Re: [PATCH RFC v2 3/4] iommu: Introduce iommu_dev_reset_prepare() and iommu_dev_reset_done()
From: Nicolin Chen
Date: Mon Jul 28 2025 - 15:08:41 EST
On Sun, Jul 27, 2025 at 01:25:01PM -0300, Jason Gunthorpe wrote:
> On Tue, Jul 22, 2025 at 02:58:21PM -0700, Nicolin Chen wrote:
> > > /*
> > > * This is called on the dma mapping fast path so avoid locking. This
> > > * is racy, but we have an expectation that the driver will setup its
> > > * DMAs inside probe while still single threaded to avoid racing.
> > > */
> > > if (dev->iommu && !READ_ONCE(dev->iommu->attach_deferred))
> >
> > This triggers a build error as attach_deferred is a bit-field. So I
> > am changing it from "u32 attach_deferred:1" to "bool" for this.
>
> Bleck, that seems undesirable.
But inevitable for READ_ONCE :(
> > And, to keep the original logic, I think it should be:
> > if (!dev->iommu || !READ_ONCE(dev->iommu->attach_deferred))
>
> That doesn't seem right, if there is no iommu by the time a driver is
> probed there never will be an iommu and this device should be running
> in direct mode only.
Well, the current function does:
if (dev->iommu && dev->iommu->attach_deferred)
return __iommu_attach_device(domain, dev);
return 0;
So, matching to that logic, it would be:
if (!dev->iommu || !dev->iommu->attach_deferred)
return 0;
return __iommu_attach_device(domain, dev);
then add guard(mutex).
I do see your point. Yet, given that it is an exported function,
I think it'd be safer to have a check. Perhaps it should give a
WARN_ON(!dev->iommu).
> > > And of course it is already quite crazy to be doing FLR during a
> > > device probe so this is not a realistic scenario.
> >
> > Hmm, I am not sure about that, as I see iommu_deferred_attach() get
> > mostly invoked by a dma_alloc() or even a dma_map(). So, this might
> > not be confined to a device probe?
>
> Once you do deferred_attach the first time it is done and won't have
> any further impact. So long as the dev->iommu->attach_deferred guards
> any changes to domains it is unlikely to be racing with FLR.
I see. The existing callers are all in dma-iommu.c. So, we can
assume that iommu_deferred_attach() is already done, when a PCI
driver calls any function from dma-iommu.c.
> > > Either ignore this condition with the rational that we are about to
> > > reset it so it doesn't matter, or we need to establish a new paging
> > > domain for isolation purposes that has the RMR setup.
> >
> > Ah, you are right. ARM MSI in a VM uses RMR and sets this.
> >
> > But does it also raise a question that a VM having RMR can't use
> > the blocked_domain, as __iommu_device_set_domain() has the exact
> > same check rejecting blocked_domain? Not sure if there would be
> > some unintended consequnce though...
>
> Sounds like it needs some sorting out.. For the purposes of FLR I
> think the blocked domain is OK, so maybe just move some of those
> checks around?
These two new APIs call the lower-level __iommu_attach_device()
that does not check require_direct. So, we are fine, so long as
we don't check it in the new API as you previously pointed out.
I'm worried about using blocked domains in general.
Thanks
Nicolin