Received: by 10.192.165.156 with SMTP id m28csp1132095imm; Mon, 16 Apr 2018 14:48:21 -0700 (PDT) X-Google-Smtp-Source: AIpwx49w18nFNjUtxB2W4zKAEbHhwaQrsPbYC+ezjNBfovScmVGcYTqzAbwR4M+/gfwIep8bHke1 X-Received: by 10.98.68.135 with SMTP id m7mr23034183pfi.57.1523915301869; Mon, 16 Apr 2018 14:48:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523915301; cv=none; d=google.com; s=arc-20160816; b=qt2HWqDpZdOrYcQXPl8c06hJwZQLEL1FyEkJ9WnWFbauAru6fZoCa29CNvLzOQM3JX jJFE2JARJ/PbLKUCkVV3EoHIS807/+lFU239VNTJl8REMkxlrpjW3x6pkulyPH0atvBp +66UkfN1TAkhApp1VQdG/ShpTDah9Ayi+ZprS9Fq+o7JUMwyPy2128v5iuXesRYfif8s t06sTEQeTFrerYFoto3DIFRoy7VcQCz3SKqFvNmdqgWn1sEU/IZKejq9QKvPQqVwfOke Q8ZY3XpZ3CNdIv5hYiUaKZKeYifXg6E/meWW+Lti6p1yf7XhI+4a4jOBtYmDU2WMVyIm zB+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=LxNRD7SIKw+egtStlx3uzHTxxsqqRQkgdmesKHID8r8=; b=Zv1jeX0I6/FsKBHSLzo/bbmj6uq5PUopD3TTgx4OquEpWB6pnVlZfRb15O9hxrSM6T nV5qvNfpHdsPEsBIGQxic2zqljeQqKeOiW7Nf5WDORUjgNP7BC8GHADzIoZpQ5SaHkWb SDs+MwadvwhT1ACbuTy3NoCxVZv5P0lUJUU5JPfjjY6BAwE0SvPec8Iro6KOjUPw3DS+ wk451pPhV9pS3m5XTPQeHhi7vv+oz7MTlPUi0hkMPPfaMwdJl9hrwHzLUb2FGn1yxbRM wpEfZuhfeuptICRBmen1rRpBcUg0e20vLU3LxpiPs7L4o8n2Nog/atQ3RzPBS0hCr5E8 wXvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g10-v6si5725137plb.272.2018.04.16.14.48.08; Mon, 16 Apr 2018 14:48:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753116AbeDPVqy (ORCPT + 99 others); Mon, 16 Apr 2018 17:46:54 -0400 Received: from mga09.intel.com ([134.134.136.24]:12291 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752924AbeDPVqq (ORCPT ); Mon, 16 Apr 2018 17:46:46 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 Apr 2018 14:46:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.48,460,1517904000"; d="scan'208";a="34740165" Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga006.jf.intel.com with ESMTP; 16 Apr 2018 14:46:43 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Greg Kroah-Hartman , Alex Williamson , Jean-Philippe Brucker Cc: Rafael Wysocki , "Liu, Yi L" , "Tian, Kevin" , Raj Ashok , Jean Delvare , "Christoph Hellwig" , "Lu Baolu" , Jacob Pan , Liu@vger.kernel.org, Yi L Subject: [PATCH v4 10/22] iommu: introduce device fault data Date: Mon, 16 Apr 2018 14:48:59 -0700 Message-Id: <1523915351-54415-11-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1523915351-54415-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1523915351-54415-1-git-send-email-jacob.jun.pan@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Device faults detected by IOMMU can be reported outside IOMMU subsystem for further processing. This patch intends to provide a generic device fault data such that device drivers can be communicated with IOMMU faults without model specific knowledge. The proposed format is the result of discussion at: https://lkml.org/lkml/2017/11/10/291 Part of the code is based on Jean-Philippe Brucker's patchset (https://patchwork.kernel.org/patch/9989315/). The assumption is that model specific IOMMU driver can filter and handle most of the internal faults if the cause is within IOMMU driver control. Therefore, the fault reasons can be reported are grouped and generalized based common specifications such as PCI ATS. Signed-off-by: Jacob Pan Signed-off-by: Jean-Philippe Brucker Signed-off-by: Liu, Yi L Signed-off-by: Ashok Raj --- include/linux/iommu.h | 102 +++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 100 insertions(+), 2 deletions(-) diff --git a/include/linux/iommu.h b/include/linux/iommu.h index e963dbd..8968933 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -49,13 +49,17 @@ struct bus_type; struct device; struct iommu_domain; struct notifier_block; +struct iommu_fault_event; /* iommu fault flags */ -#define IOMMU_FAULT_READ 0x0 -#define IOMMU_FAULT_WRITE 0x1 +#define IOMMU_FAULT_READ (1 << 0) +#define IOMMU_FAULT_WRITE (1 << 1) +#define IOMMU_FAULT_EXEC (1 << 2) +#define IOMMU_FAULT_PRIV (1 << 3) typedef int (*iommu_fault_handler_t)(struct iommu_domain *, struct device *, unsigned long, int, void *); +typedef int (*iommu_dev_fault_handler_t)(struct iommu_fault_event *, void *); struct iommu_domain_geometry { dma_addr_t aperture_start; /* First address that can be mapped */ @@ -264,6 +268,99 @@ struct iommu_device { struct device *dev; }; +/* Generic fault types, can be expanded IRQ remapping fault */ +enum iommu_fault_type { + IOMMU_FAULT_DMA_UNRECOV = 1, /* unrecoverable fault */ + IOMMU_FAULT_PAGE_REQ, /* page request fault */ +}; + +enum iommu_fault_reason { + IOMMU_FAULT_REASON_UNKNOWN = 0, + + /* IOMMU internal error, no specific reason to report out */ + IOMMU_FAULT_REASON_INTERNAL, + + /* Could not access the PASID table */ + IOMMU_FAULT_REASON_PASID_FETCH, + + /* + * PASID is out of range (e.g. exceeds the maximum PASID + * supported by the IOMMU) or disabled. + */ + IOMMU_FAULT_REASON_PASID_INVALID, + + /* Could not access the page directory (Invalid PASID entry) */ + IOMMU_FAULT_REASON_PGD_FETCH, + + /* Could not access the page table entry (Bad address) */ + IOMMU_FAULT_REASON_PTE_FETCH, + + /* Protection flag check failed */ + IOMMU_FAULT_REASON_PERMISSION, +}; + +/** + * struct iommu_fault_event - Generic per device fault data + * + * - PCI and non-PCI devices + * - Recoverable faults (e.g. page request), information based on PCI ATS + * and PASID spec. + * - Un-recoverable faults of device interest + * - DMA remapping and IRQ remapping faults + + * @type contains fault type. + * @reason fault reasons if relevant outside IOMMU driver, IOMMU driver internal + * faults are not reported + * @addr: tells the offending page address + * @pasid: contains process address space ID, used in shared virtual memory(SVM) + * @rid: requestor ID + * @page_req_group_id: page request group index + * @last_req: last request in a page request group + * @pasid_valid: indicates if the PRQ has a valid PASID + * @prot: page access protection flag, e.g. IOMMU_FAULT_READ, IOMMU_FAULT_WRITE + * @device_private: if present, uniquely identify device-specific + * private data for an individual page request. + * @iommu_private: used by the IOMMU driver for storing fault-specific + * data. Users should not modify this field before + * sending the fault response. + */ +struct iommu_fault_event { + enum iommu_fault_type type; + enum iommu_fault_reason reason; + u64 addr; + u32 pasid; + u32 page_req_group_id; + u32 last_req : 1; + u32 pasid_valid : 1; + u32 prot; + u64 device_private; + u64 iommu_private; +}; + +/** + * struct iommu_fault_param - per-device IOMMU fault data + * @dev_fault_handler: Callback function to handle IOMMU faults at device level + * @data: handler private data + * + */ +struct iommu_fault_param { + iommu_dev_fault_handler_t handler; + void *data; +}; + +/** + * struct iommu_param - collection of per-device IOMMU data + * + * @fault_param: IOMMU detected device fault reporting data + * + * TODO: migrate other per device data pointers under iommu_dev_data, e.g. + * struct iommu_group *iommu_group; + * struct iommu_fwspec *iommu_fwspec; + */ +struct iommu_param { + struct iommu_fault_param *fault_param; +}; + int iommu_device_register(struct iommu_device *iommu); void iommu_device_unregister(struct iommu_device *iommu); int iommu_device_sysfs_add(struct iommu_device *iommu, @@ -437,6 +534,7 @@ struct iommu_ops {}; struct iommu_group {}; struct iommu_fwspec {}; struct iommu_device {}; +struct iommu_fault_param {}; static inline bool iommu_present(struct bus_type *bus) { -- 2.7.4