Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp874672imm; Mon, 21 May 2018 16:15:04 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpkVRBvSp8Sme6w7ZTDnEm80TzoIQgunYUS6I1+WMjRDMCfuF4eCv2m/xImiZoXTr0wuVBY X-Received: by 2002:a62:d6da:: with SMTP id a87-v6mr21921543pfl.200.1526944504436; Mon, 21 May 2018 16:15:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526944504; cv=none; d=google.com; s=arc-20160816; b=oIE5RkvepLgLtqZV/8EGECqIB6pP1txjLnM38v4EFn9PSnHzoNb2RZ1GFYTl5+0P0U +H3RfkevGEo4fObYytaDncATSCyPvG9/r3ia74kw682AszPHUsd1BA+tVcX4mYsmFXaH kg4ThP0GH6T6HVXY5J37sqWexqMAnxNjn7u+dvrtG3Wk6QHb0d1EH6h61OpBbQhlCTak d6cVyhXdu7fvvIU55dU5EeWnG/BHMjFHadVDw/v9eGSccQg8A0gTwUMPLiFBQNwOr74d 6AQp0Imb10cyDvebc5KkXOqnF4TgdGc+0L776MbZLiU7tIxyJt5vN88V7rdFpbSi7Jd6 VtAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=edDT7S1ev6QPJG/DqwH5DlyyM7bxsY7jQd4hGfpxHY4=; b=d8ezRworr9eC5xYtjLXWiB/90bA8iI/FothnMsplFKIox7bUBtHq2GN+7qhfK22xol OzCFxe2DquBmCRJ3WsHaZea5M0vdB4zUKPYQ3OaumSBh3LXOb0e5KeJSu7tbAcNu1iW4 lgAswOlGQWbhDfFEMy5lxFR7vWjz0z11T2Bpq2SSs28erOCaeVJry7ilebuTvBoGJx/J N8yJ5ZXeBHoO9FWhMc8TkWnp9HYTlEUYHfJfHEs1Bp3DbpzSg8ELypW74p4aTO1NEYcK asYRR3VVQivCAOHRQ1sKifAQ0noFcU5KGg4TOh3tkBDpzu89xCVy64i0/jOAiWrczQro 1sBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j9-v6si14930139plk.587.2018.05.21.16.14.49; Mon, 21 May 2018 16:15:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751483AbeEUXNf (ORCPT + 99 others); Mon, 21 May 2018 19:13:35 -0400 Received: from mga04.intel.com ([192.55.52.120]:49742 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751154AbeEUXNb (ORCPT ); Mon, 21 May 2018 19:13:31 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 May 2018 16:13:31 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,428,1520924400"; d="scan'208";a="41136805" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.7.199.155]) by fmsmga007.fm.intel.com with ESMTP; 21 May 2018 16:13:30 -0700 Date: Mon, 21 May 2018 16:16:21 -0700 From: Jacob Pan To: "Liu, Yi L" Cc: "Wysocki, Rafael J" , "Tian, Kevin" , "Raj, Ashok" , Jean Delvare , Christoph Hellwig , Lu Baolu , Yi L , "iommu@lists.linux-foundation.org" , LKML , Joerg Roedel , "David Woodhouse" , Greg Kroah-Hartman , Alex Williamson , Jean-Philippe Brucker , jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v4 10/22] iommu: introduce device fault data Message-ID: <20180521161621.0ae30c8d@jacob-builder> In-Reply-To: References: <1523915351-54415-1-git-send-email-jacob.jun.pan@linux.intel.com> <1523915351-54415-11-git-send-email-jacob.jun.pan@linux.intel.com> Organization: OTC X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 20 May 2018 08:17:43 +0000 "Liu, Yi L" wrote: > Hi Jacob, > > > From: Jacob Pan [mailto:jacob.jun.pan@linux.intel.com] > > Sent: Tuesday, April 17, 2018 5:49 AM > > include/linux/iommu.h | 102 > > +++++++++++++++++++++++++++++++++++++++++++++++++- > > 1 file changed, 100 insertions(+), 2 deletions(-) > > > > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > > index e963dbd..8968933 100644 > > --- a/include/linux/iommu.h > > +++ b/include/linux/iommu.h > > @@ -49,13 +49,17 @@ struct bus_type; > > struct device; > > struct iommu_domain; > > struct notifier_block; > > +struct iommu_fault_event; > > > > /* iommu fault flags */ > > -#define IOMMU_FAULT_READ 0x0 > > -#define IOMMU_FAULT_WRITE 0x1 > > +#define IOMMU_FAULT_READ (1 << 0) > > +#define IOMMU_FAULT_WRITE (1 << 1) > > +#define IOMMU_FAULT_EXEC (1 << 2) > > +#define IOMMU_FAULT_PRIV (1 << 3) > > > > typedef int (*iommu_fault_handler_t)(struct iommu_domain *, > > struct device *, unsigned long, int, void > > *); +typedef int (*iommu_dev_fault_handler_t)(struct > > iommu_fault_event *, void *); > > > > struct iommu_domain_geometry { > > dma_addr_t aperture_start; /* First address that can be > > mapped */ @@ -264,6 +268,99 @@ struct iommu_device { > > struct device *dev; > > }; > > > > +/* Generic fault types, can be expanded IRQ remapping fault */ > > +enum iommu_fault_type { > > + IOMMU_FAULT_DMA_UNRECOV = 1, /* unrecoverable fault > > */ > > + IOMMU_FAULT_PAGE_REQ, /* page request fault > > */ +}; > > + > > +enum iommu_fault_reason { > > + IOMMU_FAULT_REASON_UNKNOWN = 0, > > + > > + /* IOMMU internal error, no specific reason to report out > > */ > > + IOMMU_FAULT_REASON_INTERNAL, > > + > > + /* Could not access the PASID table */ > > + IOMMU_FAULT_REASON_PASID_FETCH, > > + > > + /* > > + * PASID is out of range (e.g. exceeds the maximum PASID > > + * supported by the IOMMU) or disabled. > > + */ > > + IOMMU_FAULT_REASON_PASID_INVALID, > > + > > + /* Could not access the page directory (Invalid PASID > > entry) */ > > + IOMMU_FAULT_REASON_PGD_FETCH, > > + > > + /* Could not access the page table entry (Bad address) */ > > + IOMMU_FAULT_REASON_PTE_FETCH, > > + > > + /* Protection flag check failed */ > > + IOMMU_FAULT_REASON_PERMISSION, > > +}; > > + > > +/** > > + * struct iommu_fault_event - Generic per device fault data > > + * > > + * - PCI and non-PCI devices > > + * - Recoverable faults (e.g. page request), information based on > > PCI ATS > > + * and PASID spec. > > + * - Un-recoverable faults of device interest > > + * - DMA remapping and IRQ remapping faults > > + > > + * @type contains fault type. > > + * @reason fault reasons if relevant outside IOMMU driver, IOMMU > > driver internal > > + * faults are not reported > > + * @addr: tells the offending page address > > + * @pasid: contains process address space ID, used in shared > > virtual memory(SVM) > > + * @rid: requestor ID > > + * @page_req_group_id: page request group index > > + * @last_req: last request in a page request group > > + * @pasid_valid: indicates if the PRQ has a valid PASID > > + * @prot: page access protection flag, e.g. IOMMU_FAULT_READ, > > IOMMU_FAULT_WRITE > > + * @device_private: if present, uniquely identify device-specific > > + * private data for an individual page request. > > + * @iommu_private: used by the IOMMU driver for storing > > fault-specific > > + * data. Users should not modify this field before > > + * sending the fault response. > > + */ > > +struct iommu_fault_event { > > + enum iommu_fault_type type; > > + enum iommu_fault_reason reason; > > + u64 addr; > > + u32 pasid; > > + u32 page_req_group_id; > > + u32 last_req : 1; > > + u32 pasid_valid : 1; > > + u32 prot; > > I think userspace also needs to know the fault type, reason, pasid, > addr, goup_id, prot. So the definition should be included in > uapi/Linux/iommu.h. > > This comment also applies to "struct page_response_msg". Qemu also > wants to pass the page response to host. > sounds good. i assume vfio layer would reuse these data. > > + u64 device_private; > > + u64 iommu_private; > > These two seems to be in kernel driver specific data. May split the > iommu_fault_event definition into two parts. One part for the data > required by both driver and userspace. One part for in kernel driver > specific data. > even device and iommu private data can be potentially consumed by the guest kernel for some special processing. But for now, we just copy back to the response message. e.g. vt-d streaming page response request is embedded in the iommu private data. > Thanks, > Yi Liu > [Jacob Pan]