Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1070216yba; Fri, 3 May 2019 15:33:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqwA1JVlnsLvuU8DdjFi4nojudoQjxkeAoXLgk1xlFulupzt7HKuDziQhkqyMioy+IjzblWO X-Received: by 2002:a63:ed4f:: with SMTP id m15mr14084267pgk.387.1556922788480; Fri, 03 May 2019 15:33:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556922788; cv=none; d=google.com; s=arc-20160816; b=k7SMttKuRbSZ7jsh4ObCa4HyV69Wut7rgboPs/KHJET71OEVzzFHHW1eDxmMs7u/87 i1Hcq2A6cJnKDdRmoDfq9AFz3AfE0hgrmQpd5sE+m4rM1gl76fI2TvMjreG7MI5m89TR 7AVj5ITLb61yGIpV15yaA56GI72UZuSKSAwHTrZfl/Xh22A64PWo3LXle+J/nmUMMsW+ u5XrgiCzRDrAiAZaJ8NgWJEImxQm4ClmToMd71na96u5Z0YTtFS8wIlNwRdisRUEHqrA WwQDolS/YXm3+1XWhLGOJCdMrR3Ou1tWz5YB6QqROPhDNVYdoWJVlVo3hErLJP74r9mq 8bYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=3ffPsac5aQheBMBF9c+X74bz8BA17Yd768wVAYnBC80=; b=eoLG1okOBNg9M8pVzwLWgGYJStdWuz9UevNf6zozgRTejU3DxnHCzy3E2+9DusVqGA rkoABZj81fPuoeP57NCkCAepGyFo7gqiQxv8o56ctVPgPe+eyWyArrDNDCYfikYvPv0S 61XB8JBRhTXFO/5+8cKoF4uMhTLk/x8v9kOe66RDtaricqsOpOxNOxKgA4njFUJNxAAz 9fWKx6tp7IcbRaOZ9bwlNLVPDjX6Y3cqD0cPVu+PY+4/kykKRYXR0+C/kc1NDQyVr2gv nnvdZ4c6iS9Sbk3WW1sGmQk3afzi4MbviREIpR+Pq7JhST8hOkWrmdKd3DGIxteunaqr dDig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a3si4655846plc.415.2019.05.03.15.32.53; Fri, 03 May 2019 15:33:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726528AbfECW3c (ORCPT + 99 others); Fri, 3 May 2019 18:29:32 -0400 Received: from mga02.intel.com ([134.134.136.20]:7005 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726059AbfECW3c (ORCPT ); Fri, 3 May 2019 18:29:32 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 03 May 2019 15:29:31 -0700 X-ExtLoop1: 1 Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga002.jf.intel.com with ESMTP; 03 May 2019 15:29:31 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Eric Auger , Alex Williamson , Jean-Philippe Brucker Cc: "Yi Liu" , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , "Lu Baolu" , Andriy Shevchenko , Jacob Pan Subject: [PATCH v3 00/16] Shared virtual address IOMMU and VT-d support Date: Fri, 3 May 2019 15:32:01 -0700 Message-Id: <1556922737-76313-1-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Shared virtual address (SVA), a.k.a, Shared virtual memory (SVM) on Intel platforms allow address space sharing between device DMA and applications. SVA can reduce programming complexity and enhance security. This series is intended to enable SVA virtualization, i.e. shared guest application address space and physical device DMA address. Only IOMMU portion of the changes are included in this series. Additional support is needed in VFIO and QEMU (will be submitted separately) to complete this functionality. To make incremental changes and reduce the size of each patchset. This series does not inlcude support for page request services. In VT-d implementation, PASID table is per device and maintained in the host. Guest PASID table is shadowed in VMM where virtual IOMMU is emulated. .-------------. .---------------------------. | vIOMMU | | Guest process CR3, FL only| | | '---------------------------' .----------------/ | PASID Entry |--- PASID cache flush - '-------------' | | | V | | CR3 in GPA '-------------' Guest ------| Shadow |--------------------------|-------- v v v Host .-------------. .----------------------. | pIOMMU | | Bind FL for GVA-GPA | | | '----------------------' .----------------/ | | PASID Entry | V (Nested xlate) '----------------\.------------------------------. | | |SL for GPA-HPA, default domain| | | '------------------------------' '-------------' Where: - FL = First level/stage one page tables - SL = Second level/stage two page tables This work is based on collaboration with other developers on the IOMMU mailing list. Notably, [1] [PATCH v6 00/22] SMMUv3 Nested Stage Setup by Eric Auger https://lkml.org/lkml/2019/3/17/124 [2] [RFC PATCH 2/6] drivers core: Add I/O ASID allocator by Jean-Philippe Brucker https://www.spinics.net/lists/iommu/msg30639.html [3] [RFC PATCH 0/5] iommu: APIs for paravirtual PASID allocation by Lu Baolu https://lkml.org/lkml/2018/11/12/1921 [4] [PATCH v5 00/23] IOMMU and VT-d driver support for Shared Virtual Address (SVA) https://lwn.net/Articles/754331/ There are roughly three parts: 1. Generic PASID allocator [1] with extension to support custom allocator 2. IOMMU cache invalidation passdown from guest to host 3. Guest PASID bind for nested translation All generic IOMMU APIs are reused from [1], which has a v7 just published with no real impact to the patches used here. It is worth noting that unlike sMMU nested stage setup, where PASID table is owned by the guest, VT-d PASID table is owned by the host, individual PASIDs are bound instead of the PASID table. This series is based on the new VT-d 3.0 Specification (https://software.intel.com/sites/default/files/managed/c5/15/vt-directed-io-spec.pdf). This is different than the older series in [4] which was based on the older specification that does not have scalable mode. ChangeLog: - V3 - Addressed thorough review comments from Eric Auger (Thank you!) - Moved IOASID allocator from driver core to IOMMU code per suggestion by Christoph Hellwig (https://lkml.org/lkml/2019/4/26/462) - Rebased on top of Jean's SVA API branch and Eric's v7[1] (git://linux-arm.org/linux-jpb.git sva/api) - All IOMMU APIs are unmodified (except the new bind guest PASID call in patch 9/16) - V2 - Rebased on Joerg's IOMMU x86/vt-d branch v5.1-rc4 - Integrated with Eric Auger's new v7 series for common APIs (https://github.com/eauger/linux/tree/v5.1-rc3-2stage-v7) - Addressed review comments from Andy Shevchenko and Alex Williamson on IOASID custom allocator. - Support multiple custom IOASID allocators (vIOMMUs) and dynamic registration. Jacob Pan (13): iommu: Introduce attach/detach_pasid_table API ioasid: Add custom IOASID allocator iommu/vt-d: Add custom allocator for IOASID iommu/vtd: Optimize tlb invalidation for vIOMMU iommu/vt-d: Replace Intel specific PASID allocator with IOASID iommu: Introduce guest PASID bind function iommu/vt-d: Move domain helper to header iommu/vt-d: Avoid duplicated code for PASID setup iommu/vt-d: Add nested translation helper function iommu/vt-d: Clean up for SVM device list iommu/vt-d: Add bind guest PASID support iommu/vt-d: Support flushing more translation cache types iommu/vt-d: Add svm/sva invalidate function Jean-Philippe Brucker (1): iommu: Add I/O ASID allocator Liu, Yi L (1): iommu: Introduce cache_invalidate API Lu Baolu (1): iommu/vt-d: Enlightened PASID allocation drivers/iommu/Kconfig | 7 ++ drivers/iommu/Makefile | 1 + drivers/iommu/dmar.c | 50 ++++++++ drivers/iommu/intel-iommu.c | 241 ++++++++++++++++++++++++++++++++++-- drivers/iommu/intel-pasid.c | 223 +++++++++++++++++++++++++-------- drivers/iommu/intel-pasid.h | 24 +++- drivers/iommu/intel-svm.c | 293 +++++++++++++++++++++++++++++++++++--------- drivers/iommu/ioasid.c | 265 +++++++++++++++++++++++++++++++++++++++ drivers/iommu/iommu.c | 53 ++++++++ include/linux/intel-iommu.h | 41 ++++++- include/linux/intel-svm.h | 7 ++ include/linux/ioasid.h | 67 ++++++++++ include/linux/iommu.h | 43 ++++++- include/uapi/linux/iommu.h | 140 +++++++++++++++++++++ 14 files changed, 1328 insertions(+), 127 deletions(-) create mode 100644 drivers/iommu/ioasid.c create mode 100644 include/linux/ioasid.h -- 2.7.4