diff mbox

iommu/arm-smmu: Fix stream-match conflict with IOMMU_DOMAIN_DMA

Message ID 1459527597-10740-1-git-send-email-will.deacon@arm.com
State Superseded
Headers show

Commit Message

Will Deacon April 1, 2016, 4:19 p.m. UTC
Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass
for now") ignores requests to attach a device to the default domain
since, without IOMMU-basked DMA ops available everywhere, the default
domain will just lead to unexpected transaction faults being reported.

Unfortunately, the way this was implemented on SMMUv2 causes a
regression with VFIO PCI device passthrough under KVM on AMD Seattle.
On this system, the host controller device is associated with both a
pci_dev *and* a platform_device, and can therefore end up with duplicate
SMR entries, resulting in a stream-match conflict at runtime.

This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA
is rejected even before configuring the SMRs. This restores the old
behaviour for now, but we'll need to look at handing host controllers
specially when we come to supporting the default domain fully.

Reported-by: Eric Auger <eric.auger@linaro.org>
Signed-off-by: Will Deacon <will.deacon@arm.com>

---
 drivers/iommu/arm-smmu.c | 14 ++++++++------
 1 file changed, 8 insertions(+), 6 deletions(-)

-- 
2.1.4


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

Comments

Auger Eric April 4, 2016, 9:40 a.m. UTC | #1
Hi Will,
On 04/01/2016 06:19 PM, Will Deacon wrote:
> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass

> for now") ignores requests to attach a device to the default domain

> since, without IOMMU-basked DMA ops available everywhere, the default

> domain will just lead to unexpected transaction faults being reported.

> 

> Unfortunately, the way this was implemented on SMMUv2 causes a

> regression with VFIO PCI device passthrough under KVM on AMD Seattle.

> On this system, the host controller device is associated with both a

> pci_dev *and* a platform_device, and can therefore end up with duplicate

> SMR entries, resulting in a stream-match conflict at runtime.

> 

> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA

> is rejected even before configuring the SMRs. This restores the old

> behaviour for now, but we'll need to look at handing host controllers

> specially when we come to supporting the default domain fully.


This works fine for me, before and after PCIe assignment. However before
giving my T-b I would like to investigate another regression I observe
wrt SRIOV assignment. Assigning the 1st VF works fine. However assigning
a second VF does not work anymore (it used to in the past). I get
-ENOSPC from arm_smmu_master_configure_smrs

Best Regards

Eric
> 

> Reported-by: Eric Auger <eric.auger@linaro.org>

> Signed-off-by: Will Deacon <will.deacon@arm.com>

> ---

>  drivers/iommu/arm-smmu.c | 14 ++++++++------

>  1 file changed, 8 insertions(+), 6 deletions(-)

> 

> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

> index e933679a3266..2f186d22477f 100644

> --- a/drivers/iommu/arm-smmu.c

> +++ b/drivers/iommu/arm-smmu.c

> @@ -1098,18 +1098,20 @@ static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,

>  	struct arm_smmu_device *smmu = smmu_domain->smmu;

>  	void __iomem *gr0_base = ARM_SMMU_GR0(smmu);

>  

> -	/* Devices in an IOMMU group may already be configured */

> -	ret = arm_smmu_master_configure_smrs(smmu, cfg);

> -	if (ret)

> -		return ret == -EEXIST ? 0 : ret;

> -

>  	/*

>  	 * FIXME: This won't be needed once we have IOMMU-backed DMA ops

> -	 * for all devices behind the SMMU.

> +	 * for all devices behind the SMMU. Note that we need to take

> +	 * care configuring SMRs for devices both a platform_device and

> +	 * and a PCI device (i.e. a PCI host controller)

>  	 */

>  	if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)

>  		return 0;

>  

> +	/* Devices in an IOMMU group may already be configured */

> +	ret = arm_smmu_master_configure_smrs(smmu, cfg);

> +	if (ret)

> +		return ret == -EEXIST ? 0 : ret;

> +

>  	for (i = 0; i < cfg->num_streamids; ++i) {

>  		u32 idx, s2cr;

>  

> 



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Auger Eric April 5, 2016, 11:33 a.m. UTC | #2
Hi Robin,
On 04/05/2016 12:48 PM, Robin Murphy wrote:
> On 01/04/16 17:19, Will Deacon wrote:

>> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass

>> for now") ignores requests to attach a device to the default domain

>> since, without IOMMU-basked DMA ops available everywhere, the default

>> domain will just lead to unexpected transaction faults being reported.

>>

>> Unfortunately, the way this was implemented on SMMUv2 causes a

>> regression with VFIO PCI device passthrough under KVM on AMD Seattle.

>> On this system, the host controller device is associated with both a

>> pci_dev *and* a platform_device, and can therefore end up with duplicate

>> SMR entries, resulting in a stream-match conflict at runtime.

>>

>> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA

>> is rejected even before configuring the SMRs. This restores the old

>> behaviour for now, but we'll need to look at handing host controllers

>> specially when we come to supporting the default domain fully.

> 

> FWIW this is already solved with the generic bindings, as in most cases

> the host controller won't need an "iommus" property - for those that do

> actually have their own IDs for the platform device side, any aliasing

> with the PCI-derived IDs from "iommu-map" is magically taken care of in

> the group allocation code. That cross-bus-grouping should also apply to

> legacy masters too, since they look the same by the time we get to that

> point, so there should be no more stream match conflicts either way.

> I'll be working on a v2 of that series this week, so I'll rebase on top

> of this fix.


Thanks for the notice.

Besides the fault I was experiencing before that fix I also face a
regression with respect to SRIOV 2d VF assignment.  It appears it is due
to a shortage of context banks and not a shortage of SMRs as I thought
at the beginning. The -ENOSPC is returned by
arm_smmu_init_domain_context (__arm_smmu_alloc_bitmap).
arm_smmu_init_domain_context is called even if handle a default iommu
domain and if my understanding is correct we shouldn't consume any
context bank in that case.

Best Regards

Eric
> 

> Robin.

> 

>> Reported-by: Eric Auger <eric.auger@linaro.org>

>> Signed-off-by: Will Deacon <will.deacon@arm.com>

>> ---

>>   drivers/iommu/arm-smmu.c | 14 ++++++++------

>>   1 file changed, 8 insertions(+), 6 deletions(-)

>>

>> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

>> index e933679a3266..2f186d22477f 100644

>> --- a/drivers/iommu/arm-smmu.c

>> +++ b/drivers/iommu/arm-smmu.c

>> @@ -1098,18 +1098,20 @@ static int arm_smmu_domain_add_master(struct

>> arm_smmu_domain *smmu_domain,

>>       struct arm_smmu_device *smmu = smmu_domain->smmu;

>>       void __iomem *gr0_base = ARM_SMMU_GR0(smmu);

>>

>> -    /* Devices in an IOMMU group may already be configured */

>> -    ret = arm_smmu_master_configure_smrs(smmu, cfg);

>> -    if (ret)

>> -        return ret == -EEXIST ? 0 : ret;

>> -

>>       /*

>>        * FIXME: This won't be needed once we have IOMMU-backed DMA ops

>> -     * for all devices behind the SMMU.

>> +     * for all devices behind the SMMU. Note that we need to take

>> +     * care configuring SMRs for devices both a platform_device and

>> +     * and a PCI device (i.e. a PCI host controller)

>>        */

>>       if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)

>>           return 0;

>>

>> +    /* Devices in an IOMMU group may already be configured */

>> +    ret = arm_smmu_master_configure_smrs(smmu, cfg);

>> +    if (ret)

>> +        return ret == -EEXIST ? 0 : ret;

>> +

>>       for (i = 0; i < cfg->num_streamids; ++i) {

>>           u32 idx, s2cr;

>>

>>

> 



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Will Deacon April 7, 2016, 2:46 p.m. UTC | #3
Hi Eric,

On Mon, Apr 04, 2016 at 11:40:29AM +0200, Eric Auger wrote:
> On 04/01/2016 06:19 PM, Will Deacon wrote:

> > Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass

> > for now") ignores requests to attach a device to the default domain

> > since, without IOMMU-basked DMA ops available everywhere, the default

> > domain will just lead to unexpected transaction faults being reported.

> > 

> > Unfortunately, the way this was implemented on SMMUv2 causes a

> > regression with VFIO PCI device passthrough under KVM on AMD Seattle.

> > On this system, the host controller device is associated with both a

> > pci_dev *and* a platform_device, and can therefore end up with duplicate

> > SMR entries, resulting in a stream-match conflict at runtime.

> > 

> > This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA

> > is rejected even before configuring the SMRs. This restores the old

> > behaviour for now, but we'll need to look at handing host controllers

> > specially when we come to supporting the default domain fully.

> 

> This works fine for me, before and after PCIe assignment. However before

> giving my T-b I would like to investigate another regression I observe

> wrt SRIOV assignment. Assigning the 1st VF works fine. However assigning

> a second VF does not work anymore (it used to in the past). I get

> -ENOSPC from arm_smmu_master_configure_smrs


Did you get anywhere debugging this?

Will

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Auger Eric April 7, 2016, 2:50 p.m. UTC | #4
Hi Will,
On 04/07/2016 04:46 PM, Will Deacon wrote:
> Hi Eric,

> 

> On Mon, Apr 04, 2016 at 11:40:29AM +0200, Eric Auger wrote:

>> On 04/01/2016 06:19 PM, Will Deacon wrote:

>>> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass

>>> for now") ignores requests to attach a device to the default domain

>>> since, without IOMMU-basked DMA ops available everywhere, the default

>>> domain will just lead to unexpected transaction faults being reported.

>>>

>>> Unfortunately, the way this was implemented on SMMUv2 causes a

>>> regression with VFIO PCI device passthrough under KVM on AMD Seattle.

>>> On this system, the host controller device is associated with both a

>>> pci_dev *and* a platform_device, and can therefore end up with duplicate

>>> SMR entries, resulting in a stream-match conflict at runtime.

>>>

>>> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA

>>> is rejected even before configuring the SMRs. This restores the old

>>> behaviour for now, but we'll need to look at handing host controllers

>>> specially when we come to supporting the default domain fully.

>>

>> This works fine for me, before and after PCIe assignment. However before

>> giving my T-b I would like to investigate another regression I observe

>> wrt SRIOV assignment. Assigning the 1st VF works fine. However assigning

>> a second VF does not work anymore (it used to in the past). I get

>> -ENOSPC from arm_smmu_master_configure_smrs

> 

> Did you get anywhere debugging this?

Yes: http://www.spinics.net/lists/arm-kernel/msg495024.html

Eric
> 

> Will

> 



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Will Deacon April 15, 2016, 1:05 p.m. UTC | #5
On Wed, Apr 13, 2016 at 03:46:57PM +0100, Robin Murphy wrote:
> Until we get fully plumbed into of_iommu_configure, our default

> IOMMU_DOMAIN_DMA domains just bypass translation. Since we achieve that

> by leaving the stream table entries set to bypass instead of pointing at

> a translation context, the context bank we allocate for the domain is

> completely wasted. Context banks are typically a rather limited

> resource, so don't hog ones we don't need.


Eric, does this resolve your remaining passthrough regressions when applied
on top of my patch?

Will

> Reported-by: Eric Auger <eric.auger@linaro.org>

> Signed-off-by: Robin Murphy <robin.murphy@arm.com>

> ---

>  drivers/iommu/arm-smmu.c | 8 +++++++-

>  1 file changed, 7 insertions(+), 1 deletion(-)

> 

> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

> index 5158feb..7c39ac4 100644

> --- a/drivers/iommu/arm-smmu.c

> +++ b/drivers/iommu/arm-smmu.c

> @@ -826,6 +826,12 @@ static int arm_smmu_init_domain_context(struct iommu_domain *domain,

>  	if (smmu_domain->smmu)

>  		goto out_unlock;

>  

> +	/* We're bypassing these SIDs, so don't allocate an actual context */

> +	if (domain->type == IOMMU_DOMAIN_DMA) {

> +		smmu_domain->smmu = smmu;

> +		goto out_unlock;

> +	}

> +

>  	/*

>  	 * Mapping the requested stage onto what we support is surprisingly

>  	 * complicated, mainly because the spec allows S1+S2 SMMUs without

> @@ -948,7 +954,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)

>  	void __iomem *cb_base;

>  	int irq;

>  

> -	if (!smmu)

> +	if (!smmu || domain->type == IOMMU_DOMAIN_DMA)

>  		return;

>  

>  	/*

> -- 

> 2.7.3.dirty

> 


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Auger Eric April 15, 2016, 3:09 p.m. UTC | #6
Hi Robin,
On 04/13/2016 04:46 PM, Robin Murphy wrote:
> Until we get fully plumbed into of_iommu_configure, our default

> IOMMU_DOMAIN_DMA domains just bypass translation. Since we achieve that

> by leaving the stream table entries set to bypass instead of pointing at

> a translation context, the context bank we allocate for the domain is

> completely wasted. Context banks are typically a rather limited

> resource, so don't hog ones we don't need.

> 

Thanks for this fix. I recovered the ability to assign more than VFs on
Overdrive HW.

Tested-by: Eric Auger <eric.auger@linaro.org>


Best Regards

Eric
> Reported-by: Eric Auger <eric.auger@linaro.org>

> Signed-off-by: Robin Murphy <robin.murphy@arm.com>

> ---

>  drivers/iommu/arm-smmu.c | 8 +++++++-

>  1 file changed, 7 insertions(+), 1 deletion(-)

> 

> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

> index 5158feb..7c39ac4 100644

> --- a/drivers/iommu/arm-smmu.c

> +++ b/drivers/iommu/arm-smmu.c

> @@ -826,6 +826,12 @@ static int arm_smmu_init_domain_context(struct iommu_domain *domain,

>  	if (smmu_domain->smmu)

>  		goto out_unlock;

>  

> +	/* We're bypassing these SIDs, so don't allocate an actual context */

> +	if (domain->type == IOMMU_DOMAIN_DMA) {

> +		smmu_domain->smmu = smmu;

> +		goto out_unlock;

> +	}

> +

>  	/*

>  	 * Mapping the requested stage onto what we support is surprisingly

>  	 * complicated, mainly because the spec allows S1+S2 SMMUs without

> @@ -948,7 +954,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)

>  	void __iomem *cb_base;

>  	int irq;

>  

> -	if (!smmu)

> +	if (!smmu || domain->type == IOMMU_DOMAIN_DMA)

>  		return;

>  

>  	/*

> 



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Auger Eric April 15, 2016, 3:09 p.m. UTC | #7
Hi Will,
On 04/01/2016 06:19 PM, Will Deacon wrote:
> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass

> for now") ignores requests to attach a device to the default domain

> since, without IOMMU-basked DMA ops available everywhere, the default

> domain will just lead to unexpected transaction faults being reported.

> 

> Unfortunately, the way this was implemented on SMMUv2 causes a

> regression with VFIO PCI device passthrough under KVM on AMD Seattle.

> On this system, the host controller device is associated with both a

> pci_dev *and* a platform_device, and can therefore end up with duplicate

> SMR entries, resulting in a stream-match conflict at runtime.

> 

> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA

> is rejected even before configuring the SMRs. This restores the old

> behaviour for now, but we'll need to look at handing host controllers

> specially when we come to supporting the default domain fully.

> 

Tested-by: Eric Auger <eric.auger@linaro.org>


Best Regards

Eric
> Reported-by: Eric Auger <eric.auger@linaro.org>

> Signed-off-by: Will Deacon <will.deacon@arm.com>

> ---

>  drivers/iommu/arm-smmu.c | 14 ++++++++------

>  1 file changed, 8 insertions(+), 6 deletions(-)

> 

> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

> index e933679a3266..2f186d22477f 100644

> --- a/drivers/iommu/arm-smmu.c

> +++ b/drivers/iommu/arm-smmu.c

> @@ -1098,18 +1098,20 @@ static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,

>  	struct arm_smmu_device *smmu = smmu_domain->smmu;

>  	void __iomem *gr0_base = ARM_SMMU_GR0(smmu);

>  

> -	/* Devices in an IOMMU group may already be configured */

> -	ret = arm_smmu_master_configure_smrs(smmu, cfg);

> -	if (ret)

> -		return ret == -EEXIST ? 0 : ret;

> -

>  	/*

>  	 * FIXME: This won't be needed once we have IOMMU-backed DMA ops

> -	 * for all devices behind the SMMU.

> +	 * for all devices behind the SMMU. Note that we need to take

> +	 * care configuring SMRs for devices both a platform_device and

> +	 * and a PCI device (i.e. a PCI host controller)

>  	 */

>  	if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)

>  		return 0;

>  

> +	/* Devices in an IOMMU group may already be configured */

> +	ret = arm_smmu_master_configure_smrs(smmu, cfg);

> +	if (ret)

> +		return ret == -EEXIST ? 0 : ret;

> +

>  	for (i = 0; i < cfg->num_streamids; ++i) {

>  		u32 idx, s2cr;

>  

> 



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Auger Eric April 15, 2016, 3:11 p.m. UTC | #8
Hi Will,
On 04/15/2016 03:05 PM, Will Deacon wrote:
> On Wed, Apr 13, 2016 at 03:46:57PM +0100, Robin Murphy wrote:

>> Until we get fully plumbed into of_iommu_configure, our default

>> IOMMU_DOMAIN_DMA domains just bypass translation. Since we achieve that

>> by leaving the stream table entries set to bypass instead of pointing at

>> a translation context, the context bank we allocate for the domain is

>> completely wasted. Context banks are typically a rather limited

>> resource, so don't hog ones we don't need.

> 

> Eric, does this resolve your remaining passthrough regressions when applied

> on top of my patch?


Yes it does. Thank you for the fixes.

Best Regards

Eric
> 

> Will

> 

>> Reported-by: Eric Auger <eric.auger@linaro.org>

>> Signed-off-by: Robin Murphy <robin.murphy@arm.com>

>> ---

>>  drivers/iommu/arm-smmu.c | 8 +++++++-

>>  1 file changed, 7 insertions(+), 1 deletion(-)

>>

>> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

>> index 5158feb..7c39ac4 100644

>> --- a/drivers/iommu/arm-smmu.c

>> +++ b/drivers/iommu/arm-smmu.c

>> @@ -826,6 +826,12 @@ static int arm_smmu_init_domain_context(struct iommu_domain *domain,

>>  	if (smmu_domain->smmu)

>>  		goto out_unlock;

>>  

>> +	/* We're bypassing these SIDs, so don't allocate an actual context */

>> +	if (domain->type == IOMMU_DOMAIN_DMA) {

>> +		smmu_domain->smmu = smmu;

>> +		goto out_unlock;

>> +	}

>> +

>>  	/*

>>  	 * Mapping the requested stage onto what we support is surprisingly

>>  	 * complicated, mainly because the spec allows S1+S2 SMMUs without

>> @@ -948,7 +954,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain)

>>  	void __iomem *cb_base;

>>  	int irq;

>>  

>> -	if (!smmu)

>> +	if (!smmu || domain->type == IOMMU_DOMAIN_DMA)

>>  		return;

>>  

>>  	/*

>> -- 

>> 2.7.3.dirty

>>



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Yang Shi April 15, 2016, 5:53 p.m. UTC | #9
On 4/15/2016 8:09 AM, Eric Auger wrote:
> Hi Will,

> On 04/01/2016 06:19 PM, Will Deacon wrote:

>> Commit cbf8277ef456 ("iommu/arm-smmu: Treat IOMMU_DOMAIN_DMA as bypass

>> for now") ignores requests to attach a device to the default domain

>> since, without IOMMU-basked DMA ops available everywhere, the default

>> domain will just lead to unexpected transaction faults being reported.

>>

>> Unfortunately, the way this was implemented on SMMUv2 causes a

>> regression with VFIO PCI device passthrough under KVM on AMD Seattle.

>> On this system, the host controller device is associated with both a

>> pci_dev *and* a platform_device, and can therefore end up with duplicate

>> SMR entries, resulting in a stream-match conflict at runtime.

>>

>> This patch amends the original fix so that attaching to IOMMU_DOMAIN_DMA

>> is rejected even before configuring the SMRs. This restores the old

>> behaviour for now, but we'll need to look at handing host controllers

>> specially when we come to supporting the default domain fully.

>>

> Tested-by: Eric Auger <eric.auger@linaro.org>


Tested on my LS2085A board too.

Tested-by: Yang Shi <yang.shi@linaro.org>


Regards,
Yang

>

> Best Regards

>

> Eric

>> Reported-by: Eric Auger <eric.auger@linaro.org>

>> Signed-off-by: Will Deacon <will.deacon@arm.com>

>> ---

>>   drivers/iommu/arm-smmu.c | 14 ++++++++------

>>   1 file changed, 8 insertions(+), 6 deletions(-)

>>

>> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c

>> index e933679a3266..2f186d22477f 100644

>> --- a/drivers/iommu/arm-smmu.c

>> +++ b/drivers/iommu/arm-smmu.c

>> @@ -1098,18 +1098,20 @@ static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,

>>   	struct arm_smmu_device *smmu = smmu_domain->smmu;

>>   	void __iomem *gr0_base = ARM_SMMU_GR0(smmu);

>>

>> -	/* Devices in an IOMMU group may already be configured */

>> -	ret = arm_smmu_master_configure_smrs(smmu, cfg);

>> -	if (ret)

>> -		return ret == -EEXIST ? 0 : ret;

>> -

>>   	/*

>>   	 * FIXME: This won't be needed once we have IOMMU-backed DMA ops

>> -	 * for all devices behind the SMMU.

>> +	 * for all devices behind the SMMU. Note that we need to take

>> +	 * care configuring SMRs for devices both a platform_device and

>> +	 * and a PCI device (i.e. a PCI host controller)

>>   	 */

>>   	if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)

>>   		return 0;

>>

>> +	/* Devices in an IOMMU group may already be configured */

>> +	ret = arm_smmu_master_configure_smrs(smmu, cfg);

>> +	if (ret)

>> +		return ret == -EEXIST ? 0 : ret;

>> +

>>   	for (i = 0; i < cfg->num_streamids; ++i) {

>>   		u32 idx, s2cr;

>>

>>

>

>

> _______________________________________________

> linux-arm-kernel mailing list

> linux-arm-kernel@lists.infradead.org

> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

>



_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
diff mbox

Patch

diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c
index e933679a3266..2f186d22477f 100644
--- a/drivers/iommu/arm-smmu.c
+++ b/drivers/iommu/arm-smmu.c
@@ -1098,18 +1098,20 @@  static int arm_smmu_domain_add_master(struct arm_smmu_domain *smmu_domain,
 	struct arm_smmu_device *smmu = smmu_domain->smmu;
 	void __iomem *gr0_base = ARM_SMMU_GR0(smmu);
 
-	/* Devices in an IOMMU group may already be configured */
-	ret = arm_smmu_master_configure_smrs(smmu, cfg);
-	if (ret)
-		return ret == -EEXIST ? 0 : ret;
-
 	/*
 	 * FIXME: This won't be needed once we have IOMMU-backed DMA ops
-	 * for all devices behind the SMMU.
+	 * for all devices behind the SMMU. Note that we need to take
+	 * care configuring SMRs for devices both a platform_device and
+	 * and a PCI device (i.e. a PCI host controller)
 	 */
 	if (smmu_domain->domain.type == IOMMU_DOMAIN_DMA)
 		return 0;
 
+	/* Devices in an IOMMU group may already be configured */
+	ret = arm_smmu_master_configure_smrs(smmu, cfg);
+	if (ret)
+		return ret == -EEXIST ? 0 : ret;
+
 	for (i = 0; i < cfg->num_streamids; ++i) {
 		u32 idx, s2cr;