Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp327690ybb; Fri, 27 Mar 2020 23:34:50 -0700 (PDT) X-Google-Smtp-Source: ADFU+vt9iTEEdWVpHpJgH0OHENcgAc+q41I/v83UM3MUUmFPtwe+ebZub+DbxqOYrLPXCsOjnR57 X-Received: by 2002:a05:6808:d9:: with SMTP id t25mr1721488oic.22.1585377289968; Fri, 27 Mar 2020 23:34:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585377289; cv=none; d=google.com; s=arc-20160816; b=nez1ZDQw1dWDUbGPqj+U1Buvku9h96XHdTXJgAzsGAu3ECA1sdWxWsihpZfEY1QPRm yDYsB17WX9cFryXUEF2hAjTy0kdNXQKoZCyPXNtDNJIkW2ZyBdFxzfQe0zd4Asw9GgLC QEMGutkpWG3E3XD6QdHXf6sGhr6uYvyOn0yy2PpCa3BbAFJekj2YE0cg/bUeATPkjGsZ bO5cD1OHsueXwBJ1e5BEEZx2dZzz7MU5E9KErDbJ6MQFKsu/27TJb0PApFp5QM1aiqcd 5sI+hj8MSfPGgVC28alvO+F0JuaxgXKQLjtWCyJeGr05U92oGCtknPRqHuxcXFL6BztO mCvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :dlp-reaction:dlp-version:dlp-product:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=pW5stEy1p6l0xfeSLHXmgu64EMrZ9a9yg8B8VIpuQZs=; b=SBzPFCeQ6wRwQSahFS5K4kY4wBLZj7u+kV3kcLcmB7zrRw8gQIpggw+0TL/MciLtTQ R/b/WWWrEk6giubuJxOeeYPGgbuFI6yrUl196BhzuTXffgyHyHu/t8Phvw+BT0MmP/MZ 0LV6qXgjnTpw4ow7rI8ORfGem/lmJlZBl53EKRrLkdrIkUtwEU2BMIF4doLFXmKh9gml z53wUV8AO1QKd86L307xTmFgJdA3SlCBMuxn7cGcHFs+iPSDG7KHhpiBmZLoslush1gk EcfOCo508ldxFBoE8BOyRTCixIF2xTvKXkbh8RhH9/Z8eA3CRY+xAZD6N0Kpzzo9ZHwz 2Saw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r184si3409023oig.35.2020.03.27.23.34.23; Fri, 27 Mar 2020 23:34:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726186AbgC1Gdj convert rfc822-to-8bit (ORCPT + 99 others); Sat, 28 Mar 2020 02:33:39 -0400 Received: from mga07.intel.com ([134.134.136.100]:51182 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726100AbgC1Gdj (ORCPT ); Sat, 28 Mar 2020 02:33:39 -0400 IronPort-SDR: GBRKq2LSP7djyeYl2Z1zoKEtwTdf0GtszixF04CKJmnYiiDTaj1y+YtCRY7wt39rXvSve0OSRE +WfsSqCzhk7g== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Mar 2020 23:33:39 -0700 IronPort-SDR: m8ECCSE/uGzefX1bKdFAWdJXRfIJKewBfN7DEvIxdMrch/FZy5pucKzvjC9bHJEZoE7BfOqnfL ZDfroe060X0Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,315,1580803200"; d="scan'208";a="266428990" Received: from fmsmsx103.amr.corp.intel.com ([10.18.124.201]) by orsmga002.jf.intel.com with ESMTP; 27 Mar 2020 23:33:38 -0700 Received: from FMSMSX110.amr.corp.intel.com (10.18.116.10) by FMSMSX103.amr.corp.intel.com (10.18.124.201) with Microsoft SMTP Server (TLS) id 14.3.439.0; Fri, 27 Mar 2020 23:33:38 -0700 Received: from shsmsx103.ccr.corp.intel.com (10.239.4.69) by fmsmsx110.amr.corp.intel.com (10.18.116.10) with Microsoft SMTP Server (TLS) id 14.3.439.0; Fri, 27 Mar 2020 23:33:37 -0700 Received: from shsmsx104.ccr.corp.intel.com ([169.254.5.225]) by SHSMSX103.ccr.corp.intel.com ([169.254.4.146]) with mapi id 14.03.0439.000; Sat, 28 Mar 2020 14:33:35 +0800 From: "Tian, Kevin" To: Jacob Pan CC: Joerg Roedel , Alex Williamson , Lu Baolu , "iommu@lists.linux-foundation.org" , LKML , David Woodhouse , Jean-Philippe Brucker , "Liu, Yi L" , "Raj, Ashok" , Christoph Hellwig , Jonathan Cameron , Eric Auger Subject: RE: [PATCH 05/10] iommu/ioasid: Create an IOASID set for host SVA use Thread-Topic: [PATCH 05/10] iommu/ioasid: Create an IOASID set for host SVA use Thread-Index: AQHWAs3KC1709AUDMEKcaU76snqwOKhcMJxw///+BwCAAWE+AA== Date: Sat, 28 Mar 2020 06:33:34 +0000 Message-ID: References: <1585158931-1825-1-git-send-email-jacob.jun.pan@linux.intel.com> <1585158931-1825-6-git-send-email-jacob.jun.pan@linux.intel.com> <20200327102850.77a5d5da@jacob-builder> In-Reply-To: <20200327102850.77a5d5da@jacob-builder> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > From: Jacob Pan > Sent: Saturday, March 28, 2020 1:29 AM > > On Fri, 27 Mar 2020 09:41:55 +0000 > "Tian, Kevin" wrote: > > > > From: Jacob Pan > > > Sent: Thursday, March 26, 2020 1:55 AM > > > > > > Bare metal SVA allocates IOASIDs for native process addresses. This > > > should be separated from VM allocated IOASIDs thus under its own > > > set. > > > > A curious question. Now bare metal SVA uses the system set and guest > > SVA uses dynamically-created set. Then do we still allow ioasid_alloc > > with a NULL set pointer? > > > Good point! There shouldn't be NULL set. That was one of the sticky > point in the previous allocation API. I will add a check in > ioasid_alloc_set(). > > However, there is still need for global search, e.g. PRS. > https://lore.kernel.org/linux-arm-kernel/1d62b2e1-fe8c-066d-34e0- > f7929f6a78e2@arm.com/#t > > In that case, use INVALID_IOASID_SET to indicate the search is global. > e.g. > ioasid_find(INVALID_IOASID_SET, data->hpasid, NULL); ok, it makes sense. > > > > > > > This patch creates a system IOASID set with its quota set to > > > PID_MAX. This is a reasonable default in that SVM capable devices > > > can only bind to limited user processes. > > > > > > Signed-off-by: Jacob Pan > > > --- > > > drivers/iommu/intel-iommu.c | 8 +++++++- > > > drivers/iommu/ioasid.c | 9 +++++++++ > > > include/linux/ioasid.h | 9 +++++++++ > > > 3 files changed, 25 insertions(+), 1 deletion(-) > > > > > > diff --git a/drivers/iommu/intel-iommu.c > > > b/drivers/iommu/intel-iommu.c index ec3fc121744a..af7a1ef7b31e > > > 100644 --- a/drivers/iommu/intel-iommu.c > > > +++ b/drivers/iommu/intel-iommu.c > > > @@ -3511,8 +3511,14 @@ static int __init init_dmars(void) > > > goto free_iommu; > > > > > > /* PASID is needed for scalable mode irrespective to SVM */ > > > - if (intel_iommu_sm) > > > + if (intel_iommu_sm) { > > > ioasid_install_capacity(intel_pasid_max_id); > > > + /* We should not run out of IOASIDs at boot */ > > > + if (ioasid_alloc_system_set(PID_MAX_DEFAULT)) { > > > + pr_err("Failed to enable host PASID > > > allocator\n"); > > > + intel_iommu_sm = 0; > > > + } > > > + } > > > > > > /* > > > * for each drhd > > > diff --git a/drivers/iommu/ioasid.c b/drivers/iommu/ioasid.c > > > index 6265d2dbbced..9135af171a7c 100644 > > > --- a/drivers/iommu/ioasid.c > > > +++ b/drivers/iommu/ioasid.c > > > @@ -39,6 +39,9 @@ struct ioasid_data { > > > static ioasid_t ioasid_capacity; > > > static ioasid_t ioasid_capacity_avail; > > > > > > +int system_ioasid_sid; > > > +static DECLARE_IOASID_SET(system_ioasid); > > > + > > > /* System capacity can only be set once */ > > > void ioasid_install_capacity(ioasid_t total) > > > { > > > @@ -51,6 +54,12 @@ void ioasid_install_capacity(ioasid_t total) > > > } > > > EXPORT_SYMBOL_GPL(ioasid_install_capacity); > > > > > > +int ioasid_alloc_system_set(int quota) > > > +{ > > > + return ioasid_alloc_set(&system_ioasid, quota, > > > &system_ioasid_sid); +} > > > +EXPORT_SYMBOL_GPL(ioasid_alloc_system_set); > > > + > > > /* > > > * struct ioasid_allocator_data - Internal data structure to hold > > > information > > > * about an allocator. There are two types of allocators: > > > diff --git a/include/linux/ioasid.h b/include/linux/ioasid.h > > > index 8c82d2625671..097b1cc043a3 100644 > > > --- a/include/linux/ioasid.h > > > +++ b/include/linux/ioasid.h > > > @@ -29,6 +29,9 @@ struct ioasid_allocator_ops { > > > void *pdata; > > > }; > > > > > > +/* Shared IOASID set for reserved for host system use */ > > > +extern int system_ioasid_sid; > > > + > > > #define DECLARE_IOASID_SET(name) struct ioasid_set name = { 0 } > > > > > > #if IS_ENABLED(CONFIG_IOASID) > > > @@ -41,6 +44,7 @@ int ioasid_register_allocator(struct > > > ioasid_allocator_ops *allocator); > > > void ioasid_unregister_allocator(struct ioasid_allocator_ops > > > *allocator); int ioasid_attach_data(ioasid_t ioasid, void *data); > > > void ioasid_install_capacity(ioasid_t total); > > > +int ioasid_alloc_system_set(int quota); > > > int ioasid_alloc_set(struct ioasid_set *token, ioasid_t quota, int > > > *sid); void ioasid_free_set(int sid, bool destroy_set); > > > int ioasid_find_sid(ioasid_t ioasid); > > > @@ -88,5 +92,10 @@ static inline void > > > ioasid_install_capacity(ioasid_t total) { > > > } > > > > > > +static inline int ioasid_alloc_system_set(int quota) > > > +{ > > > + return -ENOTSUPP; > > > +} > > > + > > > #endif /* CONFIG_IOASID */ > > > #endif /* __LINUX_IOASID_H */ > > > -- > > > 2.7.4 > > > > [Jacob Pan]