Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp6630274yba; Tue, 14 May 2019 10:42:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqwqMdTOK022G4fI5ZTn3DqRWoxnE5wS0xMn+kVgxz4dljQmKEIpWKegOfmK81bu/JlL4oOp X-Received: by 2002:a62:3605:: with SMTP id d5mr21214231pfa.28.1557855749891; Tue, 14 May 2019 10:42:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557855749; cv=none; d=google.com; s=arc-20160816; b=B4+EbdtQcAR67jKOxAV7b7epHqm4bS63h4ilnAicMsy+QIJfiu1MGL0m1Ov7FduU5a FGlyVePm7jMVvCln3AqeT3vFtE4659MucoWFfsJ12BdiRWygFBNhPkf/6u86X+rX+tg4 Fsy7rZp1Hw6wsydHf/u7Ow/9GKZLKtvTx07pjqEHTqWkGF+uBcDT9uvhTk/vvszuMgPZ onUxUIiz9HGe3iLXy/dgcv7sE7HRpUB+3uARZxKJY/nL3Jhbd148SaOZh8TmQSTyfdIr N1+UDhF8olNb3nFoWG4IuB2flmAV+mr3s7mjNgR8TLkbt0j+HhCp8cekSUgMRV4NWmJT tVsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=c13sfcMIf8ubQFLaB5G+xCJyIGGle3oPj1rU9VubRy0=; b=g0a9ut9K0ZQ/JgOttOKtvVFWAXC+lxhmRPUB1WctSfwYo60VsCb0yHLOXL9Ez69NpX JFZyl1KscnijE+V+yIysGZGmOnznkuvSvhyCZUxIvUnk3dFf7dnvp2H8/YuoRDU6Zp+K k9DUcbcKEB0jn66DzB13okUsQN5AK7DlG+4ENiCNxEaNCw/+SZAquAXeh85cuA/dXBbt LirBKpZi5u0C96xe5TGKE65X63ednL9cSlZKiYZEnY4EEnxAcFqXRBOucaPUY4KuJbcw x/bxbXY+VhxZgRg89x1GEw5veRKXaIbcSRZ0MFk7aoAcEtW4jmlnUx2sfH1X9OU6yPuv I26g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h1si17425004pgv.67.2019.05.14.10.42.14; Tue, 14 May 2019 10:42:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726879AbfENRlJ (ORCPT + 99 others); Tue, 14 May 2019 13:41:09 -0400 Received: from mga12.intel.com ([192.55.52.136]:15303 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726180AbfENRlI (ORCPT ); Tue, 14 May 2019 13:41:08 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 May 2019 10:41:07 -0700 X-ExtLoop1: 1 Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.7.199.155]) by orsmga005.jf.intel.com with ESMTP; 14 May 2019 10:41:07 -0700 Date: Tue, 14 May 2019 10:44:01 -0700 From: Jacob Pan To: Jean-Philippe Brucker Cc: Auger Eric , "iommu@lists.linux-foundation.org" , LKML , Joerg Roedel , David Woodhouse , Alex Williamson , "Tian, Kevin" , Raj Ashok , Andriy Shevchenko , jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v3 02/16] iommu: Introduce cache_invalidate API Message-ID: <20190514104401.79d563f4@jacob-builder> In-Reply-To: References: <1556922737-76313-1-git-send-email-jacob.jun.pan@linux.intel.com> <1556922737-76313-3-git-send-email-jacob.jun.pan@linux.intel.com> <44d5ba37-a9e9-cc7a-2a3a-d32b840afa29@arm.com> <7807afe9-efab-9f48-4ca0-2332a7a54950@redhat.com> <1a5a5fad-ed21-5c79-9a9e-ff21fadfb95f@arm.com> <20190513151637.79c273e2@jacob-builder> <0da76e57-76f6-06fa-d34e-30cd0c294984@redhat.com> Organization: OTC X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Thank you both for the explanation. On Tue, 14 May 2019 11:41:24 +0100 Jean-Philippe Brucker wrote: > On 14/05/2019 08:36, Auger Eric wrote: > > Hi Jacob, > > > > On 5/14/19 12:16 AM, Jacob Pan wrote: > >> On Mon, 13 May 2019 18:09:48 +0100 > >> Jean-Philippe Brucker wrote: > >> > >>> On 13/05/2019 17:50, Auger Eric wrote: > >>>>> struct iommu_inv_pasid_info { > >>>>> #define IOMMU_INV_PASID_FLAGS_PASID (1 << 0) > >>>>> #define IOMMU_INV_PASID_FLAGS_ARCHID (1 << 1) > >>>>> __u32 flags; > >>>>> __u32 archid; > >>>>> __u64 pasid; > >>>>> }; > >>>> I agree it does the job now. However it looks a bit strange to > >>>> do a PASID based invalidation in my case - SMMUv3 nested stage - > >>>> where I don't have any PASID involved. > >>>> > >>>> Couldn't we call it context based invalidation then? A context > >>>> can be tagged by a PASID or/and an ARCHID. > >>> > >>> I think calling it "context" would be confusing as well (I > >>> shouldn't have used it earlier), since VT-d uses that name for > >>> device table entries (=STE on Arm SMMU). Maybe "addr_space"? > >>> > >> I am still struggling to understand what ARCHID is after scanning > >> through SMMUv3.1 spec. It seems to be a constant for a given SMMU. > >> Why do you need to pass it down every time? Could you point to me > >> the document or explain a little more on ARCHID use cases. > >> We have three fileds called pasid under this struct > >> iommu_cache_invalidate_info{} > >> Gets confusing :) > > archid is a generic term. That's why you did not find it in the > > spec ;-) > > > > On ARM SMMU the archid is called the ASID (Address Space ID, up to > > 16 bits. The ASID is stored in the Context Descriptor Entry (your > > PASID entry) and thus characterizes a given stage 1 translation > > "context"/"adress space". > > Yes, another way to look at it is, for a given address space: > * PASID tags device-IOTLB (ATC) entries. > * ASID (here called archid) tags IOTLB entries. > > They could have the same value, but it depends on the guest's > allocation policy which isn't in our control. With my PASID patches > for SMMUv3, they have different values. So we need both fields if we > intend to invalidate both ATC and IOTLB with a single call. > For ASID invalidation, there is also page/address selective within an ASID, right? I guess it is CMD_TLBI_NH_VA? So the single call to invalidate both ATC & IOTLB should share the same address information. i.e. struct iommu_inv_addr_info {} Just out of curiosity, what is the advantage of having guest tag its ATC with its own PASID? I thought you were planning to use custom ioasid allocator to get PASID from host. Also ASID is 16 bit as Eric said and PASID (substreamID?) is 20 bit, right? > Thanks, > Jean > > > > > At the moment the ASID is allocated per iommu domain. With aux > > domains we should have one ASID per aux domain, Jean-Philippe said. > > > > ASID tags IOTLB S1 entries. As the ASID is part of the "context > > descriptor" which is owned by the guest, the API must pass it > > somehow. > > > > 4.4.1.2 CMD_TLBI_NH_ASID(VMID, ASID) invalidation command allows to > > invalidate all IOTLB S1 entries for a given VMID/ASID and this is > > the functionality which is currently missing in the API. This is > > not an address based invalidation or a "pure" PASID based > > invalidation. At the moment we don't support PASIDs on ARM and I > > need this capability. > > Got it. > > Thanks > > > > Eric > > > > > > > >>> Thanks, > >>> Jean > >>> > >>>> > >>>> Domain invalidation would invalidate all the contexts belonging > >>>> to that domain. > >>>> > >>>> Thanks > >>>> > >>>> Eric > >> > >> [Jacob Pan] > >> > [Jacob Pan]