Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp996629rwi; Thu, 27 Oct 2022 09:53:58 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7nPeWlXeM/XaCmbi3SyJZdKk2h89EzuLcL9RljUO6FokbhDLXUtm6Wmorm3et/2st04a+l X-Received: by 2002:a17:907:7ba8:b0:78e:1b38:6b1b with SMTP id ne40-20020a1709077ba800b0078e1b386b1bmr42035491ejc.626.1666889637895; Thu, 27 Oct 2022 09:53:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666889637; cv=none; d=google.com; s=arc-20160816; b=QPvDlmk/kvvQ88cwRxZ4HQ8wfwplxrfU2W74G6CBr/UBpHPEmIdbn+r1hBbqT25F8A N16SgBXznaT3fqvI4F0saHOCwRNhHLK//kDA3nv/wSFpuo6NnROied4w1AFBYjD8Iqd/ xqfE0CfCAgCTf8LPL6sPLGHBpugA72wzwaxLJgjJQDTRJp1/Yt94DQdxjDICCuo/Z/b8 LQKG+D/IjTnqRqmXvPzVnlRCdvS3+FCurffHDH35Au2YOha7KIRYiTz37IrYhP/Qtm0k 9UzoR+75Zli5EqjHHApGY351j7AgyobRsN/a3pKqOjaWqgdHL0NsVex0QZdC/aEhUc/5 TS/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3dws5278xfOz0tuQBXMylmzota9MblVhmPDKk/4eevY=; b=S0uydB4GxLZTqN2ISZ+Zo0nQj54JMBWTRRHtaWM4DFb2jhxwGyVWj4q9uiUTPunt6+ JsGRNbO9Y2qMEHjO2NxCikHqJLmpBGjxjZrEaJYZvK/V3SNzoRX8pZeJMlYEjpE9RUhW ktNIDkXxAn+CSS+6WJZWxN85HAmgi0+H27fWF0N2Z4I6u38M1EYnBur1k4yP2JBYYD0s dVxC1+QfYiJrU+sdrMJwR1HW/N3IQu1TPoJQRtKLZVE5+hFAXmlCJzUwS5bBjGKBqx6b CifQ9yIRn+lJxKZog4wkItMX5+jeg605igoaiJo9QVQAkD/b5I3UwBTnkV2z8s8hMZCg ZQjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=vB9jh2iM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r5-20020a50c005000000b0045743696acbsi2087146edb.139.2022.10.27.09.53.32; Thu, 27 Oct 2022 09:53:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=vB9jh2iM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236120AbiJ0Qqp (ORCPT + 99 others); Thu, 27 Oct 2022 12:46:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47644 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234219AbiJ0Qqn (ORCPT ); Thu, 27 Oct 2022 12:46:43 -0400 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CA48389AE8; Thu, 27 Oct 2022 09:46:40 -0700 (PDT) Received: from quatroqueijos.cascardo.eti.br (1.general.cascardo.us.vpn [10.172.70.58]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id B9873431D9; Thu, 27 Oct 2022 16:46:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1666889198; bh=3dws5278xfOz0tuQBXMylmzota9MblVhmPDKk/4eevY=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:In-Reply-To; b=vB9jh2iMmUZpIG5wJ2UWh8XTs+L53CMfKSmoMK1qgjYTlNnUKN5f0v2gOdzGBd78Q A+UQxNRXV51g5pdbYX761i5hSCW2ORCS6gv01ydbPPfdd9SWg7iXj7zkAIBD0Ovlup qwhigHvT+53w6Mtu+7AZ1i+r5uwsbPILFmD1V49NY4esyS4Ng9uAEs6WTVqkmxQZO7 DLETm1aSpre3EnO4Qhttdgutys7egxfNFzY1SymYx1YdCJjnqWobjx9iwjimFYejDW om090fvXPbkUtbN4c7LDD5dlHaeN1KZhm8ClXLBZ+HjXcxOGJ9Y/y9XmtH9YCM1z77 dcw3JuHEdea2g== Date: Thu, 27 Oct 2022 13:46:32 -0300 From: Thadeu Lima de Souza Cascardo To: Alexey Kardashevskiy Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, iommu@lists.linux.dev, Ashish Kalra , Pankaj Gupta , Tom Lendacky , Robin Murphy , Marek Szyprowski , Christoph Hellwig Subject: Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed Message-ID: References: <20221027052607.260234-1-aik@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221027052607.260234-1-aik@amd.com> X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 27, 2022 at 04:26:07PM +1100, Alexey Kardashevskiy wrote: > At the moment the AMD encrypted platform reserves 6% of RAM for SWIOTLB > or 1GB, whichever is less. However it is possible that there is no block > big enough in the low memory which make SWIOTLB allocation fail and > the kernel continues without DMA. In such case a VM hangs on DMA. > > This divides the size in half and tries again reusing the existing > remapping logic. > > This updates default_nslabs on successful allocation which looks like > an oversight as not doing so should have broken callers of > swiotlb_size_or_default(). > > Signed-off-by: Alexey Kardashevskiy Should this have a Fixes: e998879d4fb7 ("x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests") ? Cascardo. > -- > > I hit the problem with > QEMU's "-m 16819M" where SWIOTLB was adjusted to > 0x7e200 == 1,058,013,184 (slightly less than 1GB) while > 0x7e180 still worked. > > With guest errors enabled, there are many unassigned accesses from > virtio. > > --- > kernel/dma/swiotlb.c | 20 +++++++++++++------- > 1 file changed, 13 insertions(+), 7 deletions(-) > > diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c > index 339a990554e7..d28c294320fd 100644 > --- a/kernel/dma/swiotlb.c > +++ b/kernel/dma/swiotlb.c > @@ -338,21 +338,27 @@ void __init swiotlb_init_remap(bool addressing_limit, unsigned int flags, > else > tlb = memblock_alloc_low(bytes, PAGE_SIZE); > if (!tlb) { > - pr_warn("%s: failed to allocate tlb structure\n", __func__); > - return; > - } > - > - if (remap && remap(tlb, nslabs) < 0) { > + pr_warn("%s: Failed to allocate %zu bytes tlb structure\n", > + __func__, bytes); > + } else if (remap && remap(tlb, nslabs) < 0) { > memblock_free(tlb, PAGE_ALIGN(bytes)); > + tlb = NULL; > + pr_warn("%s: Failed to remap %zu bytes\n", __func__, bytes); > + } > > + if (!tlb) { > nslabs = ALIGN(nslabs >> 1, IO_TLB_SEGSIZE); > if (nslabs >= IO_TLB_MIN_SLABS) > goto retry; > - > - pr_warn("%s: Failed to remap %zu bytes\n", __func__, bytes); > return; > } > > + if (default_nslabs != nslabs) { > + pr_info("SWIOTLB bounce buffer size adjusted %lu -> %lu slabs", > + default_nslabs, nslabs); > + default_nslabs = nslabs; > + } > + > alloc_size = PAGE_ALIGN(array_size(sizeof(*mem->slots), nslabs)); > mem->slots = memblock_alloc(alloc_size, PAGE_SIZE); > if (!mem->slots) { > -- > 2.37.3 >