From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8827FC433ED for ; Tue, 11 May 2021 03:13:03 +0000 (UTC) Received: from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id C320D61584 for ; Tue, 11 May 2021 03:13:02 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org C320D61584 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=iommu-bounces@lists.linux-foundation.org Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id 6E5D240242; Tue, 11 May 2021 03:13:02 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LnKwPAfo4o7v; Tue, 11 May 2021 03:13:01 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [IPv6:2605:bc80:3010:104::8cd3:938]) by smtp2.osuosl.org (Postfix) with ESMTP id 63B3640247; Tue, 11 May 2021 03:13:01 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 26C71C000E; Tue, 11 May 2021 03:13:01 +0000 (UTC) Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 7F10AC0001 for ; Tue, 11 May 2021 03:12:59 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 5893A60C26 for ; Tue, 11 May 2021 03:12:59 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gfjEproOV-uW for ; Tue, 11 May 2021 03:12:58 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by smtp3.osuosl.org (Postfix) with ESMTPS id A7E47607CD for ; Tue, 11 May 2021 03:12:58 +0000 (UTC) IronPort-SDR: 3cyOWrTT0HCcwm+642iRtCpXrz8g6vMGHfg5UYT0AKWNaq2Wx3C1f9Mm1DqRScfdiaDNWTkveq Xw89WeDpbYBA== X-IronPort-AV: E=McAfee;i="6200,9189,9980"; a="220296997" X-IronPort-AV: E=Sophos;i="5.82,290,1613462400"; d="scan'208";a="220296997" Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 May 2021 20:12:57 -0700 IronPort-SDR: stKccw6CyTiwgY6Z4oynDLYVZ9iolDqy5GJI2whakNs9xp75faAiZ3QlNCdDdLhdiWlAPMdVj9 pZkA/PEv8pfQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.82,290,1613462400"; d="scan'208";a="621641217" Received: from allen-box.sh.intel.com (HELO [10.239.159.128]) ([10.239.159.128]) by fmsmga006.fm.intel.com with ESMTP; 10 May 2021 20:12:52 -0700 Subject: Re: [RFC PATCH v4 01/13] iommu: Introduce dirty log tracking framework To: Keqian Zhu , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, Robin Murphy , Will Deacon , Joerg Roedel , Jean-Philippe Brucker , Yi Sun , Tian Kevin References: <20210507102211.8836-1-zhukeqian1@huawei.com> <20210507102211.8836-2-zhukeqian1@huawei.com> <18ac787a-179e-71f7-728b-c43feda80a16@huawei.com> <55fda826-9ab6-a3a0-b17e-a4d4879f00bc@linux.intel.com> From: Lu Baolu Message-ID: Date: Tue, 11 May 2021 11:12:07 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US Cc: jiangkunkun@huawei.com, Cornelia Huck , Kirti Wankhede , lushenming@huawei.com, Alex Williamson , wanghaibin.wang@huawei.com X-BeenThere: iommu@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Development issues for Linux IOMMU support List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Errors-To: iommu-bounces@lists.linux-foundation.org Sender: "iommu" Hi Keqian, On 5/10/21 7:07 PM, Keqian Zhu wrote: >>>> I suppose this interface is to ask the vendor IOMMU driver to check >>>> whether each device/iommu in the domain supports dirty bit tracking. >>>> But what will happen if new devices with different tracking capability >>>> are added afterward? >>> Yep, this is considered in the vfio part. We will query again after attaching or >>> detaching devices from the domain. When the domain becomes capable, we enable >>> dirty log for it. When it becomes not capable, we disable dirty log for it. >> If that's the case, why not putting this logic in the iommu subsystem so >> that it doesn't need to be duplicate in different upper layers? >> >> For example, add something like dirty_page_trackable in the struct of >> iommu_domain and ask the vendor iommu driver to update it once any >> device is added/removed to/from the domain. It's also better to disallow > If we do it, the upper layer still needs to query the capability from domain and switch > dirty log tracking for it. Or do you mean the domain can switch dirty log tracking automatically > when its capability change? If so, I think we're lack of some flexibility. The upper layer > may have it's own policy, such as only enable dirty log tracking when all domains are capable, > and disable dirty log tracking when just one domain is not capable. I may not get you. Assume that dirty_page_trackable is an attribution of an iommu_domain. This attribution might be changed once a new device (with different capability) added or removed. So it should be updated every time a new device is attached or detached. This work could be done by the vendor iommu driver on the path of dev_attach/dev_detach callback. For upper layers, before starting page tracking, they check the dirty_page_trackable attribution of the domain and start it only it's capable. Once the page tracking is switched on the vendor iommu driver (or iommu core) should block further device attach/detach operations until page tracking is stopped. > >> any domain attach/detach once the dirty page tracking is on. > Yep, this can greatly simplify our code logic, but I don't know whether our maintainers > agree that, as they may think that IOMMU dirty logging should not change original domain > behaviors. The maintainer owns the last word, but we need to work out a generic and self-contained API set. Best regards, baolu _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu