Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4006534ybg; Fri, 25 Oct 2019 12:00:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqzNCDSdb9nPQrt5izfHjwxNPmmuDnpINnEYkN/NEDRKhaQuiEiMKj93LEpU/Ts/Gbq6p0kS X-Received: by 2002:a05:6402:1492:: with SMTP id e18mr5647561edv.140.1572030048920; Fri, 25 Oct 2019 12:00:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572030048; cv=none; d=google.com; s=arc-20160816; b=zbFihD1eRu4vpSH0oNQqafI6BfjwpPDj0LmAxEsvANdrcKiHhJhLAUpd3SYs2G3Str 4XaE9WYIn6bWE8WswT4uj5gsBM+BNRq6C1t+9FQIUzZPQ2jCGBZ/mSU8cBdzb/+DK8px 0//saKvo7X5EC0b4NeWdFDWJ/PxUnMBC5XaEcbReNJpwrrvp9GWGzICXQh9Tnk58q0A2 TfeU1BORkfRgHhJd6LtSe0/Rm8XfkMlqW06O88hiwz/f37kAA32D+3NF52Baby5z7crp gcxxaohYsCYoJfuN2TJQMb3tBp0hSRGOUPV+D2igAaN6PDyYI1l0ebs5d2RQo78OE6L6 3D/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=75nYB3uPp89tBSo3UYW0dt5btR7fYiEj2XBL648G2fU=; b=fv1gOly1zH5xdq27fjsgMc5jETuOj/OUkw+s3ak4lwVY7NthD1bpsPVlphnXyqdarY FwrvzZvDJAyYPy7WfpfbcQV5a0AaLba7HtIjyBFgFGeeYFHlz7nWkDCDpsUCYfv7x2YR 9fYscrPvzw6VyxfwQz70fXnT1jHIDQrzX7Uhr68D/CCWx/MY2jk4RRWV0fQohma4Wv4O 5F2x64zViIitPIXtf53DlQ79B/CwyxHCMwKnWa3WLFtwjVG1oBVUaZhju9hEVq0rcx/f KeRxQicrDxGb1dSYc1trNRubY+NoBX73Gm7rC4g2vf/Jg+0CnYkKub2sjZ+jM+WO8Var 3zaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h26si1902382edb.303.2019.10.25.12.00.25; Fri, 25 Oct 2019 12:00:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2438407AbfJXTu6 (ORCPT + 99 others); Thu, 24 Oct 2019 15:50:58 -0400 Received: from mga07.intel.com ([134.134.136.100]:62195 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2438184AbfJXTuu (ORCPT ); Thu, 24 Oct 2019 15:50:50 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Oct 2019 12:50:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,225,1569308400"; d="scan'208";a="282043155" Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga001.jf.intel.com with ESMTP; 24 Oct 2019 12:50:43 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Alex Williamson , Jean-Philippe Brucker Cc: "Yi Liu" , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , "Lu Baolu" , Jonathan Cameron , Eric Auger , Jacob Pan Subject: [PATCH v7 07/11] iommu/vt-d: Add nested translation helper function Date: Thu, 24 Oct 2019 12:55:00 -0700 Message-Id: <1571946904-86776-8-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1571946904-86776-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1571946904-86776-1-git-send-email-jacob.jun.pan@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Nested translation mode is supported in VT-d 3.0 Spec.CH 3.8. With PASID granular translation type set to 0x11b, translation result from the first level(FL) also subject to a second level(SL) page table translation. This mode is used for SVA virtualization, where FL performs guest virtual to guest physical translation and SL performs guest physical to host physical translation. Signed-off-by: Jacob Pan Signed-off-by: Liu, Yi L --- drivers/iommu/intel-pasid.c | 207 ++++++++++++++++++++++++++++++++++++++++++++ drivers/iommu/intel-pasid.h | 12 +++ 2 files changed, 219 insertions(+) diff --git a/drivers/iommu/intel-pasid.c b/drivers/iommu/intel-pasid.c index ffbd416ed3b8..f846a907cfcf 100644 --- a/drivers/iommu/intel-pasid.c +++ b/drivers/iommu/intel-pasid.c @@ -415,6 +415,76 @@ pasid_set_flpm(struct pasid_entry *pe, u64 value) pasid_set_bits(&pe->val[2], GENMASK_ULL(3, 2), value << 2); } +/* + * Setup the Extended Memory Type(EMT) field (Bits 91-93) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_emt(struct pasid_entry *pe, u64 value) +{ + pasid_set_bits(&pe->val[1], GENMASK_ULL(29, 27), value << 27); +} + +/* + * Setup the Page Attribute Table (PAT) field (Bits 96-127) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_pat(struct pasid_entry *pe, u64 value) +{ + pasid_set_bits(&pe->val[1], GENMASK_ULL(63, 32), value << 27); +} + +/* + * Setup the Cache Disable (CD) field (Bit 89) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_cd(struct pasid_entry *pe) +{ + pasid_set_bits(&pe->val[1], 1 << 25, 1); +} + +/* + * Setup the Extended Memory Type Enable (EMTE) field (Bit 90) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_emte(struct pasid_entry *pe) +{ + pasid_set_bits(&pe->val[1], 1 << 26, 1); +} + +/* + * Setup the Extended Access Flag Enable (EAFE) field (Bit 135) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_eafe(struct pasid_entry *pe) +{ + pasid_set_bits(&pe->val[2], 1 << 7, 1); +} + +/* + * Setup the Page-level Cache Disable (PCD) field (Bit 95) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_pcd(struct pasid_entry *pe) +{ + pasid_set_bits(&pe->val[1], 1 << 31, 1); +} + +/* + * Setup the Page-level Write-Through (PWT)) field (Bit 94) + * of a scalable mode PASID entry. + */ +static inline void +pasid_set_pwt(struct pasid_entry *pe) +{ + pasid_set_bits(&pe->val[1], 1 << 30, 1); +} + static void pasid_cache_invalidation_with_pasid(struct intel_iommu *iommu, u16 did, int pasid) @@ -647,3 +717,140 @@ int intel_pasid_setup_pass_through(struct intel_iommu *iommu, return 0; } + +static int intel_pasid_setup_bind_data(struct intel_iommu *iommu, + struct pasid_entry *pte, + struct iommu_gpasid_bind_data_vtd *pasid_data) +{ + /* + * Not all guest PASID table entry fields are passed down during bind, + * here we only set up the ones that are dependent on guest settings. + * Execution related bits such as NXE, SMEP are not meaningful to IOMMU, + * therefore not set. Other fields, such as snoop related, are set based + * on host needs regardless of guest settings. + */ + if (pasid_data->flags & IOMMU_SVA_VTD_GPASID_SRE) { + if (!ecap_srs(iommu->ecap)) { + pr_err("No supervisor request support on %s\n", + iommu->name); + return -EINVAL; + } + pasid_set_sre(pte); + } + + if ((pasid_data->flags & IOMMU_SVA_VTD_GPASID_EAFE) && ecap_eafs(iommu->ecap)) + pasid_set_eafe(pte); + + if (pasid_data->flags & IOMMU_SVA_VTD_GPASID_EMTE) { + pasid_set_emte(pte); + pasid_set_emt(pte, pasid_data->emt); + } + + /* + * Memory type is only applicable to devices inside processor coherent + * domain. PCIe devices are not included. We can skip the rest of the + * flags if IOMMU does not support MTS. + */ + if (!ecap_mts(iommu->ecap)) { + pr_info("%s does not support memory type bind guest PASID\n", + iommu->name); + return 0; + } + + if (pasid_data->flags & IOMMU_SVA_VTD_GPASID_PCD) + pasid_set_pcd(pte); + if (pasid_data->flags & IOMMU_SVA_VTD_GPASID_PWT) + pasid_set_pwt(pte); + if (pasid_data->flags & IOMMU_SVA_VTD_GPASID_CD) + pasid_set_cd(pte); + pasid_set_pat(pte, pasid_data->pat); + + return 0; + +} + +/** + * intel_pasid_setup_nested() - Set up PASID entry for nested translation + * which is used for vSVA. The first level page tables are used for + * GVA-GPA translation in the guest, second level page tables are used + * for GPA to HPA translation. + * + * @iommu: Iommu which the device belong to + * @dev: Device to be set up for translation + * @gpgd: FLPTPTR: First Level Page translation pointer in GPA + * @pasid: PASID to be programmed in the device PASID table + * @pasid_data: Additional PASID info from the guest bind request + * @domain: Domain info for setting up second level page tables + * @addr_width: Address width of the first level (guest) + */ +int intel_pasid_setup_nested(struct intel_iommu *iommu, + struct device *dev, pgd_t *gpgd, + int pasid, struct iommu_gpasid_bind_data_vtd *pasid_data, + struct dmar_domain *domain, + int addr_width) +{ + struct pasid_entry *pte; + struct dma_pte *pgd; + u64 pgd_val; + int agaw; + u16 did; + + if (!ecap_nest(iommu->ecap)) { + pr_err("IOMMU: %s: No nested translation support\n", + iommu->name); + return -EINVAL; + } + + pte = intel_pasid_get_entry(dev, pasid); + if (WARN_ON(!pte)) + return -EINVAL; + + pasid_clear_entry(pte); + + /* Sanity checking performed by caller to make sure address + * width matching in two dimensions: + * 1. CPU vs. IOMMU + * 2. Guest vs. Host. + */ + switch (addr_width) { + case 57: + pasid_set_flpm(pte, 1); + break; + case 48: + pasid_set_flpm(pte, 0); + break; + default: + dev_err(dev, "Invalid paging mode %d\n", addr_width); + return -EINVAL; + } + + pasid_set_flptr(pte, (u64)gpgd); + + intel_pasid_setup_bind_data(iommu, pte, pasid_data); + + /* Setup the second level based on the given domain */ + pgd = domain->pgd; + + for (agaw = domain->agaw; agaw != iommu->agaw; agaw--) { + pgd = phys_to_virt(dma_pte_addr(pgd)); + if (!dma_pte_present(pgd)) { + dev_err(dev, "Invalid domain page table\n"); + return -EINVAL; + } + } + pgd_val = virt_to_phys(pgd); + pasid_set_slptr(pte, pgd_val); + pasid_set_fault_enable(pte); + + did = domain->iommu_did[iommu->seq_id]; + pasid_set_domain_id(pte, did); + + pasid_set_address_width(pte, agaw); + pasid_set_page_snoop(pte, !!ecap_smpwc(iommu->ecap)); + + pasid_set_translation_type(pte, PASID_ENTRY_PGTT_NESTED); + pasid_set_present(pte); + pasid_flush_caches(iommu, pte, pasid, did); + + return 0; +} diff --git a/drivers/iommu/intel-pasid.h b/drivers/iommu/intel-pasid.h index e413e884e685..09c85db73b77 100644 --- a/drivers/iommu/intel-pasid.h +++ b/drivers/iommu/intel-pasid.h @@ -46,6 +46,7 @@ * to vmalloc or even module mappings. */ #define PASID_FLAG_SUPERVISOR_MODE BIT(0) +#define PASID_FLAG_NESTED BIT(1) struct pasid_dir_entry { u64 val; @@ -55,6 +56,11 @@ struct pasid_entry { u64 val[8]; }; +#define PASID_ENTRY_PGTT_FL_ONLY (1) +#define PASID_ENTRY_PGTT_SL_ONLY (2) +#define PASID_ENTRY_PGTT_NESTED (3) +#define PASID_ENTRY_PGTT_PT (4) + /* The representative of a PASID table */ struct pasid_table { void *table; /* pasid table pointer */ @@ -103,6 +109,12 @@ int intel_pasid_setup_second_level(struct intel_iommu *iommu, int intel_pasid_setup_pass_through(struct intel_iommu *iommu, struct dmar_domain *domain, struct device *dev, int pasid); +int intel_pasid_setup_nested(struct intel_iommu *iommu, + struct device *dev, pgd_t *pgd, + int pasid, + struct iommu_gpasid_bind_data_vtd *pasid_data, + struct dmar_domain *domain, + int addr_width); void intel_pasid_tear_down_entry(struct intel_iommu *iommu, struct device *dev, int pasid); int vcmd_alloc_pasid(struct intel_iommu *iommu, unsigned int *pasid); -- 2.7.4