Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2319647pxb; Mon, 8 Mar 2021 22:24:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJys46sjeSLKRYpW9fEGSWCTHFxHXzWNiKzjCWj4HzIVYe1LQPXiOoqHMr4Lw4ru9OFg+Bfd X-Received: by 2002:a17:906:a944:: with SMTP id hh4mr18529614ejb.479.1615271056148; Mon, 08 Mar 2021 22:24:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615271056; cv=none; d=google.com; s=arc-20160816; b=aBoI0n9ICiN9Oq+qFv6F7fPdxRo5O+pX66kMjlEaEesYw5QWlZ826RxmcNqbV6JsVn J0Ul4ZBsuERtnucNTpWpCVNt7xw/8hweqULABGvG6uA+pIJMnGCjBO5/dn+nuJCpyuG6 7lO37Mn2Z5Z4WwWECfyajO2fAvXetZ9JwumCvqv+ROeJDRaWCZDNTuni3IoEi0L7xH8K gldGYoWZMMYrJ5fDx3KF3UanISRUwb2RswbqKuH0qhZ9exWOzGW2gx2WTleCmNEjHKUp 6mpaKul28fuQPlwBN1ko5dEyZHMPcE6B5GBckuvXDWuwjrMADHYyQQzju8kDStIey53m bKIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=inIN6DT/v8SZw70DM+VfSzE+3M0Wyqx87HT90bOeXKY=; b=iWOyDvhyXxm8Mfrn0DGyaN0T0Quu5eD/UFU32Gq6J/ErKlgNZRYcozESv0RvqxBq/k 1Ef1J/atXbyp3QqfVG1Id++RW7HX5g2WTr7w/Z8Q8uDnj4AWPKkDIoQ93It/nui/bytv OiiyJh/jUf0pfrIpbIrBw54ZNHRzfsVyY12jHgQd05lM5XYMDkn2iRJQM3LJlantpE6p DSZzljTC/uAKAthvNNM+/3KKmLfqVsn9dy5AfHXhmd5vO0q3abbihwAylsQGm38juJfy z8OzXrl1xCEAxBmLs4CSoWXkq31Z4tOj5OOBTwvTRrGbUZ1OnM0sHdIt2hg/K6G/D7Kk n5bw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s24si8239454edy.266.2021.03.08.22.23.54; Mon, 08 Mar 2021 22:24:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229813AbhCIGW0 (ORCPT + 99 others); Tue, 9 Mar 2021 01:22:26 -0500 Received: from szxga07-in.huawei.com ([45.249.212.35]:13875 "EHLO szxga07-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229527AbhCIGWY (ORCPT ); Tue, 9 Mar 2021 01:22:24 -0500 Received: from DGGEMS414-HUB.china.huawei.com (unknown [172.30.72.58]) by szxga07-in.huawei.com (SkyGuard) with ESMTP id 4DvlSc1YQGz8vRm; Tue, 9 Mar 2021 14:20:32 +0800 (CST) Received: from DESKTOP-7FEPK9S.china.huawei.com (10.174.184.135) by DGGEMS414-HUB.china.huawei.com (10.3.19.214) with Microsoft SMTP Server id 14.3.498.0; Tue, 9 Mar 2021 14:22:11 +0800 From: Shenming Lu To: Alex Williamson , Cornelia Huck , Will Deacon , Robin Murphy , Joerg Roedel , Jean-Philippe Brucker , Eric Auger , , , , , CC: Kevin Tian , , Christoph Hellwig , Lu Baolu , Jonathan Cameron , Barry Song , , , , Subject: [RFC PATCH v2 0/6] Add IOPF support for VFIO passthrough Date: Tue, 9 Mar 2021 14:22:01 +0800 Message-ID: <20210309062207.505-1-lushenming@huawei.com> X-Mailer: git-send-email 2.27.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.174.184.135] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, The static pinning and mapping problem in VFIO and possible solutions have been discussed a lot [1, 2]. One of the solutions is to add I/O page fault support for VFIO devices. Different from those relatively complicated software approaches such as presenting a vIOMMU that provides the DMA buffer information (might include para-virtualized optimizations), IOPF mainly depends on the hardware faulting capability, such as the PCIe PRI extension or Arm SMMU stall model. What's more, the IOPF support in the IOMMU driver is being implemented in SVA [3]. So we add IOPF support for VFIO passthrough based on the IOPF part of SVA in this series. We have measured its performance with UADK [4] (passthrough an accelerator to a VM) on Hisilicon Kunpeng920 board: Run hisi_sec_test... - with varying message lengths and sending times - with/without stage 2 IOPF enabled when msg_len = 1MB and PREMAP_LEN (in patch 3) = 1: speed (KB/s) times w/o IOPF with IOPF (num of faults) degradation 1 325596 119152 (518) 36.6% 100 7524985 5804659 (1058) 77.1% 1000 8661817 8440209 (1071) 97.4% 5000 8804512 8724368 (1216) 99.1% If we use the same region to send messages, since page faults occur almost only when first accessing, more times, less degradation. when msg_len = 10MB and PREMAP_LEN = 512: speed (KB/s) times w/o IOPF with IOPF (num of faults) degradation 1 1012758 682257 (13) 67.4% 100 8680688 8374154 (26) 96.5% 1000 8860861 8719918 (26) 98.4% We see that pre-mapping can help. And we also measured the performance of host SVA with the same params: when msg_len = 1MB: speed (KB/s) times w/o IOPF with IOPF (num of faults) degradation 1 951672 163866 (512) 17.2% 100 8691961 4529971 (1024) 52.1% 1000 9158721 8376346 (1024) 91.5% 5000 9184532 9008739 (1024) 98.1% Besides, the avg time spent in vfio_iommu_dev_fault_handler() (in patch 3) is little less than iopf_handle_group() (in SVA) (1.6 us vs 2.0 us). History: v1 -> v2 - Numerous improvements following the suggestions. Thanks a lot to all of you. Yet TODO: - Add support for PRI. - Consider selective-faulting. (suggested by Kevin) ... Links: [1] Lesokhin I, et al. Page Fault Support for Network Controllers. In ASPLOS, 2016. [2] Tian K, et al. coIOMMU: A Virtual IOMMU with Cooperative DMA Buffer Tracking for Efficient Memory Management in Direct I/O. In USENIX ATC, 2020. [3] https://patchwork.kernel.org/project/linux-arm-kernel/cover/20210302092644.2553014-1-jean-philippe@linaro.org/ [4] https://github.com/Linaro/uadk Any comments and suggestions are very welcome. :-) Thanks, Shenming Shenming Lu (6): iommu: Evolve to support more scenarios of using IOPF vfio: Add an MMU notifier to avoid pinning vfio: Add a page fault handler vfio: VFIO_IOMMU_ENABLE_IOPF vfio: No need to statically pin and map if IOPF enabled vfio: Add nested IOPF support .../iommu/arm/arm-smmu-v3/arm-smmu-v3-sva.c | 3 +- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 11 +- drivers/iommu/io-pgfault.c | 4 - drivers/iommu/iommu.c | 56 ++- drivers/vfio/vfio.c | 118 +++++ drivers/vfio/vfio_iommu_type1.c | 446 +++++++++++++++++- include/linux/iommu.h | 21 +- include/linux/vfio.h | 14 + include/uapi/linux/iommu.h | 3 + include/uapi/linux/vfio.h | 6 + 10 files changed, 661 insertions(+), 21 deletions(-) -- 2.19.1