Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1316404ybt; Sun, 14 Jun 2020 18:38:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyyJrz5c4H0hsDBxtMHf3uKgdEpXAikeQ0xv5zgxm3Q1cr9aXYE57/oeysONlUxtLmHoeXL X-Received: by 2002:a17:906:af6b:: with SMTP id os11mr23634741ejb.291.1592185088568; Sun, 14 Jun 2020 18:38:08 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1592185088; cv=pass; d=google.com; s=arc-20160816; b=ZCHlQea8IhioZJ1XV8yt+pRIw7oYaUBzo3LHCF3Z8Ot+e3kn5Zemy+I4sSFGuxzRzw rE6fajfyTzGdaLt+TMxEP0RT83VFVxfn0M0xhUXjoREjJa6y7Vj9LoLyaitq7rhr2YTv AqfRAMhE3z65GNqqNuUrrCkSHtyzotXatRDPOM9FeMY0SN+u8OOfV2MEQ3b1dV3WcyLa hSXPHc1uQwoTH8bUG1K9gzX54kPjZIslrIJFdHy+JpELGYcRlJfM8CFXZXrMDJX3ySwu NjtsollLze4zsCadbAG38eVAKlagWjPIuKmoqGDwFj3Gn1PjttNkUqdJAt5amYeE8EH+ 6Zyw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :dlp-reaction:dlp-product:dlp-version:content-language :accept-language:in-reply-to:references:message-id:date:thread-index :thread-topic:subject:cc:to:from:dkim-signature:ironport-sdr :ironport-sdr; bh=DDqVpS3Nj6/ifapz+1rwuenn3o19rtH5Qa9qqmcSSVE=; b=etaH/p7XKPJ44IKNEU70lu+BM+Bj04aUiJ8ZR9XBc1mhVDNXIScH6m31BHMCgixcl5 JnZf9HD7Sbq+GWYyFy/wCgYg398zykOsyaV1KTb4mTdS53Vc/w+l8RmltfHbRpYRgqDe EtbtnGC4IcpBtyRpBpA6XIZRD0w5U5vOaD35nMh//3kxeEMmsvxyv8LkpL1BTuLQUVgD Et8VHVUu9CoMXyojH+4gV3N/DWar0NPwbqOCoG6IGk31bhjlZkgu2X63RJTFx+5tva64 5xWQOSrYpmt/O8Gq9F16+ee2GgI50C1zjDoH/b/VRvByvJBOssBLjWfosnF3tm6g5DKt Ibug== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=RFXWwBpM; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k7si8053517ejq.493.2020.06.14.18.37.34; Sun, 14 Jun 2020 18:38:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=RFXWwBpM; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728108AbgFOBWm (ORCPT + 99 others); Sun, 14 Jun 2020 21:22:42 -0400 Received: from mga03.intel.com ([134.134.136.65]:45600 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727969AbgFOBWm (ORCPT ); Sun, 14 Jun 2020 21:22:42 -0400 IronPort-SDR: 6qfZuJGJpE72WU/QbS0ciV4N66sdg+FkOLsZRl+TMbKpLn2yuvOGaaNFVTC9GWcnj4JqSjoqxo nVs0b/FndYNA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Jun 2020 18:22:39 -0700 IronPort-SDR: bFlKrqjbPMpRTl7bvdE6TFGkjs8imNNvfsOsuuOQvMxGcAZ6cYDakfQcWnf2Gmf82iUtPPNQjY pYaISxKME4WA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,513,1583222400"; d="scan'208";a="475752402" Received: from orsmsx102.amr.corp.intel.com ([10.22.225.129]) by fmsmga006.fm.intel.com with ESMTP; 14 Jun 2020 18:22:38 -0700 Received: from orsmsx121.amr.corp.intel.com (10.22.225.226) by ORSMSX102.amr.corp.intel.com (10.22.225.129) with Microsoft SMTP Server (TLS) id 14.3.439.0; Sun, 14 Jun 2020 18:22:38 -0700 Received: from ORSEDG002.ED.cps.intel.com (10.7.248.5) by ORSMSX121.amr.corp.intel.com (10.22.225.226) with Microsoft SMTP Server (TLS) id 14.3.439.0; Sun, 14 Jun 2020 18:22:38 -0700 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.46) by edgegateway.intel.com (134.134.137.101) with Microsoft SMTP Server (TLS) id 14.3.439.0; Sun, 14 Jun 2020 18:22:38 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Q/CE2G6MPmGIYqCdfwS09WivnRtDhtgWMa2ek8Zf2/4n/MoRRxYEkyuqnyPXNYs8YOVxgqpTpsf8dEeYGZAMGQyuf5noj9soBVFJynxyFwyDm7NtLOIpVQQdzozajgRb6CXkmFYpDi5mX+m2n7/TwBq0N4v6HxFpz1wydFiRdPq9ViaLwoiXgfwzjyenjR998Ra1kEoqJwySXcaib0/Hz+hfXmwNX+DE6rVXToLoQP9GEgj/w9/VCXfMsa7G7jFCZui0q1coZrfSKycL0urQUP69cHvcffFsQWy3Cil5xr7w9DitO1JAok76U06CENVth01zr0nr67dpfYda7LCJVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DDqVpS3Nj6/ifapz+1rwuenn3o19rtH5Qa9qqmcSSVE=; b=oK4tfaASJf0LHJxdvAcxX2OBs2VPkDfXJHX4D6RfEk3ue1fyjeMzV1KwSQKNMf0kYkwm2UZuF1JSNa1UVI4eTj0AGWX6Y5eTPy9HUwVIpu/G4Ks1cSeuZiRdnxOejCPvPUdv6GMqgwqN2ee9FC20sCFnPng0QG5EsvTLgc6uS4AFjXyMqrHZnj5mFf4DBCECloRc9bPh0+44uzb9KLIXbjOKQRdCrFmXBcyV4kqGSx8q3LzYh9tKFvreZRRvTCwaeB0Wek+FQHvKKEygoyWmPuXOVG/T43Z9iIlj4Pm95t/UbcuMF/O0CKmUsLmaCXcWWmq3qngBuHG8cZVrF0Ee7w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DDqVpS3Nj6/ifapz+1rwuenn3o19rtH5Qa9qqmcSSVE=; b=RFXWwBpMdEqeIq7ZRawMkEme80MdObwxcJpNKk+wxzTTVDJuiPIW+lt8BIQfnhqfP21KrJPpRpG8snMkY8vix7rP3YvV8cW+0jGys4KPZUI5x93nFyDF8Xdf4uaqermKsapheRMoDtFpo9j25MN1N9x+Dwnsgycr4UgrEG29YWs= Received: from MWHPR11MB1645.namprd11.prod.outlook.com (2603:10b6:301:b::12) by MWHPR11MB0014.namprd11.prod.outlook.com (2603:10b6:301:64::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3088.18; Mon, 15 Jun 2020 01:22:37 +0000 Received: from MWHPR11MB1645.namprd11.prod.outlook.com ([fe80::9864:e0cb:af36:6feb]) by MWHPR11MB1645.namprd11.prod.outlook.com ([fe80::9864:e0cb:af36:6feb%5]) with mapi id 15.20.3088.028; Mon, 15 Jun 2020 01:22:37 +0000 From: "Tian, Kevin" To: "Liu, Yi L" , Alex Williamson CC: "eric.auger@redhat.com" , "baolu.lu@linux.intel.com" , "joro@8bytes.org" , "jacob.jun.pan@linux.intel.com" , "Raj, Ashok" , "Tian, Jun J" , "Sun, Yi Y" , "jean-philippe@linaro.org" , "peterx@redhat.com" , "Wu, Hao" , "iommu@lists.linux-foundation.org" , "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: RE: [PATCH v2 02/15] iommu: Report domain nesting info Thread-Topic: [PATCH v2 02/15] iommu: Report domain nesting info Thread-Index: AQHWP+lAh6LCFwZsRk6rW47Mu2S6h6jTzaSAgADjv4CABDOwQA== Date: Mon, 15 Jun 2020 01:22:37 +0000 Message-ID: References: <1591877734-66527-1-git-send-email-yi.l.liu@intel.com> <1591877734-66527-3-git-send-email-yi.l.liu@intel.com> <20200611133015.1418097f@x1.home> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.2.0.6 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.55.52.196] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 82000480-8ea1-4b14-7ead-08d810ca96c4 x-ms-traffictypediagnostic: MWHPR11MB0014: x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-forefront-prvs: 04359FAD81 x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 0LUNhG/PL3pbutkPYb2kPwV6+0JuP2vA5vK3v9KRM7VmtGOg4GxlUsRVOoruuIzrqN4UZ0AKkXe3kVXaDInhAqhXlkCdck4tWNV5onYK7iW1376aqpwORCffy0759xVoLFf2Zc/7D02tP03hSA0zAUWbmUC+XgV5Y2XN1ElPoFivwkMFEFi1HKgZpXZcjxcx5dY0/rs1lPla2jkvfig75oaTDgU+wWAgEJ9Afr5hlTDW/SV9gYMV35sqQbRMy66dGgPIsGArKy7CM7LQN/ArEbNtnJ4H9Agz+HqAIJ+vr2jFCubaj8ozBUl37leZsSI3VShGnDj5ielE/9gGIYggsw== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MWHPR11MB1645.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(396003)(136003)(366004)(39860400002)(376002)(346002)(66946007)(33656002)(71200400001)(66556008)(64756008)(52536014)(66476007)(66446008)(76116006)(6506007)(8676002)(86362001)(478600001)(7696005)(186003)(8936002)(5660300002)(110136005)(54906003)(316002)(2906002)(26005)(9686003)(4326008)(7416002)(55016002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: dLqypIN2zn3cmuK9rT1twCa5/InKnha1h+vnNBAIgUpDh9vxXENcwQUVYon27rdipjl4AyzowoiOexqtjRmf9+V/xVdpyoAsuQQryGQGF1+GGtTW+E/aG2AClTOj+Rdnxgg25iIfI207+Ey4d1VxKJ595Fuqerzkp5BR/tNvvxwF06BS2/xhO2PIv8ysGDT796wcn4qbDUyB+aIXAaFyabJcK3kHVXR5fWDU5z57pqwEx2GDNVhVEt36zPaF/MRTOEUvtX2KKiueU7RatgTItebG/y1Qyh07fn6L+C8jHzAeh0a4h+o7gc0g6cTWvvY+kTmzy0xa/Y3DDxQBgiSPPekv1PjdxGBtlQonNYQcoPyKeJ7LRhW5kzBWxhf76m/kRLenQXoIb5Lnw2YuBMFQWrmYLwCeC0s1LaOI9jLm5Dd9Et9UCfqCTjCtXLp5U1pvX5CDQZ9kjVrv5CeDTiwkOR/MqN1ZvpIAb+THfobuJ5U= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-Network-Message-Id: 82000480-8ea1-4b14-7ead-08d810ca96c4 X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jun 2020 01:22:37.0483 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: vFMDjdpZxwijQ/eSzCgnOc2VgXwMjxBFo3L7Ftczk7pjF20NSCqRiYU64w/kykTWENk4okRSHgIxKspqQgMczA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB0014 X-OriginatorOrg: intel.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > From: Liu, Yi L > Sent: Friday, June 12, 2020 5:05 PM >=20 > Hi Alex, >=20 > > From: Alex Williamson > > Sent: Friday, June 12, 2020 3:30 AM > > > > On Thu, 11 Jun 2020 05:15:21 -0700 > > Liu Yi L wrote: > > > > > IOMMUs that support nesting translation needs report the capability > > > info to userspace, e.g. the format of first level/stage paging struct= ures. > > > > > > Cc: Kevin Tian > > > CC: Jacob Pan > > > Cc: Alex Williamson > > > Cc: Eric Auger > > > Cc: Jean-Philippe Brucker > > > Cc: Joerg Roedel > > > Cc: Lu Baolu > > > Signed-off-by: Liu Yi L > > > Signed-off-by: Jacob Pan > > > --- > > > @Jean, Eric: as nesting was introduced for ARM, but looks like no > > > actual user of it. right? So I'm wondering if we can reuse > > > DOMAIN_ATTR_NESTING to retrieve nesting info? how about your > opinions? > > > > > > include/linux/iommu.h | 1 + > > > include/uapi/linux/iommu.h | 34 > ++++++++++++++++++++++++++++++++++ > > > 2 files changed, 35 insertions(+) > > > > > > diff --git a/include/linux/iommu.h b/include/linux/iommu.h index > > > 78a26ae..f6e4b49 100644 > > > --- a/include/linux/iommu.h > > > +++ b/include/linux/iommu.h > > > @@ -126,6 +126,7 @@ enum iommu_attr { > > > DOMAIN_ATTR_FSL_PAMUV1, > > > DOMAIN_ATTR_NESTING, /* two stages of translation */ > > > DOMAIN_ATTR_DMA_USE_FLUSH_QUEUE, > > > + DOMAIN_ATTR_NESTING_INFO, > > > DOMAIN_ATTR_MAX, > > > }; > > > > > > diff --git a/include/uapi/linux/iommu.h b/include/uapi/linux/iommu.h > > > index 303f148..02eac73 100644 > > > --- a/include/uapi/linux/iommu.h > > > +++ b/include/uapi/linux/iommu.h > > > @@ -332,4 +332,38 @@ struct iommu_gpasid_bind_data { > > > }; > > > }; > > > > > > +struct iommu_nesting_info { > > > + __u32 size; > > > + __u32 format; > > > + __u32 features; > > > +#define IOMMU_NESTING_FEAT_SYSWIDE_PASID (1 << 0) > > > +#define IOMMU_NESTING_FEAT_BIND_PGTBL (1 << 1) > > > +#define IOMMU_NESTING_FEAT_CACHE_INVLD (1 << 2) > > > + __u32 flags; > > > + __u8 data[]; > > > +}; > > > + > > > +/* > > > + * @flags: VT-d specific flags. Currently reserved for future > > > + * extension. > > > + * @addr_width: The output addr width of first level/stage translati= on > > > + * @pasid_bits: Maximum supported PASID bits, 0 represents no > PASID > > > + * support. > > > + * @cap_reg: Describe basic capabilities as defined in VT-d > capability > > > + * register. > > > + * @cap_mask: Mark valid capability bits in @cap_reg. > > > + * @ecap_reg: Describe the extended capabilities as defined in VT-d > > > + * extended capability register. > > > + * @ecap_mask: Mark the valid capability bits in @ecap_reg. > > > > Please explain this a little further, why do we need to tell userspace = about > > cap/ecap register bits that aren't valid through this interface? > > Thanks, >=20 > we only want to tell userspace about the bits marked in the cap/ecap_mask= . > cap/ecap_mask is kind of white-list of the cap/ecap register. userspace > should > only care about the bits in the white-list, for other bits, it should ign= ore. >=20 > Regards, > Yi Liu For invalid bits if kernel just clears them then do we still need additiona= l mask bits to explicitly mark them out? I guess this might be the point that= =20 Alex asked... >=20 > > Alex > > > > > > > + */ > > > +struct iommu_nesting_info_vtd { > > > + __u32 flags; > > > + __u16 addr_width; > > > + __u16 pasid_bits; > > > + __u64 cap_reg; > > > + __u64 cap_mask; > > > + __u64 ecap_reg; > > > + __u64 ecap_mask; > > > +}; > > > + > > > #endif /* _UAPI_IOMMU_H */