Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp65122rwr; Thu, 4 May 2023 14:59:42 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7OhYfqrbPU7kVREfCiDb49Azx7eJpq0xM/kgdcShNYCmHizbOevdKwwezQJu44+cCasIJv X-Received: by 2002:a05:6a21:6da5:b0:ed:1d7a:3339 with SMTP id wl37-20020a056a216da500b000ed1d7a3339mr4570542pzb.57.1683237581781; Thu, 04 May 2023 14:59:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683237581; cv=none; d=google.com; s=arc-20160816; b=l8rJRBc6YmR8lLCSKu3aL3C838hjVHLB7VpkFlYeqrXAhCEat2n89AIClHlitqVGJX 0BWG1QjAs5G/q+r0KH30rvvlhphwrJNxaO8KzwUr2tpE6mea8WkWjurDKu15GXB8WnTR NxS2LvATRz/yg/Ej1UICIrXI2ooHHft0VWtPFKpZ7wZl4Jl2l0D59mN3swMfpJ149m1P e3p64nAkqlvuIIVqF6EcJEXABuczfHiV/w+L4SZThhi11JW913TbqVvToEM4y53/kh5J WPfWBdM1J/MfnKe8lUvryarl5MC+5n8gT45bJowIF3Q1YYXNEmVr2Q3+W1Zqlgl0F7kV 0sew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=c3x/dsQq2afQ/LOo2eUumOMKDvBsg17Lr2ZsOwgFGmA=; b=uCEaKZ1a95IcQBfl1J2yks+fH6bJyHX4Y+LtTGF/evcPbNFgh8i6GEvhpC0P4Be2Qv wuc5VOrYql3i/NP5nkq5gOXtbvUQSYFpbx9vudwkgK2M4zO3cyBimQ9R/sePTQKqm4me jrCI00iQlUmgI0PVequPVkQ3ASnZtdlW+2wRZRcOP1p560c8BoxD+dvnxi2lFjHed29f i/S/LhJ6Wmt5rocncmCFZV7Kt9QiFf1bdDZBLgOGygiIggQnBbY4cRI5r4aqMEw5mFef +NdRknwCI15aIbOa3HYPhKXDutWHpfXUtkUe+39gEdtTUZ7yONSzcnJvcsjMyavQ34Mj hafg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GWSw+Q76; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i9-20020a633c49000000b0050c06b2361dsi295880pgn.72.2023.05.04.14.59.15; Thu, 04 May 2023 14:59:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GWSw+Q76; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230057AbjEDVtJ (ORCPT + 99 others); Thu, 4 May 2023 17:49:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44222 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230021AbjEDVtI (ORCPT ); Thu, 4 May 2023 17:49:08 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CF853132B0; Thu, 4 May 2023 14:49:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1683236946; x=1714772946; h=date:from:to:cc:subject:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=OkJcPMLVT1UXEftiFVOxxBid+OvrRMbUZ16uZL2VXuM=; b=GWSw+Q767Jab6sSaW/44CnUneLTWStQvHPghwPaWXWWZwgsrCq1FZxiy JlB5zreNdU+78Ej3ZQliqXn3RRAEZvDGwZrzROj0/AgAM5SzOkoVXx1aN wqqe0DTZ75t85oDtsFXGzm70+oIYkQaxTPMJBaTm8xz2OvG3Csu8MZJmy 7zvYK3gZ23VApcgfZrHQCoATPXFEcVXwCIIL+AhxE/pF7A5Txw5MDgYaZ ACj7GtWsZU6oloKv3JYZIWlDWtUmI6hbcnhejor+bY2DPlzG2b8SeXEK/ jwZXzut3mBrDdM6srAcOjK0JcooYzLDJRpnlCtFPvU6phavi9TX2CKsdu A==; X-IronPort-AV: E=McAfee;i="6600,9927,10700"; a="328688098" X-IronPort-AV: E=Sophos;i="5.99,250,1677571200"; d="scan'208";a="328688098" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 May 2023 14:49:06 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10700"; a="841384356" X-IronPort-AV: E=Sophos;i="5.99,250,1677571200"; d="scan'208";a="841384356" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.24.100.114]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 May 2023 14:49:06 -0700 Date: Thu, 4 May 2023 14:53:28 -0700 From: Jacob Pan To: Baolu Lu Cc: LKML , iommu@lists.linux.dev, Robin Murphy , Jason Gunthorpe , Joerg Roedel , dmaengine@vger.kernel.org, vkoul@kernel.org, Will Deacon , David Woodhouse , Raj Ashok , "Tian, Kevin" , Yi Liu , "Yu, Fenghua" , Dave Jiang , Tony Luck , "Zanussi, Tom" , narayan.ranganathan@intel.com, jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v5 5/7] iommu/vt-d: Prepare PASID attachment beyond RID_PASID Message-ID: <20230504145328.6b43cffb@jacob-builder> In-Reply-To: <75bdf30c-d38f-ef95-7618-91ebf35ea297@linux.intel.com> References: <20230427174937.471668-1-jacob.jun.pan@linux.intel.com> <20230427174937.471668-6-jacob.jun.pan@linux.intel.com> <75bdf30c-d38f-ef95-7618-91ebf35ea297@linux.intel.com> Organization: OTC X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_PASS, SPF_NONE,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Baolu, On Wed, 3 May 2023 14:49:36 +0800, Baolu Lu wrote: > On 4/28/23 1:49 AM, Jacob Pan wrote: > > @@ -2433,12 +2477,17 @@ static int > > dmar_domain_attach_device_pasid(struct dmar_domain *domain, struct > > intel_iommu *iommu, struct device *dev, ioasid_t pasid) > > { > > + struct device_pasid_info *dev_pasid; > > + unsigned long flags; > > int ret; > > > > - /* PASID table is mandatory for a PCI device in scalable mode. > > */ if (!sm_supported(iommu) && dev_is_real_dma_subdevice(dev)) > > return -EOPNOTSUPP; > > > > + dev_pasid = kzalloc(sizeof(*dev_pasid), GFP_KERNEL); > > + if (!dev_pasid) > > + return -ENOMEM; > > + > > if (hw_pass_through && domain_type_is_si(domain)) > > ret = intel_pasid_setup_pass_through(iommu, domain, > > dev, pasid); else if (domain->use_first_level) > > @@ -2446,6 +2495,17 @@ static int > > dmar_domain_attach_device_pasid(struct dmar_domain *domain, else > > ret = intel_pasid_setup_second_level(iommu, domain, > > dev, pasid); > > + if (ret) { > > + kfree(dev_pasid); > > + return ret; > > + } > > + > > + dev_pasid->pasid = pasid; > > + dev_pasid->dev = dev; > > + spin_lock_irqsave(&domain->lock, flags); > > + list_add(&dev_pasid->link_domain, &domain->dev_pasids); > > + spin_unlock_irqrestore(&domain->lock, flags); > > + > > return 0; > > } > > > > @@ -2467,16 +2527,13 @@ static int dmar_domain_attach_device(struct > > dmar_domain *domain, return ret; > > info->domain = domain; > > spin_lock_irqsave(&domain->lock, flags); > > + if (info->dev_attached) { > > + spin_unlock_irqrestore(&domain->lock, flags); > > + return 0; > > + } > > list_add(&info->link, &domain->devices); > > spin_unlock_irqrestore(&domain->lock, flags); > > > > - ret = dmar_domain_attach_device_pasid(domain, iommu, dev, > > - IOMMU_DEF_RID_PASID); > > - if (ret) { > > - dev_err(dev, "Setup RID2PASID failed\n"); > > - device_block_translation(dev); > > - } > > - > > ret = domain_context_mapping(domain, dev); > > if (ret) { > > dev_err(dev, "Domain context map failed\n"); > > @@ -2485,8 +2542,9 @@ static int dmar_domain_attach_device(struct > > dmar_domain *domain, } > > > > iommu_enable_pci_caps(info); > > + info->dev_attached = 1; > > > > - return 0; > > + return ret; > > } > > > > static bool device_has_rmrr(struct device *dev) > > @@ -4044,6 +4102,7 @@ static void device_block_translation(struct > > device *dev) > > spin_lock_irqsave(&info->domain->lock, flags); > > list_del(&info->link); > > + info->dev_attached = 0; > > spin_unlock_irqrestore(&info->domain->lock, flags); > > > > domain_detach_iommu(info->domain, iommu); > > @@ -4175,8 +4234,15 @@ static int intel_iommu_attach_device(struct > > iommu_domain *domain, struct device *dev) > > { > > struct device_domain_info *info = dev_iommu_priv_get(dev); > > + struct dmar_domain *dmar_domain = to_dmar_domain(domain); > > + struct intel_iommu *iommu; > > + u8 bus, devfn; > > int ret; > > > > + iommu = device_to_iommu(dev, &bus, &devfn); > > + if (!iommu) > > + return -ENODEV; > > + > > if (domain->type == IOMMU_DOMAIN_UNMANAGED && > > device_is_rmrr_locked(dev)) { > > dev_warn(dev, "Device is ineligible for IOMMU domain > > attach due to platform RMRR requirement. Contact your platform > > vendor.\n"); @@ -4190,7 +4256,23 @@ static int > > intel_iommu_attach_device(struct iommu_domain *domain, if (ret) return > > ret; > > - return dmar_domain_attach_device(to_dmar_domain(domain), dev); > > + ret = dmar_domain_attach_device(to_dmar_domain(domain), dev); > > + if (ret) { > > + dev_err(dev, "Attach device failed\n"); > > + return ret; > > + } > > + > > + /* PASID table is mandatory for a PCI device in scalable mode. > > */ > > + if (sm_supported(iommu) && !dev_is_real_dma_subdevice(dev)) { > > + /* Setup the PASID entry for requests without PASID: */ > > + ret = dmar_domain_attach_device_pasid(dmar_domain, > > iommu, dev, > > + > > IOMMU_DEF_RID_PASID); > > + if (ret) { > > + dev_err(dev, "Setup RID2PASID failed\n"); > > + device_block_translation(dev); > > + } > > + } > > + return ret; > > } > > > > static int intel_iommu_map(struct iommu_domain *domain, > > I am not following why do you need to change the attach_device path in > this patch. Perhaps you want to make sure that context entry for the > device is configured before attach_device_pasid? This is just refactoring, with this patch attach_device is broken down into 1. prepare_domain_attach_device() 2. dmar_domain_attach_device() 3. dmar_domain_attach_device_pasid() the change is due to factoring out dmar_domain_attach_device_pasid(). device context set up in #2, already ensured before PASID attachment. perhaps I miss your point? Thanks, Jacob