Received: by 10.192.165.148 with SMTP id m20csp1553445imm; Sat, 5 May 2018 15:20:58 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpp5CPLRGNSt23C5WqmF9VlkAMBpJfQOuvCNXnA7ByilW5YqjADPmhKJoon+slS65PFtyL0 X-Received: by 2002:a17:902:788e:: with SMTP id q14-v6mr32141019pll.98.1525558858468; Sat, 05 May 2018 15:20:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525558858; cv=none; d=google.com; s=arc-20160816; b=BWpWctEqgQqFEyeZ8w0NGJaMdXM9cl6AnF2OzFlpmkuuvLliXI5EEbzYoSs0g2f1Dc cBAYYZ2XCqt6rrkLvfkiYc6DFLl0gWi8hrWoFP4s6uvARAL8hTf8IPVJTNsMQY55229K nqQd3kUzRPhif+YeOstnP1jVJ41roYbV+nHniyTyZQaze3+kfSlQEW9KjYxT9LfANKqS LgW/OxpLUWlJKZzZxOv2PdH6jRZ+5MLUr5o2G96D51TRjIAbQcs745o4S0YsyiolSWDz bfuPvE55d78ZkhJ7T04Luy5LKUcuiyTCLqWkVaz237S73zAP8P701rJx2cXTZ+zQ8aqq VMRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=1AG4U7GtKaacDNSJyEcsjRW+XfjwnnkXFDucNr6q4dY=; b=oRiVbp+rTLNl8YMzw5eEAk2v3LpltJunDuzv3fhYU2EMZwixCMPKm1oP7RhM1HYOuh 4fACvBTjgGC+/ZPFLtW7NrOhhPOLdl3H9d1Wi0CskXwqabRSeuBYEs62CSObdssKyiEr kDJQXwgLkgKjtatsN/EFXr9Loba71fGhoQumqDW1bx1rdesVXjaZHixUijXJzfBNHmSH 9zPK1HBo/d42Ol948ux8/wzemtegEqJYKSh1D4xa+8Zg+2EeCRrzSSkzHElJ47j+UMpi 3bHeB5do10CiHhquwmGGwjCCwQI05tzkJ7xNJ0wOb/6lqgcUcsLII+2IK6Ufsb5A+i0o qHgA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t9si19252228pfk.228.2018.05.05.15.20.31; Sat, 05 May 2018 15:20:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751887AbeEEWTu (ORCPT + 99 others); Sat, 5 May 2018 18:19:50 -0400 Received: from mx1.redhat.com ([209.132.183.28]:34736 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750967AbeEEWTs (ORCPT ); Sat, 5 May 2018 18:19:48 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A8D6781DE3; Sat, 5 May 2018 22:19:47 +0000 (UTC) Received: from localhost (ovpn-116-34.phx2.redhat.com [10.3.116.34]) by smtp.corp.redhat.com (Postfix) with ESMTP id DBAF75D6A5; Sat, 5 May 2018 22:19:43 +0000 (UTC) Date: Sat, 5 May 2018 15:19:43 -0700 From: Jerry Snitselaar To: Jacob Pan Cc: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Greg Kroah-Hartman , Alex Williamson , Jean-Philippe Brucker , "Liu, Yi L" , Raj Ashok , Rafael Wysocki , Liu@mail.linuxfoundation.org, Jean Delvare Subject: Re: [PATCH v4 05/22] iommu: introduce iommu invalidate API function Message-ID: <20180505221943.iy724cn4ltmycv5i@cantor> Reply-To: Jerry Snitselaar Mail-Followup-To: Jacob Pan , iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Greg Kroah-Hartman , Alex Williamson , Jean-Philippe Brucker , "Liu, Yi L" , Raj Ashok , Rafael Wysocki , Liu@mail.linuxfoundation.org, Jean Delvare References: <1523915351-54415-1-git-send-email-jacob.jun.pan@linux.intel.com> <1523915351-54415-6-git-send-email-jacob.jun.pan@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <1523915351-54415-6-git-send-email-jacob.jun.pan@linux.intel.com> User-Agent: NeoMutt/20180323 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Sat, 05 May 2018 22:19:47 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon Apr 16 18, Jacob Pan wrote: >From: "Liu, Yi L" > >When an SVM capable device is assigned to a guest, the first level page >tables are owned by the guest and the guest PASID table pointer is >linked to the device context entry of the physical IOMMU. > >Host IOMMU driver has no knowledge of caching structure updates unless >the guest invalidation activities are passed down to the host. The >primary usage is derived from emulated IOMMU in the guest, where QEMU >can trap invalidation activities before passing them down to the >host/physical IOMMU. >Since the invalidation data are obtained from user space and will be >written into physical IOMMU, we must allow security check at various >layers. Therefore, generic invalidation data format are proposed here, >model specific IOMMU drivers need to convert them into their own format. > >Signed-off-by: Liu, Yi L >Signed-off-by: Jean-Philippe Brucker >Signed-off-by: Jacob Pan >Signed-off-by: Ashok Raj >--- > drivers/iommu/iommu.c | 14 ++++++++ > include/linux/iommu.h | 12 +++++++ > include/uapi/linux/iommu.h | 79 ++++++++++++++++++++++++++++++++++++++++++++++ > 3 files changed, 105 insertions(+) > >diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c >index 3a69620..784e019 100644 >--- a/drivers/iommu/iommu.c >+++ b/drivers/iommu/iommu.c >@@ -1344,6 +1344,20 @@ void iommu_unbind_pasid_table(struct iommu_domain *domain, struct device *dev) > } > EXPORT_SYMBOL_GPL(iommu_unbind_pasid_table); > >+int iommu_sva_invalidate(struct iommu_domain *domain, >+ struct device *dev, struct tlb_invalidate_info *inv_info) >+{ >+ int ret = 0; >+ >+ if (unlikely(!domain->ops->sva_invalidate)) >+ return -ENODEV; >+ >+ ret = domain->ops->sva_invalidate(domain, dev, inv_info); >+ >+ return ret; >+} >+EXPORT_SYMBOL_GPL(iommu_sva_invalidate); >+ > static void __iommu_detach_device(struct iommu_domain *domain, > struct device *dev) > { >diff --git a/include/linux/iommu.h b/include/linux/iommu.h >index 8ad111f..e963dbd 100644 >--- a/include/linux/iommu.h >+++ b/include/linux/iommu.h >@@ -190,6 +190,7 @@ struct iommu_resv_region { > * @pgsize_bitmap: bitmap of all possible supported page sizes > * @bind_pasid_table: bind pasid table pointer for guest SVM > * @unbind_pasid_table: unbind pasid table pointer and restore defaults >+ * @sva_invalidate: invalidate translation caches of shared virtual address > */ > struct iommu_ops { > bool (*capable)(enum iommu_cap); >@@ -243,6 +244,8 @@ struct iommu_ops { > struct pasid_table_config *pasidt_binfo); > void (*unbind_pasid_table)(struct iommu_domain *domain, > struct device *dev); >+ int (*sva_invalidate)(struct iommu_domain *domain, >+ struct device *dev, struct tlb_invalidate_info *inv_info); > > unsigned long pgsize_bitmap; > }; >@@ -309,6 +312,9 @@ extern int iommu_bind_pasid_table(struct iommu_domain *domain, > struct device *dev, struct pasid_table_config *pasidt_binfo); > extern void iommu_unbind_pasid_table(struct iommu_domain *domain, > struct device *dev); >+extern int iommu_sva_invalidate(struct iommu_domain *domain, >+ struct device *dev, struct tlb_invalidate_info *inv_info); >+ > extern struct iommu_domain *iommu_get_domain_for_dev(struct device *dev); > extern int iommu_map(struct iommu_domain *domain, unsigned long iova, > phys_addr_t paddr, size_t size, int prot); >@@ -720,6 +726,12 @@ void iommu_unbind_pasid_table(struct iommu_domain *domain, struct device *dev) > { > } > >+static inline int iommu_sva_invalidate(struct iommu_domain *domain, >+ struct device *dev, struct tlb_invalidate_info *inv_info) >+{ >+ return -EINVAL; >+} >+ Would -ENODEV make more sense here? > #endif /* CONFIG_IOMMU_API */ > > #endif /* __LINUX_IOMMU_H */ >diff --git a/include/uapi/linux/iommu.h b/include/uapi/linux/iommu.h >index 9f7a6bf..4447943 100644 >--- a/include/uapi/linux/iommu.h >+++ b/include/uapi/linux/iommu.h >@@ -29,4 +29,83 @@ struct pasid_table_config { > __u8 pasid_bits; > }; > >+/** >+ * enum iommu_inv_granularity - Generic invalidation granularity >+ * >+ * When an invalidation request is sent to IOMMU to flush translation caches, >+ * it may carry different granularity. These granularity levels are not specific >+ * to a type of translation cache. For an example, PASID selective granularity >+ * is only applicable to PASID cache invalidation. >+ * This enum is a collection of granularities for all types of translation >+ * caches. The idea is to make it easy for IOMMU model specific driver do >+ * conversion from generic to model specific value. >+ */ >+enum iommu_inv_granularity { >+ IOMMU_INV_GRANU_DOMAIN = 1, /* all TLBs associated with a domain */ >+ IOMMU_INV_GRANU_DEVICE, /* caching structure associated with a >+ * device ID >+ */ >+ IOMMU_INV_GRANU_DOMAIN_PAGE, /* address range with a domain */ >+ IOMMU_INV_GRANU_ALL_PASID, /* cache of a given PASID */ >+ IOMMU_INV_GRANU_PASID_SEL, /* only invalidate specified PASID */ >+ >+ IOMMU_INV_GRANU_NG_ALL_PASID, /* non-global within all PASIDs */ >+ IOMMU_INV_GRANU_NG_PASID, /* non-global within a PASIDs */ >+ IOMMU_INV_GRANU_PAGE_PASID, /* page-selective within a PASID */ >+ IOMMU_INV_NR_GRANU, >+}; >+ >+/** enum iommu_inv_type - Generic translation cache types for invalidation >+ * >+ * Invalidation requests sent to IOMMU may indicate which translation cache >+ * to be operated on. >+ * Combined with enum iommu_inv_granularity, model specific driver can do a >+ * simple lookup to convert generic type to model specific value. >+ */ >+enum iommu_inv_type { >+ IOMMU_INV_TYPE_DTLB, /* device IOTLB */ >+ IOMMU_INV_TYPE_TLB, /* IOMMU paging structure cache */ >+ IOMMU_INV_TYPE_PASID, /* PASID cache */ >+ IOMMU_INV_TYPE_CONTEXT, /* device context entry cache */ >+ IOMMU_INV_NR_TYPE >+}; >+ >+/** >+ * Translation cache invalidation header that contains mandatory meta data. >+ * @version: info format version, expecting future extesions >+ * @type: type of translation cache to be invalidated >+ */ >+struct tlb_invalidate_hdr { >+ __u32 version; >+#define TLB_INV_HDR_VERSION_1 1 >+ enum iommu_inv_type type; >+}; >+ >+/** >+ * Translation cache invalidation information, contains generic IOMMU >+ * data which can be parsed based on model ID by model specific drivers. >+ * >+ * @granularity: requested invalidation granularity, type dependent >+ * @size: 2^size of 4K pages, 0 for 4k, 9 for 2MB, etc. >+ * @pasid: processor address space ID value per PCI spec. >+ * @addr: page address to be invalidated >+ * @flags IOMMU_INVALIDATE_PASID_TAGGED: DMA with PASID tagged, >+ * @pasid validity can be >+ * deduced from @granularity >+ * IOMMU_INVALIDATE_ADDR_LEAF: leaf paging entries >+ * IOMMU_INVALIDATE_GLOBAL_PAGE: global pages >+ * >+ */ >+struct tlb_invalidate_info { >+ struct tlb_invalidate_hdr hdr; >+ enum iommu_inv_granularity granularity; >+ __u32 flags; >+#define IOMMU_INVALIDATE_NO_PASID (1 << 0) >+#define IOMMU_INVALIDATE_ADDR_LEAF (1 << 1) >+#define IOMMU_INVALIDATE_GLOBAL_PAGE (1 << 2) >+#define IOMMU_INVALIDATE_PASID_TAGGED (1 << 3) >+ __u8 size; >+ __u32 pasid; >+ __u64 addr; >+}; > #endif /* _UAPI_IOMMU_H */ >-- >2.7.4 > >_______________________________________________ >iommu mailing list >iommu@lists.linux-foundation.org >https://lists.linuxfoundation.org/mailman/listinfo/iommu