Received: by 10.223.185.116 with SMTP id b49csp7778877wrg; Thu, 1 Mar 2018 10:57:13 -0800 (PST) X-Google-Smtp-Source: AG47ELuchrpI2Gdasqs/pBnKXP0IgX8i97WqSRhVJYJv8TeB41dgI28na1zx27e0JJhQQ0yZNWwl X-Received: by 10.98.233.3 with SMTP id j3mr2992281pfh.38.1519930633099; Thu, 01 Mar 2018 10:57:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519930633; cv=none; d=google.com; s=arc-20160816; b=kWFHbrbsK+4ZD9fpSZ2Q9UFAZJsj7pb5EvdYSaKQ73ASMIT0ghjt566XY4aG1QkjDT 08C5iABLG4sKU2ZAXZ+uXjSOEQEaGosoL6+vEjN8quVAlLZvxQPDKgqRroeqk64d+Ryu cl2XpM0og6U0JI1lHweCmS0rakkbWwoqW9GqZdyw3IBbjKU1YCCruGRPTQf1JjyIA7iE iTGWiXlkaewa+zlLDOW7unZHck9+SkQXIzVbEvJbnyC4v/I4gguTqTq4iziFkPUupJD9 JpEL9vxV2QqJKLlbFO29D7TORbWcrZ0A+wp6EjEt1FgxhMLtGFO7F0vzygyYuA0p/CH3 /XZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:arc-authentication-results; bh=pT/HSObguuLRvflKii7IbNiIaC+ux3y0DZa5czzcVwQ=; b=MqXr4q3fLDKHPpxG5cigO/aU/TOBP9p07118iX/c047kSr6E340HVOJRbtk1NBtMvC AycXizuBG+hxx57ccGj9qsYlUu7bIsWKtJOD0Lpl9JKPsVI624fmcIGLt9d+pr/Tr1x7 LZqrMZzZ+499XpnVOUbKf6TCeu7+ey9WobJE9/oFahgNN3WMIKGSG+vWsuDWGFDF7YLc SJ40RTmXrWEF4UmIX9axQBDqJNonqvTF1AWqTGDQsEISTeGQ1J6c0qtUxDLOKkViCce+ BYOyRY8HheERD4iWFpOzk36pCesf9YgHa0BZJ6JEtesNwouf2MtOSfni6hAeTzT7dLZh VXdQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b128si2783660pgc.220.2018.03.01.10.56.57; Thu, 01 Mar 2018 10:57:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161079AbeCAS4S (ORCPT + 99 others); Thu, 1 Mar 2018 13:56:18 -0500 Received: from ale.deltatee.com ([207.54.116.67]:37388 "EHLO ale.deltatee.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1034046AbeCAS4P (ORCPT ); Thu, 1 Mar 2018 13:56:15 -0500 Received: from guinness.priv.deltatee.com ([172.16.1.162]) by ale.deltatee.com with esmtp (Exim 4.89) (envelope-from ) id 1erTN1-0008C1-HL; Thu, 01 Mar 2018 11:56:00 -0700 To: Bjorn Helgaas Cc: linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-nvme@lists.infradead.org, linux-rdma@vger.kernel.org, linux-nvdimm@lists.01.org, linux-block@vger.kernel.org, Stephen Bates , Christoph Hellwig , Jens Axboe , Keith Busch , Sagi Grimberg , Bjorn Helgaas , Jason Gunthorpe , Max Gurtovoy , Dan Williams , =?UTF-8?B?SsOpcsO0bWUgR2xpc3Nl?= , Benjamin Herrenschmidt , Alex Williamson References: <20180228234006.21093-1-logang@deltatee.com> <20180228234006.21093-2-logang@deltatee.com> <20180301173752.GE13722@bhelgaas-glaptop.roam.corp.google.com> From: Logan Gunthorpe Message-ID: Date: Thu, 1 Mar 2018 11:55:51 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180301173752.GE13722@bhelgaas-glaptop.roam.corp.google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 172.16.1.162 X-SA-Exim-Rcpt-To: alex.williamson@redhat.com, benh@kernel.crashing.org, jglisse@redhat.com, dan.j.williams@intel.com, maxg@mellanox.com, jgg@mellanox.com, bhelgaas@google.com, sagi@grimberg.me, keith.busch@intel.com, axboe@kernel.dk, hch@lst.de, sbates@raithlin.com, linux-block@vger.kernel.org, linux-nvdimm@lists.01.org, linux-rdma@vger.kernel.org, linux-nvme@lists.infradead.org, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, helgaas@kernel.org X-SA-Exim-Mail-From: logang@deltatee.com X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on ale.deltatee.com X-Spam-Level: X-Spam-Status: No, score=-8.7 required=5.0 tests=ALL_TRUSTED,BAYES_00, GREYLIST_ISWHITE,MYRULES_FREE,T_RP_MATCHES_RCVD autolearn=ham autolearn_force=no version=3.4.1 Subject: Re: [PATCH v2 01/10] PCI/P2PDMA: Support peer to peer memory X-SA-Exim-Version: 4.2.1 (built Tue, 02 Aug 2016 21:08:31 +0000) X-SA-Exim-Scanned: Yes (on ale.deltatee.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Bjorn, Thanks for the review. I'll correct all the nits for the next version. On 01/03/18 10:37 AM, Bjorn Helgaas wrote: > On Wed, Feb 28, 2018 at 04:39:57PM -0700, Logan Gunthorpe wrote: >> Some PCI devices may have memory mapped in a BAR space that's >> intended for use in Peer-to-Peer transactions. In order to enable >> such transactions the memory must be registered with ZONE_DEVICE pages >> so it can be used by DMA interfaces in existing drivers. > Is there anything about this memory that makes it specifically > intended for peer-to-peer transactions? I assume the device can't > really tell whether a transaction is from a CPU or a peer. No there's nothing special about the memory and it can still be accessed by the CPU. This is just the intended purpose. You could use this PCI memory as regular DMA buffers or regular memory but I'm not sure why you would. It would probably be pretty bad performance-wise. > BTW, maybe there could be some kind of guide for device driver writers > in Documentation/PCI/? Makes sense we can look at writing something for the next iteration. > I think it would be clearer and sufficient to simply say that we have > no way to know whether peer-to-peer routing between PCIe Root Ports is > supported (PCIe r4.0, sec 1.3.1). Fair enough. > The fact that you use the PCIe term "switch" suggests that a PCIe > Switch is required, but isn't it sufficient for the peers to be below > the same "PCI bridge", which would include PCIe Root Ports, PCIe > Switch Downstream Ports, and conventional PCI bridges? > The comments at get_upstream_bridge_port() suggest that this isn't > enough, and the peers actually do have to be below the same PCIe > Switch, but I don't know why. I do mean Switch as we do need to keep the traffic off the root complex. Seeing, as stated above, we don't know if it actually support it. (While we can be certain any PCI switch does). So we specifically want to exclude PCIe Root ports and I'm not sure about the support of PCI bridges but I can't imagine anyone wanting to do P2P around them so I'd rather be safe than sorry and exclude them. >> + addr = devm_memremap_pages(&pdev->dev, pgmap); >> + if (IS_ERR(addr)) > > Free pgmap here? And in the other error case below? Or maybe this > happens via the devm_* magic? If so, when would that actually happen? > Would pgmap be effectively leaked until the pdev is destroyed? Yes, it happens via the devm magic as that's the way the devm_memremap_pages() interface was designed. If I remember correctly, in my testing, it would be de-allocated when the driver gets unbound. >> + return PTR_ERR(addr); >> + >> + error = gen_pool_add_virt(pdev->p2pdma->pool, (uintptr_t)addr, >> + pci_bus_address(pdev, bar) + offset, >> + resource_size(&pgmap->res), dev_to_node(&pdev->dev)); >> + if (error) >> + return error; >> + >> + error = devm_add_action_or_reset(&pdev->dev, pci_p2pdma_percpu_kill, >> + &pdev->p2pdma->devmap_ref); >> + if (error) >> + return error; >> + >> + dev_info(&pdev->dev, "added peer-to-peer DMA memory %pR\n", >> + &pgmap->res); > > s/dev_info/pci_info/ (also similar usages below, except for the one or > two cases where you don't have a pci_dev). Oh, nice, I didn't notice that was added. > This whole thing is confusing to me. Why do you want to reject peers > directly connected to the same root port? Why do you require the same > Switch Upstream Port? You don't exclude conventional PCI, but it > looks like you would require peers to share *two* upstream PCI-to-PCI > bridges? I would think a single shared upstream bridge (conventional, > PCIe Switch Downstream Port, or PCIe Root Port) would be sufficient? Hmm, yes, this may just be laziness on my part. Finding the shared upstream bridge is a bit more tricky than just showing that they are on the same switch. So as coded, a fabric of switches with peers on different legs of the fabric are not supported. But yes, maybe they just need to be two devices with a single shared upstream bridge that is not the root port. Again, we need to reject the root port because we can't know if the root complex can support P2P traffic. > Since "pci_p2pdma_add_client()" includes "pci_" in its name, it seems > sort of weird that callers supply a non-PCI device and then we look up > a PCI device here. I assume you have some reason for this; if you > added a writeup in Documentation/PCI, that would be a good place to > elaborate on that, maybe with a one-line clue here. Well yes, but this is much more convenient for callers which don't need to care if the device they are attempting to add (which in the NVMe target case, could be a random block device) is a pci device or not. Especially seeing find_parent_pci_dev() is non-trivial. >> +void *pci_alloc_p2pmem(struct pci_dev *pdev, size_t size) >> +{ >> + void *ret; >> + >> + if (unlikely(!pdev->p2pdma)) > > Is this a hot path? I'm not sure it's worth cluttering > non-performance paths with likely/unlikely. I'd say it can be pretty hot given that we need to allocate and free buffers at multiple GB/s for the NVMe target case. I don't exactly have benchmarks or anything to show this though... >> + return NULL; >> + >> + if (unlikely(!percpu_ref_tryget_live(&pdev->p2pdma->devmap_ref))) >> + return NULL; >> + >> + ret = (void *)(uintptr_t)gen_pool_alloc(pdev->p2pdma->pool, size); > > Why the double cast? Wouldn't "(void *)" be sufficient? Oh, hmm, I can't remember now. I suspect I added it to fix a kbuild test robot error. I'll check and see if it can be removed. > In v4.6-rc1, gen_pool_free() takes "unsigned long addr". I know this > is based on -rc3; is this something that changed between -rc1 and > -rc3? Yes, I think it's taken an unsigned long for a while now. Per the above, I can't remember exactly why I casted it this way and I'll take a look again. Logan