[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v1 2/2] xen/mmu: enable SMMU subsystem only in MMU


  • To: Julien Grall <julien@xxxxxxx>, Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Ayan Kumar Halder <ayankuma@xxxxxxx>
  • Date: Mon, 11 Nov 2024 16:00:50 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=77dwYmiSAKS7gANXteFEPKiFGOY8ENhgnwTG/vsviX8=; b=oJ7ARS2SApfnDJpd0hpi9elTdoRWcfBrSqAIeP5tKbl/7UOZ+oiUjueV1WlFa4+zpIJehFc/eVwAyTIaSW4HN44IJ/cHH/f1wW53siMACx5VV4w9Dij2GLkHflomTvYJVHFof0PlYJf8sz++pyOg1qVBm8hq/ZeGr4Y4bFl6lMRafb9kryS7iZ8QbrFeEQquvjnpa564rwM0YxswcEb84h/1wmJpk2ds92i6mhTADUpkZ2iZjbv9AFoScNa929ESjjlrLA+kHp/4EXHbG6LkGdjtCA4Qy5B4DOVCE7KNg/4oBjZInRkBuHoXmm+KM3UwxXNJuU1yjzTNP5GWrIn6aw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=xmqale9EYP10343BV+Mq62eacDCoHWvhDjt0DznmU4OsDiVEdm35hvPLljq0yhtvmDj6Q3CHFon1AeG1HRFeLqdpoTgEJ/3AzAmcDYFYwcqhRzsJjFDv+0g1M0NVC8KjgtwWBU2PaIjGMN673KAi/BA91m1p/XBsuOKm+9TFgEAYCVBvqrDXqR14wUijK/AFEcnB3pLJsca1N96AX+xJ15kYlpSVOg2QdIsQsddLAJ59G6tXu56+PzWRTMD5VbW+sBS8PN3aPFQJNNiqfzZyfOaYGAmH30kOWiTYxdC4sqPT5SuIgmPqfLpP//IC0mUScP2+Cj//y0ZBEBlqJcUsJA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
  • Cc: Penny Zheng <Penny.Zheng@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Rahul Singh <rahul.singh@xxxxxxx>, Luca Fancellu <luca.fancellu@xxxxxxx>
  • Delivery-date: Mon, 11 Nov 2024 16:01:34 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>


On 11/11/2024 13:45, Julien Grall wrote:
Hi Ayan,
Hi Julien,

On 11/11/2024 13:24, Ayan Kumar Halder wrote:
On 11/11/2024 11:12, Julien Grall wrote:
Hi,
Hi Julien,

On 08/11/2024 19:59, Ayan Kumar Halder wrote:
From: Penny Zheng <Penny.Zheng@xxxxxxx>

In Xen, SMMU subsystem is supported for MMU system only. The reason being SMMU
driver uses the same page tables as MMU.
Thus, we make it dependent on CONFIG_MMU.

Signed-off-by: Penny Zheng <Penny.Zheng@xxxxxxx>
Signed-off-by: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
---
  xen/arch/arm/Kconfig            | 2 +-
  xen/drivers/passthrough/Kconfig | 3 ++-
  2 files changed, 3 insertions(+), 2 deletions(-)

diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 15b2e4a227..3699e148e9 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -16,7 +16,7 @@ config ARM
      select HAS_DEVICE_TREE
      select HAS_PASSTHROUGH
      select HAS_UBSAN
-    select IOMMU_FORCE_PT_SHARE
+    select IOMMU_FORCE_PT_SHARE if MMU

Realistically, everything under drivers/passthrough is MMU specific. So does it actually make any sense to select HAS_PASSTHROUGH right now?

Actually we are able to assign devices to different DomUs (eg UART1 to domU1) as long as the device isn't behind an IOMMU. So in our case, the passthrough device tree has this node

         uart@9c0b0000 {
             compatible = "arm,pl011\0arm,primecell";
             reg = <0x00 0x9c0b0000 0x00 0x10000>;
             interrupt-parent = <0x01>;
             interrupts = <0x00 0x07 0x04>;
             clock-names = "uartclk\0apb_pclk";
             clocks = <0x06 0x07>;
             xen,path = "/uart@9c0b0000";
             xen,reg = <0x00 0x9c0b0000 0x00 0x10000 0x00 0x9c0b0000>;
             xen,force-assign-without-iommu;

So how devices will be protected on an MPU systems?

>          };> So, should we still disable HAS_PASSTHROUGH for MPU ?

While it may work, a lot of code in drivers/passthrough is IOMMU specific (see all the function named iommu_*). So I find really odd that you disable IOMMU_FORCE_PT_SHARE but all the rest is still present...

I think we need some consistency. If you are planning to do device passthrough without any protection, then I don't think you need any code within drivers/passthrough/ (at least for platform devices).

Overall, for this patch, I think it would be better to simply select HAS_PASSTHROUGH when MMU is enabled. We can revisit device passthrough once we have the patches on the ML.
Yes, this makes sense. I will wait for Luca to confirm as well.

BTW, I think it should be move under the Kconfig MMU rather than using "if MMU".

Yes. So for now this should be sufficient.

diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 15b2e4a227..adebf8d5ca 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -14,9 +14,7 @@ config ARM
        select FUNCTION_ALIGNMENT_4B
        select HAS_ALTERNATIVE if HAS_VMAP
        select HAS_DEVICE_TREE
-       select HAS_PASSTHROUGH
        select HAS_UBSAN
-       select IOMMU_FORCE_PT_SHARE

 config ARCH_DEFCONFIG
        string
@@ -78,6 +76,8 @@ config MMU
        bool "MMU"
        select HAS_PMAP
        select HAS_VMAP
+       select HAS_PASSTHROUGH
+       select IOMMU_FORCE_PT_SHARE
        help
          Select it if you plan to run Xen on A-profile Armv7+

- Ayan



Cheers,




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.