Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2313112pxb; Mon, 19 Apr 2021 02:41:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwTVo+5BH0fc5wRKJbmqFQ3eve6uucln+0Rkx0w0e/jsdmG4RptmYHukFKHf82zBGND7JTV X-Received: by 2002:a17:902:d909:b029:ec:927c:3316 with SMTP id c9-20020a170902d909b02900ec927c3316mr9297017plz.21.1618825286020; Mon, 19 Apr 2021 02:41:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618825286; cv=none; d=google.com; s=arc-20160816; b=sK6dWdT+gT8gg7foZstht5ai18Zs9Z3FOpduHliAtKm1XOlbEctNj0IxyEg2nueCSo DB83mfDh7gYcdWqfrdhuvhoZU5eAoIUouIorvOUg3NJ5CUrF+6JTdcMLRuzM+MdklDZ1 /svf0tW3iQ783IRwZz3D8hyjF1QVrS3Zq1QgRJWwbcBXp8WWsmQGXrLvNfuVdkvG0o41 dAIVGplQUp0kIo9AHXdeGSxD5jbANxh5CmHIfq9Js1es+9y7YcDH9D04fUOaeRGcIlQK 8DrCjVqkziRiZwePfVMdvOZw7Wh/gMdA9aXTG12ZaW0eJmnt298Pj+B8yIM5aSKxkeKY dYGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=SOVxLrfQA7v0Mo2piSEsPYvMh7Cm0ARAJRzAaEsfhig=; b=NF+F3n3TP0XRSBNV0alNUrbrAtF3rx9GihH1UvJ5Lv3k2JTR/qa3oxuaB/40DaTxrG x9G2drTd43l6ANeB3XJdHBVRr4TpoVUHW6v0nF63E/Ie0Ymi9p4eE9NrFV2xVUID8zbG 6uIiGWXdx8WMhEX1F1P9vGJTnDfnvs0Epv0Xj5o9y+0BwlwTWO4l2tMVkPifOZkrnfng h1NOM5Dl8/FaPEFFRj5A2/1YaasX/wpyp3lj2Ep4cV6ZUcmqCvI/0IYTKPHQIksfW0yW H7MvUCxskAriGCMOrANWAHCa5W1YQ0w/ilMfDmwAmmgbduuS5Yozuw9uGcDTcfoqziBi vkwA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z8si15825798pfe.208.2021.04.19.02.41.13; Mon, 19 Apr 2021 02:41:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237962AbhDSJcu (ORCPT + 99 others); Mon, 19 Apr 2021 05:32:50 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:16480 "EHLO szxga05-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232440AbhDSJcs (ORCPT ); Mon, 19 Apr 2021 05:32:48 -0400 Received: from DGGEMS410-HUB.china.huawei.com (unknown [172.30.72.59]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4FP1kD4zpFzqTsr; Mon, 19 Apr 2021 17:29:56 +0800 (CST) Received: from [10.174.187.224] (10.174.187.224) by DGGEMS410-HUB.china.huawei.com (10.3.19.210) with Microsoft SMTP Server id 14.3.498.0; Mon, 19 Apr 2021 17:32:09 +0800 Subject: Re: [PATCH v3 02/12] iommu: Add iommu_split_block interface To: Lu Baolu , , , , Robin Murphy , Will Deacon , "Joerg Roedel" , Yi Sun , "Jean-Philippe Brucker" , Jonathan Cameron , Tian Kevin References: <20210413085457.25400-1-zhukeqian1@huawei.com> <20210413085457.25400-3-zhukeqian1@huawei.com> CC: Alex Williamson , Cornelia Huck , Kirti Wankhede , , , , From: Keqian Zhu Message-ID: <491da550-dc54-42e6-ac91-13d411575fad@huawei.com> Date: Mon, 19 Apr 2021 17:32:08 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.187.224] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Baolu, On 2021/4/14 15:14, Lu Baolu wrote: > On 4/13/21 4:54 PM, Keqian Zhu wrote: >> Block(largepage) mapping is not a proper granule for dirty log tracking. >> Take an extreme example, if DMA writes one byte, under 1G mapping, the >> dirty amount reported is 1G, but under 4K mapping, the dirty amount is >> just 4K. >> >> This adds a new interface named iommu_split_block in IOMMU base layer. >> A specific IOMMU driver can invoke it during start dirty log. If so, the >> driver also need to realize the split_block iommu ops. >> >> We flush all iotlbs after the whole procedure is completed to ease the >> pressure of IOMMU, as we will hanle a huge range of mapping in general. >> >> Signed-off-by: Keqian Zhu >> Signed-off-by: Kunkun Jiang >> --- >> drivers/iommu/iommu.c | 41 +++++++++++++++++++++++++++++++++++++++++ >> include/linux/iommu.h | 11 +++++++++++ >> 2 files changed, 52 insertions(+) >> >> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c >> index 667b2d6d2fc0..bb413a927870 100644 >> --- a/drivers/iommu/iommu.c >> +++ b/drivers/iommu/iommu.c >> @@ -2721,6 +2721,47 @@ int iommu_domain_set_attr(struct iommu_domain *domain, >> } >> EXPORT_SYMBOL_GPL(iommu_domain_set_attr); >> +int iommu_split_block(struct iommu_domain *domain, unsigned long iova, >> + size_t size) >> +{ >> + const struct iommu_ops *ops = domain->ops; >> + unsigned int min_pagesz; >> + size_t pgsize; >> + bool flush = false; >> + int ret = 0; >> + >> + if (unlikely(!ops || !ops->split_block)) >> + return -ENODEV; >> + >> + min_pagesz = 1 << __ffs(domain->pgsize_bitmap); >> + if (!IS_ALIGNED(iova | size, min_pagesz)) { >> + pr_err("unaligned: iova 0x%lx size 0x%zx min_pagesz 0x%x\n", >> + iova, size, min_pagesz); >> + return -EINVAL; >> + } >> + >> + while (size) { >> + flush = true; >> + >> + pgsize = iommu_pgsize(domain, iova, size); >> + >> + ret = ops->split_block(domain, iova, pgsize); >> + if (ret) >> + break; >> + >> + pr_debug("split handled: iova 0x%lx size 0x%zx\n", iova, pgsize); >> + >> + iova += pgsize; >> + size -= pgsize; >> + } >> + >> + if (flush) >> + iommu_flush_iotlb_all(domain); >> + >> + return ret; >> +} >> +EXPORT_SYMBOL_GPL(iommu_split_block); > > Do you really have any consumers of this interface other than the dirty > bit tracking? If not, I don't suggest to make this as a generic IOMMU > interface. > > There is an implicit requirement for such interfaces. The > iommu_map/unmap(iova, size) shouldn't be called at the same time. > Currently there's no such sanity check in the iommu core. A poorly > written driver could mess up the kernel by misusing this interface. Yes, I don't think up a scenario except dirty tracking. Indeed, we'd better not make them as a generic interface. Do you have any suggestion that underlying iommu drivers can share these code but not make it as a generic iommu interface? I have a not so good idea. Make the "split" interfaces as a static function, and transfer the function pointer to start_dirty_log. But it looks weird and inflexible. On the other hand, if a driver calls map/unmap with split/merge at the same time, it's a bug of driver, it should follow the rule. > > This also applies to iommu_merge_page(). > Thanks, Keqian