From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9910FEE57CF for ; Wed, 11 Sep 2024 20:57:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:CC:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=TaXM7S7gQWj86txDDKWL7MAi/O5PFPORnmDcqUPABfU=; b=VQfCZ6q6s1Mmt8JKNNi58y+/vG WIitF7E4Cau/0x3xWrISa99nSmML0MhK1AJRIHJO2kYQAL6KoSZkyTt7BvSbv/LlQtR2qOD+CkKVk L2AjKNqeqHzqah8LNg1nC1LO03BGe7q03OipJxVPPWDTTf08e1Fp1ESJNfkn8zV+CP1RAU9HnnbFS qbwmvQZDw1+abwTn3kG8dxP+qqbWQ1yS/jQ2R0gGIHGUxqfzuXFyu9jk53bZrVVJRgUlpLLEFqq0B RAunBwSOhlNNnQDqJTRPDSUEG9JpGmOm+391tWCe8YftetUQ455O+zau+ewOJyeYssSIt+QAhxQgo mZYTd9PA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1soUP9-0000000B0lx-14Qy; Wed, 11 Sep 2024 20:57:35 +0000 Received: from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1soULb-0000000B06b-2pK6 for linux-arm-kernel@bombadil.infradead.org; Wed, 11 Sep 2024 20:53:55 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:CC:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=TaXM7S7gQWj86txDDKWL7MAi/O5PFPORnmDcqUPABfU=; b=Lhmd5XrVdryvJmWb8J0c51Pt9x mU7OoZnx6Mw6NGFVqq2klA/YlsUJYWOPPCnjwU6il1IsRSosrYx986gwnxEg3S8bDPMPkuzxPss0Q ss++6TcyQaQGZkgeJHvHop4O3Vlh1KAZeNob/l8X5ZT1jOtJssVaSs6M8pxqTtFPF5yylw06XAk72 1IXcoH+RMS3XIK73BNSImt6zmO7O3LfPpHhS8UKaP9T/tY47V/N5pXTHGj45aOUr/kVAX/ftT1dO5 eL9o1EL3+x6I59DaC/Zorw2hT9euBO1xYMC46+iJboZO389Y5FMpHhCVa87oKAQGY65512DWMSMUe U8xI0iHA==; Received: from mail-dm6nam10on20619.outbound.protection.outlook.com ([2a01:111:f400:7e88::619] helo=NAM10-DM6-obe.outbound.protection.outlook.com) by desiato.infradead.org with esmtps (Exim 4.98 #2 (Red Hat Linux)) id 1soULX-00000000EPG-3Vyy for linux-arm-kernel@lists.infradead.org; Wed, 11 Sep 2024 20:53:54 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=CJwG/DSb98NRIDAkqRU/IdBvgQermmCtcJMrS2jE+P7hH5DOSXw0qOAHzRrsQQNGm0LKaAt2UjUQMvHs7TwrLhcuGsgSQPsTkOT4foM7k9MlP86N+fKxxWhvBS61FT2LNGh0raHy8RUe95GBhYjP4sLIX4um/h0fzjuNHsKOi0nHVBnsLP9oMQDM40FidnzIgC5t0jQVDPTQWRWuF9toUjxVgr6ws9kj9Yl2RtE6OpprDUAFPOvvVrC0URXnVsnhrkv5Ab/b7I8Vily2Kbc+QV/CDrit9QWiJtqH2eiNW849HDnP/yRnwfJz2F+SD0U+DAsTPi1niC0NcGTB4yZXaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TaXM7S7gQWj86txDDKWL7MAi/O5PFPORnmDcqUPABfU=; b=oWhP62IxkY39y+qT2tan0v+C1mBU+Ag7zXldqfmbI2vuZ6gDHg8PAzdY0BiGryyF/XiMGxI5bGaw/CROjqerSbjD8da3Gdy0oH4kYuIH9NnAXOv7oHJT+1ZdwGzeXNN1oLDEAFOaE7zzJSBW8+HckzVsUwWU2++bcxVJzXfG/SH3XJSwH+Aia0a8ONwqNIhJ7/lnPcW5UOdoO9MadlZPpeseXkJ5zyGrPiRbh0k0xg2NKSczh4BvlfEvUtxZXGN2L7ZhcjNkYM+bQVrFzJIn0nEs7Wjn/7rKa+elDGxyvEXw2nXoVd9B3JEPUXuz9bqJVZ7fuh85NJfEZoXvztZzfA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.160) smtp.rcpttodomain=intel.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TaXM7S7gQWj86txDDKWL7MAi/O5PFPORnmDcqUPABfU=; b=gJJp6SL6VJOFnNPJ8INnw8q4vho73OKB9YeqvKSzcxiZFYOavC4SHn4fc6YrQo2hTvF7VUisECf8HP+VmUpC4bsGKBsYntc7qEUYxtKNm9fZ1sxA+v5pnMWup3i4ppI6OTTOLRB7u64zxT/jekHy3jQRHy3JUNui0MYvI9+whuHjoY0d6+fLF8Fp7boGtZjjijZhX+nXfDaBvh3cQY/ZWe/iP2moHieFJclFYRwIWLZrj8HbEl+He5m1UNEWs6AN/XQA0qLjXCeGacbPeECgWV3oGdZiMfcwPriwkxEv0FJioSU1vkvuEY4QjBThCnLi1GnzorkzKj3cN5E3RzzgJA== Received: from SJ0PR03CA0119.namprd03.prod.outlook.com (2603:10b6:a03:333::34) by SA1PR12MB7038.namprd12.prod.outlook.com (2603:10b6:806:24d::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7939.17; Wed, 11 Sep 2024 20:53:42 +0000 Received: from SJ5PEPF00000205.namprd05.prod.outlook.com (2603:10b6:a03:333:cafe::8d) by SJ0PR03CA0119.outlook.office365.com (2603:10b6:a03:333::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7939.24 via Frontend Transport; Wed, 11 Sep 2024 20:53:42 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.160) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.160 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.160; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.160) by SJ5PEPF00000205.mail.protection.outlook.com (10.167.244.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.13 via Frontend Transport; Wed, 11 Sep 2024 20:53:42 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Wed, 11 Sep 2024 13:53:20 -0700 Received: from rnnvmail205.nvidia.com (10.129.68.10) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Wed, 11 Sep 2024 13:53:20 -0700 Received: from nvidia.com (10.127.8.9) by mail.nvidia.com (10.129.68.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4 via Frontend Transport; Wed, 11 Sep 2024 13:53:16 -0700 Date: Wed, 11 Sep 2024 13:53:16 -0700 From: Nicolin Chen To: "Tian, Kevin" CC: Jason Gunthorpe , "will@kernel.org" , "joro@8bytes.org" , "suravee.suthikulpanit@amd.com" , "robin.murphy@arm.com" , "dwmw2@infradead.org" , "baolu.lu@linux.intel.com" , "shuah@kernel.org" , "linux-kernel@vger.kernel.org" , "iommu@lists.linux.dev" , "linux-arm-kernel@lists.infradead.org" , "linux-kselftest@vger.kernel.org" , "eric.auger@redhat.com" , "jean-philippe@linaro.org" , "mdf@kernel.org" , "mshavit@google.com" , "shameerali.kolothum.thodi@huawei.com" , "smostafa@google.com" , "Liu, Yi L" Subject: Re: [PATCH v2 17/19] iommu/arm-smmu-v3: Add arm_smmu_viommu_cache_invalidate Message-ID: References: <4b61aba3bc6c1cce628d9db44d5b18ea567a8be1.1724776335.git.nicolinc@nvidia.com> <20240905162039.GT1358970@nvidia.com> <20240905182148.GA1358970@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: X-NV-OnPremToCloud: ExternallySecured X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF00000205:EE_|SA1PR12MB7038:EE_ X-MS-Office365-Filtering-Correlation-Id: 250959df-9181-47a2-bd65-08dcd2a3d1e7 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|82310400026|7416014|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?jWt/AvqR5xt4FBRNtFd1wD+Zo9gBy3ZvQwAgfK4U1SmgkpMfx5RCJlEvU826?= =?us-ascii?Q?ovmqGJY15HSUhVGg700NyAEOJ6dwB1mvLXLbpON/YneF/6U2sFFOPreIPb8o?= =?us-ascii?Q?090dFDFfmf6kVv95tZzz9WaRrGzWmHCAUwK+tWViZRNIc19ZCXlF6ix/xj5p?= =?us-ascii?Q?xAYGxMjYjP0TBddiqYB7fadGtZ9DHLbKiDrBWs2SY4TiIcvHtJG2qgN70tCE?= =?us-ascii?Q?H2f5NV9JOKT6haiUePYwiVnmvGl/hdNsHgcEcpHH2u6I5vSrlQfFClzf20d1?= =?us-ascii?Q?YnK78TH4XCpjoUde67BdsP4EP0rDMo1gOrJ7PnAVQJqc+/3pttJfbFlTWEVY?= =?us-ascii?Q?I7b/YPyY2CLBi6Vh0rBuY0CQwWhIf2Cs+0Ybv875PlRKS/PTs3rLunxBIgIa?= =?us-ascii?Q?Q4TiUgRtxOQ/GI9S9iAVMmjoTQDPjDH4GwlUG67Web9jHRLnx1+0emfAKPk6?= =?us-ascii?Q?oeKHUVZs2retUOuHHnTxF4pn7CGgGGci+rDbrNIDW4PZXvEV5i7hpdrvisA3?= =?us-ascii?Q?lTw3406ti1gtc/3lNT2nlk+uySiPEUyfr02o+R+JMZmcTMUtVG2c6whZ4230?= =?us-ascii?Q?imF2xDxJHup707TdXCigjqdWnSDWBFngN3jj+Eo3/Q6X+8iIWXe+AI64sHZq?= =?us-ascii?Q?rjt25t9TW+nf5PjWQRJY+ntlp15x7c9PQ5z1rEFtF54wVGmdYg70MIEHNJ0C?= =?us-ascii?Q?NJGAivNpzNCVOGRO1RhLam7ppmPtnR4w1ruLmOEPDkp0aq38m4gEJv8VkdkB?= =?us-ascii?Q?54W7Dp8Ai9YfLG2EnMAPU3WCmkq3mnZy/vvS9bZUXJ7MoDvDpf/XL8pSDVIA?= =?us-ascii?Q?SB4xQZYZp9DcBkcWhhsvgB1cjNqT+IJ5LFZjZArYEYfrt6bMdQZs/mCeMno3?= =?us-ascii?Q?0seEpITtBFlN+ZllIqXs+TJcbcYegavaXp7vd3ynquubnNSyAiSSD+8KQine?= =?us-ascii?Q?mxLkE9qSMzjGSYHbE4ClF4FdlQ5ZOQ8fxaASKAes9dv2FD+HEg55Qy+j1gNS?= =?us-ascii?Q?zokW8XTN1Wey/kOZo4cjNWWz/HbAAHUfgZq22MgNNoPiA/IuIMY8zwCUuA+F?= =?us-ascii?Q?zEpW/uFrdKYP0iXdK3aB9Jk/tToAdPbS/33QuCD7JZCs2940D02eczZMtmKo?= =?us-ascii?Q?zMwayWIrisdNXC+OG4YiFzOcldV+hdPKtQ2Mdbjm+5FWAOzNX1rqa0L/uyLK?= =?us-ascii?Q?4WCtLB2aJ5y79ZRWvlDZXyLlP1YNlhr270IG4MsrFLyZ1McvBNMDdRw2Wxm+?= =?us-ascii?Q?XLyiNSrwdvoPrQwCgJDL+VEbv7sUhQk+Bpt1d6M9qariausScUejjENkhrPb?= =?us-ascii?Q?eovULywuXdTIrzbeZy1BamRChs0SFZ4m1qo34qv3mt9Omd95K58SDKBX6uFC?= =?us-ascii?Q?Qw5EEWWg8nL87m/EbIrt5zQ8OIM91yZ5V5ie1ZZ9Q1LFGMzOPaxCX541TZ4w?= =?us-ascii?Q?mqc96ZVOd9Oob1o/mz4h5VfpRnX90OVE?= X-Forefront-Antispam-Report: CIP:216.228.117.160;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc6edge1.nvidia.com;CAT:NONE;SFS:(13230040)(1800799024)(376014)(82310400026)(7416014)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Sep 2024 20:53:42.2582 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 250959df-9181-47a2-bd65-08dcd2a3d1e7 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.117.160];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF00000205.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB7038 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240911_215352_201236_478D306A X-CRM114-Status: GOOD ( 19.98 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Wed, Sep 11, 2024 at 08:13:01AM +0000, Tian, Kevin wrote: > > > > Yes, many more patches, and don't try to do it now.. But we can copy > > > > the vmid from the s2 and place it in the viommu struct during > > > > allocation time. > > > > > > > > > > does it assume that a viommu object cannot span multiple physical > > > IOMMUs so there is only one vmid per viommu? > > > > I think so. One the reasons of introducing vIOMMU is to maintain > > the shareability across physical IOMMUs at the s2 HWPT_PAGING. > > > > I don't quite get it. e.g. for intel-iommu the S2 domain itself can > be shared across physical IOMMUs SMMU does the same, but needs a VMID per pSMMU to tag that S2 domain: vIOMMU0 (VMIDx of pSMMU0) -> shared S2 vIOMMU1 (VMIDy of pSMMU1) -> shared S2 Note: x and y might be different. > then what is the problem > preventing a vIOMMU object using that S2 to span multiple IOMMUs? Jason previously suggested the way of implementing multi-vIOMMU in a VMM to be one vIOMMU object representing a vIOMMU instance (of a physical IOMMU) in the VM. So, it'd be only one VMID per one vIOMMU object. Sharing one vIOMMU object on the other hand needs the vIOMMU to hold a list of VMIDs for all (or attached?) physical IOMMUs. This would change what a vIOMMU object represents. > Probably there is a good reason e.g. for simplification or better > aligned with hw accel stuff. But it's not explained clearly so far. I will try emphasizing that in the next version, likely in the rst file that I am patching for HWPT_PAGING/NESTED at this point. Thanks Nicolin