Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp5820446iob; Tue, 10 May 2022 04:36:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyVGq2GpzG2BpikZ2yhawR13aXRpaQtEh9NqrCC7wRX4nKC/OQ7oD7L6SXPHh6FnJ/+y0jX X-Received: by 2002:a17:90a:930b:b0:1bf:ac1f:6585 with SMTP id p11-20020a17090a930b00b001bfac1f6585mr22458624pjo.88.1652182611555; Tue, 10 May 2022 04:36:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652182611; cv=none; d=google.com; s=arc-20160816; b=mIrzYdTFpmB5gBSbsxOAU4bmy03MSjSuW7bW13bXPCLVy3bPCq5kfkKBEu6oPmxqQ6 fi5tt04lSUC4SCYS7TkxGI0xu1Ak6HX4jnZY8+0VcVTW1Beyge+f7YrZZfjlZnTBSOSw FA3NuJFiuhM8j8nE8vM1Ok55jdaZP8N2rei0RlbDwFpWXYG7+Pmf5IkuCq5LN1DiNKXQ NGadBLsLgVEO+pDDT1mJtlyFXJ/qBjFPxk/e4b89K/wu22uzGOO9IDn0U/w47tqUgYqk d9b5UegPl2B31L9tpocpnr9Q1hAFbfLknOPnKCH5/CZU36MwmKkF75+eDRmI4BP/JkY1 ch6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=fM5eLk+W18lwJKwzhceG0+E5d48YRsE6alyajT0n9qM=; b=GS6EYeg4lOMOWFeNFOf8W/43ALPgCA5JW0HYiUGLrj7kuoNq2uUWh8dGQlFmGtV9ND CJuFRHYq9B4QPaOcaQB/tdE9yMSxFkyOo86+vgR1wy7iFanZBYBXkYX4gquiXaZ37RZj G8bUCjzK+CV+UJ1Y/rB5wIEfwG9fIAePcNAZJBaERZ57fzR6oGw8TXqZSL8sl27cvxho V+1yRMsinYbcWg4SHxPpkBxAT/F+2kZCO8lIes1yY4aT2K+W7J+eaWjvgYvSIGN7cMuc yOiUfI1Caog33XhX2/rxTWEqB1QhDY+fXnTDbq7+cf1XtUXcxAv56mlHWP1dWhOXKWpF mLGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=eL2sb1Ya; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i17-20020a170902c95100b0015d093f3891si3356017pla.584.2022.05.10.04.36.36; Tue, 10 May 2022 04:36:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=eL2sb1Ya; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237248AbiEJG0n (ORCPT + 99 others); Tue, 10 May 2022 02:26:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35712 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237231AbiEJGZv (ORCPT ); Tue, 10 May 2022 02:25:51 -0400 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 426774BFC4 for ; Mon, 9 May 2022 23:21:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1652163694; x=1683699694; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=QroNYLJpUsYM/NBPVJf3TutCJ8ddwM1iHl2fHZWXXoo=; b=eL2sb1YaQXyO1ZrQGtOUV3fPYJSZmD8ON/zFYwXpVn/ZXU+KqS1hIH6c e+BcSLJe/GdFn7E+whRnKDJ5ZiPZKYRG0jnekZmbGukeMCxA/zanbhM9w Tb4nhWirPq8uCeKQCOiJt/jZuTkgSMo4sm6y/yDUVH32Slefe5yL08s15 XRROZS+6LyHBUvQ8VjFOxOzawQVVXPjYQMrYHq37tUAq3l5nYNORFl00K ajNUCBL6yiu/aNkKToy4k0qzQOGV9E5eVkkUdl6CH5yuMaJxPYq6CRGOj SpAIAO2NYvDfnfnxI542cPAorccZPJQjXMToasb81IpQ3jVhyh+uRtPh7 g==; X-IronPort-AV: E=McAfee;i="6400,9594,10342"; a="332313120" X-IronPort-AV: E=Sophos;i="5.91,213,1647327600"; d="scan'208";a="332313120" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 May 2022 23:21:33 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,213,1647327600"; d="scan'208";a="552636709" Received: from allen-box.sh.intel.com ([10.239.159.48]) by orsmga002.jf.intel.com with ESMTP; 09 May 2022 23:21:29 -0700 From: Lu Baolu To: Joerg Roedel , Jason Gunthorpe , Christoph Hellwig , Kevin Tian , Ashok Raj , Will Deacon , Robin Murphy , Jean-Philippe Brucker , Dave Jiang , Vinod Koul Cc: Eric Auger , Liu Yi L , Jacob jun Pan , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu , Jean-Philippe Brucker Subject: [PATCH v6 11/12] iommu: Per-domain I/O page fault handling Date: Tue, 10 May 2022 14:17:37 +0800 Message-Id: <20220510061738.2761430-12-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220510061738.2761430-1-baolu.lu@linux.intel.com> References: <20220510061738.2761430-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Tweak the I/O page fault handling framework to route the page faults to the domain and call the page fault handler retrieved from the domain. This makes the I/O page fault handling framework possible to serve more usage scenarios as long as they have an IOMMU domain and install a page fault handler in it. Some unused functions are also removed to avoid dead code. Signed-off-by: Lu Baolu Reviewed-by: Jean-Philippe Brucker --- drivers/iommu/iommu-sva-lib.h | 2 -- drivers/iommu/io-pgfault.c | 64 ++++------------------------------- drivers/iommu/iommu-sva-lib.c | 20 ----------- 3 files changed, 7 insertions(+), 79 deletions(-) diff --git a/drivers/iommu/iommu-sva-lib.h b/drivers/iommu/iommu-sva-lib.h index 3420654c6e2f..74ce2e76321b 100644 --- a/drivers/iommu/iommu-sva-lib.h +++ b/drivers/iommu/iommu-sva-lib.h @@ -8,8 +8,6 @@ #include #include -struct mm_struct *iommu_sva_find(ioasid_t pasid); - /* I/O Page fault */ struct device; struct iommu_fault; diff --git a/drivers/iommu/io-pgfault.c b/drivers/iommu/io-pgfault.c index aee9e033012f..9efe5259402b 100644 --- a/drivers/iommu/io-pgfault.c +++ b/drivers/iommu/io-pgfault.c @@ -69,69 +69,18 @@ static int iopf_complete_group(struct device *dev, struct iopf_fault *iopf, return iommu_page_response(dev, &resp); } -static enum iommu_page_response_code -iopf_handle_single(struct iopf_fault *iopf) -{ - vm_fault_t ret; - struct mm_struct *mm; - struct vm_area_struct *vma; - unsigned int access_flags = 0; - unsigned int fault_flags = FAULT_FLAG_REMOTE; - struct iommu_fault_page_request *prm = &iopf->fault.prm; - enum iommu_page_response_code status = IOMMU_PAGE_RESP_INVALID; - - if (!(prm->flags & IOMMU_FAULT_PAGE_REQUEST_PASID_VALID)) - return status; - - mm = iommu_sva_find(prm->pasid); - if (IS_ERR_OR_NULL(mm)) - return status; - - mmap_read_lock(mm); - - vma = find_extend_vma(mm, prm->addr); - if (!vma) - /* Unmapped area */ - goto out_put_mm; - - if (prm->perm & IOMMU_FAULT_PERM_READ) - access_flags |= VM_READ; - - if (prm->perm & IOMMU_FAULT_PERM_WRITE) { - access_flags |= VM_WRITE; - fault_flags |= FAULT_FLAG_WRITE; - } - - if (prm->perm & IOMMU_FAULT_PERM_EXEC) { - access_flags |= VM_EXEC; - fault_flags |= FAULT_FLAG_INSTRUCTION; - } - - if (!(prm->perm & IOMMU_FAULT_PERM_PRIV)) - fault_flags |= FAULT_FLAG_USER; - - if (access_flags & ~vma->vm_flags) - /* Access fault */ - goto out_put_mm; - - ret = handle_mm_fault(vma, prm->addr, fault_flags, NULL); - status = ret & VM_FAULT_ERROR ? IOMMU_PAGE_RESP_INVALID : - IOMMU_PAGE_RESP_SUCCESS; - -out_put_mm: - mmap_read_unlock(mm); - mmput(mm); - - return status; -} - static void iopf_handle_group(struct work_struct *work) { struct iopf_group *group; + struct iommu_domain *domain; struct iopf_fault *iopf, *next; enum iommu_page_response_code status = IOMMU_PAGE_RESP_SUCCESS; group = container_of(work, struct iopf_group, work); + domain = iommu_get_domain_for_iopf(group->dev, + group->last_fault.fault.prm.pasid); + if (!domain || !domain->iopf_handler) + status = IOMMU_PAGE_RESP_INVALID; list_for_each_entry_safe(iopf, next, &group->faults, list) { /* @@ -139,7 +88,8 @@ static void iopf_handle_group(struct work_struct *work) * faults in the group if there is an error. */ if (status == IOMMU_PAGE_RESP_SUCCESS) - status = iopf_handle_single(iopf); + status = domain->iopf_handler(&iopf->fault, + domain->fault_data); if (!(iopf->fault.prm.flags & IOMMU_FAULT_PAGE_REQUEST_LAST_PAGE)) diff --git a/drivers/iommu/iommu-sva-lib.c b/drivers/iommu/iommu-sva-lib.c index 32c836e4a60e..ea12504a9e12 100644 --- a/drivers/iommu/iommu-sva-lib.c +++ b/drivers/iommu/iommu-sva-lib.c @@ -52,26 +52,6 @@ static int iommu_sva_alloc_pasid(struct mm_struct *mm, return ret; } -/* ioasid_find getter() requires a void * argument */ -static bool __mmget_not_zero(void *mm) -{ - return mmget_not_zero(mm); -} - -/** - * iommu_sva_find() - Find mm associated to the given PASID - * @pasid: Process Address Space ID assigned to the mm - * - * On success a reference to the mm is taken, and must be released with mmput(). - * - * Returns the mm corresponding to this PASID, or an error if not found. - */ -struct mm_struct *iommu_sva_find(ioasid_t pasid) -{ - return ioasid_find(&iommu_sva_pasid, pasid, __mmget_not_zero); -} -EXPORT_SYMBOL_GPL(iommu_sva_find); - /* * I/O page fault handler for SVA * -- 2.25.1