Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3209590imu; Sat, 24 Nov 2018 00:09:25 -0800 (PST) X-Google-Smtp-Source: AFSGD/USzihw8TtTQVsAlkvGwot1PSo/Ahuj7vHo1KAPvBmtmGXb3JcRKlRhTQA/44lR569vjDrQ X-Received: by 2002:a17:902:9a9:: with SMTP id 38mr18759385pln.204.1543046965205; Sat, 24 Nov 2018 00:09:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543046965; cv=none; d=google.com; s=arc-20160816; b=xWP/iK5YmTg3ohAT6LJA9LXxQiJJkFDdWlOEFvLpIez058GSLg2SVqekasRBOab5tI hfIAkeUFouU4x1D5bUe8JMTsWhfE6FldPHGsGG+XTgObJrc+YLsxjqOiatvVLMVA1UDm EC1RIqrrvcfpSQltvpv6PBSJouo5ULz7kqguqCac+bSlri7m4kwUgCeNjnicDf6lp88m aua5E9W7HvSebCKaGb6NLkYW7Z4/ek6KFaK9zOiyyFWPe8bK9wSV/uIrBJU3Jo6RFdJw 3tkAGgp9BibWLiE+wR22DVa1HYQtE0QME73BJYXtxQiqF1yMnJ0WjlDqzO96yKH59zVQ ORAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=bsbTPvhhyXs2FaKN9CBjx+vbXwKOIVDzMNECpuVaC/8=; b=X9n/k/mZ4QL0/intvbmvTNqiGMC0dvIBrHz9WvszbMwMEq4Bvi4Mx9nXGsyuLnOQNO kXTNsfCt0RgvA9gv7RyEjZ36tRWl99rnUdUtG22JYy/1A6u4+NVLPSGMhSXCyCBgfD4D UHNlEPtE3kJz3Pz8F6apy6fjAZjn8ObRhbatmgijDxjWNTdjRiv87ea6XZVKqujOT7p7 dPaQqH9Vscc3piPx6tPp0mxCk4rllOsR2xJLkRL238Chvp2/dp4Wt9vHxVmXOBDHIdy8 rAraBXdJa9OEFbI99DUfIJzm1k5oRD9IbvztYu5wJlO5n8A1H9gIBtt1bHGt/IDh0uzs 7VzA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q13si56631986pgj.86.2018.11.24.00.09.11; Sat, 24 Nov 2018 00:09:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2408324AbeKWSoR (ORCPT + 99 others); Fri, 23 Nov 2018 13:44:17 -0500 Received: from szxga06-in.huawei.com ([45.249.212.32]:57633 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729827AbeKWSoR (ORCPT ); Fri, 23 Nov 2018 13:44:17 -0500 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 8AAEA597EB3C7; Fri, 23 Nov 2018 16:01:07 +0800 (CST) Received: from localhost (10.67.212.75) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 23 Nov 2018 16:01:01 +0800 Date: Fri, 23 Nov 2018 16:02:42 +0800 From: Kenneth Lee To: Jason Gunthorpe CC: Leon Romanovsky , Kenneth Lee , "Tim Sell" , , "Alexander Shishkin" , Zaibo Xu , , , , Christoph Lameter , Hao Fang , Gavin Schenk , "RDMA mailing list" , Zhou Wang , "Doug Ledford" , Uwe =?iso-8859-1?Q?Kleine-K=F6nig?= , David Kershner , Johan Hovold , Cyrille Pitchen , Sagar Dharia , Jens Axboe , , linux-netdev , Randy Dunlap , , Vinod Koul , , Philippe Ombredanne , Sanyog Kale , "David S. Miller" , Subject: Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce Message-ID: <20181123080242.GK157308@Turing-Arch-b> References: <95310df4-b32c-42f0-c750-3ad5eb89b3dd@gmail.com> <20181114160017.GI3759@mtr-leonro.mtl.com> <20181115085109.GD157308@Turing-Arch-b> <20181115145455.GN3759@mtr-leonro.mtl.com> <20181119091405.GE157308@Turing-Arch-b> <20181119184954.GB4890@ziepe.ca> <20181120030702.GH157308@Turing-Arch-b> <20181120032939.GR4890@ziepe.ca> <20181121060805.GJ157308@Turing-Arch-b> <20181122025840.GB19938@ziepe.ca> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20181122025840.GB19938@ziepe.ca> User-Agent: Mutt/1.5.21 (2010-09-15) X-Originating-IP: [10.67.212.75] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 21, 2018 at 07:58:40PM -0700, Jason Gunthorpe wrote: > Date: Wed, 21 Nov 2018 19:58:40 -0700 > From: Jason Gunthorpe > To: Kenneth Lee > CC: Leon Romanovsky , Kenneth Lee , > Tim Sell , linux-doc@vger.kernel.org, Alexander > Shishkin , Zaibo Xu > , zhangfei.gao@foxmail.com, linuxarm@huawei.com, > haojian.zhuang@linaro.org, Christoph Lameter , Hao Fang > , Gavin Schenk , RDMA mailing > list , Zhou Wang , > Doug Ledford , Uwe Kleine-K?nig > , David Kershner > , Johan Hovold , Cyrille > Pitchen , Sagar Dharia > , Jens Axboe , > guodong.xu@linaro.org, linux-netdev , Randy Dunlap > , linux-kernel@vger.kernel.org, Vinod Koul > , linux-crypto@vger.kernel.org, Philippe Ombredanne > , Sanyog Kale , "David S. > Miller" , linux-accelerators@lists.ozlabs.org > Subject: Re: [RFCv3 PATCH 1/6] uacce: Add documents for WarpDrive/uacce > User-Agent: Mutt/1.9.4 (2018-02-28) > Message-ID: <20181122025840.GB19938@ziepe.ca> > > On Wed, Nov 21, 2018 at 02:08:05PM +0800, Kenneth Lee wrote: > > > > But considering Jean's SVA stuff seems based on mmu notifiers, I have > > > a hard time believing that it has any different behavior from RDMA's > > > ODP, and if it does have different behavior, then it is probably just > > > a bug in the ODP implementation. > > > > As Jean has explained, his solution is based on page table sharing. I think ODP > > should also consider this new feature. > > Shared page tables would require the HW to walk the page table format > of the CPU directly, not sure how that would be possible for ODP? > > Presumably the implementation for ARM relies on the IOMMU hardware > doing this? Yes, that is the idea. And since Jean is merging the AMD and Intel solution together, I assume they can do the same. This is also the reason I want to solve my problem on top of IOMMU directly. But anyway, let me try to see if I can merge the logic with ODP. > > > > > > If all your driver needs is to mmap some PCI bar space, route > > > > > interrupts and do DMA mapping then mediated VFIO is probably a good > > > > > choice. > > > > > > > > Yes. That is what is done in our RFCv1/v2. But we accepted Jerome's opinion and > > > > try not to add complexity to the mm subsystem. > > > > > > Why would a mediated VFIO driver touch the mm subsystem? Sounds like > > > you don't have a VFIO driver if it needs to do stuff like that... > > > > VFIO has no ODP-like solution, and if we want to solve the fork problem, we have > > to make some change to iommu and the fork procedure. Further, VFIO takes every > > queue as a independent device. This create a lot of trouble on resource > > management. For example, you will need a manager process to withdraw the unused > > device and you need to let the user process know about PASID of the queue, and > > so on. > > Well, I would think you'd add SVA support to the VFIO driver as a > generic capability - it seems pretty useful for any VFIO user as it > avoids all the kernel upcalls to do memory pinning and DMA address > translation. It is already part of Jean's patchset. And that's why I built my solution on VFIO in the first place. But I think the concept of SVA and PASID is not compatible with the original VFIO concept space. You would not share your whole address space to a device at all in a virtual machine manager, wouldn't you? And if you can manage to have a separated mdev for your virtual machine, why bother to set a PASID to it? The answer to those problem, I think, will be Intel's Scalable IO Virtualization. For accelerator, the requirement is simply: getting a handle to device, attaching the process's mm with the handle by sharing the process's page table with its iommu indexed by PASID, and start the communication... > > Once the VFIO driver knows about this as a generic capability then the > device it exposes to userspace would use CPU addresses instead of DMA > addresses. > > The question is if your driver needs much more than the device > agnostic generic services VFIO provides. > > I'm not sure what you have in mind with resource management.. It is > hard to revoke resources from userspace, unless you are doing > kernel syscalls, but then why do all this? Say, I have 1024 queues in my accelerator. I can get one by opening the device and attach it with the fd. If the process exit by any means, the queue can be returned with the release of the fd. But if it is mdev, it will still be there and some one should tell the allocator it is available again. This is not easy to design in user space. > > Jason --