Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4709290ybp; Mon, 7 Oct 2019 12:38:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzqlpGQTB9HT1DPDEjK4nxF9WGfXsTjr6UJVf7dboFALhhv77oklWPKSMqmUMrD6LAMNhUC X-Received: by 2002:a50:ee10:: with SMTP id g16mr30547230eds.267.1570477111232; Mon, 07 Oct 2019 12:38:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570477111; cv=none; d=google.com; s=arc-20160816; b=q2T9WJ8wImzd+iuC/VnBydVwoeRcIDxu3LSbKDK47fh3cSYDt4S9ZL8fE4vNXTJA8b NIEJKs8eVlSkqF3y93boSnT5ojdt3aDJXZV1UYoCaTCOrYWuuhjwQiXzj7Ux0ylKvVOY CSG3dxi0mBCVpYA8q0h1fvUYyjbQNggXxW5l+z5ct6h7KXWx1hAse7QiJ/BkUdQAPpYi vPw+KLl2NVjD/F8AnAheMmGdGkADXD4oVZeoO7Xh9uZ8z/cHlt0svjKJTWMwi+nFRd60 lIXFC1c2xVCsRJ+cKAsR+7AkgU74qmM0K5Pi+W/+s9UND3EEGnvtFrzplG7cpZTj12G8 ISYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=UTEb77t3pAXy9Zt0qY5mjubijy1c9W0CiYjIF0rAjb4=; b=NZXl0w+LcjIitaypQ8OAT6VkSuH/kbN0GJ7DWQ2FMDmlwhnijIoM8Fk9a5AvkBU4b7 tmaLROQK4Bia6r4CZ1ytTwlWJKZRGQfsemtzZVsq7ajw5jo+soLkne2lTzLWvf74mRD3 zJVBX0m9rQCzzfySKHDg9K9EP9LrSM/KD2ts6M0tj7jC7l+gKU26jft+2gopBsbwflbK fM6U7jE1432ML2/rfIgFI1H43Ivai/LOWUZW+qWjVA6KsPfH4xps5FxByoGbqm95KxPV ZvN2AOtd/VU3gkVvecpPiEtNGyDab19onzfPiAqYPc3sLEaFtQ5/qcla2kp9F5RtTNiP Og0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a2si9009159edc.321.2019.10.07.12.38.06; Mon, 07 Oct 2019 12:38:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728680AbfJGTfl (ORCPT + 99 others); Mon, 7 Oct 2019 15:35:41 -0400 Received: from mga18.intel.com ([134.134.136.126]:16422 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728212AbfJGTfl (ORCPT ); Mon, 7 Oct 2019 15:35:41 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Oct 2019 12:35:40 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.67,269,1566889200"; d="scan'208";a="205174650" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.7.199.155]) by orsmga002.jf.intel.com with ESMTP; 07 Oct 2019 12:35:40 -0700 Date: Mon, 7 Oct 2019 12:39:12 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Alex Williamson , Jean-Philippe Brucker Cc: "Yi Liu" , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , "Lu Baolu" , Jonathan Cameron , Eric Auger , Jerry Snitselaar , jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v4 0/4] User API for nested shared virtual address (SVA) Message-ID: <20191007123912.60c19a79@jacob-builder> In-Reply-To: <1570045363-24856-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1570045363-24856-1-git-send-email-jacob.jun.pan@linux.intel.com> Organization: OTC X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Joerg and all, Just wondering if you have more comments on this series. Thanks, Jacob On Wed, 2 Oct 2019 12:42:39 -0700 Jacob Pan wrote: > This set consists of IOMMU APIs to support SVA in the guest, a.k.a > nested SVA. As the complete SVA support is complex, we break down the > enabling effort into three stages: > 1. PCI device direct assignment > 2. Fault handling, especially page request service support > 3. Mediated device assignment > > Each stage includes common API and vendor specific IOMMU driver > changes. This series is the common uAPI for stage #1. It is intended > to build consensus on the interface which all vendors reply on. > > This series is extracted from the complete stage1 set which includes > VT-d code. https://lkml.org/lkml/2019/8/15/951 > > Changes: > - Use spinlock instead of mutex to protect ioasid custom allocators. > This is to support callers in atomic context > - Added more padding to guest PASID bind data for future extensions, > suggested by Joerg. > After much thinking, I did not do name change from PASID to IOASID in > the uAPI, considering we have been using PASID in the rest of uAPIs. > IOASID will remain used within the kernel. > > For more discussions lead to this series, checkout LPC 2019 > VFIO/IOMMU/PCI microconference materials. > https://linuxplumbersconf.org/event/4/sessions/66/#20190909 > > > Change log: > v4: - minor patch regroup and fixes based on review from Jean > v3: - include errno.h in ioasid.h to fix compile error > - rebased to v5.4-rc1, no change > > v2: > - Addressed review comments by Jean on IOASID custom > allocators, locking fix, misc control flow fix. > - Fixed a compile error with missing header errno.h > - Updated Jean-Philiippe's new email and updateded > reviewed-by tag > > Jacob Pan (2): > iommu/ioasid: Add custom allocators > iommu: Introduce guest PASID bind function > > Jean-Philippe Brucker (1): > iommu: Add I/O ASID allocator > > Yi L Liu (1): > iommu: Introduce cache_invalidate API > > drivers/iommu/Kconfig | 4 + > drivers/iommu/Makefile | 1 + > drivers/iommu/ioasid.c | 422 > +++++++++++++++++++++++++++++++++++++++++++++ > drivers/iommu/iommu.c | 30 ++++ include/linux/ioasid.h | > 76 ++++++++ include/linux/iommu.h | 36 ++++ > include/uapi/linux/iommu.h | 169 ++++++++++++++++++ > 7 files changed, 738 insertions(+) > create mode 100644 drivers/iommu/ioasid.c > create mode 100644 include/linux/ioasid.h > [Jacob Pan]