From: Baolu Lu <baolu.lu@linux.intel.com>
To: Jason Gunthorpe <jgg@nvidia.com>
Cc: baolu.lu@linux.intel.com, "Tian, Kevin" <kevin.tian@intel.com>,
"iommu@lists.linux.dev" <iommu@lists.linux.dev>,
"linux-kselftest@vger.kernel.org"
<linux-kselftest@vger.kernel.org>,
"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
Lixiao Yang <lixiao.yang@intel.com>,
Matthew Rosato <mjrosato@linux.ibm.com>,
Nicolin Chen <nicolinc@nvidia.com>,
"Liu, Yi L" <yi.l.liu@intel.com>
Subject: Re: [PATCH v7 03/19] iommufd: Replace the hwpt->devices list with iommufd_group
Date: Fri, 19 May 2023 10:03:57 +0800 [thread overview]
Message-ID: <d99e284d-31b1-6d04-cf14-d7b160ee3f44@linux.intel.com> (raw)
In-Reply-To: <ZGYT8RmGM+vwNzDa@nvidia.com>
On 2023/5/18 20:02, Jason Gunthorpe wrote:
> On Thu, May 18, 2023 at 03:05:23PM +0800, Baolu Lu wrote:
>
>>> It doesn't make any sense to store a struct like that in dev_iommu.
>>>
>>> The fault handler should come from the domain and we should be able to
>>> have a unique 'void *data' cookie linked to the (dev,PASID) to go
>>> along with the fault handler.
>>
>> If I get your point correctly, the iommu core should provide some places
>> for the iommufd to put a cookie for each pair of {device, pasid}, and
>> provide interfaces to manage it. For example,
>
> I'd say when you attach a PRI capable domain (eg to a PASID) then provide
> a 'void * data' during the attach.
>
>> If so, perhaps we need some special treatment for ARM as a user hwpt
>> actually presents the PASID table of the device and the guest setting
>> pasid table entry will not be propagated to host. Then, the @pasid in
>> above interfaces is meaningless.
>
> As above, when attaching to a RID you'd still pass in the *data
Yes! Merging these with hwpt attach/detach would be more logical.
>
>> 1) Move iommu faults uapi from uapi/linux/iommu.h to uapi/linux
>> /iommufd.h and remove the former.
>
> Please no, delete all the dead code from here and move whatever is
> still in use into include/linux/
>
> Then we can talk about what parts of it become uAPI and how best to
> manage that on a patch by patch basis.
Okay, let's rebuild it from the ground up.
>
>> 2) Add a device id in the iommu_fault structure.
>> struct iommu_fault {
>> __u32 type;
>> - __u32 padding;
>> + __u32 dev_id;
>
> Why? This is iommufd internal, the void * above should cover it.
This is actually part of 1). :-)
>
>> 3) Add the device pointer to the parameters of domain fault handler.
>
> That makes some sense
>
>> 4) Decouple I/O page fault handling from IOMMU_SVA in the iommu core and
>> the drivers.
>
> Definately, this SVA stuff need to be scrubbed out.
>
> SVA is only a special domain type that takes the page table top from a
> mmu_stuct and a shared fault handler in the core code to do handle_mm_fault()
>
> It should not be in drivers any more deeply than that. We still have a
> ways to go.
Agreed. In addition to fault handler, SVA usually needs to register a
callback to mm_notifier to keep the IO or device TLB cache consistent.
This part of code could also be consolidated to the core.
There are still things to do here, but the priority (from my point of
view) is to make the iopf handling framework in the iommu core more
generic, rather than just serving SVA.
Best regards,
baolu
next prev parent reply other threads:[~2023-05-19 2:04 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-05-15 14:00 [PATCH v7 00/19] Add iommufd physical device operations for replace and alloc hwpt Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 01/19] iommufd: Move isolated msi enforcement to iommufd_device_bind() Jason Gunthorpe
2023-05-16 4:07 ` Baolu Lu
2023-05-15 14:00 ` [PATCH v7 02/19] iommufd: Add iommufd_group Jason Gunthorpe
2023-05-16 2:43 ` Baolu Lu
2023-05-16 12:54 ` Jason Gunthorpe
2023-05-17 4:18 ` Baolu Lu
2023-05-15 14:00 ` [PATCH v7 03/19] iommufd: Replace the hwpt->devices list with iommufd_group Jason Gunthorpe
2023-05-16 3:00 ` Baolu Lu
2023-05-16 12:27 ` Jason Gunthorpe
2023-05-17 4:15 ` Baolu Lu
2023-05-17 6:33 ` Tian, Kevin
2023-05-17 12:43 ` Jason Gunthorpe
2023-05-18 7:05 ` Baolu Lu
2023-05-18 12:02 ` Jason Gunthorpe
2023-05-19 2:03 ` Baolu Lu [this message]
2023-05-19 7:51 ` Tian, Kevin
2023-05-19 11:42 ` Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 04/19] iommu: Export iommu_get_resv_regions() Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 05/19] iommufd: Keep track of each device's reserved regions instead of groups Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 06/19] iommufd: Use the iommufd_group to avoid duplicate MSI setup Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 07/19] iommufd: Make sw_msi_start a group global Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 08/19] iommufd: Move putting a hwpt to a helper function Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 09/19] iommufd: Add enforced_cache_coherency to iommufd_hw_pagetable_alloc() Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 10/19] iommufd: Allow a hwpt to be aborted after allocation Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 11/19] iommufd: Fix locking around hwpt allocation Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 12/19] iommufd: Reorganize iommufd_device_attach into iommufd_device_change_pt Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 13/19] iommu: Introduce a new iommu_group_replace_domain() API Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 14/19] iommufd: Add iommufd_device_replace() Jason Gunthorpe
2023-07-07 8:00 ` Liu, Yi L
2023-07-10 16:46 ` Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 15/19] iommufd: Make destroy_rwsem use a lock class per object type Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 16/19] iommufd/selftest: Test iommufd_device_replace() Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 17/19] iommufd: Add IOMMU_HWPT_ALLOC Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 18/19] iommufd/selftest: Return the real idev id from selftest mock_domain Jason Gunthorpe
2023-05-15 14:00 ` [PATCH v7 19/19] iommufd/selftest: Add a selftest for IOMMU_HWPT_ALLOC Jason Gunthorpe
2023-05-17 23:57 ` [PATCH v7 00/19] Add iommufd physical device operations for replace and alloc hwpt Nicolin Chen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d99e284d-31b1-6d04-cf14-d7b160ee3f44@linux.intel.com \
--to=baolu.lu@linux.intel.com \
--cc=iommu@lists.linux.dev \
--cc=jgg@nvidia.com \
--cc=kevin.tian@intel.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=lixiao.yang@intel.com \
--cc=mjrosato@linux.ibm.com \
--cc=nicolinc@nvidia.com \
--cc=yi.l.liu@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox