Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp217724pxb; Tue, 29 Mar 2022 02:56:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyXV97P33v88br0GvnU07aBAZHVsVVUoJJK5DTDn8ZDGkFihFCpwvFUfUhh+9wnVVdv4Ev2 X-Received: by 2002:a17:907:3e99:b0:6df:7ad3:f66b with SMTP id hs25-20020a1709073e9900b006df7ad3f66bmr34079652ejc.230.1648547818691; Tue, 29 Mar 2022 02:56:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648547818; cv=none; d=google.com; s=arc-20160816; b=FU4znmKQgoyYMxxdpy3w/6RqB8Kgmk4HkV1KO9R8EC120dxkJUFjLNe/2NGGx3mY9r 4VIxHSvTXozy7ZnhLjux5sStMfCPQzrcZ46mPiRu2Gf/nDhPtOKDRWMZVqmzh2VinwI7 l6c8Mm61HZ6wcvMk4LWJTN27IGTQNQ0ciTXn5QT98jWMJITwVY7efOiPwa+IQNBFQEdV udcl8g/JUq57wEpvyg/QZJO5b906//OqYhv583tzZxBOCbSpZFN1XsUnD9MUledgyX6K R+dcAQTK6L39o4cKTPXi81lE0l8ClSU3U/+krlqPZlzTp0T56QvjZVq2i9lveSQN3x4S EzNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=migLN9dfB7kQLrZcmAfktSQ3C2xkGbFyKSgNArimZWY=; b=Y7aMQDMMl/UnbDokLrhnkA3nkEpGxDg61K699t8bct172xEsmBH2m+OhYeCvasS+9J qqptJ0r1avTAH+q8f4NubW+J1s+q/1yjv+GmZBsU/PV/GBadZXs1+tlCCwFZ4mL/insP 9I2X3AYtej2UMUVJy2+4nRMke7I9IT4OMia4YUReLyYtjdS7KF7Jd09acDBIRLLe8o1d bmmD6Xvn08Bs/3n5JCViKhIrMMeWrSS0wWA4ohsQ14dH8iDefUEwYbR7DuXIDHmc5VpS IHWpTxh5e0ppndYiesANohmFm19s+Hp/qXqNq5B8mADxoNbBuFQVFubK4bTGE5bBUcjh Ei2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ViGbliQR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v14-20020a056402348e00b0041998f14e58si19510999edc.468.2022.03.29.02.56.31; Tue, 29 Mar 2022 02:56:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ViGbliQR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232548AbiC2FmQ (ORCPT + 99 others); Tue, 29 Mar 2022 01:42:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55916 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232538AbiC2FmJ (ORCPT ); Tue, 29 Mar 2022 01:42:09 -0400 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8999523D45E for ; Mon, 28 Mar 2022 22:40:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648532424; x=1680068424; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=AnPaIsnG/p3ivIG6I+bXTOQ6EzNmHvly5wxHWTR6dqE=; b=ViGbliQRiTxx+eDArgRxSvxi0wJQPCVTTxLCTdSgDHOJFNiQ8TQaI10q 52euLV4EviVBtlmJ+RHV+BgDCMczI5M/+vJ+aIzxBoEF6WDeGB8rvc5n7 1CQd3uZpUQOwZxHhI5XwI8REGXi+O3nTFteTFfjtL6m5sxJOB2j+fzi8v KQDag6AinxUMnRaQINd+Tza7Lbp+18LoVTVxQjGIbHL6TVZMPZUZFCtvZ xNIFhG/VV6ZXMw/c/pMhQOyLQtqL1zOyINymGKTNOoOqtWotgBP4mNIqC BjgO0KuslL9GOw+DK+vI0cLFvPlIABIcyVOxGz4fkbqX9QIxxYQlxU4Qr w==; X-IronPort-AV: E=McAfee;i="6200,9189,10300"; a="259136976" X-IronPort-AV: E=Sophos;i="5.90,219,1643702400"; d="scan'208";a="259136976" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Mar 2022 22:40:23 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,219,1643702400"; d="scan'208";a="694603589" Received: from allen-box.sh.intel.com ([10.239.159.48]) by fmsmga001.fm.intel.com with ESMTP; 28 Mar 2022 22:40:20 -0700 From: Lu Baolu To: Joerg Roedel , Jason Gunthorpe , Christoph Hellwig , Kevin Tian , Ashok Raj , Will Deacon , Robin Murphy , Jean-Philippe Brucker Cc: Eric Auger , Liu Yi L , Jacob jun Pan , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu Subject: [PATCH RFC v2 03/11] iommu/sva: Add iommu_domain type for SVA Date: Tue, 29 Mar 2022 13:37:52 +0800 Message-Id: <20220329053800.3049561-4-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220329053800.3049561-1-baolu.lu@linux.intel.com> References: <20220329053800.3049561-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add a new iommu domain type IOMMU_DOMAIN_SVA to represent an I/O page table which is shared from CPU host VA. Add some helpers to get and put an SVA domain and implement SVA domain life cycle management. Signed-off-by: Lu Baolu --- include/linux/iommu.h | 7 +++ drivers/iommu/iommu-sva-lib.h | 10 ++++ drivers/iommu/iommu-sva-lib.c | 89 +++++++++++++++++++++++++++++++++++ 3 files changed, 106 insertions(+) diff --git a/include/linux/iommu.h b/include/linux/iommu.h index 36f43af0af53..29c4c2edd706 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -42,6 +42,7 @@ struct notifier_block; struct iommu_sva; struct iommu_fault_event; struct iommu_dma_cookie; +struct iommu_sva_cookie; /* iommu fault flags */ #define IOMMU_FAULT_READ 0x0 @@ -64,6 +65,9 @@ struct iommu_domain_geometry { #define __IOMMU_DOMAIN_PT (1U << 2) /* Domain is identity mapped */ #define __IOMMU_DOMAIN_DMA_FQ (1U << 3) /* DMA-API uses flush queue */ +#define __IOMMU_DOMAIN_SHARED (1U << 4) /* Page table shared from CPU */ +#define __IOMMU_DOMAIN_HOST_VA (1U << 5) /* Host CPU virtual address */ + /* * This are the possible domain-types * @@ -86,6 +90,8 @@ struct iommu_domain_geometry { #define IOMMU_DOMAIN_DMA_FQ (__IOMMU_DOMAIN_PAGING | \ __IOMMU_DOMAIN_DMA_API | \ __IOMMU_DOMAIN_DMA_FQ) +#define IOMMU_DOMAIN_SVA (__IOMMU_DOMAIN_SHARED | \ + __IOMMU_DOMAIN_HOST_VA) struct iommu_domain { unsigned type; @@ -95,6 +101,7 @@ struct iommu_domain { void *handler_token; struct iommu_domain_geometry geometry; struct iommu_dma_cookie *iova_cookie; + struct iommu_sva_cookie *sva_cookie; }; static inline bool iommu_is_dma_domain(struct iommu_domain *domain) diff --git a/drivers/iommu/iommu-sva-lib.h b/drivers/iommu/iommu-sva-lib.h index 8909ea1094e3..1a71218b07f5 100644 --- a/drivers/iommu/iommu-sva-lib.h +++ b/drivers/iommu/iommu-sva-lib.h @@ -10,6 +10,7 @@ int iommu_sva_alloc_pasid(struct mm_struct *mm, ioasid_t min, ioasid_t max); struct mm_struct *iommu_sva_find(ioasid_t pasid); +struct mm_struct *iommu_sva_domain_mm(struct iommu_domain *domain); /* I/O Page fault */ struct device; @@ -26,6 +27,8 @@ int iopf_queue_flush_dev(struct device *dev); struct iopf_queue *iopf_queue_alloc(const char *name); void iopf_queue_free(struct iopf_queue *queue); int iopf_queue_discard_partial(struct iopf_queue *queue); +bool iommu_sva_domain_get_user(struct iommu_domain *domain); +void iommu_sva_domain_put_user(struct iommu_domain *domain); #else /* CONFIG_IOMMU_SVA */ static inline int iommu_queue_iopf(struct iommu_fault *fault, void *cookie) @@ -63,5 +66,12 @@ static inline int iopf_queue_discard_partial(struct iopf_queue *queue) { return -ENODEV; } + +static inline bool iommu_sva_domain_get_user(struct iommu_domain *domain) +{ + return false; +} + +static inline void iommu_sva_domain_put_user(struct iommu_domain *domain) { } #endif /* CONFIG_IOMMU_SVA */ #endif /* _IOMMU_SVA_LIB_H */ diff --git a/drivers/iommu/iommu-sva-lib.c b/drivers/iommu/iommu-sva-lib.c index 106506143896..78820be23f15 100644 --- a/drivers/iommu/iommu-sva-lib.c +++ b/drivers/iommu/iommu-sva-lib.c @@ -3,12 +3,21 @@ * Helpers for IOMMU drivers implementing SVA */ #include +#include +#include #include #include "iommu-sva-lib.h" static DEFINE_MUTEX(iommu_sva_lock); static DECLARE_IOASID_SET(iommu_sva_pasid); +static DEFINE_XARRAY_ALLOC(sva_domain_array); + +struct iommu_sva_cookie { + struct mm_struct *mm; + ioasid_t pasid; + refcount_t users; +}; /** * iommu_sva_alloc_pasid - Allocate a PASID for the mm @@ -69,3 +78,83 @@ struct mm_struct *iommu_sva_find(ioasid_t pasid) return ioasid_find(&iommu_sva_pasid, pasid, __mmget_not_zero); } EXPORT_SYMBOL_GPL(iommu_sva_find); + +static struct iommu_domain * +iommu_sva_alloc_domain(struct device *dev, struct mm_struct *mm) +{ + struct bus_type *bus = dev->bus; + struct iommu_sva_cookie *cookie; + struct iommu_domain *domain; + void *curr; + + if (!bus || !bus->iommu_ops) + return NULL; + + cookie = kzalloc(sizeof(*cookie), GFP_KERNEL); + if (!cookie) + return NULL; + + domain = bus->iommu_ops->domain_alloc(IOMMU_DOMAIN_SVA); + if (!domain) + goto err_domain_alloc; + + cookie->mm = mm; + cookie->pasid = mm->pasid; + refcount_set(&cookie->users, 1); + domain->type = IOMMU_DOMAIN_SVA; + domain->sva_cookie = cookie; + curr = xa_store(&sva_domain_array, mm->pasid, domain, GFP_KERNEL); + if (xa_err(curr)) + goto err_xa_store; + + return domain; +err_xa_store: + domain->ops->free(domain); +err_domain_alloc: + kfree(cookie); + return NULL; +} + +static void iommu_sva_free_domain(struct iommu_domain *domain) +{ + xa_erase(&sva_domain_array, domain->sva_cookie->pasid); + kfree(domain->sva_cookie); + domain->ops->free(domain); +} + +bool iommu_sva_domain_get_user(struct iommu_domain *domain) +{ + struct iommu_sva_cookie *cookie = domain->sva_cookie; + + return refcount_inc_not_zero(&cookie->users); +} + +void iommu_sva_domain_put_user(struct iommu_domain *domain) +{ + struct iommu_sva_cookie *cookie = domain->sva_cookie; + + if (refcount_dec_and_test(&cookie->users)) + iommu_sva_free_domain(domain); +} + +static __maybe_unused struct iommu_domain * +iommu_sva_get_domain(struct device *dev, struct mm_struct *mm) +{ + struct iommu_domain *domain; + ioasid_t pasid = mm->pasid; + + if (pasid == INVALID_IOASID) + return NULL; + + domain = xa_load(&sva_domain_array, pasid); + if (!domain) + return iommu_sva_alloc_domain(dev, mm); + iommu_sva_domain_get_user(domain); + + return domain; +} + +struct mm_struct *iommu_sva_domain_mm(struct iommu_domain *domain) +{ + return domain->sva_cookie->mm; +} -- 2.25.1