On Thu, Apr 27, 2017 at 11:12:45AM +0100, Jean-Philippe Brucker wrote: > On 27/04/17 07:36, Liu, Yi L wrote: > > On Wed, Apr 26, 2017 at 05:56:45PM +0100, Jean-Philippe Brucker wrote: > >> Hi Yi, Jacob, > >> > >> On 26/04/17 11:11, Liu, Yi L wrote: > >>> From: Jacob Pan <jacob.jun....@linux.intel.com> > >>> > >>> Virtual IOMMU was proposed to support Shared Virtual Memory (SVM) use > >>> case in the guest: > >>> https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05311.html > >>> > >>> As part of the proposed architecture, when a SVM capable PCI > >>> device is assigned to a guest, nested mode is turned on. Guest owns the > >>> first level page tables (request with PASID) and performs GVA->GPA > >>> translation. Second level page tables are owned by the host for GPA->HPA > >>> translation for both request with and without PASID. > >>> > >>> A new IOMMU driver interface is therefore needed to perform tasks as > >>> follows: > >>> * Enable nested translation and appropriate translation type > >>> * Assign guest PASID table pointer (in GPA) and size to host IOMMU > >>> > >>> This patch introduces new functions called iommu_(un)bind_pasid_table() > >>> to IOMMU APIs. Architecture specific IOMMU function can be added later > >>> to perform the specific steps for binding pasid table of assigned devices. > >>> > >>> This patch also adds model definition in iommu.h. It would be used to > >>> check if the bind request is from a compatible entity. e.g. a bind > >>> request from an intel_iommu emulator may not be supported by an ARM SMMU > >>> driver. > >>> > >>> Signed-off-by: Jacob Pan <jacob.jun....@linux.intel.com> > >>> Signed-off-by: Liu, Yi L <yi.l....@linux.intel.com> > >>> --- > >>> drivers/iommu/iommu.c | 19 +++++++++++++++++++ > >>> include/linux/iommu.h | 31 +++++++++++++++++++++++++++++++ > >>> 2 files changed, 50 insertions(+) > >>> > >>> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > >>> index dbe7f65..f2da636 100644 > >>> --- a/drivers/iommu/iommu.c > >>> +++ b/drivers/iommu/iommu.c > >>> @@ -1134,6 +1134,25 @@ int iommu_attach_device(struct iommu_domain > >>> *domain, struct device *dev) > >>> } > >>> EXPORT_SYMBOL_GPL(iommu_attach_device); > >>> > >>> +int iommu_bind_pasid_table(struct iommu_domain *domain, struct device > >>> *dev, > >>> + struct pasid_table_info *pasidt_binfo) > >> > >> I guess that domain can always be deduced from dev using > >> iommu_get_domain_for_dev, and doesn't need to be passed as argument? > >> > >> For the next version of my SVM series, I was thinking of passing group > >> instead of device to iommu_bind. Since all devices in a group are expected > >> to share the same mappings (whether they want it or not), users will have > >> to do iommu_group_for_each_dev anyway (as you do in patch 6/8). So it > >> might be simpler to let the IOMMU core take the group lock and do > >> group->domain->ops->bind_task(dev...) for each device. The question also > >> holds for iommu_do_invalidate in patch 3/8. > >> > >> This way the prototypes would be: > >> int iommu_bind...(struct iommu_group *group, struct ... *info) > >> int iommu_unbind...(struct iommu_group *group, struct ...*info) > >> int iommu_invalidate...(struct iommu_group *group, struct ...*info) > >> > >> For PASID table binding it might not matter much, as VFIO will most likely > >> be the only user. But task binding will be called by device drivers, which > >> by now should be encouraged to do things at iommu_group granularity. > >> Alternatively it could be done implicitly like in iommu_attach_device, > >> with "iommu_bind_device_x" calling "iommu_bind_group_x". > >> > >> > >> Extending this reasoning, since groups in a domain are also supposed to > >> have the same mappings, then similarly to map/unmap, > >> bind/unbind/invalidate should really be done with an iommu_domain (and > >> nothing else) as target argument. However this requires the IOMMU core to > >> keep a group list in each domain, which might complicate things a little > >> too much. > >> > >> But "all devices in a domain share the same PASID table" is the paradigm > >> I'm currently using in the guts of arm-smmu-v3. And I wonder if, as with > >> iommu_group, it should be made more explicit to users, so they don't > >> assume that devices within a domain are isolated from each others with > >> regard to PASID DMA. > >> > >>> +{ > >>> + if (unlikely(!domain->ops->bind_pasid_table)) > >>> + return -EINVAL; > >>> + > >>> + return domain->ops->bind_pasid_table(domain, dev, pasidt_binfo); > >>> +} > >>> +EXPORT_SYMBOL_GPL(iommu_bind_pasid_table); > >>> + > >>> +int iommu_unbind_pasid_table(struct iommu_domain *domain, struct device > >>> *dev) > >>> +{ > >>> + if (unlikely(!domain->ops->unbind_pasid_table)) > >>> + return -EINVAL; > >>> + > >>> + return domain->ops->unbind_pasid_table(domain, dev); > >>> +} > >>> +EXPORT_SYMBOL_GPL(iommu_unbind_pasid_table); > >>> + > >>> static void __iommu_detach_device(struct iommu_domain *domain, > >>> struct device *dev) > >>> { > >>> diff --git a/include/linux/iommu.h b/include/linux/iommu.h > >>> index 0ff5111..491a011 100644 > >>> --- a/include/linux/iommu.h > >>> +++ b/include/linux/iommu.h > >>> @@ -131,6 +131,15 @@ struct iommu_dm_region { > >>> int prot; > >>> }; > >>> > >>> +struct pasid_table_info { > >>> + __u64 ptr; /* PASID table ptr */ > >>> + __u64 size; /* PASID table size*/ > >>> + __u32 model; /* magic number */ > >>> +#define INTEL_IOMMU (1 << 0) > >>> +#define ARM_SMMU (1 << 1) > >> > >> Not sure if there is any advantage in this being a bitfield rather than > >> simple values (1, 2, 3, etc). > >> The names should also have a prefix, such as "PASID_TABLE_MODEL_" > > > > Hi Jean, > > > > For the value, no special reason from my side. so it is fine to just > > use (1,2..). > > For the prefix, model definition may also needed for iommu tlb > > invalidate propagation. So it may be suitable to have a prefix like > > "SVM_MODEL_" or so? Does it make sense? > > Sure, SVM_MODEL would do. However, once the PASID table is bound and the > model has been negotiated, do we need to repeat the model in each > invalidation? At that point user and driver already agreed on the model to > use (and the various structure formats), so they could just transmit > opaque structures and each end of the pipe would know how to interpret it.
Jean, yes, it works if this invalidate API is only for SVM. But I remember there may be requirement from gIOVA. If guest tries to invalidate large range of gIOVA mapping, using unmap is low efficiency. Tianyu Lan may provide detail about this case. That's why I added the model check all the same in invalidate path. Let's double check if the requirement is really needed from gIOVA. If no, I agree with you on the suggested method. Thanks, Yi L _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu