Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp4080239img; Tue, 26 Mar 2019 02:34:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqxf7dQ6TpVspZ6tSwTcA2XG7CX3GgW13JWeJMArOeJ85ba+3B9Zt4hpYI6B3twdMPjJMzcI X-Received: by 2002:a17:902:d24:: with SMTP id 33mr30005117plu.246.1553592844535; Tue, 26 Mar 2019 02:34:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553592844; cv=none; d=google.com; s=arc-20160816; b=gVl2CdQ3BrZ71IRNFiJgVfPtL2QLhCXUXp9L6PIr6cY+iNJPOvkg8bFUPLcf9bInNc 017e6iZUMUx4pa9S6RmJ0h1iTn0747Bu5FKjCAv/PB/9TYNrQg8mAYVek/AMNhbFItyv fDEXBMUzFsIh1pMmvtxVk/yscD1KiW6xIscyXy82PcbR7WO0GSK0lt8mNPGDUUG+QgTm cOTB+1bxM/Tmi7ehHXj/XyKD5nuK9IJldrxNTnjy5CAiUM/EDNq4brG4YSGr33tAQHaY mYYRwTiryC81EasDRticFPodMeB/2D7zk5x6SgdOfNv9rOK/zWp2ZZmaw3G7eBrVjm9W qn3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:content-transfer-encoding :content-language:in-reply-to:mime-version:date:message-id:from :references:cc:to:subject; bh=RjeaBpxhOXcLYBecoLMz46llJK4/0fRPQejaUMEb4qA=; b=b9EdMU76HtqVS/GSx9/dgw4LVpu4nyGJP6dtlesGQGOe5BLAxBZAeWybcvApypmSvF Ic8WRG2/Fh6fvTwKfPMOmlGN47CZyOO07/Ig3DWBVycVMCvOvHwM+kwMEdVf3APxNrfP jag6R2/nIK0/DfgyOMUkCFIQFjzF2fjNvWb16BeiEi+XgrZw14BbqYOkrN8n/qdEuxsf XFpliMkXjwceLyxCkn7dpoqxDUnaL2FsC0lODcDpaAO7P8LIsWlrJyWGZ4gouAF42f+g Oe+fpllsnR9JaeRWG1bqk9LOqFIG+EYnBL+mDRsIYwHhU+ZXDp/vadHZAlASifhxNf5d jfxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=UCb3rOd0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g21si15309021pgi.448.2019.03.26.02.33.49; Tue, 26 Mar 2019 02:34:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=UCb3rOd0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730919AbfCZJc6 (ORCPT + 99 others); Tue, 26 Mar 2019 05:32:58 -0400 Received: from hqemgate15.nvidia.com ([216.228.121.64]:4215 "EHLO hqemgate15.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726261AbfCZJc6 (ORCPT ); Tue, 26 Mar 2019 05:32:58 -0400 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqemgate15.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Tue, 26 Mar 2019 02:32:51 -0700 Received: from hqmail.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Tue, 26 Mar 2019 02:32:55 -0700 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Tue, 26 Mar 2019 02:32:55 -0700 Received: from [10.24.70.251] (10.124.1.5) by HQMAIL101.nvidia.com (172.20.187.10) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 26 Mar 2019 09:32:48 +0000 Subject: Re: [PATCH v8 7/9] vfio/mdev: Add iommu related member in mdev_device To: Lu Baolu , Joerg Roedel , David Woodhouse , Alex Williamson CC: "ashok.raj@intel.com" , "sanjay.k.kumar@intel.com" , "jacob.jun.pan@intel.com" , "kevin.tian@intel.com" , Jean-Philippe Brucker , "yi.l.liu@intel.com" , "yi.y.sun@intel.com" , "peterx@redhat.com" , "tiwei.bie@intel.com" , "xin.zeng@intel.com" , "iommu@lists.linux-foundation.org" , "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Jacob Pan , Neo Jia References: <20190325013036.18400-1-baolu.lu@linux.intel.com> <20190325013036.18400-8-baolu.lu@linux.intel.com> X-Nvconfidentiality: public From: Kirti Wankhede Message-ID: Date: Tue, 26 Mar 2019 15:02:44 +0530 MIME-Version: 1.0 In-Reply-To: <20190325013036.18400-8-baolu.lu@linux.intel.com> X-Originating-IP: [10.124.1.5] X-ClientProxiedBy: HQMAIL101.nvidia.com (172.20.187.10) To HQMAIL101.nvidia.com (172.20.187.10) Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1553592771; bh=RjeaBpxhOXcLYBecoLMz46llJK4/0fRPQejaUMEb4qA=; h=X-PGP-Universal:Subject:To:CC:References:X-Nvconfidentiality:From: Message-ID:Date:MIME-Version:In-Reply-To:X-Originating-IP: X-ClientProxiedBy:Content-Type:Content-Language: Content-Transfer-Encoding; b=UCb3rOd0kRUcX6d5ePHglVck6Xwd3sp5zgDcN/XYpj/7O8MdPiz6FrbrHgg/ibCMg MEh7ktxdFbVcgvRhftLRfBZpWHCZssdhdHuQjU781ZnMFRZzZ/o1gzqw1UEdJnuh2R iU+3ScHUCbMqG/LcFnA9jFL4GehhqOSEG4miCNL7offSVXdoqkk2JeoBaRLaiK33+P ZZX2TOIbjeiL86br48q3A89tebvNcdE1ShiJn9bRl6Xr+/J4XXePNyoMJmKmBn86bf peYLfaiYBMKyIZkLzXtSZhngU0MSdotHvQh/PoAt/s8OrjLqWZ4ufVWafUdM75v670 Gacj/iNTCqrYA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/25/2019 7:00 AM, Lu Baolu wrote: > A parent device might create different types of mediated > devices. For example, a mediated device could be created > by the parent device with full isolation and protection > provided by the IOMMU. One usage case could be found on > Intel platforms where a mediated device is an assignable > subset of a PCI, the DMA requests on behalf of it are all > tagged with a PASID. Since IOMMU supports PASID-granular > translations (scalable mode in VT-d 3.0), this mediated > device could be individually protected and isolated by an > IOMMU. > > This patch adds a new member in the struct mdev_device to > indicate that the mediated device represented by mdev could > be isolated and protected by attaching a domain to a device > represented by mdev->iommu_device. It also adds a helper to > add or set the iommu device. > > * mdev_device->iommu_device > - This, if set, indicates that the mediated device could > be fully isolated and protected by IOMMU via attaching > an iommu domain to this device. If empty, it indicates > using vendor defined isolation, hence bypass IOMMU. > > * mdev_set/get_iommu_device(dev, iommu_device) > - Set or get the iommu device which represents this mdev > in IOMMU's device scope. Drivers don't need to set the > iommu device if it uses vendor defined isolation. > > Cc: Ashok Raj > Cc: Jacob Pan > Cc: Kevin Tian > Cc: Liu Yi L > Suggested-by: Kevin Tian > Suggested-by: Alex Williamson > Signed-off-by: Lu Baolu > Reviewed-by: Jean-Philippe Brucker > --- > drivers/vfio/mdev/mdev_core.c | 18 ++++++++++++++++++ > drivers/vfio/mdev/mdev_private.h | 1 + > include/linux/mdev.h | 14 ++++++++++++++ > 3 files changed, 33 insertions(+) > > diff --git a/drivers/vfio/mdev/mdev_core.c b/drivers/vfio/mdev/mdev_core.c > index b96fedc77ee5..1b6435529166 100644 > --- a/drivers/vfio/mdev/mdev_core.c > +++ b/drivers/vfio/mdev/mdev_core.c > @@ -390,6 +390,24 @@ int mdev_device_remove(struct device *dev, bool force_remove) > return 0; > } > > +int mdev_set_iommu_device(struct device *dev, struct device *iommu_device) > +{ > + struct mdev_device *mdev = to_mdev_device(dev); > + > + mdev->iommu_device = iommu_device; > + > + return 0; > +} > +EXPORT_SYMBOL(mdev_set_iommu_device); > + > +struct device *mdev_get_iommu_device(struct device *dev) > +{ > + struct mdev_device *mdev = to_mdev_device(dev); > + > + return mdev->iommu_device; > +} > +EXPORT_SYMBOL(mdev_get_iommu_device); > + > static int __init mdev_init(void) > { > return mdev_bus_register(); > diff --git a/drivers/vfio/mdev/mdev_private.h b/drivers/vfio/mdev/mdev_private.h > index 379758c52b1b..bfb7b22a7cb6 100644 > --- a/drivers/vfio/mdev/mdev_private.h > +++ b/drivers/vfio/mdev/mdev_private.h > @@ -34,6 +34,7 @@ struct mdev_device { > struct list_head next; > struct kobject *type_kobj; > bool active; > + struct device *iommu_device; > }; > > #define to_mdev_device(dev) container_of(dev, struct mdev_device, dev) > diff --git a/include/linux/mdev.h b/include/linux/mdev.h > index d7aee90e5da5..df2ea39f47ee 100644 > --- a/include/linux/mdev.h > +++ b/include/linux/mdev.h > @@ -15,6 +15,20 @@ > > struct mdev_device; > > +/* > + * Called by the parent device driver to set the device which represents > + * this mdev in iommu protection scope. By default, the iommu device is > + * NULL, that indicates using vendor defined isolation. > + * > + * @dev: the mediated device that iommu will isolate. > + * @iommu_device: a pci device which represents the iommu for @dev. > + * > + * Return 0 for success, otherwise negative error value. > + */ > +int mdev_set_iommu_device(struct device *dev, struct device *iommu_device); > + > +struct device *mdev_get_iommu_device(struct device *dev); > + > /** > * struct mdev_parent_ops - Structure to be registered for each parent device to > * register the device to mdev module. > Reviewed-by: Kirti Wankhede Thanks, Kirti