Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp4508299img; Tue, 26 Mar 2019 10:43:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqywQIetZzHlS0Rz/ssplIbD8YcPuI/rAOiGOEsvQiccbLefmWwKwVrFJC18SyPXJI0dLMSQ X-Received: by 2002:a17:902:848c:: with SMTP id c12mr32202173plo.207.1553622214607; Tue, 26 Mar 2019 10:43:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553622214; cv=none; d=google.com; s=arc-20160816; b=HUYnXEDFwQIckzCHNlZnVMn9MhGYTxnDg+rxV1q8AcyfqIpqeSEcp4l0+ikWbeyIO7 NpqsxsTF+JJK/lutNtG2bQ2ChUtaNrArM4n94hvc4dJfObwMEf+ZuGbB6lkdjPbji2D5 QQGEmYn3lU5WdTxsOzFMdCPkRyB0iJNx/Y7/xeEvSj6/cAFPXXcPoBwdPzCr2USCmaNI xqKlTku4NoN/9E2i2gS4c+SDloHoK2az70O4PzUuSIQmiCCk1OXg92q708nx/mRQDNRs X/sgClfI16LP6A0owFPcEpxtnHY8UMb7U8jD+LQ/AefpXrg0SuyVjunmvC5aVLyQlgEd R6pw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=DmM+9HX6yD/GJQVz9rTmZRFzDSSlklnK4Ch5VPGW064=; b=eJJ5cuLRzD3U2jPJikypf8z2XfkYqLwInUqdLhRkfoSlfKWk3eafyMdiY7iXLZb/9q ZaLyTCGIW5lkthujMkjrCKpemVxF7pP03HHhAKvMmL0HassI5K9rFJxPIVMoD4EC4Y+r F0c5+z6IoIwcv8SlX1UnnH+9oCW1vy9PwvSPCA5f38Xji4jegoJd1u7LdYqENUvQVaT+ dxtdmZWHfOkYyJGXlYUcdZdud8qXirosPCQ8iLoqeSnFmXTSF00abUU44Ici5Q5OrqA4 DDgPx+Bun0gCXmPZAZkhT+MULYMGY/0Iw3ofIaBhox+KnGsOQXucYsn25llB0ic/Gvfz +q1Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e11si18447855plb.140.2019.03.26.10.43.19; Tue, 26 Mar 2019 10:43:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732193AbfCZRmd (ORCPT + 99 others); Tue, 26 Mar 2019 13:42:33 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58652 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729440AbfCZRmd (ORCPT ); Tue, 26 Mar 2019 13:42:33 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 282FA356F1; Tue, 26 Mar 2019 17:42:32 +0000 (UTC) Received: from x1.home (ovpn-116-99.phx2.redhat.com [10.3.116.99]) by smtp.corp.redhat.com (Postfix) with ESMTP id F00B917573; Tue, 26 Mar 2019 17:42:28 +0000 (UTC) Date: Tue, 26 Mar 2019 11:42:28 -0600 From: Alex Williamson To: Lu Baolu Cc: Joerg Roedel , David Woodhouse , Kirti Wankhede , ashok.raj@intel.com, sanjay.k.kumar@intel.com, jacob.jun.pan@intel.com, kevin.tian@intel.com, Jean-Philippe Brucker , yi.l.liu@intel.com, yi.y.sun@intel.com, peterx@redhat.com, tiwei.bie@intel.com, xin.zeng@intel.com, iommu@lists.linux-foundation.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Jacob Pan Subject: Re: [PATCH v8 7/9] vfio/mdev: Add iommu related member in mdev_device Message-ID: <20190326114228.5380be3c@x1.home> In-Reply-To: <20190325013036.18400-8-baolu.lu@linux.intel.com> References: <20190325013036.18400-1-baolu.lu@linux.intel.com> <20190325013036.18400-8-baolu.lu@linux.intel.com> Organization: Red Hat MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Tue, 26 Mar 2019 17:42:32 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 25 Mar 2019 09:30:34 +0800 Lu Baolu wrote: > A parent device might create different types of mediated > devices. For example, a mediated device could be created > by the parent device with full isolation and protection > provided by the IOMMU. One usage case could be found on > Intel platforms where a mediated device is an assignable > subset of a PCI, the DMA requests on behalf of it are all > tagged with a PASID. Since IOMMU supports PASID-granular > translations (scalable mode in VT-d 3.0), this mediated > device could be individually protected and isolated by an > IOMMU. > > This patch adds a new member in the struct mdev_device to > indicate that the mediated device represented by mdev could > be isolated and protected by attaching a domain to a device > represented by mdev->iommu_device. It also adds a helper to > add or set the iommu device. > > * mdev_device->iommu_device > - This, if set, indicates that the mediated device could > be fully isolated and protected by IOMMU via attaching > an iommu domain to this device. If empty, it indicates > using vendor defined isolation, hence bypass IOMMU. > > * mdev_set/get_iommu_device(dev, iommu_device) > - Set or get the iommu device which represents this mdev > in IOMMU's device scope. Drivers don't need to set the > iommu device if it uses vendor defined isolation. > > Cc: Ashok Raj > Cc: Jacob Pan > Cc: Kevin Tian > Cc: Liu Yi L > Suggested-by: Kevin Tian > Suggested-by: Alex Williamson > Signed-off-by: Lu Baolu > Reviewed-by: Jean-Philippe Brucker > --- > drivers/vfio/mdev/mdev_core.c | 18 ++++++++++++++++++ > drivers/vfio/mdev/mdev_private.h | 1 + > include/linux/mdev.h | 14 ++++++++++++++ > 3 files changed, 33 insertions(+) Acked-by: Alex Williamson > diff --git a/drivers/vfio/mdev/mdev_core.c b/drivers/vfio/mdev/mdev_core.c > index b96fedc77ee5..1b6435529166 100644 > --- a/drivers/vfio/mdev/mdev_core.c > +++ b/drivers/vfio/mdev/mdev_core.c > @@ -390,6 +390,24 @@ int mdev_device_remove(struct device *dev, bool force_remove) > return 0; > } > > +int mdev_set_iommu_device(struct device *dev, struct device *iommu_device) > +{ > + struct mdev_device *mdev = to_mdev_device(dev); > + > + mdev->iommu_device = iommu_device; > + > + return 0; > +} > +EXPORT_SYMBOL(mdev_set_iommu_device); > + > +struct device *mdev_get_iommu_device(struct device *dev) > +{ > + struct mdev_device *mdev = to_mdev_device(dev); > + > + return mdev->iommu_device; > +} > +EXPORT_SYMBOL(mdev_get_iommu_device); > + > static int __init mdev_init(void) > { > return mdev_bus_register(); > diff --git a/drivers/vfio/mdev/mdev_private.h b/drivers/vfio/mdev/mdev_private.h > index 379758c52b1b..bfb7b22a7cb6 100644 > --- a/drivers/vfio/mdev/mdev_private.h > +++ b/drivers/vfio/mdev/mdev_private.h > @@ -34,6 +34,7 @@ struct mdev_device { > struct list_head next; > struct kobject *type_kobj; > bool active; > + struct device *iommu_device; > }; > > #define to_mdev_device(dev) container_of(dev, struct mdev_device, dev) > diff --git a/include/linux/mdev.h b/include/linux/mdev.h > index d7aee90e5da5..df2ea39f47ee 100644 > --- a/include/linux/mdev.h > +++ b/include/linux/mdev.h > @@ -15,6 +15,20 @@ > > struct mdev_device; > > +/* > + * Called by the parent device driver to set the device which represents > + * this mdev in iommu protection scope. By default, the iommu device is > + * NULL, that indicates using vendor defined isolation. > + * > + * @dev: the mediated device that iommu will isolate. > + * @iommu_device: a pci device which represents the iommu for @dev. > + * > + * Return 0 for success, otherwise negative error value. > + */ > +int mdev_set_iommu_device(struct device *dev, struct device *iommu_device); > + > +struct device *mdev_get_iommu_device(struct device *dev); > + > /** > * struct mdev_parent_ops - Structure to be registered for each parent device to > * register the device to mdev module.