15:43 ` [PATCH v12 01/10] iommu: Fix comment for struct iommu_fwspec Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43 ` [PATCH v12 02/10] iommu/arm-smmu-v3: Use device properties for pasid-num-bits Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-02-01  7:30   ` Auger Eric
2021-02-01  7:30     ` Auger Eric
2021-02-01  7:30     ` Auger Eric
2021-01-27 15:43 ` [PATCH v12 03/10] iommu: Separate IOMMU_DEV_FEAT_IOPF from IOMMU_DEV_FEAT_SVA Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-02-01  7:35   ` Auger Eric
2021-02-01  7:35     ` Auger Eric
2021-02-01  7:35     ` Auger Eric
2021-01-27 15:43 ` [PATCH v12 04/10] iommu/vt-d: Support IOMMU_DEV_FEAT_IOPF Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43 ` [PATCH v12 05/10] uacce: Enable IOMMU_DEV_FEAT_IOPF Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43 ` [PATCH v12 06/10] iommu: Add a page fault handler Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-31 18:29   ` Auger Eric
2021-01-31 18:29     ` Auger Eric
2021-01-31 18:29     ` Auger Eric
2021-02-02  5:51   ` Shenming Lu
2021-02-02  5:51     ` Shenming Lu
2021-02-02  5:51     ` Shenming Lu
2021-01-27 15:43 ` [PATCH v12 07/10] iommu/arm-smmu-v3: Maintain a SID->device structure Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43 ` [PATCH v12 08/10] dt-bindings: document stall property for IOMMU masters Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-02-01  7:28   ` Auger Eric
2021-02-01  7:28     ` Auger Eric
2021-02-01  7:28     ` Auger Eric
2021-01-27 15:43 ` [PATCH v12 09/10] ACPI/IORT: Enable stall support for platform devices Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43 ` [PATCH v12 10/10] iommu/arm-smmu-v3: Add " Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-27 15:43   ` Jean-Philippe Brucker
2021-01-31 18:29   ` Auger Eric
2021-01-31 18:29     ` Auger Eric
2021-01-31 18:29     ` Auger Eric
2021-02-01 11:12     ` Jean-Philippe Brucker
2021-02-01 11:12       ` Jean-Philippe Brucker
2021-02-01 11:12       ` Jean-Philippe Brucker
2021-02-01 13:16       ` Auger Eric
2021-02-01 13:16         ` Auger Eric
2021-02-01 13:16         ` Auger Eric
2021-02-01 15:19         ` Jean-Philippe Brucker
2021-02-01 15:19           ` Jean-Philippe Brucker
2021-02-01 15:19           ` Jean-Philippe Brucker
2021-02-01  1:18   ` Zhou Wang
2021-02-01  1:18     ` Zhou Wang
2021-02-01  1:18     ` Zhou Wang
2021-02-01 11:14     ` Jean-Philippe Brucker
2021-02-01 11:14       ` Jean-Philippe Brucker
2021-02-01 11:14       ` Jean-Philippe Brucker
2021-02-01 12:53       ` Zhou Wang
2021-02-01 12:53         ` Zhou Wang
2021-02-01 12:53         ` Zhou Wang
2021-02-26  9:43       ` Zhou Wang [this message]
2021-02-26  9:43         ` Zhou Wang
2021-02-26  9:43         ` Zhou Wang
2021-02-26 16:29         ` Jean-Philippe Brucker
2021-02-26 16:29           ` Jean-Philippe Brucker
2021-02-26 16:29           ` Jean-Philippe Brucker
2021-02-27  3:40           ` Zhou Wang
2021-02-27  3:40             ` Zhou Wang
2021-02-27  3:40             ` Zhou Wang

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=fabffd28-7497-2758-c2bf-9d31aa562085@hisilicon.com \
    --to=wangzhou1@hisilicon.com \
    --cc=devicetree@vger.kernel.org \
    --cc=guohanjun@huawei.com \
    --cc=iommu@lists.linux-foundation.org \
    --cc=jean-philippe@linaro.org \
    --cc=joro@8bytes.org \
    --cc=kevin.tian@intel.com \
    --cc=lenb@kernel.org \
    --cc=linux-accelerators@lists.ozlabs.org \
    --cc=linux-acpi@vger.kernel.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=rjw@rjwysocki.net \
    --cc=robh+dt@kernel.org \
    --cc=robin.murphy@arm.com \
    --cc=sudeep.holla@arm.com \
    --cc=vivek.gautam@arm.com \
    --cc=will@kernel.org \
    --cc=zhangfei.gao@linaro.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.