Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp240311pxa; Fri, 21 Aug 2020 06:12:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxM1bK8p21PrEvsJPs0b54JcsrEyDrv+uVNkH5LO+BnEuAmpLWALwB02KtEmqmSprF5I9IC X-Received: by 2002:aa7:d3c2:: with SMTP id o2mr2774841edr.11.1598015578728; Fri, 21 Aug 2020 06:12:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598015578; cv=none; d=google.com; s=arc-20160816; b=vrQOqYeFfgMi4/lLuF0NeaC1shmZveh9Q7s6cBB/xsIxWrbQ0770gY0Isysm4Lft8t Zz0S/BmpYvSOjUMx/IlzvRBFYQY/OGqoRIgZaje+iG+4VPdhGozFmCX40UodXIZruoOH ++3om1U0l+6dGXTIncVUv/FkM6dHQsOWeKB9wjs2borYd67KjnF5R9L4EI4Yw3UgwgXt 5hIzanB0fwbdGhDbkwKueA1rz2A+l65Dal1teL6ESRxMW8vquND4mA9dCsW6MCmvdaJZ dNDmK/AwVKXt3N6jel2gQvDnZsCtCelAaSG17MBAlnzQbXspb+YpgzNCHBOIyjCEn/WB TPIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=Od+bO6wwGHZOpfyUe8CiRlpyX1hZ1GD4+OWd3dAX8YA=; b=sdj6+Azwc9UbEfrLOyQnhC5WTXtMoOmiyrMmmBfl4hM3sv5p49D3TqwhyUMm1KaUBL WEvpwqFY6V+MIC/FmR99c3k1WBwhRyuaPe9W3WNcVNBF2kpzeLUbZLaZeCUnUV89ro15 9QDoWOx4l7bfxL1zbi7OlPQl4ejYLYGFEMtuL4tAGKokg2GhdooEQCGjb6TJTvRgPgyG 32O1VNtCpMYRLhFbIEMVv7ulbtwYPIqNEjx3yb4ong1KDO8a92bYUkKUM1V02wGjnC9m IWfy6bH27ra3j+Z0EfyuQYPRRwqhSoKtjGWQcaJm54GJziIuRXHAYzTbLRJkvYuDXc3g dzpQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=STB2EhqU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c18si1157685edr.134.2020.08.21.06.12.34; Fri, 21 Aug 2020 06:12:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=STB2EhqU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727850AbgHUNJv (ORCPT + 99 others); Fri, 21 Aug 2020 09:09:51 -0400 Received: from us-smtp-2.mimecast.com ([205.139.110.61]:54382 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726879AbgHUNJt (ORCPT ); Fri, 21 Aug 2020 09:09:49 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1598015387; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Od+bO6wwGHZOpfyUe8CiRlpyX1hZ1GD4+OWd3dAX8YA=; b=STB2EhqUyy49UsAXTTFI1HiJZRY1NW+uJWaeMn2QGu+w9LW8TBYTfmPLLha1JUsqcWdRpB +H9djbOQgOA8nAcvuI9yLake6AJAWqrUhaWVhCzQwmbazFlGaDYRDs/zKW+i2OACFFZZpp dAeL/l+82+ndepKHZ0YMU9UrqPWBT5E= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-350-mXq3zwf3MwmX4df6JT2Brg-1; Fri, 21 Aug 2020 09:09:44 -0400 X-MC-Unique: mXq3zwf3MwmX4df6JT2Brg-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id E550B18BA282; Fri, 21 Aug 2020 13:09:41 +0000 (UTC) Received: from [10.36.113.93] (ovpn-113-93.ams2.redhat.com [10.36.113.93]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 8D35877DC2; Fri, 21 Aug 2020 13:09:31 +0000 (UTC) Subject: Re: [PATCH v6 08/15] iommu: Pass domain to sva_unbind_gpasid() To: Alex Williamson , Liu Yi L Cc: baolu.lu@linux.intel.com, joro@8bytes.org, kevin.tian@intel.com, jacob.jun.pan@linux.intel.com, ashok.raj@intel.com, jun.j.tian@intel.com, yi.y.sun@intel.com, jean-philippe@linaro.org, peterx@redhat.com, hao.wu@intel.com, stefanha@gmail.com, iommu@lists.linux-foundation.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org References: <1595917664-33276-1-git-send-email-yi.l.liu@intel.com> <1595917664-33276-9-git-send-email-yi.l.liu@intel.com> <20200820150619.5dc1ec7a@x1.home> From: Auger Eric Message-ID: <7db3f15c-09e3-6a52-352a-c9a499895922@redhat.com> Date: Fri, 21 Aug 2020 15:09:29 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200820150619.5dc1ec7a@x1.home> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 8/20/20 11:06 PM, Alex Williamson wrote: > On Mon, 27 Jul 2020 23:27:37 -0700 > Liu Yi L wrote: > >> From: Yi Sun >> >> Current interface is good enough for SVA virtualization on an assigned >> physical PCI device, but when it comes to mediated devices, a physical >> device may attached with multiple aux-domains. Also, for guest unbind, > > s/may/may be/ > >> the PASID to be unbind should be allocated to the VM. This check requires >> to know the ioasid_set which is associated with the domain. >> >> So this interface needs to pass in domain info. Then the iommu driver is >> able to know which domain will be used for the 2nd stage translation of >> the nesting mode and also be able to do PASID ownership check. This patch >> passes @domain per the above reason. Also, the prototype of &pasid is >> changed frnt" to "u32" as the below link. > > s/frnt"/from an "int"/ > >> https://lore.kernel.org/kvm/27ac7880-bdd3-2891-139e-b4a7cd18420b@redhat.com/ > > This is really confusing, the link is to Eric's comment asking that the > conversion from (at the time) int to ioasid_t be included in the commit > log. The text here implies that it's pointing to some sort of > justification for the change, which it isn't. It just notes that it > happened, not why it happened, with a mostly irrelevant link. > >> Cc: Kevin Tian >> CC: Jacob Pan >> Cc: Alex Williamson >> Cc: Eric Auger >> Cc: Jean-Philippe Brucker >> Cc: Joerg Roedel >> Cc: Lu Baolu >> Reviewed-by: Eric Auger >> Signed-off-by: Yi Sun >> Signed-off-by: Liu Yi L >> --- >> v5 -> v6: >> *) use "u32" prototype for @pasid. >> *) add review-by from Eric Auger. > > I'd probably hold off on adding Eric's R-b given the additional change > in this version FWIW. Thanks, Yep I did not notice that change given the R-b was applied ;-) Thanks Eric > > Alex > >> v2 -> v3: >> *) pass in domain info only >> *) use u32 for pasid instead of int type >> >> v1 -> v2: >> *) added in v2. >> --- >> drivers/iommu/intel/svm.c | 3 ++- >> drivers/iommu/iommu.c | 2 +- >> include/linux/intel-iommu.h | 3 ++- >> include/linux/iommu.h | 3 ++- >> 4 files changed, 7 insertions(+), 4 deletions(-) >> >> diff --git a/drivers/iommu/intel/svm.c b/drivers/iommu/intel/svm.c >> index c27d16a..c85b8d5 100644 >> --- a/drivers/iommu/intel/svm.c >> +++ b/drivers/iommu/intel/svm.c >> @@ -436,7 +436,8 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, >> return ret; >> } >> >> -int intel_svm_unbind_gpasid(struct device *dev, int pasid) >> +int intel_svm_unbind_gpasid(struct iommu_domain *domain, >> + struct device *dev, u32 pasid) >> { >> struct intel_iommu *iommu = intel_svm_device_to_iommu(dev); >> struct intel_svm_dev *sdev; >> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c >> index 1ce2a61..bee79d7 100644 >> --- a/drivers/iommu/iommu.c >> +++ b/drivers/iommu/iommu.c >> @@ -2145,7 +2145,7 @@ int iommu_sva_unbind_gpasid(struct iommu_domain *domain, struct device *dev, >> if (unlikely(!domain->ops->sva_unbind_gpasid)) >> return -ENODEV; >> >> - return domain->ops->sva_unbind_gpasid(dev, data->hpasid); >> + return domain->ops->sva_unbind_gpasid(domain, dev, data->hpasid); >> } >> EXPORT_SYMBOL_GPL(iommu_sva_unbind_gpasid); >> >> diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h >> index 0d0ab32..f98146b 100644 >> --- a/include/linux/intel-iommu.h >> +++ b/include/linux/intel-iommu.h >> @@ -738,7 +738,8 @@ extern int intel_svm_enable_prq(struct intel_iommu *iommu); >> extern int intel_svm_finish_prq(struct intel_iommu *iommu); >> int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, >> struct iommu_gpasid_bind_data *data); >> -int intel_svm_unbind_gpasid(struct device *dev, int pasid); >> +int intel_svm_unbind_gpasid(struct iommu_domain *domain, >> + struct device *dev, u32 pasid); >> struct iommu_sva *intel_svm_bind(struct device *dev, struct mm_struct *mm, >> void *drvdata); >> void intel_svm_unbind(struct iommu_sva *handle); >> diff --git a/include/linux/iommu.h b/include/linux/iommu.h >> index b1ff702..80467fc 100644 >> --- a/include/linux/iommu.h >> +++ b/include/linux/iommu.h >> @@ -303,7 +303,8 @@ struct iommu_ops { >> int (*sva_bind_gpasid)(struct iommu_domain *domain, >> struct device *dev, struct iommu_gpasid_bind_data *data); >> >> - int (*sva_unbind_gpasid)(struct device *dev, int pasid); >> + int (*sva_unbind_gpasid)(struct iommu_domain *domain, >> + struct device *dev, u32 pasid); >> >> int (*def_domain_type)(struct device *dev); >> >