Received: by 2002:ab2:1149:0:b0:1f3:1f8c:d0c6 with SMTP id z9csp2469880lqz; Tue, 2 Apr 2024 20:47:24 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUir8sZ8OkiExa9vaMOZ5e/DV6CLUK8nyV5QoGIm/t59iEP7yg7U8iMtqtgNMjSIrc7cRDCPxxrVIDp99ARmGh2gipiB84c8KlsrjhueA== X-Google-Smtp-Source: AGHT+IGq64jMITu7nlVTUWml3HBPfGsxm+ptPFfRBE+EaTAUOv9cdczUwp/pn5v+MmzQ3t5FZW0Q X-Received: by 2002:a17:906:16d8:b0:a4e:70ed:e2c6 with SMTP id t24-20020a17090616d800b00a4e70ede2c6mr1188651ejd.31.1712116044218; Tue, 02 Apr 2024 20:47:24 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1712116044; cv=pass; d=google.com; s=arc-20160816; b=rXYff6HYd0BHetc8jRkHkPYoKNh9A1nqdM5DdwhnOqUMPXAuGSAxd3VN1owiRS8h9C qstHc+kV+ZuR+c8sx6hN9nwWlOhxl28ydIxETTZLwrpW6fvugzZlztyKJikcR2gC2zPa iqrsg9RCbO/m946aRqf71ix5rBlwz9sbbyzpZ7RbW2G3Elf0skFnn/YtSbVR+OYABxrP cnz0zhTjrCTO26Dzu7sjCyz03qxqtnkcimjIyrZvZr/a54nQG3Qtw7Vzvd4DZvtAnrZK 8g382o6sy2DgFcNVmg/b954tJkTleLpxS1yhDzits+KBUQdKIijmpYKLeZenO5ViJhsB urGA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=Lrc+wAYAOfj54tJ1Ja+0GUL9a2C6mctOKXVBme3dL5A=; fh=tXslIEC/iII+0o9YvlUtRXapl6zSPusBr1yEidN1Q7w=; b=JeRvO9JBUPUS0bDxLcqM2OfH77VvI7n+Rf6SXV6aE9o32l8PWQtMv+l8OEG4N6Pw2L g4FSY37CCwItZxsOiTDhSBjNKkEGgiH5lUFlAN8BNMantf+8javEVfc3ISdnhVa83iTF vlD8PEkp1PKYclk8ynRUaSmVgFecO8RO3x3eDvOXcBIpwyBVOs7Zx1wudaFqLW6NQK6F YkVrXSpMdvu5Pa3UmMv4NaC1L9JGML/tuIW8ycyK+VybBOh0EihoH0CVEgW5vMCXelNz oeEqbqfiKlE26mBZ0H0pLCZ2OCtXoaT+tFXzQT9pt2CCTK/atfaYFfxlGaRNlj+ZiWOX Jxug==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=fJ50OBKR; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-128921-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-128921-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id dt2-20020a170906b78200b00a47100a7144si6571492ejb.199.2024.04.02.20.47.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Apr 2024 20:47:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-128921-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=fJ50OBKR; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-128921-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-128921-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id B19021F26533 for ; Wed, 3 Apr 2024 01:18:15 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7BA073D56F; Wed, 3 Apr 2024 01:16:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="fJ50OBKR" Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 951482E62F for ; Wed, 3 Apr 2024 01:16:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.16 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712107009; cv=none; b=OOIhb6teWfWONqY6/x4vAsM20P7wMEROXnhAGvyPmMBnccmQtY5F++PXyZu+6k1KEOluGwcQFVCNKal/RmzzyIC2OzAvmH5PPedh87e0JOyliv0IEyuxZ33w4ErBHPb0Th0G8L+nyM1QnFpUVcnk7TaV80iQ4dIbNn4csHxuOzQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1712107009; c=relaxed/simple; bh=b7TJ0f955tOKCT0EcM00BUcCZoKgdNaMTCXKLFWx9x4=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=HFUti2nsgQWe2Ai+Scjtdue71fiFu2uRj2fN1elWXndpw7F9UDI7vF+4ug/EWDrMUCT2KjG7Ymt8p5oDHvI1L69q4TjBjMBw5YP3Ug9pJN5R/dMBpSsk+bIq9tbciX7HB7NcA5nEhZXQBjIJLm90k2N9meaBS6CTrH0PL3FYENs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=fJ50OBKR; arc=none smtp.client-ip=198.175.65.16 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1712107007; x=1743643007; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=b7TJ0f955tOKCT0EcM00BUcCZoKgdNaMTCXKLFWx9x4=; b=fJ50OBKRT0MGSsIo9HqH4JrrjscCZ5PHPW3+DkftG+8YhFnAT2WN57qT n/iYoqrG22gzU/7sjWeReTwOHOL0e2Mj4PgY6gZ0JvvlcUrx2FFp2BuSt GrpmpZOW4/oH9I9aG1rSqt5ZMiz7+HEZGsgFNjPDBtYb1oBYqAS4JDDM1 R5qBxTISqLSLlmaHvay2ObjC30MuiHYCvzWHAqIaRfKCyOm8E+yba4Jrp d5AcbH5SWgvB593JAQ5Oix+whgQ3ny4TGXXJySG14EOYz4Nc5DCTEI4Rz dsXaDKjsJ16Dq25howA93tcOD7SGreQPkLGOo07WjPorjNd50dtXPw5MT A==; X-CSE-ConnectionGUID: OlxEcg4FTN+GZVMtZUHZsQ== X-CSE-MsgGUID: lv8BxNw9TKGLsS38/fxMbA== X-IronPort-AV: E=McAfee;i="6600,9927,11032"; a="7439806" X-IronPort-AV: E=Sophos;i="6.07,176,1708416000"; d="scan'208";a="7439806" Received: from orviesa003.jf.intel.com ([10.64.159.143]) by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2024 18:16:47 -0700 X-CSE-ConnectionGUID: iQL+MAlSQbCguAZ9/PzDpA== X-CSE-MsgGUID: ikxUkevlRwaGnGq73QaT9g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.07,176,1708416000"; d="scan'208";a="22953316" Received: from allen-box.sh.intel.com ([10.239.159.127]) by orviesa003.jf.intel.com with ESMTP; 02 Apr 2024 18:16:45 -0700 From: Lu Baolu To: Jason Gunthorpe , Kevin Tian , Joerg Roedel , Will Deacon , Robin Murphy , Jean-Philippe Brucker , Nicolin Chen , Yi Liu , Jacob Pan , Joel Granados Cc: iommu@lists.linux.dev, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu Subject: [PATCH v4 7/9] iommufd: Associate fault object with iommufd_hw_pgtable Date: Wed, 3 Apr 2024 09:15:17 +0800 Message-Id: <20240403011519.78512-8-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240403011519.78512-1-baolu.lu@linux.intel.com> References: <20240403011519.78512-1-baolu.lu@linux.intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit When allocating a user iommufd_hw_pagetable, the user space is allowed to associate a fault object with the hw_pagetable by specifying the fault object ID in the page table allocation data and setting the IOMMU_HWPT_FAULT_ID_VALID flag bit. On a successful return of hwpt allocation, the user can retrieve and respond to page faults by reading and writing the file interface of the fault object. Once a fault object has been associated with a hwpt, the hwpt is iopf-capable, indicated by fault_capable set to true. Attaching, detaching, or replacing an iopf-capable hwpt to an RID or PASID will differ from those that are not iopf-capable. Signed-off-by: Lu Baolu --- drivers/iommu/iommufd/iommufd_private.h | 10 +++++++ include/uapi/linux/iommufd.h | 8 ++++++ drivers/iommu/iommufd/fault.c | 20 ++++++++++++++ drivers/iommu/iommufd/hw_pagetable.c | 36 +++++++++++++++++++------ 4 files changed, 66 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/iommufd/iommufd_private.h b/drivers/iommu/iommufd/iommufd_private.h index 8dad1150eaf0..0c2f5fee4130 100644 --- a/drivers/iommu/iommufd/iommufd_private.h +++ b/drivers/iommu/iommufd/iommufd_private.h @@ -293,6 +293,7 @@ int iommufd_check_iova_range(struct io_pagetable *iopt, struct iommufd_hw_pagetable { struct iommufd_object obj; struct iommu_domain *domain; + struct iommufd_fault *fault; bool fault_capable; }; @@ -456,8 +457,17 @@ struct iommufd_fault { struct wait_queue_head wait_queue; }; +static inline struct iommufd_fault * +iommufd_get_fault(struct iommufd_ucmd *ucmd, u32 id) +{ + return container_of(iommufd_get_object(ucmd->ictx, id, + IOMMUFD_OBJ_FAULT), + struct iommufd_fault, obj); +} + int iommufd_fault_alloc(struct iommufd_ucmd *ucmd); void iommufd_fault_destroy(struct iommufd_object *obj); +int iommufd_fault_iopf_handler(struct iopf_group *group); #ifdef CONFIG_IOMMUFD_TEST int iommufd_test(struct iommufd_ucmd *ucmd); diff --git a/include/uapi/linux/iommufd.h b/include/uapi/linux/iommufd.h index 1819b28e9e6b..3d566c1ffcc6 100644 --- a/include/uapi/linux/iommufd.h +++ b/include/uapi/linux/iommufd.h @@ -357,10 +357,13 @@ struct iommu_vfio_ioas { * the parent HWPT in a nesting configuration. * @IOMMU_HWPT_ALLOC_DIRTY_TRACKING: Dirty tracking support for device IOMMU is * enforced on device attachment + * @IOMMU_HWPT_FAULT_ID_VALID: The fault_id field of hwpt allocation data is + * valid. */ enum iommufd_hwpt_alloc_flags { IOMMU_HWPT_ALLOC_NEST_PARENT = 1 << 0, IOMMU_HWPT_ALLOC_DIRTY_TRACKING = 1 << 1, + IOMMU_HWPT_FAULT_ID_VALID = 1 << 2, }; /** @@ -412,6 +415,9 @@ enum iommu_hwpt_data_type { * @data_type: One of enum iommu_hwpt_data_type * @data_len: Length of the type specific data * @data_uptr: User pointer to the type specific data + * @fault_id: The ID of IOMMUFD_FAULT object. Valid only if flags field of + * IOMMU_HWPT_FAULT_ID_VALID is set. + * @__reserved2: Padding to 64-bit alignment. Must be 0. * * Explicitly allocate a hardware page table object. This is the same object * type that is returned by iommufd_device_attach() and represents the @@ -442,6 +448,8 @@ struct iommu_hwpt_alloc { __u32 data_type; __u32 data_len; __aligned_u64 data_uptr; + __u32 fault_id; + __u32 __reserved2; }; #define IOMMU_HWPT_ALLOC _IO(IOMMUFD_TYPE, IOMMUFD_CMD_HWPT_ALLOC) diff --git a/drivers/iommu/iommufd/fault.c b/drivers/iommu/iommufd/fault.c index f16f15e7edd4..ffe948b6a5b5 100644 --- a/drivers/iommu/iommufd/fault.c +++ b/drivers/iommu/iommufd/fault.c @@ -350,3 +350,23 @@ int iommufd_fault_alloc(struct iommufd_ucmd *ucmd) return rc; } + +int iommufd_fault_iopf_handler(struct iopf_group *group) +{ + struct iommufd_hw_pagetable *hwpt; + struct iommufd_fault *fault; + + if (!group->attach_handle) + return -EINVAL; + + hwpt = group->attach_handle->domain->fault_data; + fault = hwpt->fault; + + mutex_lock(&fault->mutex); + list_add_tail(&group->node, &fault->deliver); + mutex_unlock(&fault->mutex); + + wake_up_interruptible(&fault->wait_queue); + + return 0; +} diff --git a/drivers/iommu/iommufd/hw_pagetable.c b/drivers/iommu/iommufd/hw_pagetable.c index 33d142f8057d..95ea943f5be5 100644 --- a/drivers/iommu/iommufd/hw_pagetable.c +++ b/drivers/iommu/iommufd/hw_pagetable.c @@ -8,6 +8,15 @@ #include "../iommu-priv.h" #include "iommufd_private.h" +static void __iommufd_hwpt_destroy(struct iommufd_hw_pagetable *hwpt) +{ + if (hwpt->domain) + iommu_domain_free(hwpt->domain); + + if (hwpt->fault) + iommufd_put_object(hwpt->fault->ictx, &hwpt->fault->obj); +} + void iommufd_hwpt_paging_destroy(struct iommufd_object *obj) { struct iommufd_hwpt_paging *hwpt_paging = @@ -22,9 +31,7 @@ void iommufd_hwpt_paging_destroy(struct iommufd_object *obj) hwpt_paging->common.domain); } - if (hwpt_paging->common.domain) - iommu_domain_free(hwpt_paging->common.domain); - + __iommufd_hwpt_destroy(&hwpt_paging->common); refcount_dec(&hwpt_paging->ioas->obj.users); } @@ -49,9 +56,7 @@ void iommufd_hwpt_nested_destroy(struct iommufd_object *obj) struct iommufd_hwpt_nested *hwpt_nested = container_of(obj, struct iommufd_hwpt_nested, common.obj); - if (hwpt_nested->common.domain) - iommu_domain_free(hwpt_nested->common.domain); - + __iommufd_hwpt_destroy(&hwpt_nested->common); refcount_dec(&hwpt_nested->parent->common.obj.users); } @@ -213,7 +218,8 @@ iommufd_hwpt_nested_alloc(struct iommufd_ctx *ictx, struct iommufd_hw_pagetable *hwpt; int rc; - if (flags || !user_data->len || !ops->domain_alloc_user) + if ((flags & ~IOMMU_HWPT_FAULT_ID_VALID) || + !user_data->len || !ops->domain_alloc_user) return ERR_PTR(-EOPNOTSUPP); if (parent->auto_domain || !parent->nest_parent) return ERR_PTR(-EINVAL); @@ -227,7 +233,7 @@ iommufd_hwpt_nested_alloc(struct iommufd_ctx *ictx, refcount_inc(&parent->common.obj.users); hwpt_nested->parent = parent; - hwpt->domain = ops->domain_alloc_user(idev->dev, flags, + hwpt->domain = ops->domain_alloc_user(idev->dev, 0, parent->common.domain, user_data); if (IS_ERR(hwpt->domain)) { rc = PTR_ERR(hwpt->domain); @@ -308,6 +314,20 @@ int iommufd_hwpt_alloc(struct iommufd_ucmd *ucmd) goto out_put_pt; } + if (cmd->flags & IOMMU_HWPT_FAULT_ID_VALID) { + struct iommufd_fault *fault; + + fault = iommufd_get_fault(ucmd, cmd->fault_id); + if (IS_ERR(fault)) { + rc = PTR_ERR(fault); + goto out_hwpt; + } + hwpt->fault = fault; + hwpt->domain->iopf_handler = iommufd_fault_iopf_handler; + hwpt->domain->fault_data = hwpt; + hwpt->fault_capable = true; + } + cmd->out_hwpt_id = hwpt->obj.id; rc = iommufd_ucmd_respond(ucmd, sizeof(*cmd)); if (rc) -- 2.34.1