[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v1 2/2] xen/mmu: enable SMMU subsystem only in MMU
- To: Julien Grall <julien@xxxxxxx>, Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
- From: Ayan Kumar Halder <ayankuma@xxxxxxx>
- Date: Mon, 11 Nov 2024 16:00:50 +0000
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=77dwYmiSAKS7gANXteFEPKiFGOY8ENhgnwTG/vsviX8=; b=oJ7ARS2SApfnDJpd0hpi9elTdoRWcfBrSqAIeP5tKbl/7UOZ+oiUjueV1WlFa4+zpIJehFc/eVwAyTIaSW4HN44IJ/cHH/f1wW53siMACx5VV4w9Dij2GLkHflomTvYJVHFof0PlYJf8sz++pyOg1qVBm8hq/ZeGr4Y4bFl6lMRafb9kryS7iZ8QbrFeEQquvjnpa564rwM0YxswcEb84h/1wmJpk2ds92i6mhTADUpkZ2iZjbv9AFoScNa929ESjjlrLA+kHp/4EXHbG6LkGdjtCA4Qy5B4DOVCE7KNg/4oBjZInRkBuHoXmm+KM3UwxXNJuU1yjzTNP5GWrIn6aw==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=xmqale9EYP10343BV+Mq62eacDCoHWvhDjt0DznmU4OsDiVEdm35hvPLljq0yhtvmDj6Q3CHFon1AeG1HRFeLqdpoTgEJ/3AzAmcDYFYwcqhRzsJjFDv+0g1M0NVC8KjgtwWBU2PaIjGMN673KAi/BA91m1p/XBsuOKm+9TFgEAYCVBvqrDXqR14wUijK/AFEcnB3pLJsca1N96AX+xJ15kYlpSVOg2QdIsQsddLAJ59G6tXu56+PzWRTMD5VbW+sBS8PN3aPFQJNNiqfzZyfOaYGAmH30kOWiTYxdC4sqPT5SuIgmPqfLpP//IC0mUScP2+Cj//y0ZBEBlqJcUsJA==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
- Cc: Penny Zheng <Penny.Zheng@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Rahul Singh <rahul.singh@xxxxxxx>, Luca Fancellu <luca.fancellu@xxxxxxx>
- Delivery-date: Mon, 11 Nov 2024 16:01:34 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 11/11/2024 13:45, Julien Grall wrote:
Hi Ayan,
Hi Julien,
On 11/11/2024 13:24, Ayan Kumar Halder wrote:
On 11/11/2024 11:12, Julien Grall wrote:
Hi,
Hi Julien,
On 08/11/2024 19:59, Ayan Kumar Halder wrote:
From: Penny Zheng <Penny.Zheng@xxxxxxx>
In Xen, SMMU subsystem is supported for MMU system only. The reason
being SMMU
driver uses the same page tables as MMU.
Thus, we make it dependent on CONFIG_MMU.
Signed-off-by: Penny Zheng <Penny.Zheng@xxxxxxx>
Signed-off-by: Ayan Kumar Halder <ayan.kumar.halder@xxxxxxx>
---
xen/arch/arm/Kconfig | 2 +-
xen/drivers/passthrough/Kconfig | 3 ++-
2 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 15b2e4a227..3699e148e9 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -16,7 +16,7 @@ config ARM
select HAS_DEVICE_TREE
select HAS_PASSTHROUGH
select HAS_UBSAN
- select IOMMU_FORCE_PT_SHARE
+ select IOMMU_FORCE_PT_SHARE if MMU
Realistically, everything under drivers/passthrough is MMU specific.
So does it actually make any sense to select HAS_PASSTHROUGH right now?
Actually we are able to assign devices to different DomUs (eg UART1
to domU1) as long as the device isn't behind an IOMMU. So in our
case, the passthrough device tree has this node
uart@9c0b0000 {
compatible = "arm,pl011\0arm,primecell";
reg = <0x00 0x9c0b0000 0x00 0x10000>;
interrupt-parent = <0x01>;
interrupts = <0x00 0x07 0x04>;
clock-names = "uartclk\0apb_pclk";
clocks = <0x06 0x07>;
xen,path = "/uart@9c0b0000";
xen,reg = <0x00 0x9c0b0000 0x00 0x10000 0x00 0x9c0b0000>;
xen,force-assign-without-iommu;
So how devices will be protected on an MPU systems?
> };> So, should we still disable HAS_PASSTHROUGH for MPU ?
While it may work, a lot of code in drivers/passthrough is IOMMU
specific (see all the function named iommu_*). So I find really odd
that you disable IOMMU_FORCE_PT_SHARE but all the rest is still
present...
I think we need some consistency. If you are planning to do device
passthrough without any protection, then I don't think you need any
code within drivers/passthrough/ (at least for platform devices).
Overall, for this patch, I think it would be better to simply select
HAS_PASSTHROUGH when MMU is enabled. We can revisit device passthrough
once we have the patches on the ML.
Yes, this makes sense. I will wait for Luca to confirm as well.
BTW, I think it should be move under the Kconfig MMU rather than using
"if MMU".
Yes. So for now this should be sufficient.
diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
index 15b2e4a227..adebf8d5ca 100644
--- a/xen/arch/arm/Kconfig
+++ b/xen/arch/arm/Kconfig
@@ -14,9 +14,7 @@ config ARM
select FUNCTION_ALIGNMENT_4B
select HAS_ALTERNATIVE if HAS_VMAP
select HAS_DEVICE_TREE
- select HAS_PASSTHROUGH
select HAS_UBSAN
- select IOMMU_FORCE_PT_SHARE
config ARCH_DEFCONFIG
string
@@ -78,6 +76,8 @@ config MMU
bool "MMU"
select HAS_PMAP
select HAS_VMAP
+ select HAS_PASSTHROUGH
+ select IOMMU_FORCE_PT_SHARE
help
Select it if you plan to run Xen on A-profile Armv7+
- Ayan
Cheers,
|