Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp195514rwd; Wed, 31 May 2023 21:49:43 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4rLOedmYtulvImr4sOXQb4Xo6+BAOs8SdpEzYDt98jcBzsRJb1TPiSwc4knfRPggM7LYTK X-Received: by 2002:a25:7e87:0:b0:bab:af52:7482 with SMTP id z129-20020a257e87000000b00babaf527482mr8337899ybc.34.1685594982828; Wed, 31 May 2023 21:49:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685594982; cv=none; d=google.com; s=arc-20160816; b=ReP2RP2mpZBAeduTfbWiTBHXBZNpeqeczp11YpJRKZo0PbuSnCT7KgmeWwjkS06js4 /IxtVUcj/fEOyebKYZudtRER309VJ8ARGP1M7R7Ek907vPeeeSGVvDZXtLBUfLDOIN7n vqudjGRwcG+hE+6yn+L5IgHBe2KgiWHzeB+aTf/vrjFtORw05ztRel+qE7eMkkJDGPSw HbxE0Yn/RThx09jREqYAtj5BQ6drMiCkOLUx38gNxSr5N33nTFfjzSebLNmug5UJ47bL hKAti0jt83aOos1XiJefUKF1oKkU08VEeeSj6ky8m2jDD0XVnV1odQr0QeGEMGDxVk0Q d5+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=YPRIvdil3baqCiTl0ymlBq2OOMKp5zq1zut3ryKX5m0=; b=IgBe9d42mkg5IEmSFSlc5+mQ1cvLBNRbJ56Fr9EzFc9Dkay/UEYPeFp3cRrbnFQvkj SpGbXT49ShOzrQC/bnsLr0GeattRVZa+UsCTidFDd1iXMB0ssWj+cFVmoEQnaJ/tfF+s MwRF2azeBRrp+pXDi/pfKF0bZNltFsKPgVkfk3fbqiSlxUr7LBikt+1sfvKwQQapTDlY wxY9rDgYSGXUpp5Fu1fPFLpD7SFmIWpwqLyGT9eHkTZHpoBZdMox40Bh/HtyZGSMoSXh D0MA2DjNQ0iMgO8esXhKILiUu4FvV/yuCSOmjvlI1O+VDo4s7ZDooCv5zPS9emphvwFD St3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=nmMO07Kb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j13-20020a170902758d00b0019d038765f6si2034006pll.449.2023.05.31.21.49.30; Wed, 31 May 2023 21:49:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=nmMO07Kb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230399AbjFAE3M (ORCPT + 99 others); Thu, 1 Jun 2023 00:29:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36690 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230410AbjFAE3K (ORCPT ); Thu, 1 Jun 2023 00:29:10 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BD413A3; Wed, 31 May 2023 21:29:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1685593748; x=1717129748; h=date:from:to:cc:subject:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=qG0Umcj9VDUl7x+PwQ4etmpLHYQ/oy15Ct2LJzLgUxw=; b=nmMO07Kbb02PC1HGfRNI8QTZzb5c/q51jKDcq2COxEz2WFCWzLfbz2iK OyLc+y/Vh2fTpzpe8KhEmD32r0FWJHm9+kY2zlocSHK6AINv9mH9M+x2R awSvpDH8kAbC9JUkV4zjoB/8K0I7Oo0W7nRPIGM+V3+4tmMMhhj3lZWI/ rhoMoGkCgSiqSJM/ldVtrc6onfCXUQ44Mbk21RaXsm+OSpplQxNrhtyU+ mZiT0vtZ12KZ/iFieCI5fA07osDxvKtqCoS5EvFlL592Sq0wTQ/Cvm1Oo 0flA6T3wJqywCuS2MrLXq7Pxy4kavAxcM3ni5KDg9JLaT0csDOodXoKTi w==; X-IronPort-AV: E=McAfee;i="6600,9927,10727"; a="421225083" X-IronPort-AV: E=Sophos;i="6.00,209,1681196400"; d="scan'208";a="421225083" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 May 2023 21:29:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10727"; a="657605968" X-IronPort-AV: E=Sophos;i="6.00,209,1681196400"; d="scan'208";a="657605968" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.24.100.114]) by orsmga003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 May 2023 21:29:06 -0700 Date: Wed, 31 May 2023 21:33:42 -0700 From: Jacob Pan To: LKML , iommu@lists.linux.dev, Jason Gunthorpe , "Lu Baolu" , Joerg Roedel , "Robin Murphy" , Jean-Philippe Brucker , dmaengine@vger.kernel.org, vkoul@kernel.org Cc: "Will Deacon" , David Woodhouse , Raj Ashok , "Tian, Kevin" , Yi Liu , "Yu, Fenghua" , Dave Jiang , Tony Luck , "Zanussi, Tom" , narayan.ranganathan@intel.com, jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v7 0/4] Re-enable IDXD kernel workqueue under DMA API Message-ID: <20230531213342.1a3f1508@jacob-builder> In-Reply-To: <20230523173451.2932113-1-jacob.jun.pan@linux.intel.com> References: <20230523173451.2932113-1-jacob.jun.pan@linux.intel.com> Organization: OTC X-Mailer: Claws Mail 3.17.5 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jason, Do you have any comments on this set? this is a follow-up of the IOASID removal series. Thanks a lot for your time. Jacob On Tue, 23 May 2023 10:34:47 -0700, Jacob Pan wrote: > Hi Joerg and all, > > IDXD kernel work queues were disabled due to the flawed use of kernel VA > and SVA API. > Link: > https://lore.kernel.org/linux-iommu/20210511194726.GP1002214@nvidia.com/ > > The solution is to enable it under DMA API where IDXD shared workqueue > users can use ENQCMDS to submit work on buffers mapped by DMA API. > > This patchset adds support for attaching PASID to the device's default > domain and the ability to allocate global PASIDs from IOMMU APIs. IDXD > driver can then re-enable the kernel work queues and use them under DMA > API. > > This depends on the IOASID removal series. (merged) > https://lore.kernel.org/all/ZCaUBJvUMsJyD7EW@8bytes.org/ > > > Thanks, > > Jacob > > --- > Changelog: > v7: > - renamed IOMMU_DEF_RID_PASID to be IOMMU_NO_PASID to be more > generic (Jean) > - simplify range checking for sva PASID (Baolu) > v6: > - use a simplified version of vt-d driver change for > set_device_pasid from Baolu. > - check and rename global PASID allocation base > v5: > - exclude two patches related to supervisor mode, taken by VT-d > maintainer Baolu. > - move PASID range check into allocation API so that device > drivers only need to pass in struct device*. (Kevin) > - factor out helper functions in device-domain attach (Baolu) > - make explicit use of RID_PASID across architectures > v4: > - move dummy functions outside ifdef CONFIG_IOMMU_SVA (Baolu) > - dropped domain type check while disabling idxd system PASID > (Baolu) > > v3: > - moved global PASID allocation API from SVA to IOMMU (Kevin) > - remove #ifdef around global PASID reservation during boot > (Baolu) > - remove restriction on PASID 0 allocation (Baolu) > - fix a bug in sysfs domain change when attaching devices > - clear idxd user interrupt enable bit after disabling device( > Fenghua) v2: > - refactored device PASID attach domain ops based on Baolu's > early patch > - addressed TLB flush gap > - explicitly reserve RID_PASID from SVA PASID number space > - get dma domain directly, avoid checking domain types > > > > Jacob Pan (3): > iommu: Generalize PASID 0 for normal DMA w/o PASID > iommu: Move global PASID allocation from SVA to core > dmaengine/idxd: Re-enable kernel workqueue under DMA API > > Lu Baolu (1): > iommu/vt-d: Add set_dev_pasid callback for dma domain > > drivers/dma/idxd/device.c | 30 +--- > drivers/dma/idxd/dma.c | 5 +- > drivers/dma/idxd/init.c | 60 ++++++- > drivers/dma/idxd/sysfs.c | 7 - > .../iommu/arm/arm-smmu-v3/arm-smmu-v3-sva.c | 2 +- > drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 10 +- > drivers/iommu/intel/iommu.c | 159 +++++++++++++++--- > drivers/iommu/intel/iommu.h | 7 + > drivers/iommu/intel/pasid.c | 2 +- > drivers/iommu/intel/pasid.h | 1 - > drivers/iommu/iommu-sva.c | 28 ++- > drivers/iommu/iommu.c | 24 +++ > include/linux/iommu.h | 11 ++ > 13 files changed, 261 insertions(+), 85 deletions(-) > Thanks, Jacob