Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1637248pxa; Thu, 20 Aug 2020 16:59:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy3bD0KgV5Q9PsYaxOthu6k1SjmtIXgwSBg2Hb2gldL7sVOPiT9nFreD+zdCO6yin8yIyzi X-Received: by 2002:a17:906:ae49:: with SMTP id lf9mr225812ejb.317.1597967954795; Thu, 20 Aug 2020 16:59:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597967954; cv=none; d=google.com; s=arc-20160816; b=DvdtHGULjnP7E5Sbnit3YYwPw0gnhG4psRX9iua1U9iluc9A0yb6ov/A1E2XaRWUoN nAslKZILBPWs0D+mWeuMR5rdqLdOr80IaJ6vqnxRykkOMTVTORt+O2unGkn7lL8bCSNQ U8sXhx+Au59//gBWra500h08YYQLptBRf7PqTweGttZGpzIRcUmA/ytP+yKj0HQhyncb VsQfIbjeEmHd1mUj0+UatiF+ylz1sYlM4/zHFiqWtsLu28v0lDsYYgJgrLH72hSDzSU9 lP+CEk3yM/sqVgUYmvknMGTiJxhGVFNTlD338jNBCAL+Xt/rMeMsvVE2PZg/QLLq+Bcm 0oXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=rG+0Ph4uNEh5HoJiSQCxU0AdH7yPtWs/ChEMaNuJT88=; b=uUH1pysqFM9D146vootKFzs27XDs7kqxB1jYswzVfUvwCix/Lxw2qB/xOxmjstYPkI 1WosshKo7Icpwwvl9Og4fX7LQZhdWOemdcPnluY3xgjm6Mj+myhGTZuxcQC7NrSkev+Y cgROg2Piqi80ppHUTlfq/Rtwmi9lXbzql9PeA3f7IKTb7rao+9f1p3e+C1RmsEjM4v9g vrJsndISaPGj10jwJUBepaG80kTSowbLZZGN5MRMWyeeR8JZWOHEBrR/nnihOwX/w5HQ x1QOi63GscAEuBgueBoRJio9ONPjWtDoOGR4KIyLGCh+EE934XNdVphFzc+6UjkKrjQ6 XIwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=OR4mJH+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f21si6756ejq.412.2020.08.20.16.58.50; Thu, 20 Aug 2020 16:59:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=OR4mJH+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728644AbgHTVGh (ORCPT + 99 others); Thu, 20 Aug 2020 17:06:37 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:51374 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726716AbgHTVGf (ORCPT ); Thu, 20 Aug 2020 17:06:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1597957591; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=rG+0Ph4uNEh5HoJiSQCxU0AdH7yPtWs/ChEMaNuJT88=; b=OR4mJH+LvYoPaeME0BO5Zp3p+0CgbD2KcHvcAbknDkJLIshOX+d9V9OyoJHXvyvzbOGkse W9JMkeGdmiwJRKDZSxodOzkvvGN/RAfvjIKYTbcGpbwCLeDb/B2MGA0WBGthvWxZ4P53yj PfTRFSK1KiIZsWCtz7045lQrW1iIlRQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-216-HhsWVm-ENXCQUNs4rYgzZA-1; Thu, 20 Aug 2020 17:06:29 -0400 X-MC-Unique: HhsWVm-ENXCQUNs4rYgzZA-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id DDA09107464C; Thu, 20 Aug 2020 21:06:26 +0000 (UTC) Received: from x1.home (ovpn-112-71.phx2.redhat.com [10.3.112.71]) by smtp.corp.redhat.com (Postfix) with ESMTP id EC8685C1BD; Thu, 20 Aug 2020 21:06:19 +0000 (UTC) Date: Thu, 20 Aug 2020 15:06:19 -0600 From: Alex Williamson To: Liu Yi L Cc: eric.auger@redhat.com, baolu.lu@linux.intel.com, joro@8bytes.org, kevin.tian@intel.com, jacob.jun.pan@linux.intel.com, ashok.raj@intel.com, jun.j.tian@intel.com, yi.y.sun@intel.com, jean-philippe@linaro.org, peterx@redhat.com, hao.wu@intel.com, stefanha@gmail.com, iommu@lists.linux-foundation.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 08/15] iommu: Pass domain to sva_unbind_gpasid() Message-ID: <20200820150619.5dc1ec7a@x1.home> In-Reply-To: <1595917664-33276-9-git-send-email-yi.l.liu@intel.com> References: <1595917664-33276-1-git-send-email-yi.l.liu@intel.com> <1595917664-33276-9-git-send-email-yi.l.liu@intel.com> Organization: Red Hat MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 27 Jul 2020 23:27:37 -0700 Liu Yi L wrote: > From: Yi Sun > > Current interface is good enough for SVA virtualization on an assigned > physical PCI device, but when it comes to mediated devices, a physical > device may attached with multiple aux-domains. Also, for guest unbind, s/may/may be/ > the PASID to be unbind should be allocated to the VM. This check requires > to know the ioasid_set which is associated with the domain. > > So this interface needs to pass in domain info. Then the iommu driver is > able to know which domain will be used for the 2nd stage translation of > the nesting mode and also be able to do PASID ownership check. This patch > passes @domain per the above reason. Also, the prototype of &pasid is > changed frnt" to "u32" as the below link. s/frnt"/from an "int"/ > https://lore.kernel.org/kvm/27ac7880-bdd3-2891-139e-b4a7cd18420b@redhat.com/ This is really confusing, the link is to Eric's comment asking that the conversion from (at the time) int to ioasid_t be included in the commit log. The text here implies that it's pointing to some sort of justification for the change, which it isn't. It just notes that it happened, not why it happened, with a mostly irrelevant link. > Cc: Kevin Tian > CC: Jacob Pan > Cc: Alex Williamson > Cc: Eric Auger > Cc: Jean-Philippe Brucker > Cc: Joerg Roedel > Cc: Lu Baolu > Reviewed-by: Eric Auger > Signed-off-by: Yi Sun > Signed-off-by: Liu Yi L > --- > v5 -> v6: > *) use "u32" prototype for @pasid. > *) add review-by from Eric Auger. I'd probably hold off on adding Eric's R-b given the additional change in this version FWIW. Thanks, Alex > v2 -> v3: > *) pass in domain info only > *) use u32 for pasid instead of int type > > v1 -> v2: > *) added in v2. > --- > drivers/iommu/intel/svm.c | 3 ++- > drivers/iommu/iommu.c | 2 +- > include/linux/intel-iommu.h | 3 ++- > include/linux/iommu.h | 3 ++- > 4 files changed, 7 insertions(+), 4 deletions(-) > > diff --git a/drivers/iommu/intel/svm.c b/drivers/iommu/intel/svm.c > index c27d16a..c85b8d5 100644 > --- a/drivers/iommu/intel/svm.c > +++ b/drivers/iommu/intel/svm.c > @@ -436,7 +436,8 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, > return ret; > } > > -int intel_svm_unbind_gpasid(struct device *dev, int pasid) > +int intel_svm_unbind_gpasid(struct iommu_domain *domain, > + struct device *dev, u32 pasid) > { > struct intel_iommu *iommu = intel_svm_device_to_iommu(dev); > struct intel_svm_dev *sdev; > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index 1ce2a61..bee79d7 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -2145,7 +2145,7 @@ int iommu_sva_unbind_gpasid(struct iommu_domain *domain, struct device *dev, > if (unlikely(!domain->ops->sva_unbind_gpasid)) > return -ENODEV; > > - return domain->ops->sva_unbind_gpasid(dev, data->hpasid); > + return domain->ops->sva_unbind_gpasid(domain, dev, data->hpasid); > } > EXPORT_SYMBOL_GPL(iommu_sva_unbind_gpasid); > > diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h > index 0d0ab32..f98146b 100644 > --- a/include/linux/intel-iommu.h > +++ b/include/linux/intel-iommu.h > @@ -738,7 +738,8 @@ extern int intel_svm_enable_prq(struct intel_iommu *iommu); > extern int intel_svm_finish_prq(struct intel_iommu *iommu); > int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, > struct iommu_gpasid_bind_data *data); > -int intel_svm_unbind_gpasid(struct device *dev, int pasid); > +int intel_svm_unbind_gpasid(struct iommu_domain *domain, > + struct device *dev, u32 pasid); > struct iommu_sva *intel_svm_bind(struct device *dev, struct mm_struct *mm, > void *drvdata); > void intel_svm_unbind(struct iommu_sva *handle); > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > index b1ff702..80467fc 100644 > --- a/include/linux/iommu.h > +++ b/include/linux/iommu.h > @@ -303,7 +303,8 @@ struct iommu_ops { > int (*sva_bind_gpasid)(struct iommu_domain *domain, > struct device *dev, struct iommu_gpasid_bind_data *data); > > - int (*sva_unbind_gpasid)(struct device *dev, int pasid); > + int (*sva_unbind_gpasid)(struct iommu_domain *domain, > + struct device *dev, u32 pasid); > > int (*def_domain_type)(struct device *dev); >