Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4059366ybi; Mon, 3 Jun 2019 05:08:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqypy6c6SmkFJbVfpFSoH1t1LMAf9CCOYX27Bo+MC+5ua7xYMLOqst+6LbZSOvAcFVvhg5B/ X-Received: by 2002:a17:902:b713:: with SMTP id d19mr29655961pls.123.1559563734632; Mon, 03 Jun 2019 05:08:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559563734; cv=none; d=google.com; s=arc-20160816; b=uKF3kA7mxF+QVJ7QuH6oJ2zP1KPwEo+hfXi0EAGCGBQ+QT00e8n95PzmBWlOdIB171 RfUU86BgjKGJHQrjgqw4yQT3WctaUXfv8jelxsKmYEIKgYiMQb1B4y6OkY5vQGCMgGWx PmnZOjs19DZfBaFdwuWpu481GfkYjW8Pn+ZNy8oWEJ6SEeG1feSmj0dBQQRGd+TFi33Q MriEqynWd7nT0BFTJ3wWz7zULzhgFZpD9GIYHh5TFJ+1rACMX9KNQVx6vJZ8A5fhPFnA 4J3hVhS51DIIMMkIuoV/lnoGnRIiFTCqbiekhM3VmJ9fT5e1Nk5u2LoNzGrGFQ35t24t uQ0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=JlhQ2DxTvFhAU05edR29sFN0GzoFZrcQbYK7sDJGKZI=; b=WHHmCalR7UAyB+cK6rwjcvQhFwWyJ8iG2paV6GHA+1V/1rNtkWoxZwpqpQeywkYhPt EmdvnV32179gC/QcqGoO2xNzoU+YloDt6pQZc6lrgMLkghu2rRZ13w0xVt1hrc+ivgK/ 8MtmVKnPACf2mgLXBvnDmyQ5erb7Be7e40mGCV9gYgS/YA/ZnoLxOMHQGmUHQ2GBh+7k LZPtiJwKeJ7B3kAjCC+zo1+Y9un5ptxhMh/jDIMgcdkxHLEuu4MuNHAUw66lOjXv556Z 6DH0ZqxYR1gLBQvc+iYkuIPFbkvGOAtxuq6bZdSYwWVOQY3WB43D3QMfWIXaykl8DqZ1 rTWg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s21si17784792pgm.154.2019.06.03.05.08.35; Mon, 03 Jun 2019 05:08:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727629AbfFCKwC (ORCPT + 99 others); Mon, 3 Jun 2019 06:52:02 -0400 Received: from 8bytes.org ([81.169.241.247]:41064 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727255AbfFCKwB (ORCPT ); Mon, 3 Jun 2019 06:52:01 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id C6EF836B; Mon, 3 Jun 2019 12:51:59 +0200 (CEST) Date: Mon, 3 Jun 2019 12:51:58 +0200 From: Joerg Roedel To: Tom Murphy Cc: iommu@lists.linux-foundation.org, murphyt7@tcd.ie, Will Deacon , Robin Murphy , Marek Szyprowski , Kukjin Kim , Krzysztof Kozlowski , David Woodhouse , Andy Gross , David Brown , Matthias Brugger , Rob Clark , Heiko Stuebner , Gerald Schaefer , Thierry Reding , Jonathan Hunter , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, linux-rockchip@lists.infradead.org, linux-s390@vger.kernel.org, linux-tegra@vger.kernel.org Subject: Re: [PATCH v3 0/4] iommu/amd: Convert the AMD iommu driver to the dma-iommu api Message-ID: <20190603105158.GL12745@8bytes.org> References: <20190506185207.31069-1-tmurphy@arista.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190506185207.31069-1-tmurphy@arista.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Tom, On Mon, May 06, 2019 at 07:52:02PM +0100, Tom Murphy wrote: > Convert the AMD iommu driver to the dma-iommu api. Remove the iova > handling and reserve region code from the AMD iommu driver. Thank you for your work on this! I appreciate that much, but I am not sure we are ready to make that move for the AMD and Intel IOMMU drivers yet. My main concern right now is that these changes will add a per-page table lock into the fast-path for dma-mapping operations. There has been much work in the past to remove all locking from these code-paths and make it scalable on x86. The dma-ops implementations in the x86 IOMMU drivers have the benefit that they can call their page-table manipulation functions directly and without locks, because they can make the necessary assumptions. The IOMMU-API mapping/unmapping path can't make these assumptions because it is also used for non-DMA-API use-cases. So before we can move the AMD and Intel drivers to the generic DMA-API implementation we need to solve this problem to not introduce new scalability regressions. Regards, Joerg