Received: by 2002:a05:7412:7c14:b0:fa:6e18:a558 with SMTP id ii20csp225609rdb; Mon, 22 Jan 2024 02:00:44 -0800 (PST) X-Google-Smtp-Source: AGHT+IFjkfbm8r6NJdL1l/zyDj+EDtIDTaiiOxwGALmqZKvLlKED9czTNadPFRNDF36BYHxlxT3b X-Received: by 2002:a05:6a20:9597:b0:19b:90d8:2a15 with SMTP id iu23-20020a056a20959700b0019b90d82a15mr2075444pzb.67.1705917643664; Mon, 22 Jan 2024 02:00:43 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705917643; cv=pass; d=google.com; s=arc-20160816; b=GKWvvqRmQBNQVNLpdAMDC0KWdIIVBCw5r+BkxcqUA/fN6e/gY1l2lOP6tpVuXQiBsp NT+PIK6rzcZK2aR4NJftg7YNqOUvKbhDf+I2WpMZESi+2riNjtV+obiS7PYoe69bsB01 P0EwIDmMBF8zty+wmCtLH8d3U6N7y4+esPlXMShxVkow87FE1SGeTWQfaBbMRR7mc99U wnL4nG9YexY++QDOwD9L854UuLxmZDoPJ7ZsAd3JlYD9tUVz8YzUaqDT435P9QWcAuXT PWwXo+M6OqKnRaYeVPVOdiMk5kp5/5gJLsuwWcENk7pTWVYglvSaADuS8lGWmfYuRd12 X8+g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=y6mNd8ukwt/cavaxiLc2Jxy1lq9Hti6hBMLCgyGpW0I=; fh=tXslIEC/iII+0o9YvlUtRXapl6zSPusBr1yEidN1Q7w=; b=SIZQkYAisV3Ab7GkDV/LtulfjFfYVoRTDP4bt4fmmzhk/IpR/GXAQZ98fiqztsO1Ww xHYVQe/jWmxMqd0W52enXfsUibQpYSnDmkN/QTGFx79oEOxRsGAu8BCv3qegXZmBBII3 lgZoZsAKQnV3nQBfc485JNn9bZado3QM0KtoXO+bQISpr33Y5JlsIHBJWTt0wXX9Phq/ 4BU4iNrcHxp7UuHHhxn7cJyUbQ+0jowabZ+0sNgqZnvtON1TBXs+p5eiOqnp0OU1DrIE t/ExpSKRD3yhjP7zLeadzODW3IHmWz081uN6BYVAl1jEWk3hRRVTYyqW8qgYSE+jmA9H ktlg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=iJngVLvI; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-32451-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32451-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id bo10-20020a056a000e8a00b006d9a15adaeasi9982196pfb.115.2024.01.22.02.00.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Jan 2024 02:00:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-32451-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=iJngVLvI; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-32451-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32451-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id C68D3B22B70 for ; Mon, 22 Jan 2024 07:44:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id AFE8416410; Mon, 22 Jan 2024 07:44:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="iJngVLvI" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5E09116416 for ; Mon, 22 Jan 2024 07:44:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.7 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705909474; cv=none; b=r6z/O0/v680yT8sd7VOougL/b6oduXuWibDNY10ovtSH85muni7eo53QPqDk+pSgIbj1z7f5EfwUKqE0OI9r3a1dBk4ozQ3fy6yQpifzPsWolLsyscWb2sFb9/DdQxVRh5xX7qh22p36lRgpSzWzKeTL8sb1U6u9j9YU6MLixCI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705909474; c=relaxed/simple; bh=WaeZbozXHzble1W02cueiTjc38Ii0RT3AX9RzeBAuRA=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=pzzcs//BIxEioMR9/cVRdoigU4LVnNzjFBwWsTfJIj36oB8vd4IMGKfslx/c/HzwwTCtO7Fi2gq81NTqlqRlkRU95tLij1cGFxzlVZRoe16yue9fWHtOyqmA88A7IcTaezQzIskYi2tTmOtkMqCIUGAuwLiGPdsjdNQLMF0FP6A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=iJngVLvI; arc=none smtp.client-ip=192.198.163.7 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1705909473; x=1737445473; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=WaeZbozXHzble1W02cueiTjc38Ii0RT3AX9RzeBAuRA=; b=iJngVLvILBFpjOQVM9vO+sOS12IBRx2dgRLz8k8leq5dXUZ2VX4uK6Nc d48mMD8aPqd+ftoScUlV2YpaI5d4USkPrPIp9Z+VPMYKQDNvkhshIxvUc N9mscpKBVNyvwqSFc4QmwE4gcrPob72fuLm++69fRNDeIMiDriTtQ5Rng emzn3Ms4JNgWX/4EK5jPsPQm23zeQ9lNeuiRyhKDFtxb9Rf9z2+K8noeB 4fMBE2Gemmfj8UAAvKpDeESIvZizSsryf7Lq9YX8tG/wDMR+TIRzV7Olo +CwVNK4k09KaZkS37oAI0/5prU5BnToGrlUx1CP6741bHw/3Zdk9xKH+L w==; X-IronPort-AV: E=McAfee;i="6600,9927,10960"; a="22611477" X-IronPort-AV: E=Sophos;i="6.05,211,1701158400"; d="scan'208";a="22611477" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Jan 2024 23:44:31 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10960"; a="778504953" X-IronPort-AV: E=Sophos;i="6.05,211,1701158400"; d="scan'208";a="778504953" Received: from allen-box.sh.intel.com ([10.239.159.127]) by orsmga007.jf.intel.com with ESMTP; 21 Jan 2024 23:44:27 -0800 From: Lu Baolu To: Jason Gunthorpe , Kevin Tian , Joerg Roedel , Will Deacon , Robin Murphy , Jean-Philippe Brucker , Nicolin Chen , Yi Liu , Jacob Pan , Joel Granados Cc: iommu@lists.linux.dev, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu Subject: [PATCH v3 0/8] IOMMUFD: Deliver IO page faults to user space Date: Mon, 22 Jan 2024 15:38:55 +0800 Message-Id: <20240122073903.24406-1-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This series implements the functionality of delivering IO page faults to user space through the IOMMUFD framework. One feasible use case is the nested translation. Nested translation is a hardware feature that supports two-stage translation tables for IOMMU. The second-stage translation table is managed by the host VMM, while the first-stage translation table is owned by user space. This allows user space to control the IOMMU mappings for its devices. When an IO page fault occurs on the first-stage translation table, the IOMMU hardware can deliver the page fault to user space through the IOMMUFD framework. User space can then handle the page fault and respond to the device top-down through the IOMMUFD. This allows user space to implement its own IO page fault handling policies. User space application that is capable of handling IO page faults should allocate a fault object, and bind the fault object to any domain that it is willing to handle the fault generatd for them. On a successful return of fault object allocation, the user can retrieve and respond to page faults by reading or writing to the file descriptor (FD) returned. The iommu selftest framework has been updated to test the IO page fault delivery and response functionality. This series is based on the page fault handling framework refactoring in the IOMMU core [1]. The series and related patches are available on GitHub: [2] [1] https://lore.kernel.org/linux-iommu/20240122054308.23901-1-baolu.lu@linux.intel.com/ [2] https://github.com/LuBaolu/intel-iommu/commits/iommufd-io-pgfault-delivery-v3 Best regards, baolu Change log: v3: - Add iopf domain attach/detach/replace interfaces to manage the reference counters of hwpt and device, ensuring that both can only be destroyed after all outstanding IOPFs have been responded to. - Relocate the fault handling file descriptor from hwpt to a fault object to enable a single fault handling object to be utilized across multiple domains. - Miscellaneous cleanup and performance improvements. v2: https://lore.kernel.org/linux-iommu/20231026024930.382898-1-baolu.lu@linux.intel.com/ - Move all iommu refactoring patches into a sparated series and discuss it in a different thread. The latest patch series [v6] is available at https://lore.kernel.org/linux-iommu/20230928042734.16134-1-baolu.lu@linux.intel.com/ - We discussed the timeout of the pending page fault messages. We agreed that we shouldn't apply any timeout policy for the page fault handling in user space. https://lore.kernel.org/linux-iommu/20230616113232.GA84678@myrica/ - Jason suggested that we adopt a simple file descriptor interface for reading and responding to I/O page requests, so that user space applications can improve performance using io_uring. https://lore.kernel.org/linux-iommu/ZJWjD1ajeem6pK3I@ziepe.ca/ v1: https://lore.kernel.org/linux-iommu/20230530053724.232765-1-baolu.lu@linux.intel.com/ Lu Baolu (8): iommu: Add iopf domain attach/detach/replace interface iommu/sva: Use iopf domain attach/detach interface iommufd: Add fault and response message definitions iommufd: Add iommufd fault object iommufd: Associate fault object with iommufd_hw_pgtable iommufd: IOPF-capable hw page table attach/detach/replace iommufd/selftest: Add IOPF support for mock device iommufd/selftest: Add coverage for IOPF test include/linux/iommu.h | 40 +- drivers/iommu/iommufd/iommufd_private.h | 41 ++ drivers/iommu/iommufd/iommufd_test.h | 8 + include/uapi/linux/iommufd.h | 91 ++++ tools/testing/selftests/iommu/iommufd_utils.h | 83 +++- drivers/iommu/io-pgfault.c | 215 ++++++++-- drivers/iommu/iommu-sva.c | 48 ++- drivers/iommu/iommufd/device.c | 16 +- drivers/iommu/iommufd/fault.c | 391 ++++++++++++++++++ drivers/iommu/iommufd/hw_pagetable.c | 36 +- drivers/iommu/iommufd/main.c | 6 + drivers/iommu/iommufd/selftest.c | 63 +++ tools/testing/selftests/iommu/iommufd.c | 17 + .../selftests/iommu/iommufd_fail_nth.c | 2 +- drivers/iommu/iommufd/Makefile | 1 + 15 files changed, 1001 insertions(+), 57 deletions(-) create mode 100644 drivers/iommu/iommufd/fault.c -- 2.34.1