Received: by 10.223.185.116 with SMTP id b49csp819088wrg; Fri, 23 Feb 2018 07:17:36 -0800 (PST) X-Google-Smtp-Source: AH8x224CXPzuujO/VvZD41vhDsCOkcD12tGSUPe3utnhVnL2KrfZCFdxMSVvvfM40NZOh8ph3xQ9 X-Received: by 2002:a17:902:5203:: with SMTP id z3-v6mr2079810plh.392.1519399056239; Fri, 23 Feb 2018 07:17:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519399056; cv=none; d=google.com; s=arc-20160816; b=P5eCEDJX9Drff8hSGdS654Q677gVtj48XySHLSwYuCMof+pna8320/JR60y39aOBHN Mq8dbwghX9ALGwUXmTvTayovLJicZytj13J+9JOU6Tyu6MjspbkedTY3lF3g41EOu3QY Jrg3hblQX+KjjZTWf4L65jqnwRoVfTkOnVLqrerlfpPVKbw7BOiYAVFd60A4Gkw3v2WE kSjO6dj/B3DThd6fRvxCvXHRZDZ6LyCJR+/zMGCwcAXYKRq8XSx3uGiTvCNmFzQ4QoKQ pnKx6y86ChPCe7b7eAMAstBnGpfP3glLkC4ngFjK2m78nZO9KmS/as6YODEf4hoF8b/8 rj6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=K9Dgo/35o+V08ZFYgUmWtuh+0Sf0p4IJPDYE75gkr9k=; b=Szpw8HbrEk859XmF3cKzOWQnf51OA92eMy8HxtRLgi4k96uwbRrD+pjaSjCiwEbP8X TGsWWoUqGrf0zazFnutV7/0sFvhImFbAR7ZOFvYWrKU9un1YGEPymbdG1qZIt9EpbEm8 PveQfRLEay7XVto588atgPZBLcoIXLDADnaoSNhVjbECKMm+i8o+6P/EzUeK9Bx/OrrF HcDz1Jw5R8DF4rznELB/c1wRx+k/KZpxPnAy4E3JD9BWg2THmjG3W6YfiXBWGXWNJ/5D f0qn1V5K7B6nencxL/sBmONLkOdtXybYI1y/926ncUKUm0U6J2HxNQypG5QGTe+jNVzr 9x1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j88si927547pfe.324.2018.02.23.07.17.21; Fri, 23 Feb 2018 07:17:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751623AbeBWPPR (ORCPT + 99 others); Fri, 23 Feb 2018 10:15:17 -0500 Received: from mx1.redhat.com ([209.132.183.28]:38320 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751436AbeBWPPP (ORCPT ); Fri, 23 Feb 2018 10:15:15 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5F3CFC03E019; Fri, 23 Feb 2018 15:15:15 +0000 (UTC) Received: from w520.home (ovpn-117-203.phx2.redhat.com [10.3.117.203]) by smtp.corp.redhat.com (Postfix) with ESMTP id 487765C20C; Fri, 23 Feb 2018 15:15:14 +0000 (UTC) Date: Fri, 23 Feb 2018 08:15:13 -0700 From: Alex Williamson To: "Tian, Kevin" Cc: Suravee Suthikulpanit , "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "joro@8bytes.org" , "jroedel@suse.de" Subject: Re: [PATCH v5] vfio/type1: Adopt fast IOTLB flush interface when unmap IOVAs Message-ID: <20180223081513.33f799f7@w520.home> In-Reply-To: References: <1517466458-3523-1-git-send-email-suravee.suthikulpanit@amd.com> <20180222155915.543804e8@w520.home> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Fri, 23 Feb 2018 15:15:15 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 23 Feb 2018 08:20:51 +0000 "Tian, Kevin" wrote: > > From: Alex Williamson > > Sent: Friday, February 23, 2018 6:59 AM > > > > On Thu, 1 Feb 2018 01:27:38 -0500 > > Suravee Suthikulpanit wrote: > > > > > VFIO IOMMU type1 currently upmaps IOVA pages synchronously, which > > requires > > > IOTLB flushing for every unmapping. This results in large IOTLB flushing > > > overhead when handling pass-through devices has a large number of > > mapped > > > IOVAs. This can be avoided by using the new IOTLB flushing interface. > > > > > > Cc: Alex Williamson > > > Cc: Joerg Roedel > > > Signed-off-by: Suravee Suthikulpanit > > > --- > > > > > > Changes from v4 (https://lkml.org/lkml/2018/1/31/153) > > > * Change return type from ssize_t back to size_t since we no longer > > > changing IOMMU API. Also update error handling logic accordingly. > > > * In unmap_unpin_fast(), also sync when failing to allocate entry. > > > * Some code restructuring and variable renaming. > > > > > > drivers/vfio/vfio_iommu_type1.c | 128 > > ++++++++++++++++++++++++++++++++++++---- > > > 1 file changed, 117 insertions(+), 11 deletions(-) > > > > > > diff --git a/drivers/vfio/vfio_iommu_type1.c > > b/drivers/vfio/vfio_iommu_type1.c > > > index e30e29a..6041530 100644 > > > --- a/drivers/vfio/vfio_iommu_type1.c > > > +++ b/drivers/vfio/vfio_iommu_type1.c > > > @@ -102,6 +102,13 @@ struct vfio_pfn { > > > atomic_t ref_count; > > > }; > > > > > > +struct vfio_regions { > > > + struct list_head list; > > > + dma_addr_t iova; > > > + phys_addr_t phys; > > > + size_t len; > > > +}; > > > + > > > #define IS_IOMMU_CAP_DOMAIN_IN_CONTAINER(iommu) \ > > > (!list_empty(&iommu->domain_list)) > > > > > > @@ -648,11 +655,102 @@ static int > > vfio_iommu_type1_unpin_pages(void *iommu_data, > > > return i > npage ? npage : (i > 0 ? i : -EINVAL); > > > } > > > > > > +static long vfio_sync_unpin(struct vfio_dma *dma, struct vfio_domain > > *domain, > > > + struct list_head *regions) > > > +{ > > > + long unlocked = 0; > > > + struct vfio_regions *entry, *next; > > > + > > > + iommu_tlb_sync(domain->domain); > > > + > > > + list_for_each_entry_safe(entry, next, regions, list) { > > > + unlocked += vfio_unpin_pages_remote(dma, > > > + entry->iova, > > > + entry->phys >> > > PAGE_SHIFT, > > > + entry->len >> PAGE_SHIFT, > > > + false); > > > + list_del(&entry->list); > > > + kfree(entry); > > > + } > > > + > > > + cond_resched(); > > > + > > > + return unlocked; > > > +} > > > + > > > +/* > > > + * Generally, VFIO needs to unpin remote pages after each IOTLB flush. > > > + * Therefore, when using IOTLB flush sync interface, VFIO need to keep > > track > > > + * of these regions (currently using a list). > > > + * > > > + * This value specifies maximum number of regions for each IOTLB flush > > sync. > > > + */ > > > +#define VFIO_IOMMU_TLB_SYNC_MAX 512 > > > + > > > +static size_t unmap_unpin_fast(struct vfio_domain *domain, > > > + struct vfio_dma *dma, dma_addr_t *iova, > > > + size_t len, phys_addr_t phys, long *unlocked, > > > + struct list_head *unmapped_list, > > > + int *unmapped_cnt) > > > +{ > > > + size_t unmapped = 0; > > > + struct vfio_regions *entry = kzalloc(sizeof(*entry), GFP_KERNEL); > > > + > > > + if (entry) { > > > + unmapped = iommu_unmap_fast(domain->domain, *iova, > > len); > > > + > > > + if (!unmapped) { > > > + kfree(entry); > > > + } else { > > > + iommu_tlb_range_add(domain->domain, *iova, > > unmapped); > > > + entry->iova = *iova; > > > + entry->phys = phys; > > > + entry->len = unmapped; > > > + list_add_tail(&entry->list, unmapped_list); > > > + > > > + *iova += unmapped; > > > + (*unmapped_cnt)++; > > > + } > > > + } > > > + > > > + /* > > > + * Sync if the number of fast-unmap regions hits the limit > > > + * or in case of errors. > > > + */ > > > + if (*unmapped_cnt >= VFIO_IOMMU_TLB_SYNC_MAX > > || !unmapped) { > > > + *unlocked += vfio_sync_unpin(dma, domain, > > > + unmapped_list); > > > + *unmapped_cnt = 0; > > > + } > > I'm not sure why returning ZERO is treated as only unmap error > here, but if looking at __iommu_unmap clearly there are other > error codes returned also. I know it's not introduced by this > patch but Alex, was it deliberately implemented such way under > any assumption or a typo? iommu_unmap() returns a size_t, an unsigned type. Suravee has another patch in the iommu space to correct that function from trying to return -errno. Thanks, Alex