Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4006142ybg; Fri, 25 Oct 2019 12:00:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqxKNGRtDObodK5XycWrNPxHp2cOHrrwIt/EcsPeKIz7via90xoRlWUb1yuIy57LDHO8rS5k X-Received: by 2002:a17:906:c801:: with SMTP id cx1mr5094930ejb.266.1572030032673; Fri, 25 Oct 2019 12:00:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572030032; cv=none; d=google.com; s=arc-20160816; b=Vkh7QIXqyA8sEIe10oN51ZvLS6A438ZNTLw+Ri1nDTQOACseZBfyakCu1uraD+6pyl 9ac8zlsZJJeSQq7UXTJzSqV/ojsuK5Zd1TxAf45Y9KzD48iJsS3XDI069sMNRF/IFoIo U+LWfLiruDeyTwrhSdRz4PZJAHUegVQq+H4i0px4vBMkj09ADqXFQBjbZ+uY0wFIGtQu LHSDca4BQ6oFpj7zD70rfVMw8vMtBwA9EGP0jz3jH9OqOXUtSOW20NCTtncTTPErBp62 v3X6yt3FCR1NNTnO1AygxkgsUn8DmHMyI83mJaEs+3EogNl9xT7ssMvPSv/N36zH8ym+ jq2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=sr9Q8Vsd0vOlUf0IxzrhQTylZNd8xgmmuIuQIBlLUWU=; b=k9MCQ17O5RA4DWlc5Cq2XH9gXL4CHC84kw8NeZTzw3jRKv8V9bBA70l5D1bkPTvM8u XEMlxSy2EczxpmJTJCja5bm/mLDT5NdFOGtQAxXze6/i/ycu8Ax849F1x+75ipygL5UH XUj8rROtyot5WeUFVCEg+v00ZOdZFWPBk4kBitcZBJexxNuNDotIhha41I0sP1ZY2/gZ CNXkbkYej8Gx57dqQQ7fMq8ghnbkc0K4dbmqWBXzSpZqvCAZ0HePACXblqzRisw3TMz5 +qtCZbaP9t++q6HVvFht10oYIdCQvlnX0PzXncN8LplgHX3D5krWKxlV3Wk3fDqtAHam bvZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d15si1370356edn.49.2019.10.25.12.00.09; Fri, 25 Oct 2019 12:00:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2438008AbfJXTup (ORCPT + 99 others); Thu, 24 Oct 2019 15:50:45 -0400 Received: from mga07.intel.com ([134.134.136.100]:62195 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437405AbfJXTuo (ORCPT ); Thu, 24 Oct 2019 15:50:44 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Oct 2019 12:50:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,225,1569308400"; d="scan'208";a="282043134" Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga001.jf.intel.com with ESMTP; 24 Oct 2019 12:50:43 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Alex Williamson , Jean-Philippe Brucker Cc: "Yi Liu" , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , "Lu Baolu" , Jonathan Cameron , Eric Auger , Jacob Pan Subject: [PATCH v7 00/11] Nested Shared Virtual Address (SVA) VT-d support Date: Thu, 24 Oct 2019 12:54:53 -0700 Message-Id: <1571946904-86776-1-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Shared virtual address (SVA), a.k.a, Shared virtual memory (SVM) on Intel platforms allow address space sharing between device DMA and applications. SVA can reduce programming complexity and enhance security. This series is intended to enable SVA virtualization, i.e. enable use of SVA within a guest user application. Only IOMMU portion of the changes are included in this series. Additional support is needed in VFIO and QEMU (will be submitted separately) to complete this functionality. To make incremental changes and reduce the size of each patchset. This series does not inlcude support for page request services. In VT-d implementation, PASID table is per device and maintained in the host. Guest PASID table is shadowed in VMM where virtual IOMMU is emulated. .-------------. .---------------------------. | vIOMMU | | Guest process CR3, FL only| | | '---------------------------' .----------------/ | PASID Entry |--- PASID cache flush - '-------------' | | | V | | CR3 in GPA '-------------' Guest ------| Shadow |--------------------------|-------- v v v Host .-------------. .----------------------. | pIOMMU | | Bind FL for GVA-GPA | | | '----------------------' .----------------/ | | PASID Entry | V (Nested xlate) '----------------\.------------------------------. | | |SL for GPA-HPA, default domain| | | '------------------------------' '-------------' Where: - FL = First level/stage one page tables - SL = Second level/stage two page tables This is the remaining VT-d only portion of V5 since the uAPIs and IOASID common code have been applied to Joerg's IOMMU core branch. (https://lkml.org/lkml/2019/10/2/833) The complete set with VFIO patches are here: https://github.com/jacobpan/linux.git:siov_sva The complete nested SVA upstream patches are divided into three phases: 1. Common APIs and PCI device direct assignment 2. Page Request Services (PRS) support 3. Mediated device assignment With this set and the accompanied VFIO code, we will achieve phase #1. Thanks, Jacob ChangeLog: - V7 - Respect vIOMMU PASID range in virtual command PASID/IOASID allocator - Caching virtual command capabilities to avoid runtime checks that could cause vmexits. - V6 - Rebased on top of Joerg's core branch (git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu.git core) - Adapt to new uAPIs and IOASID allocators - V5 Rebased on v5.3-rc4 which has some of the IOMMU fault APIs merged. Addressed v4 review comments from Eric Auger, Baolu Lu, and Jonathan Cameron. Specific changes are as follows: - Refined custom IOASID allocator to support multiple vIOMMU, hotplug cases. - Extracted vendor data from IOMMU guest PASID bind data, for VT-d will support all necessary guest PASID entry fields for PASID bind. - Support non-identity host-guest PASID mapping - Exception handling in various cases - V4 - Redesigned IOASID allocator such that it can support custom allocators with shared helper functions. Use separate XArray to store IOASIDs per allocator. Took advice from Eric Auger to have default allocator use the generic allocator structure. Combined into one patch in that the default allocator is just "another" allocator now. Can be built as a module in case of driver use without IOMMU. - Extended bind guest PASID data to support SMMU and non-identity guest to host PASID mapping https://lkml.org/lkml/2019/5/21/802 - Rebased on Jean's sva/api common tree, new patches starts with [PATCH v4 10/22] - V3 - Addressed thorough review comments from Eric Auger (Thank you!) - Moved IOASID allocator from driver core to IOMMU code per suggestion by Christoph Hellwig (https://lkml.org/lkml/2019/4/26/462) - Rebased on top of Jean's SVA API branch and Eric's v7[1] (git://linux-arm.org/linux-jpb.git sva/api) - All IOMMU APIs are unmodified (except the new bind guest PASID call in patch 9/16) - V2 - Rebased on Joerg's IOMMU x86/vt-d branch v5.1-rc4 - Integrated with Eric Auger's new v7 series for common APIs (https://github.com/eauger/linux/tree/v5.1-rc3-2stage-v7) - Addressed review comments from Andy Shevchenko and Alex Williamson on IOASID custom allocator. - Support multiple custom IOASID allocators (vIOMMUs) and dynamic registration. Jacob Pan (10): iommu/vt-d: Cache virtual command capability register iommu/vt-d: Add custom allocator for IOASID iommu/vt-d: Replace Intel specific PASID allocator with IOASID iommu/vt-d: Move domain helper to header iommu/vt-d: Avoid duplicated code for PASID setup iommu/vt-d: Add nested translation helper function iommu/vt-d: Misc macro clean up for SVM iommu/vt-d: Add bind guest PASID support iommu/vt-d: Support flushing more translation cache types iommu/vt-d: Add svm/sva invalidate function Lu Baolu (1): iommu/vt-d: Enlightened PASID allocation drivers/iommu/Kconfig | 1 + drivers/iommu/dmar.c | 47 +++++++ drivers/iommu/intel-iommu.c | 259 ++++++++++++++++++++++++++++++++-- drivers/iommu/intel-pasid.c | 332 ++++++++++++++++++++++++++++++++++++-------- drivers/iommu/intel-pasid.h | 25 +++- drivers/iommu/intel-svm.c | 298 +++++++++++++++++++++++++++++++-------- include/linux/intel-iommu.h | 43 +++++- include/linux/intel-svm.h | 17 +++ 8 files changed, 890 insertions(+), 132 deletions(-) -- 2.7.4