Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1141902ybz; Fri, 1 May 2020 15:33:35 -0700 (PDT) X-Google-Smtp-Source: APiQypLpQi5Vck4m6gRoHa73lq966j9l9MbZbnJ+vPnnyXYH0GvsgXV1MwMkRTzijHeQhhXppS21 X-Received: by 2002:a17:906:48c:: with SMTP id f12mr5528110eja.93.1588372415382; Fri, 01 May 2020 15:33:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588372415; cv=none; d=google.com; s=arc-20160816; b=w+XBHa/3qIUk4wLR5c5BCPhTYIRKQFrUUZ/f611ZwVF02P8QDqMQGRug3o/Bf3BnUP 5cb8s3vWZyPFdS9Kv2lnb0da4z+Z/xIpg0QXtfq9ajbroO8tfpnq1pajIHusRJrtKcFk U+4XPtRp/tXiGcio3HQe29ydZYJTl3Mdf5MlDAOa08lDZD12GzZypYYT4Efgp8yaIbre NVwc7GfIUTiSk/uJ77u4zH/TbCHrJOMET4yIFghrDQjTMizYKMPWXrHGTuqsls2bbehy koiq8Bq2jJYqTDH15Z/mEVmd6hbT1FdjuT7hHi+0Jgmn9D1LfYQysR0bsdB42nPGXIhk lqWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:ironport-sdr:ironport-sdr; bh=fsBoJ2shmyRSXNRCCh01YPLTpneoQz7bq7rXmsXKiLE=; b=sHLvaYoBkKpGYkBDpzFqqUy7EJAgvJKiyHksyyNryY/zJg1Y4xMNtU+CtwzMNkhIOW nfkMebTXQnVZWIM+nh0BCbGkQJXaTEArdkRveA5xkfQUgx6Z1sGy8ZJ3Y0he5N/Nu+91 skP1NSeCKar3lKo8PEy/gtqUxkcDZO+l4hX13a+qyB8xQEysihBG/jTUn78LdctOP2aq f8lRFVJ1oaGQu3EVnfM9Pe4L4PhX7lV5DdQ6KXoZzLg5wrt6bSOwcpiuwPKFOoRHMosL Yhi96EeJoAcTZKnQQSkKwLfb6RShJFtyza24YIPs1ERDL5mQHmISkBfPVGbabQTT0bbZ 8g6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jr9si2659053ejb.52.2020.05.01.15.33.11; Fri, 01 May 2020 15:33:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726903AbgEAWbx (ORCPT + 99 others); Fri, 1 May 2020 18:31:53 -0400 Received: from mga04.intel.com ([192.55.52.120]:41078 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726336AbgEAWbx (ORCPT ); Fri, 1 May 2020 18:31:53 -0400 IronPort-SDR: Yuo582PxpoKQCZcs02G473e2EQ1vYsik9vaKXBlSp/+XwJD3gbyzcQaR3RR6om7R+KRdK7nQDk kj0+hcwmWcVQ== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 May 2020 15:31:52 -0700 IronPort-SDR: 5ekQ+k46xybgF9HW2j412kLZkLzlc6Jvaz+HLd9DSdS0Js4fihZVy+KneV7F1D3hzoz3si5WQC EDbL825xEQWw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,341,1583222400"; d="scan'208";a="248657049" Received: from meghadey-mobl1.amr.corp.intel.com (HELO [10.251.135.85]) ([10.251.135.85]) by fmsmga007.fm.intel.com with ESMTP; 01 May 2020 15:31:51 -0700 Subject: Re: [PATCH RFC 00/15] Add VFIO mediated device support and IMS support for the idxd driver. To: Jason Gunthorpe , Dan Williams Cc: Dave Jiang , Vinod Koul , maz@kernel.org, Bjorn Helgaas , "Rafael J. Wysocki" , Greg KH , Thomas Gleixner , "H. Peter Anvin" , Alex Williamson , Jacob jun Pan , "Raj, Ashok" , Yi L Liu , baolu.lu@intel.com, "Tian, Kevin" , Sanjay K Kumar , "Luck, Tony" , Jing Lin , kwankhede@nvidia.com, eric.auger@redhat.com, parav@mellanox.com, dmaengine@vger.kernel.org, Linux Kernel Mailing List , X86 ML , linux-pci@vger.kernel.org, KVM list References: <158751095889.36773.6009825070990637468.stgit@djiang5-desk3.ch.intel.com> <20200421235442.GO11945@mellanox.com> <20200423191846.GE13640@mellanox.com> From: "Dey, Megha" Message-ID: <098aef60-35a4-dc44-be07-ea43c1a726c7@linux.intel.com> Date: Fri, 1 May 2020 15:31:51 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200423191846.GE13640@mellanox.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jason, On 4/23/2020 12:18 PM, Jason Gunthorpe wrote: > On Wed, Apr 22, 2020 at 02:24:11PM -0700, Dan Williams wrote: >> On Tue, Apr 21, 2020 at 4:55 PM Jason Gunthorpe wrote: >>> >>> On Tue, Apr 21, 2020 at 04:33:46PM -0700, Dave Jiang wrote: >>>> The actual code is independent of the stage 2 driver code submission that adds >>>> support for SVM, ENQCMD(S), PASID, and shared workqueues. This code series will >>>> support dedicated workqueue on a guest with no vIOMMU. >>>> >>>> A new device type "mdev" is introduced for the idxd driver. This allows the wq >>>> to be dedicated to the usage of a VFIO mediated device (mdev). Once the work >>>> queue (wq) is enabled, an uuid generated by the user can be added to the wq >>>> through the uuid sysfs attribute for the wq. After the association, a mdev can >>>> be created using this UUID. The mdev driver code will associate the uuid and >>>> setup the mdev on the driver side. When the create operation is successful, the >>>> uuid can be passed to qemu. When the guest boots up, it should discover a DSA >>>> device when doing PCI discovery. >>> >>> I'm feeling really skeptical that adding all this PCI config space and >>> MMIO BAR emulation to the kernel just to cram this into a VFIO >>> interface is a good idea, that kind of stuff is much safer in >>> userspace. >>> >>> Particularly since vfio is not really needed once a driver is using >>> the PASID stuff. We already have general code for drivers to use to >>> attach a PASID to a mm_struct - and using vfio while disabling all the >>> DMA/iommu config really seems like an abuse. >>> >>> A /dev/idxd char dev that mmaps a bar page and links it to a PASID >>> seems a lot simpler and saner kernel wise. >>> >>>> The mdev utilizes Interrupt Message Store or IMS[3] instead of MSIX for >>>> interrupts for the guest. This preserves MSIX for host usages and also allows a >>>> significantly larger number of interrupt vectors for guest usage. >>> >>> I never did get a reply to my earlier remarks on the IMS patches. >>> >>> The concept of a device specific addr/data table format for MSI is not >>> Intel specific. This should be general code. We have a device that can >>> use this kind of kernel capability today. >> >> This has been my concern reviewing the implementation. IMS needs more >> than one in-tree user to validate degrees of freedom in the api. I had >> been missing a second "in-tree user" to validate the scope of the >> flexibility that was needed. > > IMS is too narrowly specified. > > All platforms that support MSI today can support IMS. It is simply a > way for the platform to give the driver an addr/data pair that triggers > an interrupt when a posted write is performed to that pair. > Well, yes and no. IMS requires interrupt remapping in addition to the dynamic nature of IRQ allocation. > This is different from the other interrupt setup flows which are > tightly tied to the PCI layer. Here the driver should simply ask for > interrupts. > > Ie the entire IMS API to the driver should be something very simple > like: > > struct message_irq > { > uint64_t addr; > uint32_t data; > }; > > struct message_irq *request_message_irq( > struct device *, irq_handler_t handler, unsigned long flags, > const char *name, void *dev); > > And the plumbing underneath should setup the irq chips and so forth as > required. > yes, this seems correct. > Jason >