Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp911411iog; Wed, 29 Jun 2022 12:48:12 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sh/rH5EBHSNwHTGrWWIe75heYL7q3UJX33wQtt/pUU3Dhm/IqY4sFj88WfqJkuumbRypZJ X-Received: by 2002:a17:90b:4ac6:b0:1ed:1811:5009 with SMTP id mh6-20020a17090b4ac600b001ed18115009mr7484241pjb.47.1656532092510; Wed, 29 Jun 2022 12:48:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656532092; cv=none; d=google.com; s=arc-20160816; b=fXwOYXxWY4cBQ2Vp9R1gCCrNirel/uA085ugL1E3KWSNLK/cRApwWKoHzwKnJuQa73 341Zfs71mox6NkWp2XjhVmmYR3hrKk+qIsiS+L8medJWX1Udvy9XcXRq0yh6Bw5l3SGN Tjl5VunFpXBpPaJ5N1ALK6eBV/KWXkXqmy96lCLJTF12Zj9goqH1Kyv0N3qe33HbyqoB RV+NgF60+PL1h+Wk5+oXsA4Z5diFoo4xcSyvOu+nCLCVR+jrjKNI04e3SMgNPD09zprY qD1D9NbjSIn+MJNEECw02tCwxtsSaE1uJadh3Gf/BQl+kPgmtBDsX1gvqZE6QXwDcy1l ExXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=wtEVZJzV27xvlwsGQZCUhLA3H94kzjzmpSCjqNJAWJk=; b=Y5+2Ev6KYTmb3SMjWg/2h+/LlM7q2HIhpjJ0Rc2xhSJTiHxarUtchMJJ9dWlYNOLOG nd7EVnmVH0kOrSMdcFKemIbugHY99kXA0wmKZ6vuB41eKSd0NXo4ZWa0K4kfiFhhCvdQ /r1Dqm2S9ovroFZNlyU7tMHApMHy16YxoalqUE1KQOOpyfd1SpIfi7hzhh85g7vwgIf0 FnpPm6kua+pJqfrlTMORZNKGljnhPRrnW3RZZM7mufrbWUB5bx7uiPuJXjyb2bO7K0vG rzT6hS/aUXPQ6m/vrcGaZKX8vJ9sTxhHQvK4lJLTAV1Q2j+ah0QxnNtI/TdIlp77uaF/ ceNA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j71-20020a63804a000000b0040dd28f9670si17364661pgd.603.2022.06.29.12.47.56; Wed, 29 Jun 2022 12:48:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230501AbiF2TPQ (ORCPT + 99 others); Wed, 29 Jun 2022 15:15:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57876 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229546AbiF2TPP (ORCPT ); Wed, 29 Jun 2022 15:15:15 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1ABDE3CA7C; Wed, 29 Jun 2022 12:15:14 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 123D21480; Wed, 29 Jun 2022 12:15:14 -0700 (PDT) Received: from [10.57.85.71] (unknown [10.57.85.71]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 6188D3F792; Wed, 29 Jun 2022 12:15:10 -0700 (PDT) Message-ID: <7f0673e1-433b-65fb-1d2b-c3e4adeebf87@arm.com> Date: Wed, 29 Jun 2022 20:15:04 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH v7 08/21] iommu/dma: support PCI P2PDMA pages in dma-iommu map_sg Content-Language: en-GB To: Logan Gunthorpe , linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, linux-block@vger.kernel.org, linux-pci@vger.kernel.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org Cc: Minturn Dave B , Martin Oliveira , Ralph Campbell , Jason Gunthorpe , John Hubbard , Dave Hansen , Matthew Wilcox , =?UTF-8?Q?Christian_K=c3=b6nig?= , Jason Gunthorpe , Chaitanya Kulkarni , Jason Ekstrand , Daniel Vetter , Bjorn Helgaas , Dan Williams , Stephen Bates , Ira Weiny , Christoph Hellwig , Xiong Jianxin References: <20220615161233.17527-1-logang@deltatee.com> <20220615161233.17527-9-logang@deltatee.com> From: Robin Murphy In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-06-29 16:57, Logan Gunthorpe wrote: > > > > On 2022-06-29 06:07, Robin Murphy wrote: >> On 2022-06-15 17:12, Logan Gunthorpe wrote: >>> When a PCI P2PDMA page is seen, set the IOVA length of the segment >>> to zero so that it is not mapped into the IOVA. Then, in finalise_sg(), >>> apply the appropriate bus address to the segment. The IOVA is not >>> created if the scatterlist only consists of P2PDMA pages. >>> >>> A P2PDMA page may have three possible outcomes when being mapped: >>>    1) If the data path between the two devices doesn't go through >>>       the root port, then it should be mapped with a PCI bus address >>>    2) If the data path goes through the host bridge, it should be mapped >>>       normally with an IOMMU IOVA. >>>    3) It is not possible for the two devices to communicate and thus >>>       the mapping operation should fail (and it will return -EREMOTEIO). >>> >>> Similar to dma-direct, the sg_dma_mark_pci_p2pdma() flag is used to >>> indicate bus address segments. On unmap, P2PDMA segments are skipped >>> over when determining the start and end IOVA addresses. >>> >>> With this change, the flags variable in the dma_map_ops is set to >>> DMA_F_PCI_P2PDMA_SUPPORTED to indicate support for P2PDMA pages. >>> >>> Signed-off-by: Logan Gunthorpe >>> Reviewed-by: Jason Gunthorpe >>> --- >>>   drivers/iommu/dma-iommu.c | 68 +++++++++++++++++++++++++++++++++++---- >>>   1 file changed, 61 insertions(+), 7 deletions(-) >>> >>> diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c >>> index f90251572a5d..b01ca0c6a7ab 100644 >>> --- a/drivers/iommu/dma-iommu.c >>> +++ b/drivers/iommu/dma-iommu.c >>> @@ -21,6 +21,7 @@ >>>   #include >>>   #include >>>   #include >>> +#include >>>   #include >>>   #include >>>   #include >>> @@ -1062,6 +1063,16 @@ static int __finalise_sg(struct device *dev, >>> struct scatterlist *sg, int nents, >>>           sg_dma_address(s) = DMA_MAPPING_ERROR; >>>           sg_dma_len(s) = 0; >>>   +        if (is_pci_p2pdma_page(sg_page(s)) && !s_iova_len) { >> >> Logically, should we not be able to use sg_is_dma_bus_address() here? I >> think it should be feasible, and simpler, to prepare the p2p segments >> up-front, such that at this point all we need to do is restore the >> original length (if even that, see below). > > Per my previous email, no, because sg_is_dma_bus_address() is not set > yet and not meant to tell you something about the page. That flag will > be set below by pci_p2pdma_map_bus_segment() and then checkd in > iommu_dma_unmap_sg() to determine if the dma_address in the segment > needs to be unmapped. I know it's not set yet as-is; I'm suggesting things should be restructured so that it *would be*. In the logical design of this code, the DMA addresses are effectively determined in iommu_dma_map_sg(), and __finalise_sg() merely converts them from a relative to an absolute form (along with undoing the other trickery). Thus the call to pci_p2pdma_map_bus_segment() absolutely belongs in the main iommu_map_sg() loop. >>> +            if (i > 0) >>> +                cur = sg_next(cur); >>> + >>> +            pci_p2pdma_map_bus_segment(s, cur); >>> +            count++; >>> +            cur_len = 0; >>> +            continue; >>> +        } >>> + >>>           /* >>>            * Now fill in the real DMA data. If... >>>            * - there is a valid output segment to append to >>> @@ -1158,6 +1169,8 @@ static int iommu_dma_map_sg(struct device *dev, >>> struct scatterlist *sg, >>>       struct iova_domain *iovad = &cookie->iovad; >>>       struct scatterlist *s, *prev = NULL; >>>       int prot = dma_info_to_prot(dir, dev_is_dma_coherent(dev), attrs); >>> +    struct dev_pagemap *pgmap = NULL; >>> +    enum pci_p2pdma_map_type map_type; >>>       dma_addr_t iova; >>>       size_t iova_len = 0; >>>       unsigned long mask = dma_get_seg_boundary(dev); >>> @@ -1193,6 +1206,35 @@ static int iommu_dma_map_sg(struct device *dev, >>> struct scatterlist *sg, >>>           s_length = iova_align(iovad, s_length + s_iova_off); >>>           s->length = s_length; >>>   +        if (is_pci_p2pdma_page(sg_page(s))) { >>> +            if (sg_page(s)->pgmap != pgmap) { >>> +                pgmap = sg_page(s)->pgmap; >>> +                map_type = pci_p2pdma_map_type(pgmap, dev); >>> +            } >> >> There's a definite code smell here, but per above and below I think we >> *should* actually call the new helper instead of copy-pasting half of it. > > >> >>> + >>> +            switch (map_type) { >>> +            case PCI_P2PDMA_MAP_BUS_ADDR: >>> +                /* >>> +                 * A zero length will be ignored by >>> +                 * iommu_map_sg() and then can be detected >> >> If that is required behaviour then it needs an explicit check in >> iommu_map_sg() to guarantee (and document) it. It's only by chance that >> __iommu_map() happens to return success for size == 0 *if* all the other >> arguments still line up, which is a far cry from a safe no-op. > > What should such a check look like? I could certainly add some comments > to iommu_map_sg(), but I don't see what the code would need to check for... I'd say a check for zero-length segments would look like "if (sg->length == 0)", most likely with a "continue;" on the following line. >> However, rather than play yet more silly tricks, I think it would make >> even more sense to make iommu_map_sg() properly aware and able to skip >> direct p2p segments on its own. Once it becomes normal to pass mixed >> scatterlists around, it's only a matter of time until one ends up being >> handed to a driver which manages its own IOMMU domain, and then what? > > I suppose we can add another call to is_pci_p2pdma_page() inside > iommu_map_sg() if you think that is cleaner. Seems like more work on the > fast path to me, but I'm not opposed to it. I was thinking more of sg_is_dma_bus_address() but admittedly under my initial misapprehension of that. I suppose there's still a tenuous argument that even though we're not actually consuming sg_dma_address() at that point, if a segment *has* been earmarked for direct p2p, then skipping it rather than mapping it at the root complex TA that's probably never going to see those transactions might seem the more logical choice. However it's all a bit hypothetical, and not significantly cleaner than a zero-size special case, so I'm not particularly tied to the idea either. >>> +                 * in __finalise_sg() to actually map the >>> +                 * bus address. >>> +                 */ >>> +                s->length = 0; >>> +                continue; >>> +            case PCI_P2PDMA_MAP_THRU_HOST_BRIDGE: >>> +                /* >>> +                 * Mapping through host bridge should be >>> +                 * mapped with regular IOVAs, thus we >>> +                 * do nothing here and continue below. >>> +                 */ >>> +                break; >>> +            default: >>> +                ret = -EREMOTEIO; >>> +                goto out_restore_sg; >>> +            } >>> +        } >>> + >>>           /* >>>            * Due to the alignment of our single IOVA allocation, we can >>>            * depend on these assumptions about the segment boundary mask: >>> @@ -1215,6 +1257,9 @@ static int iommu_dma_map_sg(struct device *dev, >>> struct scatterlist *sg, >>>           prev = s; >>>       } >>>   +    if (!iova_len) >>> +        return __finalise_sg(dev, sg, nents, 0); >>> + >>>       iova = iommu_dma_alloc_iova(domain, iova_len, dma_get_mask(dev), >>> dev); >>>       if (!iova) { >>>           ret = -ENOMEM; >>> @@ -1236,7 +1281,7 @@ static int iommu_dma_map_sg(struct device *dev, >>> struct scatterlist *sg, >>>   out_restore_sg: >>>       __invalidate_sg(sg, nents); >>>   out: >>> -    if (ret != -ENOMEM) >>> +    if (ret != -ENOMEM && ret != -EREMOTEIO) >>>           return -EINVAL; >>>       return ret; >>>   } >>> @@ -1244,7 +1289,7 @@ static int iommu_dma_map_sg(struct device *dev, >>> struct scatterlist *sg, >>>   static void iommu_dma_unmap_sg(struct device *dev, struct >>> scatterlist *sg, >>>           int nents, enum dma_data_direction dir, unsigned long attrs) >>>   { >>> -    dma_addr_t start, end; >>> +    dma_addr_t end, start = DMA_MAPPING_ERROR; >> >> There are several things I don't like about this logic, I'd rather have >> "end = 0" here... > > Ok, I think that should work. > >>>       struct scatterlist *tmp; >>>       int i; >>>   @@ -1260,14 +1305,22 @@ static void iommu_dma_unmap_sg(struct device >>> *dev, struct scatterlist *sg, >>>        * The scatterlist segments are mapped into a single >>>        * contiguous IOVA allocation, so this is incredibly easy. >>>        */ >> >> [ This comment rather stops being true :( ] > > Not exactly. Sure there are some segments in the SGL that have bus > addresses, but all the regular IOVAs still have a single contiguous > allocation and only require one call to __iommu_dma_unmap(). The only > trick issues is finding the first and last actual IOVA SG to get the range. "The scatterlist segments" means all of them, including any p2p ones which are demonstrably not mapped into anything. The extra logic required to skip non-mapped p2p segments goes beyond "incredibly easy". If there's one thing I *do* definitely understand, it's my own comments ;) Thanks, Robin. > >> >>> -    start = sg_dma_address(sg); >>> -    for_each_sg(sg_next(sg), tmp, nents - 1, i) { >> >> ...then generalise the first-element special case here into a dedicated >> "walk to the first non-p2p element" loop... > > Ok, I'll see what I can do for that. > > Logan