Received: by 10.192.165.148 with SMTP id m20csp3854862imm; Mon, 23 Apr 2018 13:42:11 -0700 (PDT) X-Google-Smtp-Source: AIpwx48QtAH//SLYn/OFDACpRmRnxOLONIYxCMD6ChNyeRrJ56oOmGBmoY0t1tnIy8DX4vjAZ8zv X-Received: by 2002:a17:902:585e:: with SMTP id f30-v6mr22027217plj.50.1524516131295; Mon, 23 Apr 2018 13:42:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524516131; cv=none; d=google.com; s=arc-20160816; b=szUWLS7Woqn9WvS181czDfUIqzvRMZf6XtsbQXgaU+M6HVgMat9amoJxd+IqwMlFjJ DrFQVkvVl/lDGkvBP44U1t94UvujHr8Dow3X3kIUJHQX2/dHoHufGgdmFtiwn9RBAEnW DUeLzD9lrzaKsDINwMc4waCeclyXghzKhFpcGW4OmW/ck03FSB7QkVpn2kZieB1oIqhm rC7kzm29LQz7WfQRuL6HOTi2tb7s24yB6D+AURUsBxqc1ZvkaRzrvKcELx5cEyVNwuHb QAjbRVYOvkN3VPDvlblgpLNuQTjaza/xmy/xOraji8TYwxc/aPle3KOH9ptxujeyPStW ltWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=wd8fgMEUsLEOVlhWbnIOJtoQSeeZ5E9cj1LUVaPTkrk=; b=dmUhQr+HR0NJKIBEmn5TCJ5FwZrWxZuCscqj6zRm1XKS8wnBrvvZjrFMQyTRblkcNe 2zJ0zNW+H2Prqyl3m898iygayeQCxhzjFelDmXjT1A9087Wl4VlIT0QhC1QPFKKPnAI8 CbXAnLmE2WFIhOhnCNhP4MYH1cT4vB3/kRL5ouhhp5n6yvEU63t0zD6kbBZcMUaAFHCd b4i45EkuRCct0MHmI6xpI86U2cRbs962raSoZhdOJAjOakdTYperOsqj+6Y/IDT+lpo0 6McNEBQeh36DVAoYPXYa/LTOzv9TvQO9eAg0nFyrLGr+ARAQoJVPEIXSRenPFRp51dSg 63Fw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f28-v6si13746740plj.255.2018.04.23.13.41.56; Mon, 23 Apr 2018 13:42:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755599AbeDWUkw (ORCPT + 99 others); Mon, 23 Apr 2018 16:40:52 -0400 Received: from mga05.intel.com ([192.55.52.43]:64547 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755165AbeDWUkv (ORCPT ); Mon, 23 Apr 2018 16:40:51 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Apr 2018 13:40:51 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,319,1520924400"; d="scan'208";a="218794993" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.7.199.155]) by orsmga005.jf.intel.com with ESMTP; 23 Apr 2018 13:40:50 -0700 Date: Mon, 23 Apr 2018 13:43:25 -0700 From: Jacob Pan To: Jean-Philippe Brucker Cc: "iommu@lists.linux-foundation.org" , LKML , Joerg Roedel , David Woodhouse , Greg Kroah-Hartman , Alex Williamson , Rafael Wysocki , "Liu, Yi L" , "Tian, Kevin" , Raj Ashok , Jean Delvare , Christoph Hellwig , Lu Baolu , "Liu, Yi L" , Liu@ostrya.localdomain, jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v4 05/22] iommu: introduce iommu invalidate API function Message-ID: <20180423134325.6780f6ac@jacob-builder> In-Reply-To: <20180420181951.GA50099@ostrya.localdomain> References: <1523915351-54415-1-git-send-email-jacob.jun.pan@linux.intel.com> <1523915351-54415-6-git-send-email-jacob.jun.pan@linux.intel.com> <20180420181951.GA50099@ostrya.localdomain> Organization: OTC X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 20 Apr 2018 19:19:54 +0100 Jean-Philippe Brucker wrote: > Hi Jacob, > > On Mon, Apr 16, 2018 at 10:48:54PM +0100, Jacob Pan wrote: > [...] > > +/** > > + * enum iommu_inv_granularity - Generic invalidation granularity > > + * > > + * When an invalidation request is sent to IOMMU to flush > > translation caches, > > + * it may carry different granularity. These granularity levels > > are not specific > > + * to a type of translation cache. For an example, PASID selective > > granularity > > + * is only applicable to PASID cache invalidation. > > I'm still confused by this, I think we should add more definitions > because architectures tend to use different names. What you call > "Translations caches" encompasses all caches that can be invalidated > with this request, right? So all of: > yes correct. > * "TLB" and "DTLB" that cache IOVA->GPA and GPA->PA (TLB is in the > IOMMU, DTLB is an ATC in an endpoint), > * "PASID cache" that cache PASID->Translation Table, > * "Context cache" that cache RID->PASID table > > Does this match the model you're using? > yes. PASID cache and context caches are in the IOMMU. > The last name is a bit unfortunate. Since the Arm architecture uses > the name "context" for what a PASID points to, "Device cache" would > suit us better but it's not important. > or call it device context cache. actually so far context cache is here only for completeness purpose. the expected use case is that QEMU traps guest device context cache flush and call bind_pasid_table. > I don't understand what you mean by "PASID selective granularity is > only applicable to PASID cache invalidation", it seems to contradict > the preceding sentence. You are right. That was a mistake. I meant to say "These granularity levels are specific to a type of" > What if user sends an invalidation with > IOMMU_INV_TYPE_TLB and IOMMU_INV_GRANU_ALL_PASID? Doesn't this remove > from the TLBs all entries with the given PASID? > No, this meant to invalidate all PASID of a given domain ID. I need to correct the description. The dilemma here is to map model specific fields into generic list. not all combinations are legal. > > + * This enum is a collection of granularities for all types of > > translation > > + * caches. The idea is to make it easy for IOMMU model specific > > driver do > > + * conversion from generic to model specific value. > > + */ > > +enum iommu_inv_granularity { > > In patch 9, inv_type_granu_map has some valid fields with granularity > == 0. Does it mean "invalidate all caches"? > > I don't think user should ever be allowed to invalidate caches entries > of devices and domains it doesn't own. > Agreed, I removed global granu to avoid device invalidation beyond device itself. But I missed some of the fields in inv_type_granu_map{}. > > + IOMMU_INV_GRANU_DOMAIN = 1, /* all TLBs associated > > with a domain */ > > + IOMMU_INV_GRANU_DEVICE, /* caching > > structure associated with a > > + * device ID > > + */ > > + IOMMU_INV_GRANU_DOMAIN_PAGE, /* address range with > > a domain */ > > > + IOMMU_INV_GRANU_ALL_PASID, /* cache of a given > > PASID */ > > If this corresponds to QI_GRAN_ALL_ALL in patch 9, the comment should > be "Cache of all PASIDs"? Or maybe "all entries for all PASIDs"? Is it > different from GRANU_DOMAIN then? QI_GRAN_ALL_ALL maps to VT-d spec 6.5.2.4, which invalidates all ext TLB cache within a domain. It could reuse GRANU_DOMAIN but I was also trying to match the naming convention in the spec. > > + IOMMU_INV_GRANU_PASID_SEL, /* only invalidate > > specified PASID */ + > > + IOMMU_INV_GRANU_NG_ALL_PASID, /* non-global within > > all PASIDs */ > > + IOMMU_INV_GRANU_NG_PASID, /* non-global within a > > PASIDs */ > > Are the "NG" variant needed since there is a > IOMMU_INVALIDATE_GLOBAL_PAGE below? We should drop either flag or > granule. > > FWIW I'm starting to think more granule options is actually better > than flags, because it flattens the combinations and keeps them to two > dimensions, that we can understand and explain with a table. > > > + IOMMU_INV_GRANU_PAGE_PASID, /* page-selective > > within a PASID */ > > Maybe this should be called "NG_PAGE_PASID", Sure. I was thinking page range already implies non-global pages. > and "DOMAIN_PAGE" should > instead be "PAGE_PASID". If I understood their meaning correctly, it > would be more consistent with the rest. > I am trying not to mix granu between request w/ PASID and w/o. DOMAIN_PAGE meant to be for request w/o PASID. > > + IOMMU_INV_NR_GRANU, > > +}; > > + > > +/** enum iommu_inv_type - Generic translation cache types for > > invalidation > > + * > > + * Invalidation requests sent to IOMMU may indicate which > > translation cache > > + * to be operated on. > > + * Combined with enum iommu_inv_granularity, model specific driver > > can do a > > + * simple lookup to convert generic type to model specific value. > > + */ > > +enum iommu_inv_type { > > These should be flags (1 << 0), (1 << 1) etc, since IOMMUs will want > to invalidate multiple caches at once (at least DTLB and TLB). You > could then do for_each_set_bit in the driver > I was thinking the invalidation to be inclusive as we discussed earlier ,last year :). TLB includes DLTB PASID cache includes TLB and DTLB. I need to document it better. > > + IOMMU_INV_TYPE_DTLB, /* device IOTLB */ > > + IOMMU_INV_TYPE_TLB, /* IOMMU paging structure cache > > */ > > + IOMMU_INV_TYPE_PASID, /* PASID cache */ > > + IOMMU_INV_TYPE_CONTEXT, /* device context entry > > cache */ > > + IOMMU_INV_NR_TYPE > > +}; > > We need to summarize and explain valid combinations, because reading > inv_type_granu_map and inv_type_granu_table is a bit tedious. I tried > to reproduce inv_type_granu_map here (Cell format is PASID_TAGGED / > !PASID_TAGGED). Could you check if this matches your model? great summary. thanks > > type | DTLB | TLB | PASID | CONTEXT > granule | | | | > -----------------+-----------+-----------+-----------+----------- > - | / Y | / Y | | / Y what is this row? > DOMAIN | | / Y | | / Y > DEVICE | | | | / Y > DOMAIN_PAGE | | / Y | | > ALL_PASID | Y | Y | | > PASID_SEL | Y | | Y | > NG_ALL_PASID | | Y | Y | > NG_PASID | | Y | | > PAGE_PASID | | Y | | > Mostly match what I intended for VT-d. Just one thing on the PASID column, all PASID associated with a given domain ID can go either NG_ALL_PASID (as in your table) or ALL_PASID. Here is what I plan to change in comments that can reflect what you have in the table above. Can I also copy your table in the next version? enum iommu_inv_granularity { IOMMU_INV_GRANU_DOMAIN = 1, /* IOTLBs and device context * cache associated with a * domain ID */ IOMMU_INV_GRANU_DEVICE, /* device context cache * associated with a device ID */ IOMMU_INV_GRANU_DOMAIN_PAGE, /* IOTLBs associated with * address range of a * given domain ID */ IOMMU_INV_GRANU_ALL_PASID, /* DTLB or IOTLB of all * PASIDs associated to a * given domain ID */ IOMMU_INV_GRANU_PASID_SEL, /* DTLB and PASID cache * associated to a PASID */ IOMMU_INV_GRANU_NG_ALL_PASID, /* IOTLBs of non-global * pages for all PASIDs for a * given domain ID */ IOMMU_INV_GRANU_NG_PASID, /* IOTLBs of non-global * pages for a given PASID */ IOMMU_INV_GRANU_PAGE_PASID, /* IOTLBs of selected page * range within a PASID */ > There is no intersection between PASID_TAGGED and !PASID_TAGGED (Y/Y), > so the flag might not be needed. > right > I think the API can be more relaxed. Each IOMMU driver can add more > restrictions, but I think the SMMU can support these combinations: > > | DTLB | TLB | PASID | CONTEXT > --------------+-----------+-----------+-----------+----------- > DOMAIN | Y | Y | Y | Y > DEVICE | Y | Y | Y | Y > DOMAIN_PAGE | Y | Y | | > ALL_PASID | Y | Y | Y | > PASID_SEL | Y | Y | Y | > NG_ALL_PASID | Y | Y | Y | > NG_PASID | Y | Y | Y | > PAGE_PASID | Y | Y | | > > Two are missing in the PASID column because it doesn't make any sense > to target the PASID cache with a page-selective invalidation. And for > the context cache, we can only invalidate per device or per domain. > So I think this is the biggest set of allowed combinations. > right, not all combinations are allowed, it is up to each IOMMU driver to convert and sanitize based on a built-in valid map. e.g. in my vt-d patch inv_type_granu_map[] > > > + > > +/** > > + * Translation cache invalidation header that contains mandatory > > meta data. > > + * @version: info format version, expecting future extesions > > + * @type: type of translation cache to be invalidated > > + */ > > +struct tlb_invalidate_hdr { > > + __u32 version; > > +#define TLB_INV_HDR_VERSION_1 1 > > + enum iommu_inv_type type; > > +}; > > + > > +/** > > + * Translation cache invalidation information, contains generic > > IOMMU > > + * data which can be parsed based on model ID by model specific > > drivers. > > + * > > + * @granularity: requested invalidation granularity, type > > dependent > > + * @size: 2^size of 4K pages, 0 for 4k, 9 for 2MB, > > etc. > > Maybe start the size at 1 byte, we don't know what sort of granularity > future architectures will offer. > I can't see any case we are not operating at sub-page size. why would anyone cache translation for 1 byte, that is too much overhead. > > + * @pasid: processor address space ID value per PCI > > spec. > > + * @addr: page address to be invalidated > > + * @flags IOMMU_INVALIDATE_PASID_TAGGED: DMA with PASID > > tagged, > > + * @pasid validity > > can be > > + * deduced from > > @granularity > > This is really hurting my brain... Two dimensions was already > difficult, but I can't follow anymore. What does PASID_TAGGED say if > not "@pasid is valid"? I thought VT-d mandated PASID for nested > translation? > you already have 3-D in your granu table :), this is the same as your "Y" and "/Y" filed. I need the PASID_TAGGED flag to differentiate different IOTLB types. PASID_TAGGED is used only when @pasid is valid, which is implied in the grnu. E.g. certain granu is only allowed for PASID tagged case. > > + * IOMMU_INVALIDATE_ADDR_LEAF: leaf paging entries > > + * IOMMU_INVALIDATE_GLOBAL_PAGE: global pages > > + * > > + */ > > +struct tlb_invalidate_info { > > + struct tlb_invalidate_hdr hdr; > > + enum iommu_inv_granularity granularity; > > + __u32 flags; > > +#define IOMMU_INVALIDATE_NO_PASID (1 << 0) > > I suggested NO_PASID because Arm can have pasid-tagged and one > no-pasid address spaces within the same domain in DSS0 mode. AMD > would also need this for their GIoV mode, if I understood it > correctly. > > When specifying NO_PASID, the user invalidates mappings for the > address space that doesn't have a PASID, but the same granularities > as PASID contexts apply. I now think we can remove the NO_PASID flag > and avoid a lot of confusion. > > The GIoV and DSS0 modes are implemented by reserving entry 0 of the > PASID table for NO_PASID translations. Given that the guest specifies > this mode at BIND_TABLE time, the host understands that when the guest > invalidates PASID 0, if GIoV or DSS0 was enabled, then the > invalidation applies to the NO_PASID context. So you can drop this > flag in my opinion. > sounds good. PASID0 is used for request w/o PASID so both GIOVA and SVA have PASIDs. Will drop. > Thanks, > Jean [Jacob Pan]