Linux Kernel Selftest development
 help / color / mirror / Atom feed
From: Baolu Lu <baolu.lu@linux.intel.com>
To: Jason Gunthorpe <jgg@nvidia.com>
Cc: baolu.lu@linux.intel.com, iommu@lists.linux.dev,
	Kevin Tian <kevin.tian@intel.com>,
	linux-kselftest@vger.kernel.org, kvm@vger.kernel.org,
	Nicolin Chen <nicolinc@nvidia.com>, Yi Liu <yi.l.liu@intel.com>
Subject: Re: [PATCH v2 05/17] iommufd: Keep track of each device's reserved regions instead of groups
Date: Thu, 9 Mar 2023 09:43:13 +0800	[thread overview]
Message-ID: <a2a198ec-2a11-28f5-db2d-ca8c7ec76cbe@linux.intel.com> (raw)
In-Reply-To: <ZAijolW3I1BOSjpn@nvidia.com>

On 3/8/23 11:02 PM, Jason Gunthorpe wrote:
> On Wed, Mar 08, 2023 at 08:32:03PM +0800, Baolu Lu wrote:
>>> diff --git a/drivers/iommu/iommufd/iommufd_private.h b/drivers/iommu/iommufd/iommufd_private.h
>>> index 2ff192777f27d3..22863759c3bfb0 100644
>>> --- a/drivers/iommu/iommufd/iommufd_private.h
>>> +++ b/drivers/iommu/iommufd/iommufd_private.h
>>> @@ -76,10 +76,9 @@ int iopt_table_add_domain(struct io_pagetable *iopt,
>>>    			  struct iommu_domain *domain);
>>>    void iopt_table_remove_domain(struct io_pagetable *iopt,
>>>    			      struct iommu_domain *domain);
>>> -int iopt_table_enforce_group_resv_regions(struct io_pagetable *iopt,
>>> -					  struct device *device,
>>> -					  struct iommu_group *group,
>>> -					  phys_addr_t *sw_msi_start);
>>> +int iopt_table_enforce_dev_resv_regions(struct io_pagetable *iopt,
>>> +					struct device *dev,
>>> +					phys_addr_t *sw_msi_start);
>>>    int iopt_set_allow_iova(struct io_pagetable *iopt,
>>>    			struct rb_root_cached *allowed_iova);
>>>    int iopt_reserve_iova(struct io_pagetable *iopt, unsigned long start,
>>
>> Perhaps a silly question. The reserved regions are enforced in IOVA when
>> a device is added to the igroup's device list. Should it be released
>> after the device is removed from the list?
> 
> Yes, it is, iommufd_hw_pagetable_detach() does it right after the
> list_del()
> 
>> This may not be appropriate because the devices may share some common
>> reserved regions, such as the IOMMU_RESV_MSI.
> 
> Common reserved regions are duplicated for every device just as they
> were duplicated for every group.
> 
> The duplicates are keyed with an owner that is equal to the 'struct
> device *' so we only remove the IOVA specific to the struct device.
> 
> The interval tree effectively unions the duplicated and overlapping
> IOVA regions during lookup.
> 
> It is done this way to avoid memory allocation on destruction
> paths. We never have to chop up merged IOVA regions or something to
> remove a device.

Ah! Yes. This has been considered. I should read further into
iopt_reserve_iova() and iopt_remove_reserved_iova(). Thanks for the
explanation.

Best regards,
baolu

  reply	other threads:[~2023-03-09  1:44 UTC|newest]

Thread overview: 49+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-08  0:35 [PATCH v2 00/17] Add iommufd physical device operations for replace and alloc hwpt Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 01/17] iommufd: Move isolated msi enforcement to iommufd_device_bind() Jason Gunthorpe
2023-03-08  2:55   ` Baolu Lu
2023-03-09 12:53     ` Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 02/17] iommufd: Add iommufd_group Jason Gunthorpe
2023-03-08  3:18   ` Baolu Lu
2023-03-09 15:51     ` Jason Gunthorpe
2023-03-10 10:30   ` Tian, Kevin
2023-03-08  0:35 ` [PATCH v2 03/17] iommufd: Replace the hwpt->devices list with iommufd_group Jason Gunthorpe
2023-03-08 11:56   ` Baolu Lu
2023-03-10 10:36   ` Tian, Kevin
2023-03-10 14:16     ` Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 04/17] iommu: Export iommu_get_resv_regions() Jason Gunthorpe
2023-03-08 12:06   ` Baolu Lu
2023-03-08 14:54     ` Jason Gunthorpe
2023-03-10 10:40   ` Tian, Kevin
2023-03-08  0:35 ` [PATCH v2 05/17] iommufd: Keep track of each device's reserved regions instead of groups Jason Gunthorpe
2023-03-08 12:32   ` Baolu Lu
2023-03-08 15:02     ` Jason Gunthorpe
2023-03-09  1:43       ` Baolu Lu [this message]
2023-03-10 10:42   ` Tian, Kevin
2023-03-08  0:35 ` [PATCH v2 06/17] iommufd: Use the iommufd_group to avoid duplicate MSI setup Jason Gunthorpe
2023-03-10 10:42   ` Tian, Kevin
2023-03-08  0:35 ` [PATCH v2 07/17] iommufd: Make sw_msi_start a group global Jason Gunthorpe
2023-03-10 10:45   ` Tian, Kevin
2023-03-08  0:35 ` [PATCH v2 08/17] iommufd: Move putting a hwpt to a helper function Jason Gunthorpe
2023-03-08 12:42   ` Baolu Lu
2023-03-10 10:45   ` Tian, Kevin
2023-03-08  0:35 ` [PATCH v2 09/17] iommufd: Add enforced_cache_coherency to iommufd_hw_pagetable_alloc() Jason Gunthorpe
2023-03-08 13:04   ` Baolu Lu
2023-03-08 15:06     ` Jason Gunthorpe
2023-03-09  2:03       ` Baolu Lu
2023-03-09  2:05   ` Baolu Lu
2023-03-08  0:35 ` [PATCH v2 10/17] iommufd: Reorganize iommufd_device_attach into iommufd_device_change_pt Jason Gunthorpe
2023-03-08 13:46   ` Baolu Lu
2023-03-10 11:26   ` Tian, Kevin
2023-03-10 15:01     ` Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 11/17] iommu: Introduce a new iommu_group_replace_domain() API Jason Gunthorpe
2023-03-08 13:48   ` Baolu Lu
2023-03-08  0:35 ` [PATCH v2 12/17] iommufd: Add iommufd_device_replace() Jason Gunthorpe
2023-03-09  1:14   ` Baolu Lu
2023-03-10 11:48   ` Tian, Kevin
2023-03-10 15:04     ` Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 13/17] iommufd: Make destroy_rwsem use a lock class per object type Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 14/17] iommufd/selftest: Test iommufd_device_replace() Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 15/17] iommufd: Add IOMMU_HWPT_ALLOC Jason Gunthorpe
2023-03-09  1:21   ` Baolu Lu
2023-03-08  0:35 ` [PATCH v2 16/17] iommufd/selftest: Return the real idev id from selftest mock_domain Jason Gunthorpe
2023-03-08  0:35 ` [PATCH v2 17/17] iommufd/selftest: Add a selftest for IOMMU_HWPT_ALLOC Jason Gunthorpe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=a2a198ec-2a11-28f5-db2d-ca8c7ec76cbe@linux.intel.com \
    --to=baolu.lu@linux.intel.com \
    --cc=iommu@lists.linux.dev \
    --cc=jgg@nvidia.com \
    --cc=kevin.tian@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kselftest@vger.kernel.org \
    --cc=nicolinc@nvidia.com \
    --cc=yi.l.liu@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox