From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 89EFBC2D0EB for ; Sat, 28 Mar 2020 06:33:43 +0000 (UTC) Received: from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 6146B20714 for ; Sat, 28 Mar 2020 06:33:43 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6146B20714 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=iommu-bounces@lists.linux-foundation.org Received: from localhost (localhost [127.0.0.1]) by fraxinus.osuosl.org (Postfix) with ESMTP id 3955087573; Sat, 28 Mar 2020 06:33:43 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from fraxinus.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YAZHOvgaA_Yc; Sat, 28 Mar 2020 06:33:42 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by fraxinus.osuosl.org (Postfix) with ESMTP id 813D987374; Sat, 28 Mar 2020 06:33:42 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 6E9E7C18DA; Sat, 28 Mar 2020 06:33:42 +0000 (UTC) Received: from whitealder.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by lists.linuxfoundation.org (Postfix) with ESMTP id 7D1E7C0177 for ; Sat, 28 Mar 2020 06:33:40 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id 6C43087631 for ; Sat, 28 Mar 2020 06:33:40 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TSQ50Dd7VgXd for ; Sat, 28 Mar 2020 06:33:39 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by whitealder.osuosl.org (Postfix) with ESMTPS id 8D9A98761F for ; Sat, 28 Mar 2020 06:33:39 +0000 (UTC) IronPort-SDR: v+6ze/0JYjGaD+GvvRzW5iOXumXC0fw1ZrOcPdWhwPNxqjHgVeXgvgWBL6f4eOKimacUIsl+Ow neGDjJF/Lg3w== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Mar 2020 23:33:39 -0700 IronPort-SDR: m8ECCSE/uGzefX1bKdFAWdJXRfIJKewBfN7DEvIxdMrch/FZy5pucKzvjC9bHJEZoE7BfOqnfL ZDfroe060X0Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,315,1580803200"; d="scan'208";a="266428990" Received: from fmsmsx103.amr.corp.intel.com ([10.18.124.201]) by orsmga002.jf.intel.com with ESMTP; 27 Mar 2020 23:33:38 -0700 Received: from FMSMSX110.amr.corp.intel.com (10.18.116.10) by FMSMSX103.amr.corp.intel.com (10.18.124.201) with Microsoft SMTP Server (TLS) id 14.3.439.0; Fri, 27 Mar 2020 23:33:38 -0700 Received: from shsmsx103.ccr.corp.intel.com (10.239.4.69) by fmsmsx110.amr.corp.intel.com (10.18.116.10) with Microsoft SMTP Server (TLS) id 14.3.439.0; Fri, 27 Mar 2020 23:33:37 -0700 Received: from shsmsx104.ccr.corp.intel.com ([169.254.5.225]) by SHSMSX103.ccr.corp.intel.com ([169.254.4.146]) with mapi id 14.03.0439.000; Sat, 28 Mar 2020 14:33:35 +0800 From: "Tian, Kevin" To: Jacob Pan Subject: RE: [PATCH 05/10] iommu/ioasid: Create an IOASID set for host SVA use Thread-Topic: [PATCH 05/10] iommu/ioasid: Create an IOASID set for host SVA use Thread-Index: AQHWAs3KC1709AUDMEKcaU76snqwOKhcMJxw///+BwCAAWE+AA== Date: Sat, 28 Mar 2020 06:33:34 +0000 Message-ID: References: <1585158931-1825-1-git-send-email-jacob.jun.pan@linux.intel.com> <1585158931-1825-6-git-send-email-jacob.jun.pan@linux.intel.com> <20200327102850.77a5d5da@jacob-builder> In-Reply-To: <20200327102850.77a5d5da@jacob-builder> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Cc: "Raj, Ashok" , Jean-Philippe Brucker , LKML , "iommu@lists.linux-foundation.org" , Alex Williamson , David Woodhouse , Jonathan Cameron X-BeenThere: iommu@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Development issues for Linux IOMMU support List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: iommu-bounces@lists.linux-foundation.org Sender: "iommu" > From: Jacob Pan > Sent: Saturday, March 28, 2020 1:29 AM > > On Fri, 27 Mar 2020 09:41:55 +0000 > "Tian, Kevin" wrote: > > > > From: Jacob Pan > > > Sent: Thursday, March 26, 2020 1:55 AM > > > > > > Bare metal SVA allocates IOASIDs for native process addresses. This > > > should be separated from VM allocated IOASIDs thus under its own > > > set. > > > > A curious question. Now bare metal SVA uses the system set and guest > > SVA uses dynamically-created set. Then do we still allow ioasid_alloc > > with a NULL set pointer? > > > Good point! There shouldn't be NULL set. That was one of the sticky > point in the previous allocation API. I will add a check in > ioasid_alloc_set(). > > However, there is still need for global search, e.g. PRS. > https://lore.kernel.org/linux-arm-kernel/1d62b2e1-fe8c-066d-34e0- > f7929f6a78e2@arm.com/#t > > In that case, use INVALID_IOASID_SET to indicate the search is global. > e.g. > ioasid_find(INVALID_IOASID_SET, data->hpasid, NULL); ok, it makes sense. > > > > > > > This patch creates a system IOASID set with its quota set to > > > PID_MAX. This is a reasonable default in that SVM capable devices > > > can only bind to limited user processes. > > > > > > Signed-off-by: Jacob Pan > > > --- > > > drivers/iommu/intel-iommu.c | 8 +++++++- > > > drivers/iommu/ioasid.c | 9 +++++++++ > > > include/linux/ioasid.h | 9 +++++++++ > > > 3 files changed, 25 insertions(+), 1 deletion(-) > > > > > > diff --git a/drivers/iommu/intel-iommu.c > > > b/drivers/iommu/intel-iommu.c index ec3fc121744a..af7a1ef7b31e > > > 100644 --- a/drivers/iommu/intel-iommu.c > > > +++ b/drivers/iommu/intel-iommu.c > > > @@ -3511,8 +3511,14 @@ static int __init init_dmars(void) > > > goto free_iommu; > > > > > > /* PASID is needed for scalable mode irrespective to SVM */ > > > - if (intel_iommu_sm) > > > + if (intel_iommu_sm) { > > > ioasid_install_capacity(intel_pasid_max_id); > > > + /* We should not run out of IOASIDs at boot */ > > > + if (ioasid_alloc_system_set(PID_MAX_DEFAULT)) { > > > + pr_err("Failed to enable host PASID > > > allocator\n"); > > > + intel_iommu_sm = 0; > > > + } > > > + } > > > > > > /* > > > * for each drhd > > > diff --git a/drivers/iommu/ioasid.c b/drivers/iommu/ioasid.c > > > index 6265d2dbbced..9135af171a7c 100644 > > > --- a/drivers/iommu/ioasid.c > > > +++ b/drivers/iommu/ioasid.c > > > @@ -39,6 +39,9 @@ struct ioasid_data { > > > static ioasid_t ioasid_capacity; > > > static ioasid_t ioasid_capacity_avail; > > > > > > +int system_ioasid_sid; > > > +static DECLARE_IOASID_SET(system_ioasid); > > > + > > > /* System capacity can only be set once */ > > > void ioasid_install_capacity(ioasid_t total) > > > { > > > @@ -51,6 +54,12 @@ void ioasid_install_capacity(ioasid_t total) > > > } > > > EXPORT_SYMBOL_GPL(ioasid_install_capacity); > > > > > > +int ioasid_alloc_system_set(int quota) > > > +{ > > > + return ioasid_alloc_set(&system_ioasid, quota, > > > &system_ioasid_sid); +} > > > +EXPORT_SYMBOL_GPL(ioasid_alloc_system_set); > > > + > > > /* > > > * struct ioasid_allocator_data - Internal data structure to hold > > > information > > > * about an allocator. There are two types of allocators: > > > diff --git a/include/linux/ioasid.h b/include/linux/ioasid.h > > > index 8c82d2625671..097b1cc043a3 100644 > > > --- a/include/linux/ioasid.h > > > +++ b/include/linux/ioasid.h > > > @@ -29,6 +29,9 @@ struct ioasid_allocator_ops { > > > void *pdata; > > > }; > > > > > > +/* Shared IOASID set for reserved for host system use */ > > > +extern int system_ioasid_sid; > > > + > > > #define DECLARE_IOASID_SET(name) struct ioasid_set name = { 0 } > > > > > > #if IS_ENABLED(CONFIG_IOASID) > > > @@ -41,6 +44,7 @@ int ioasid_register_allocator(struct > > > ioasid_allocator_ops *allocator); > > > void ioasid_unregister_allocator(struct ioasid_allocator_ops > > > *allocator); int ioasid_attach_data(ioasid_t ioasid, void *data); > > > void ioasid_install_capacity(ioasid_t total); > > > +int ioasid_alloc_system_set(int quota); > > > int ioasid_alloc_set(struct ioasid_set *token, ioasid_t quota, int > > > *sid); void ioasid_free_set(int sid, bool destroy_set); > > > int ioasid_find_sid(ioasid_t ioasid); > > > @@ -88,5 +92,10 @@ static inline void > > > ioasid_install_capacity(ioasid_t total) { > > > } > > > > > > +static inline int ioasid_alloc_system_set(int quota) > > > +{ > > > + return -ENOTSUPP; > > > +} > > > + > > > #endif /* CONFIG_IOASID */ > > > #endif /* __LINUX_IOASID_H */ > > > -- > > > 2.7.4 > > > > [Jacob Pan] _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu