All of lore.kernel.org
 help / color / mirror / Atom feed
From: Liu Yi L <yi.l.liu@intel.com>
To: alex.williamson@redhat.com, jgg@nvidia.com, hch@lst.de,
	jasowang@redhat.com, joro@8bytes.org
Cc: jean-philippe@linaro.org, kevin.tian@intel.com,
	parav@mellanox.com, lkml@metux.net, pbonzini@redhat.com,
	lushenming@huawei.com, eric.auger@redhat.com, corbet@lwn.net,
	ashok.raj@intel.com, yi.l.liu@intel.com,
	yi.l.liu@linux.intel.com, jun.j.tian@intel.com, hao.wu@intel.com,
	dave.jiang@intel.com, jacob.jun.pan@linux.intel.com,
	kwankhede@nvidia.com, robin.murphy@arm.com, kvm@vger.kernel.org,
	iommu@lists.linux-foundation.org, dwmw2@infradead.org,
	linux-kernel@vger.kernel.org, baolu.lu@linux.intel.com,
	david@gibson.dropbear.id.au, nicolinc@nvidia.com
Subject: [RFC 14/20] iommu/iommufd: Add iommufd_device_[de]attach_ioasid()
Date: Sun, 19 Sep 2021 14:38:42 +0800	[thread overview]
Message-ID: <20210919063848.1476776-15-yi.l.liu@intel.com> (raw)
In-Reply-To: <20210919063848.1476776-1-yi.l.liu@intel.com>

An I/O address space takes effect in the iommu only after it's attached
by a device. This patch provides iommufd_device_[de/at]tach_ioasid()
helpers for this purpose. One device can be only attached to one ioasid
at this point, but one ioasid can be attached by multiple devices.

The caller specifies the iommufd_device (returned at binding time) and
the target ioasid when calling the helper function. Upon request, iommufd
installs the specified I/O page table to the correct place in the IOMMU,
according to the routing information (struct device* which represents
RID) recorded in iommufd_device. Future variants could allow the caller
to specify additional routing information (e.g. pasid/ssid) when multiple
I/O address spaces are supported per device.

Open:
Per Jason's comment in below link, bus-specific wrappers are recommended.
This RFC implements one wrapper for pci device. But it looks that struct
pci_device is not used at all since iommufd_ device already carries all
necessary info. So want to have another discussion on its necessity, e.g.
whether making more sense to have bus-specific wrappers for binding, while
leaving a common attaching helper per iommufd_device.
https://lore.kernel.org/linux-iommu/20210528233649.GB3816344@nvidia.com/

TODO:
When multiple devices are attached to a same ioasid, the permitted iova
ranges and supported pgsize bitmap on this ioasid should be a common
subset of all attached devices. iommufd needs to track such info per
ioasid and update it every time when a new device is attached to the
ioasid. This has not been done in this version yet, due to the temporary
hack adopted in patch 16-18. The hack reuses vfio type1 driver which
already includes the necessary logic for iova ranges and pgsize bitmap.
Once we get a clear direction for those patches, that logic will be moved
to this patch.

Signed-off-by: Liu Yi L <yi.l.liu@intel.com>
---
 drivers/iommu/iommufd/iommufd.c | 226 ++++++++++++++++++++++++++++++++
 include/linux/iommufd.h         |  29 ++++
 2 files changed, 255 insertions(+)

diff --git a/drivers/iommu/iommufd/iommufd.c b/drivers/iommu/iommufd/iommufd.c
index e45d76359e34..25373a0e037a 100644
--- a/drivers/iommu/iommufd/iommufd.c
+++ b/drivers/iommu/iommufd/iommufd.c
@@ -51,6 +51,19 @@ struct iommufd_ioas {
 	bool enforce_snoop;
 	struct iommufd_ctx *ictx;
 	refcount_t refs;
+	struct mutex lock;
+	struct list_head device_list;
+	struct iommu_domain *domain;
+};
+
+/*
+ * An ioas_device_info object is created per each successful attaching
+ * request. A list of objects are maintained per ioas when the address
+ * space is shared by multiple devices.
+ */
+struct ioas_device_info {
+	struct iommufd_device *idev;
+	struct list_head next;
 };
 
 static int iommufd_fops_open(struct inode *inode, struct file *filep)
@@ -119,6 +132,21 @@ static void iommufd_ctx_put(struct iommufd_ctx *ictx)
 	kfree(ictx);
 }
 
+static struct iommufd_ioas *ioasid_get_ioas(struct iommufd_ctx *ictx, int ioasid)
+{
+	struct iommufd_ioas *ioas;
+
+	if (ioasid < 0)
+		return NULL;
+
+	mutex_lock(&ictx->lock);
+	ioas = xa_load(&ictx->ioasid_xa, ioasid);
+	if (ioas)
+		refcount_inc(&ioas->refs);
+	mutex_unlock(&ictx->lock);
+	return ioas;
+}
+
 /* Caller should hold ictx->lock */
 static void ioas_put_locked(struct iommufd_ioas *ioas)
 {
@@ -128,11 +156,28 @@ static void ioas_put_locked(struct iommufd_ioas *ioas)
 	if (!refcount_dec_and_test(&ioas->refs))
 		return;
 
+	WARN_ON(!list_empty(&ioas->device_list));
 	xa_erase(&ictx->ioasid_xa, ioasid);
 	iommufd_ctx_put(ictx);
 	kfree(ioas);
 }
 
+/*
+ * Caller should hold a ictx reference when calling this function
+ * otherwise ictx might be freed in ioas_put_locked() then the last
+ * unlock becomes problematic. Alternatively we could have a fresh
+ * implementation of ioas_put instead of calling the locked function.
+ * In this case it can ensure ictx is freed after mutext_unlock().
+ */
+static void ioas_put(struct iommufd_ioas *ioas)
+{
+	struct iommufd_ctx *ictx = ioas->ictx;
+
+	mutex_lock(&ictx->lock);
+	ioas_put_locked(ioas);
+	mutex_unlock(&ictx->lock);
+}
+
 static int iommufd_ioasid_alloc(struct iommufd_ctx *ictx, unsigned long arg)
 {
 	struct iommu_ioasid_alloc req;
@@ -178,6 +223,9 @@ static int iommufd_ioasid_alloc(struct iommufd_ctx *ictx, unsigned long arg)
 	iommufd_ctx_get(ictx);
 	ioas->ictx = ictx;
 
+	mutex_init(&ioas->lock);
+	INIT_LIST_HEAD(&ioas->device_list);
+
 	refcount_set(&ioas->refs, 1);
 
 	return ioasid;
@@ -344,6 +392,166 @@ static struct miscdevice iommu_misc_dev = {
 	.mode = 0666,
 };
 
+/* Caller should hold ioas->lock */
+static struct ioas_device_info *ioas_find_device(struct iommufd_ioas *ioas,
+						 struct iommufd_device *idev)
+{
+	struct ioas_device_info *ioas_dev;
+
+	list_for_each_entry(ioas_dev, &ioas->device_list, next) {
+		if (ioas_dev->idev == idev)
+			return ioas_dev;
+	}
+
+	return NULL;
+}
+
+static void ioas_free_domain_if_empty(struct iommufd_ioas *ioas)
+{
+	if (list_empty(&ioas->device_list)) {
+		iommu_domain_free(ioas->domain);
+		ioas->domain = NULL;
+	}
+}
+
+static int ioas_check_device_compatibility(struct iommufd_ioas *ioas,
+					   struct device *dev)
+{
+	bool snoop = false;
+	u32 addr_width;
+	int ret;
+
+	/*
+	 * currently we only support I/O page table with iommu enforce-snoop
+	 * format. Attaching a device which doesn't support this format in its
+	 * upstreaming iommu is rejected.
+	 */
+	ret = iommu_device_get_info(dev, IOMMU_DEV_INFO_FORCE_SNOOP, &snoop);
+	if (ret || !snoop)
+		return -EINVAL;
+
+	ret = iommu_device_get_info(dev, IOMMU_DEV_INFO_ADDR_WIDTH, &addr_width);
+	if (ret || addr_width < ioas->addr_width)
+		return -EINVAL;
+
+	/* TODO: also need to check permitted iova ranges and pgsize bitmap */
+
+	return 0;
+}
+
+/**
+ * iommufd_device_attach_ioasid - attach device to an ioasid
+ * @idev: [in] Pointer to struct iommufd_device.
+ * @ioasid: [in] ioasid points to an I/O address space.
+ *
+ * Returns 0 for successful attach, otherwise returns error.
+ *
+ */
+int iommufd_device_attach_ioasid(struct iommufd_device *idev, int ioasid)
+{
+	struct iommufd_ioas *ioas;
+	struct ioas_device_info *ioas_dev;
+	struct iommu_domain *domain;
+	int ret;
+
+	ioas = ioasid_get_ioas(idev->ictx, ioasid);
+	if (!ioas) {
+		pr_err_ratelimited("Trying to attach illegal or unkonwn IOASID %u\n", ioasid);
+		return -EINVAL;
+	}
+
+	mutex_lock(&ioas->lock);
+
+	/* Check for duplicates */
+	if (ioas_find_device(ioas, idev)) {
+		ret = -EINVAL;
+		goto out_unlock;
+	}
+
+	ret = ioas_check_device_compatibility(ioas, idev->dev);
+	if (ret)
+		goto out_unlock;
+
+	ioas_dev = kzalloc(sizeof(*ioas_dev), GFP_KERNEL);
+	if (!ioas_dev) {
+		ret = -ENOMEM;
+		goto out_unlock;
+	}
+
+	/*
+	 * Each ioas is backed by an iommu domain, which is allocated
+	 * when the ioas is attached for the first time and then shared
+	 * by following devices.
+	 */
+	if (list_empty(&ioas->device_list)) {
+		struct iommu_domain *d;
+
+		d = iommu_domain_alloc(idev->dev->bus);
+		if (!d) {
+			ret = -ENOMEM;
+			goto out_free;
+		}
+		ioas->domain = d;
+	}
+	domain = ioas->domain;
+
+	/* Install the I/O page table to the iommu for this device */
+	ret = iommu_attach_device(domain, idev->dev);
+	if (ret)
+		goto out_domain;
+
+	ioas_dev->idev = idev;
+	list_add(&ioas_dev->next, &ioas->device_list);
+	mutex_unlock(&ioas->lock);
+
+	return 0;
+out_domain:
+	ioas_free_domain_if_empty(ioas);
+out_free:
+	kfree(ioas_dev);
+out_unlock:
+	mutex_unlock(&ioas->lock);
+	ioas_put(ioas);
+
+	return ret;
+}
+EXPORT_SYMBOL_GPL(iommufd_device_attach_ioasid);
+
+/**
+ * iommufd_device_detach_ioasid - Detach an ioasid from a device.
+ * @idev: [in] Pointer to struct iommufd_device.
+ * @ioasid: [in] ioasid points to an I/O address space.
+ *
+ */
+void iommufd_device_detach_ioasid(struct iommufd_device *idev, int ioasid)
+{
+	struct iommufd_ioas *ioas;
+	struct ioas_device_info *ioas_dev;
+
+	ioas = ioasid_get_ioas(idev->ictx, ioasid);
+	if (!ioas)
+		return;
+
+	mutex_lock(&ioas->lock);
+	ioas_dev = ioas_find_device(ioas, idev);
+	if (!ioas_dev) {
+		mutex_unlock(&ioas->lock);
+		goto out;
+	}
+
+	list_del(&ioas_dev->next);
+	iommu_detach_device(ioas->domain, idev->dev);
+	ioas_free_domain_if_empty(ioas);
+	kfree(ioas_dev);
+	mutex_unlock(&ioas->lock);
+
+	/* release the reference acquired at the start of this function */
+	ioas_put(ioas);
+out:
+	ioas_put(ioas);
+}
+EXPORT_SYMBOL_GPL(iommufd_device_detach_ioasid);
+
 /**
  * iommufd_bind_device - Bind a physical device marked by a device
  *			 cookie to an iommu fd.
@@ -426,8 +634,26 @@ EXPORT_SYMBOL_GPL(iommufd_bind_device);
 void iommufd_unbind_device(struct iommufd_device *idev)
 {
 	struct iommufd_ctx *ictx = idev->ictx;
+	struct iommufd_ioas *ioas;
+	unsigned long index;
 
 	mutex_lock(&ictx->lock);
+	xa_for_each(&ictx->ioasid_xa, index, ioas) {
+		struct ioas_device_info *ioas_dev;
+
+		mutex_lock(&ioas->lock);
+		ioas_dev = ioas_find_device(ioas, idev);
+		if (!ioas_dev) {
+			mutex_unlock(&ioas->lock);
+			continue;
+		}
+		list_del(&ioas_dev->next);
+		iommu_detach_device(ioas->domain, idev->dev);
+		ioas_free_domain_if_empty(ioas);
+		kfree(ioas_dev);
+		mutex_unlock(&ioas->lock);
+		ioas_put_locked(ioas);
+	}
 	xa_erase(&ictx->device_xa, idev->id);
 	mutex_unlock(&ictx->lock);
 	/* Exit the security context */
diff --git a/include/linux/iommufd.h b/include/linux/iommufd.h
index 1dd6515e7816..01a4fe934143 100644
--- a/include/linux/iommufd.h
+++ b/include/linux/iommufd.h
@@ -13,6 +13,7 @@
 #include <linux/errno.h>
 #include <linux/err.h>
 #include <linux/device.h>
+#include <linux/pci.h>
 
 #define IOMMUFD_IOASID_MAX	((unsigned int)(0x7FFFFFFF))
 #define IOMMUFD_IOASID_MIN	0
@@ -27,6 +28,16 @@ struct iommufd_device *
 iommufd_bind_device(int fd, struct device *dev, u64 dev_cookie);
 void iommufd_unbind_device(struct iommufd_device *idev);
 
+int iommufd_device_attach_ioasid(struct iommufd_device *idev, int ioasid);
+void iommufd_device_detach_ioasid(struct iommufd_device *idev, int ioasid);
+
+static inline int
+__pci_iommufd_device_attach_ioasid(struct pci_dev *pdev,
+				   struct iommufd_device *idev, int ioasid)
+{
+	return iommufd_device_attach_ioasid(idev, ioasid);
+}
+
 #else /* !CONFIG_IOMMUFD */
 static inline struct iommufd_device *
 iommufd_bind_device(int fd, struct device *dev, u64 dev_cookie)
@@ -37,5 +48,23 @@ iommufd_bind_device(int fd, struct device *dev, u64 dev_cookie)
 static inline void iommufd_unbind_device(struct iommufd_device *idev)
 {
 }
+
+static inline int iommufd_device_attach_ioasid(struct iommufd_device *idev,
+					       int ioasid)
+{
+	return -ENODEV;
+}
+
+static inline void iommufd_device_detach_ioasid(struct iommufd_device *idev,
+						int ioasid)
+{
+}
+
+static inline int
+__pci_iommufd_device_attach_ioasid(struct pci_dev *pdev,
+				   struct iommufd_device *idev, int ioasid)
+{
+	return -ENODEV;
+}
 #endif /* CONFIG_IOMMUFD */
 #endif /* __LINUX_IOMMUFD_H */
-- 
2.25.1


WARNING: multiple messages have this Message-ID (diff)
From: Liu Yi L <yi.l.liu@intel.com>
To: alex.williamson@redhat.com, jgg@nvidia.com, hch@lst.de,
	jasowang@redhat.com, joro@8bytes.org
Cc: kvm@vger.kernel.org, kwankhede@nvidia.com,
	jean-philippe@linaro.org, dave.jiang@intel.com,
	ashok.raj@intel.com, corbet@lwn.net, kevin.tian@intel.com,
	parav@mellanox.com, lkml@metux.net, david@gibson.dropbear.id.au,
	robin.murphy@arm.com, jun.j.tian@intel.com,
	linux-kernel@vger.kernel.org, lushenming@huawei.com,
	iommu@lists.linux-foundation.org, pbonzini@redhat.com,
	dwmw2@infradead.org
Subject: [RFC 14/20] iommu/iommufd: Add iommufd_device_[de]attach_ioasid()
Date: Sun, 19 Sep 2021 14:38:42 +0800	[thread overview]
Message-ID: <20210919063848.1476776-15-yi.l.liu@intel.com> (raw)
In-Reply-To: <20210919063848.1476776-1-yi.l.liu@intel.com>

An I/O address space takes effect in the iommu only after it's attached
by a device. This patch provides iommufd_device_[de/at]tach_ioasid()
helpers for this purpose. One device can be only attached to one ioasid
at this point, but one ioasid can be attached by multiple devices.

The caller specifies the iommufd_device (returned at binding time) and
the target ioasid when calling the helper function. Upon request, iommufd
installs the specified I/O page table to the correct place in the IOMMU,
according to the routing information (struct device* which represents
RID) recorded in iommufd_device. Future variants could allow the caller
to specify additional routing information (e.g. pasid/ssid) when multiple
I/O address spaces are supported per device.

Open:
Per Jason's comment in below link, bus-specific wrappers are recommended.
This RFC implements one wrapper for pci device. But it looks that struct
pci_device is not used at all since iommufd_ device already carries all
necessary info. So want to have another discussion on its necessity, e.g.
whether making more sense to have bus-specific wrappers for binding, while
leaving a common attaching helper per iommufd_device.
https://lore.kernel.org/linux-iommu/20210528233649.GB3816344@nvidia.com/

TODO:
When multiple devices are attached to a same ioasid, the permitted iova
ranges and supported pgsize bitmap on this ioasid should be a common
subset of all attached devices. iommufd needs to track such info per
ioasid and update it every time when a new device is attached to the
ioasid. This has not been done in this version yet, due to the temporary
hack adopted in patch 16-18. The hack reuses vfio type1 driver which
already includes the necessary logic for iova ranges and pgsize bitmap.
Once we get a clear direction for those patches, that logic will be moved
to this patch.

Signed-off-by: Liu Yi L <yi.l.liu@intel.com>
---
 drivers/iommu/iommufd/iommufd.c | 226 ++++++++++++++++++++++++++++++++
 include/linux/iommufd.h         |  29 ++++
 2 files changed, 255 insertions(+)

diff --git a/drivers/iommu/iommufd/iommufd.c b/drivers/iommu/iommufd/iommufd.c
index e45d76359e34..25373a0e037a 100644
--- a/drivers/iommu/iommufd/iommufd.c
+++ b/drivers/iommu/iommufd/iommufd.c
@@ -51,6 +51,19 @@ struct iommufd_ioas {
 	bool enforce_snoop;
 	struct iommufd_ctx *ictx;
 	refcount_t refs;
+	struct mutex lock;
+	struct list_head device_list;
+	struct iommu_domain *domain;
+};
+
+/*
+ * An ioas_device_info object is created per each successful attaching
+ * request. A list of objects are maintained per ioas when the address
+ * space is shared by multiple devices.
+ */
+struct ioas_device_info {
+	struct iommufd_device *idev;
+	struct list_head next;
 };
 
 static int iommufd_fops_open(struct inode *inode, struct file *filep)
@@ -119,6 +132,21 @@ static void iommufd_ctx_put(struct iommufd_ctx *ictx)
 	kfree(ictx);
 }
 
+static struct iommufd_ioas *ioasid_get_ioas(struct iommufd_ctx *ictx, int ioasid)
+{
+	struct iommufd_ioas *ioas;
+
+	if (ioasid < 0)
+		return NULL;
+
+	mutex_lock(&ictx->lock);
+	ioas = xa_load(&ictx->ioasid_xa, ioasid);
+	if (ioas)
+		refcount_inc(&ioas->refs);
+	mutex_unlock(&ictx->lock);
+	return ioas;
+}
+
 /* Caller should hold ictx->lock */
 static void ioas_put_locked(struct iommufd_ioas *ioas)
 {
@@ -128,11 +156,28 @@ static void ioas_put_locked(struct iommufd_ioas *ioas)
 	if (!refcount_dec_and_test(&ioas->refs))
 		return;
 
+	WARN_ON(!list_empty(&ioas->device_list));
 	xa_erase(&ictx->ioasid_xa, ioasid);
 	iommufd_ctx_put(ictx);
 	kfree(ioas);
 }
 
+/*
+ * Caller should hold a ictx reference when calling this function
+ * otherwise ictx might be freed in ioas_put_locked() then the last
+ * unlock becomes problematic. Alternatively we could have a fresh
+ * implementation of ioas_put instead of calling the locked function.
+ * In this case it can ensure ictx is freed after mutext_unlock().
+ */
+static void ioas_put(struct iommufd_ioas *ioas)
+{
+	struct iommufd_ctx *ictx = ioas->ictx;
+
+	mutex_lock(&ictx->lock);
+	ioas_put_locked(ioas);
+	mutex_unlock(&ictx->lock);
+}
+
 static int iommufd_ioasid_alloc(struct iommufd_ctx *ictx, unsigned long arg)
 {
 	struct iommu_ioasid_alloc req;
@@ -178,6 +223,9 @@ static int iommufd_ioasid_alloc(struct iommufd_ctx *ictx, unsigned long arg)
 	iommufd_ctx_get(ictx);
 	ioas->ictx = ictx;
 
+	mutex_init(&ioas->lock);
+	INIT_LIST_HEAD(&ioas->device_list);
+
 	refcount_set(&ioas->refs, 1);
 
 	return ioasid;
@@ -344,6 +392,166 @@ static struct miscdevice iommu_misc_dev = {
 	.mode = 0666,
 };
 
+/* Caller should hold ioas->lock */
+static struct ioas_device_info *ioas_find_device(struct iommufd_ioas *ioas,
+						 struct iommufd_device *idev)
+{
+	struct ioas_device_info *ioas_dev;
+
+	list_for_each_entry(ioas_dev, &ioas->device_list, next) {
+		if (ioas_dev->idev == idev)
+			return ioas_dev;
+	}
+
+	return NULL;
+}
+
+static void ioas_free_domain_if_empty(struct iommufd_ioas *ioas)
+{
+	if (list_empty(&ioas->device_list)) {
+		iommu_domain_free(ioas->domain);
+		ioas->domain = NULL;
+	}
+}
+
+static int ioas_check_device_compatibility(struct iommufd_ioas *ioas,
+					   struct device *dev)
+{
+	bool snoop = false;
+	u32 addr_width;
+	int ret;
+
+	/*
+	 * currently we only support I/O page table with iommu enforce-snoop
+	 * format. Attaching a device which doesn't support this format in its
+	 * upstreaming iommu is rejected.
+	 */
+	ret = iommu_device_get_info(dev, IOMMU_DEV_INFO_FORCE_SNOOP, &snoop);
+	if (ret || !snoop)
+		return -EINVAL;
+
+	ret = iommu_device_get_info(dev, IOMMU_DEV_INFO_ADDR_WIDTH, &addr_width);
+	if (ret || addr_width < ioas->addr_width)
+		return -EINVAL;
+
+	/* TODO: also need to check permitted iova ranges and pgsize bitmap */
+
+	return 0;
+}
+
+/**
+ * iommufd_device_attach_ioasid - attach device to an ioasid
+ * @idev: [in] Pointer to struct iommufd_device.
+ * @ioasid: [in] ioasid points to an I/O address space.
+ *
+ * Returns 0 for successful attach, otherwise returns error.
+ *
+ */
+int iommufd_device_attach_ioasid(struct iommufd_device *idev, int ioasid)
+{
+	struct iommufd_ioas *ioas;
+	struct ioas_device_info *ioas_dev;
+	struct iommu_domain *domain;
+	int ret;
+
+	ioas = ioasid_get_ioas(idev->ictx, ioasid);
+	if (!ioas) {
+		pr_err_ratelimited("Trying to attach illegal or unkonwn IOASID %u\n", ioasid);
+		return -EINVAL;
+	}
+
+	mutex_lock(&ioas->lock);
+
+	/* Check for duplicates */
+	if (ioas_find_device(ioas, idev)) {
+		ret = -EINVAL;
+		goto out_unlock;
+	}
+
+	ret = ioas_check_device_compatibility(ioas, idev->dev);
+	if (ret)
+		goto out_unlock;
+
+	ioas_dev = kzalloc(sizeof(*ioas_dev), GFP_KERNEL);
+	if (!ioas_dev) {
+		ret = -ENOMEM;
+		goto out_unlock;
+	}
+
+	/*
+	 * Each ioas is backed by an iommu domain, which is allocated
+	 * when the ioas is attached for the first time and then shared
+	 * by following devices.
+	 */
+	if (list_empty(&ioas->device_list)) {
+		struct iommu_domain *d;
+
+		d = iommu_domain_alloc(idev->dev->bus);
+		if (!d) {
+			ret = -ENOMEM;
+			goto out_free;
+		}
+		ioas->domain = d;
+	}
+	domain = ioas->domain;
+
+	/* Install the I/O page table to the iommu for this device */
+	ret = iommu_attach_device(domain, idev->dev);
+	if (ret)
+		goto out_domain;
+
+	ioas_dev->idev = idev;
+	list_add(&ioas_dev->next, &ioas->device_list);
+	mutex_unlock(&ioas->lock);
+
+	return 0;
+out_domain:
+	ioas_free_domain_if_empty(ioas);
+out_free:
+	kfree(ioas_dev);
+out_unlock:
+	mutex_unlock(&ioas->lock);
+	ioas_put(ioas);
+
+	return ret;
+}
+EXPORT_SYMBOL_GPL(iommufd_device_attach_ioasid);
+
+/**
+ * iommufd_device_detach_ioasid - Detach an ioasid from a device.
+ * @idev: [in] Pointer to struct iommufd_device.
+ * @ioasid: [in] ioasid points to an I/O address space.
+ *
+ */
+void iommufd_device_detach_ioasid(struct iommufd_device *idev, int ioasid)
+{
+	struct iommufd_ioas *ioas;
+	struct ioas_device_info *ioas_dev;
+
+	ioas = ioasid_get_ioas(idev->ictx, ioasid);
+	if (!ioas)
+		return;
+
+	mutex_lock(&ioas->lock);
+	ioas_dev = ioas_find_device(ioas, idev);
+	if (!ioas_dev) {
+		mutex_unlock(&ioas->lock);
+		goto out;
+	}
+
+	list_del(&ioas_dev->next);
+	iommu_detach_device(ioas->domain, idev->dev);
+	ioas_free_domain_if_empty(ioas);
+	kfree(ioas_dev);
+	mutex_unlock(&ioas->lock);
+
+	/* release the reference acquired at the start of this function */
+	ioas_put(ioas);
+out:
+	ioas_put(ioas);
+}
+EXPORT_SYMBOL_GPL(iommufd_device_detach_ioasid);
+
 /**
  * iommufd_bind_device - Bind a physical device marked by a device
  *			 cookie to an iommu fd.
@@ -426,8 +634,26 @@ EXPORT_SYMBOL_GPL(iommufd_bind_device);
 void iommufd_unbind_device(struct iommufd_device *idev)
 {
 	struct iommufd_ctx *ictx = idev->ictx;
+	struct iommufd_ioas *ioas;
+	unsigned long index;
 
 	mutex_lock(&ictx->lock);
+	xa_for_each(&ictx->ioasid_xa, index, ioas) {
+		struct ioas_device_info *ioas_dev;
+
+		mutex_lock(&ioas->lock);
+		ioas_dev = ioas_find_device(ioas, idev);
+		if (!ioas_dev) {
+			mutex_unlock(&ioas->lock);
+			continue;
+		}
+		list_del(&ioas_dev->next);
+		iommu_detach_device(ioas->domain, idev->dev);
+		ioas_free_domain_if_empty(ioas);
+		kfree(ioas_dev);
+		mutex_unlock(&ioas->lock);
+		ioas_put_locked(ioas);
+	}
 	xa_erase(&ictx->device_xa, idev->id);
 	mutex_unlock(&ictx->lock);
 	/* Exit the security context */
diff --git a/include/linux/iommufd.h b/include/linux/iommufd.h
index 1dd6515e7816..01a4fe934143 100644
--- a/include/linux/iommufd.h
+++ b/include/linux/iommufd.h
@@ -13,6 +13,7 @@
 #include <linux/errno.h>
 #include <linux/err.h>
 #include <linux/device.h>
+#include <linux/pci.h>
 
 #define IOMMUFD_IOASID_MAX	((unsigned int)(0x7FFFFFFF))
 #define IOMMUFD_IOASID_MIN	0
@@ -27,6 +28,16 @@ struct iommufd_device *
 iommufd_bind_device(int fd, struct device *dev, u64 dev_cookie);
 void iommufd_unbind_device(struct iommufd_device *idev);
 
+int iommufd_device_attach_ioasid(struct iommufd_device *idev, int ioasid);
+void iommufd_device_detach_ioasid(struct iommufd_device *idev, int ioasid);
+
+static inline int
+__pci_iommufd_device_attach_ioasid(struct pci_dev *pdev,
+				   struct iommufd_device *idev, int ioasid)
+{
+	return iommufd_device_attach_ioasid(idev, ioasid);
+}
+
 #else /* !CONFIG_IOMMUFD */
 static inline struct iommufd_device *
 iommufd_bind_device(int fd, struct device *dev, u64 dev_cookie)
@@ -37,5 +48,23 @@ iommufd_bind_device(int fd, struct device *dev, u64 dev_cookie)
 static inline void iommufd_unbind_device(struct iommufd_device *idev)
 {
 }
+
+static inline int iommufd_device_attach_ioasid(struct iommufd_device *idev,
+					       int ioasid)
+{
+	return -ENODEV;
+}
+
+static inline void iommufd_device_detach_ioasid(struct iommufd_device *idev,
+						int ioasid)
+{
+}
+
+static inline int
+__pci_iommufd_device_attach_ioasid(struct pci_dev *pdev,
+				   struct iommufd_device *idev, int ioasid)
+{
+	return -ENODEV;
+}
 #endif /* CONFIG_IOMMUFD */
 #endif /* __LINUX_IOMMUFD_H */
-- 
2.25.1

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

  parent reply	other threads:[~2021-09-19  6:43 UTC|newest]

Thread overview: 537+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-09-19  6:38 [RFC 00/20] Introduce /dev/iommu for userspace I/O address space management Liu Yi L
2021-09-19  6:38 ` Liu Yi L
2021-09-19  6:38 ` [RFC 01/20] iommu/iommufd: Add /dev/iommu core Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 15:41   ` Jason Gunthorpe
2021-09-21 15:41     ` Jason Gunthorpe via iommu
2021-09-22  1:51     ` Tian, Kevin
2021-09-22  1:51       ` Tian, Kevin
2021-09-22 12:40       ` Jason Gunthorpe
2021-09-22 12:40         ` Jason Gunthorpe via iommu
2021-09-22 13:59         ` Tian, Kevin
2021-09-22 13:59           ` Tian, Kevin
2021-09-22 14:10           ` Jason Gunthorpe
2021-09-22 14:10             ` Jason Gunthorpe via iommu
2021-10-15  9:18     ` Liu, Yi L
2021-10-15  9:18       ` Liu, Yi L
2021-10-15 11:18       ` Jason Gunthorpe
2021-10-15 11:18         ` Jason Gunthorpe via iommu
2021-10-15 11:29         ` Liu, Yi L
2021-10-15 11:29           ` Liu, Yi L
2021-10-19 16:57         ` Jacob Pan
2021-10-19 16:57           ` Jacob Pan
2021-10-19 16:57           ` Jason Gunthorpe
2021-10-19 16:57             ` Jason Gunthorpe via iommu
2021-10-19 17:11             ` Jacob Pan
2021-10-19 17:11               ` Jacob Pan
2021-10-19 17:12               ` Jason Gunthorpe
2021-10-19 17:12                 ` Jason Gunthorpe via iommu
2021-09-19  6:38 ` [RFC 02/20] vfio: Add device class for /dev/vfio/devices Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 15:57   ` Jason Gunthorpe
2021-09-21 15:57     ` Jason Gunthorpe via iommu
2021-09-21 23:56     ` Tian, Kevin
2021-09-21 23:56       ` Tian, Kevin
2021-09-22  0:55       ` Jason Gunthorpe
2021-09-22  0:55         ` Jason Gunthorpe via iommu
2021-09-22  1:07         ` Tian, Kevin
2021-09-22  1:07           ` Tian, Kevin
2021-09-22 12:31           ` Jason Gunthorpe
2021-09-22 12:31             ` Jason Gunthorpe via iommu
2021-09-22  3:22         ` Tian, Kevin
2021-09-22  3:22           ` Tian, Kevin
2021-09-22 12:50           ` Jason Gunthorpe
2021-09-22 12:50             ` Jason Gunthorpe via iommu
2021-09-22 14:09             ` Tian, Kevin
2021-09-22 14:09               ` Tian, Kevin
2021-09-21 19:56   ` Alex Williamson
2021-09-21 19:56     ` Alex Williamson
2021-09-22  0:56     ` Tian, Kevin
2021-09-22  0:56       ` Tian, Kevin
2021-09-29  2:08   ` David Gibson
2021-09-29  2:08     ` David Gibson
2021-09-29 19:05     ` Alex Williamson
2021-09-29 19:05       ` Alex Williamson
2021-09-30  2:43       ` David Gibson
2021-09-30  2:43         ` David Gibson
2021-10-20 12:39     ` Liu, Yi L
2021-10-20 12:39       ` Liu, Yi L
2021-09-19  6:38 ` [RFC 03/20] vfio: Add vfio_[un]register_device() Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 16:01   ` Jason Gunthorpe
2021-09-21 16:01     ` Jason Gunthorpe via iommu
2021-09-21 23:10     ` Tian, Kevin
2021-09-21 23:10       ` Tian, Kevin
2021-09-22  0:53       ` Jason Gunthorpe
2021-09-22  0:53         ` Jason Gunthorpe via iommu
2021-09-22  0:59         ` Tian, Kevin
2021-09-22  0:59           ` Tian, Kevin
2021-09-22  9:23         ` Tian, Kevin
2021-09-22  9:23           ` Tian, Kevin
2021-09-22 12:22           ` Jason Gunthorpe
2021-09-22 12:22             ` Jason Gunthorpe via iommu
2021-09-22 13:44             ` Tian, Kevin
2021-09-22 13:44               ` Tian, Kevin
2021-09-22 20:10             ` Alex Williamson
2021-09-22 20:10               ` Alex Williamson
2021-09-22 22:34               ` Tian, Kevin
2021-09-22 22:34                 ` Tian, Kevin
2021-09-22 22:45                 ` Alex Williamson
2021-09-22 22:45                   ` Alex Williamson
2021-09-22 23:45                   ` Tian, Kevin
2021-09-22 23:45                     ` Tian, Kevin
2021-09-22 23:52                     ` Jason Gunthorpe
2021-09-22 23:52                       ` Jason Gunthorpe via iommu
2021-09-23  0:38                       ` Tian, Kevin
2021-09-23  0:38                         ` Tian, Kevin
2021-09-22 23:56               ` Jason Gunthorpe
2021-09-22 23:56                 ` Jason Gunthorpe via iommu
2021-09-22  0:54     ` Tian, Kevin
2021-09-22  0:54       ` Tian, Kevin
2021-09-22  1:00       ` Jason Gunthorpe
2021-09-22  1:00         ` Jason Gunthorpe via iommu
2021-09-22  1:02         ` Tian, Kevin
2021-09-22  1:02           ` Tian, Kevin
2021-09-23  7:25         ` Eric Auger
2021-09-23  7:25           ` Eric Auger
2021-09-23 11:44           ` Jason Gunthorpe
2021-09-23 11:44             ` Jason Gunthorpe via iommu
2021-09-29  2:46         ` david
2021-09-29  2:46           ` david
2021-09-29 12:22           ` Jason Gunthorpe
2021-09-29 12:22             ` Jason Gunthorpe via iommu
2021-09-30  2:48             ` david
2021-09-30  2:48               ` david
2021-09-29  2:43   ` David Gibson
2021-09-29  2:43     ` David Gibson
2021-09-29  3:40     ` Tian, Kevin
2021-09-29  3:40       ` Tian, Kevin
2021-09-29  5:30     ` Tian, Kevin
2021-09-29  5:30       ` Tian, Kevin
2021-09-29  7:08       ` Cornelia Huck
2021-09-29  7:08         ` Cornelia Huck
2021-09-29 12:15         ` Jason Gunthorpe via iommu
2021-09-29 12:15           ` Jason Gunthorpe
2021-09-19  6:38 ` [RFC 04/20] iommu: Add iommu_device_get_info interface Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 16:19   ` Jason Gunthorpe
2021-09-21 16:19     ` Jason Gunthorpe via iommu
2021-09-22  2:31     ` Lu Baolu
2021-09-22  2:31       ` Lu Baolu
2021-09-22  5:07       ` Christoph Hellwig
2021-09-22  5:07         ` Christoph Hellwig
2021-09-29  2:52   ` David Gibson
2021-09-29  2:52     ` David Gibson
2021-09-29  9:25     ` Lu Baolu
2021-09-29  9:25       ` Lu Baolu
2021-09-29  9:29       ` Lu Baolu
2021-09-29  9:29         ` Lu Baolu
2021-09-19  6:38 ` [RFC 05/20] vfio/pci: Register device to /dev/vfio/devices Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 16:40   ` Jason Gunthorpe
2021-09-21 16:40     ` Jason Gunthorpe via iommu
2021-09-21 21:09     ` Alex Williamson
2021-09-21 21:09       ` Alex Williamson
2021-09-21 21:58       ` Jason Gunthorpe
2021-09-21 21:58         ` Jason Gunthorpe via iommu
2021-09-22  1:24         ` Tian, Kevin
2021-09-22  1:24           ` Tian, Kevin
2021-09-22  1:19       ` Tian, Kevin
2021-09-22  1:19         ` Tian, Kevin
2021-09-22 21:17         ` Alex Williamson
2021-09-22 21:17           ` Alex Williamson
2021-09-22 23:49           ` Tian, Kevin
2021-09-22 23:49             ` Tian, Kevin
2021-09-19  6:38 ` [RFC 06/20] iommu: Add iommu_device_init[exit]_user_dma interfaces Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 17:09   ` Jason Gunthorpe
2021-09-21 17:09     ` Jason Gunthorpe via iommu
2021-09-22  1:47     ` Tian, Kevin
2021-09-22  1:47       ` Tian, Kevin
2021-09-22 12:39       ` Jason Gunthorpe
2021-09-22 12:39         ` Jason Gunthorpe via iommu
2021-09-22 13:56         ` Tian, Kevin
2021-09-22 13:56           ` Tian, Kevin
2021-09-27  9:42         ` Tian, Kevin
2021-09-27  9:42           ` Tian, Kevin
2021-09-27 11:34           ` Lu Baolu
2021-09-27 11:34             ` Lu Baolu
2021-09-27 13:08             ` Tian, Kevin
2021-09-27 13:08               ` Tian, Kevin
2021-09-27 11:53           ` Jason Gunthorpe
2021-09-27 11:53             ` Jason Gunthorpe via iommu
2021-09-27 13:00             ` Tian, Kevin
2021-09-27 13:00               ` Tian, Kevin
2021-09-27 13:09               ` Jason Gunthorpe
2021-09-27 13:09                 ` Jason Gunthorpe via iommu
2021-09-27 13:32                 ` Tian, Kevin
2021-09-27 14:39                   ` Jason Gunthorpe
2021-09-28  7:13                     ` Tian, Kevin
2021-09-28 11:54                       ` Jason Gunthorpe
2021-09-28 23:59                         ` Tian, Kevin
2021-09-27 19:19                   ` Alex Williamson
2021-09-28  7:43                     ` Tian, Kevin
2021-09-28 16:26                       ` Alex Williamson
2021-09-27 15:09           ` Jason Gunthorpe
2021-09-27 15:09             ` Jason Gunthorpe via iommu
2021-09-28  7:30             ` Tian, Kevin
2021-09-28  7:30               ` Tian, Kevin
2021-09-28 11:57               ` Jason Gunthorpe
2021-09-28 11:57                 ` Jason Gunthorpe via iommu
2021-09-28 13:35                 ` Lu Baolu
2021-09-28 13:35                   ` Lu Baolu
2021-09-28 14:07                   ` Jason Gunthorpe
2021-09-28 14:07                     ` Jason Gunthorpe via iommu
2021-09-29  0:38                     ` Tian, Kevin
2021-09-29  0:38                       ` Tian, Kevin
2021-09-29 12:59                       ` Jason Gunthorpe
2021-09-29 12:59                         ` Jason Gunthorpe via iommu
2021-10-15  1:29                         ` Tian, Kevin
2021-10-15  1:29                           ` Tian, Kevin
2021-10-15 11:09                           ` Jason Gunthorpe
2021-10-15 11:09                             ` Jason Gunthorpe via iommu
2021-10-18  1:52                             ` Tian, Kevin
2021-10-18  1:52                               ` Tian, Kevin
2021-09-29  2:22                     ` Lu Baolu
2021-09-29  2:22                       ` Lu Baolu
2021-09-29  2:29                       ` Tian, Kevin
2021-09-29  2:29                         ` Tian, Kevin
2021-09-29  2:38                         ` Lu Baolu
2021-09-29  2:38                           ` Lu Baolu
2021-09-29  4:55   ` David Gibson
2021-09-29  4:55     ` David Gibson
2021-09-29  5:38     ` Tian, Kevin
2021-09-29  5:38       ` Tian, Kevin
2021-09-29  6:35       ` David Gibson
2021-09-29  6:35         ` David Gibson
2021-09-29  7:31         ` Tian, Kevin
2021-09-29  7:31           ` Tian, Kevin
2021-09-30  3:05           ` David Gibson
2021-09-30  3:05             ` David Gibson
2021-09-29 12:57         ` Jason Gunthorpe
2021-09-29 12:57           ` Jason Gunthorpe via iommu
2021-09-30  3:09           ` David Gibson
2021-09-30  3:09             ` David Gibson
2021-09-30 22:28             ` Jason Gunthorpe
2021-09-30 22:28               ` Jason Gunthorpe via iommu
2021-10-01  3:54               ` David Gibson
2021-10-01  3:54                 ` David Gibson
2021-09-19  6:38 ` [RFC 07/20] iommu/iommufd: Add iommufd_[un]bind_device() Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 17:14   ` Jason Gunthorpe
2021-09-21 17:14     ` Jason Gunthorpe via iommu
2021-10-15  9:21     ` Liu, Yi L
2021-10-15  9:21       ` Liu, Yi L
2021-09-29  5:25   ` David Gibson
2021-09-29  5:25     ` David Gibson
2021-09-29 12:24     ` Jason Gunthorpe
2021-09-29 12:24       ` Jason Gunthorpe via iommu
2021-09-30  3:10       ` David Gibson
2021-09-30  3:10         ` David Gibson
2021-10-01 12:43         ` Jason Gunthorpe
2021-10-01 12:43           ` Jason Gunthorpe via iommu
2021-10-07  1:23           ` David Gibson
2021-10-07  1:23             ` David Gibson
2021-10-07 11:35             ` Jason Gunthorpe
2021-10-07 11:35               ` Jason Gunthorpe via iommu
2021-10-11  3:24               ` David Gibson
2021-10-11  3:24                 ` David Gibson
2021-09-19  6:38 ` [RFC 08/20] vfio/pci: Add VFIO_DEVICE_BIND_IOMMUFD Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-19 10:08   ` kernel test robot
2021-09-19 10:08     ` kernel test robot
2021-09-21 17:29   ` Jason Gunthorpe
2021-09-21 17:29     ` Jason Gunthorpe via iommu
2021-09-22 21:01     ` Alex Williamson
2021-09-22 21:01       ` Alex Williamson
2021-09-22 23:01       ` Jason Gunthorpe
2021-09-22 23:01         ` Jason Gunthorpe via iommu
2021-09-29  6:00   ` David Gibson
2021-09-29  6:00     ` David Gibson
2021-09-29  6:41     ` Tian, Kevin
2021-09-29  6:41       ` Tian, Kevin
2021-09-29 12:28       ` Jason Gunthorpe
2021-09-29 12:28         ` Jason Gunthorpe via iommu
2021-09-29 22:34         ` Tian, Kevin
2021-09-29 22:34           ` Tian, Kevin
2021-09-30  3:12       ` David Gibson
2021-09-30  3:12         ` David Gibson
2021-09-19  6:38 ` [RFC 09/20] iommu: Add page size and address width attributes Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-22 13:42   ` Eric Auger
2021-09-22 13:42     ` Eric Auger
2021-09-22 14:19     ` Tian, Kevin
2021-09-22 14:19       ` Tian, Kevin
2021-09-19  6:38 ` [RFC 10/20] iommu/iommufd: Add IOMMU_DEVICE_GET_INFO Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 17:40   ` Jason Gunthorpe
2021-09-21 17:40     ` Jason Gunthorpe via iommu
2021-09-22  3:30     ` Tian, Kevin
2021-09-22  3:30       ` Tian, Kevin
2021-09-22 12:41       ` Jason Gunthorpe
2021-09-22 12:41         ` Jason Gunthorpe via iommu
2021-09-29  6:18         ` david
2021-09-29  6:18           ` david
2021-09-22 21:24   ` Alex Williamson
2021-09-22 21:24     ` Alex Williamson
2021-09-22 23:49     ` Jason Gunthorpe
2021-09-22 23:49       ` Jason Gunthorpe via iommu
2021-09-23  3:10       ` Tian, Kevin
2021-09-23  3:10         ` Tian, Kevin
2021-09-23 10:15         ` Jean-Philippe Brucker
2021-09-23 10:15           ` Jean-Philippe Brucker
2021-09-23 11:27           ` Jason Gunthorpe
2021-09-23 11:27             ` Jason Gunthorpe via iommu
2021-09-23 12:05             ` Tian, Kevin
2021-09-23 12:05               ` Tian, Kevin
2021-09-23 12:22               ` Jason Gunthorpe
2021-09-23 12:22                 ` Jason Gunthorpe via iommu
2021-09-29  8:48                 ` Tian, Kevin
2021-09-29  8:48                   ` Tian, Kevin
2021-09-29 12:36                   ` Jason Gunthorpe
2021-09-29 12:36                     ` Jason Gunthorpe via iommu
2021-09-30  8:30                     ` Tian, Kevin
2021-09-30 10:33                       ` Jean-Philippe Brucker
2021-09-30 22:04                         ` Jason Gunthorpe
2021-10-01  3:28                           ` hch
2021-10-14  8:13                             ` Tian, Kevin
2021-10-14  8:22                               ` hch
2021-10-14  8:29                                 ` Tian, Kevin
2021-10-14  8:01                         ` Tian, Kevin
2021-10-14  9:16                           ` Jean-Philippe Brucker
2021-09-30  8:49                 ` Tian, Kevin
2021-09-30  8:49                   ` Tian, Kevin
2021-09-30 13:43                   ` Lu Baolu
2021-09-30 13:43                     ` Lu Baolu
2021-10-01  3:24                     ` hch
2021-10-01  3:24                       ` hch
2021-09-30 22:08                   ` Jason Gunthorpe
2021-09-30 22:08                     ` Jason Gunthorpe via iommu
2021-09-23 11:36         ` Jason Gunthorpe
2021-09-23 11:36           ` Jason Gunthorpe via iommu
     [not found]       ` <BN9PR11MB5433409DF766AAEF1BB2CF258CA39@BN9PR11MB5433.namprd11.prod.outlook.com>
2021-09-23  3:38         ` Tian, Kevin
2021-09-23  3:38           ` Tian, Kevin
2021-09-23 11:42           ` Jason Gunthorpe
2021-09-23 11:42             ` Jason Gunthorpe via iommu
2021-09-30  9:35             ` Tian, Kevin
2021-09-30  9:35               ` Tian, Kevin
2021-09-30 22:23               ` Jason Gunthorpe
2021-09-30 22:23                 ` Jason Gunthorpe via iommu
2021-10-01  3:30                 ` hch
2021-10-01  3:30                   ` hch
2021-10-14  9:11                 ` Tian, Kevin
2021-10-14  9:11                   ` Tian, Kevin
2021-10-14 15:42                   ` Jason Gunthorpe
2021-10-14 15:42                     ` Jason Gunthorpe via iommu
2021-10-15  1:01                     ` Tian, Kevin
2021-10-15  1:01                       ` Tian, Kevin
     [not found]                     ` <BN9PR11MB543327BB6D58AEF91AD2C9D18CB99@BN9PR11MB5433.namprd11.prod.outlook.com>
2021-10-21  2:26                       ` Tian, Kevin
2021-10-21  2:26                         ` Tian, Kevin
2021-10-21 14:58                         ` Jean-Philippe Brucker
2021-10-21 14:58                           ` Jean-Philippe Brucker
2021-10-21 23:22                           ` Jason Gunthorpe
2021-10-21 23:22                             ` Jason Gunthorpe via iommu
2021-10-22  7:49                             ` Jean-Philippe Brucker
2021-10-22  7:49                               ` Jean-Philippe Brucker
2021-10-25 16:51                               ` Jason Gunthorpe
2021-10-25 16:51                                 ` Jason Gunthorpe via iommu
2021-10-21 23:30                         ` Jason Gunthorpe
2021-10-21 23:30                           ` Jason Gunthorpe via iommu
2021-10-22  3:08                           ` Tian, Kevin
2021-10-22  3:08                             ` Tian, Kevin
2021-10-25 23:34                             ` Jason Gunthorpe
2021-10-25 23:34                               ` Jason Gunthorpe via iommu
2021-10-27  1:42                               ` Tian, Kevin
2021-10-27  1:42                                 ` Tian, Kevin
2021-10-28  2:07                               ` Tian, Kevin
2021-10-28  2:07                                 ` Tian, Kevin
2021-10-29 13:55                                 ` Jason Gunthorpe
2021-10-29 13:55                                   ` Jason Gunthorpe via iommu
2021-09-29  6:23   ` David Gibson
2021-09-29  6:23     ` David Gibson
2021-09-19  6:38 ` [RFC 11/20] iommu/iommufd: Add IOMMU_IOASID_ALLOC/FREE Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-19 11:03   ` kernel test robot
2021-09-19 11:03     ` kernel test robot
2021-09-21 17:44   ` Jason Gunthorpe
2021-09-21 17:44     ` Jason Gunthorpe via iommu
2021-09-22  3:40     ` Tian, Kevin
2021-09-22  3:40       ` Tian, Kevin
2021-09-22 14:09       ` Jason Gunthorpe
2021-09-22 14:09         ` Jason Gunthorpe via iommu
2021-09-23  9:14         ` Tian, Kevin
2021-09-23  9:14           ` Tian, Kevin
2021-09-23 12:06           ` Jason Gunthorpe
2021-09-23 12:06             ` Jason Gunthorpe via iommu
2021-09-23 12:22             ` Tian, Kevin
2021-09-23 12:22               ` Tian, Kevin
2021-09-23 12:31               ` Jason Gunthorpe
2021-09-23 12:31                 ` Jason Gunthorpe via iommu
2021-09-23 12:45                 ` Tian, Kevin
2021-09-23 12:45                   ` Tian, Kevin
2021-09-23 13:01                   ` Jason Gunthorpe
2021-09-23 13:01                     ` Jason Gunthorpe via iommu
2021-09-23 13:20                     ` Tian, Kevin
2021-09-23 13:20                       ` Tian, Kevin
2021-09-23 13:30                       ` Jason Gunthorpe
2021-09-23 13:30                         ` Jason Gunthorpe via iommu
2021-09-23 13:41                         ` Tian, Kevin
2021-09-23 13:41                           ` Tian, Kevin
2021-10-01  6:30               ` david
2021-10-01  6:30                 ` david
2021-10-01  6:26           ` david
2021-10-01  6:26             ` david
2021-10-01  6:19         ` david
2021-10-01  6:19           ` david
2021-10-01 12:25           ` Jason Gunthorpe
2021-10-01 12:25             ` Jason Gunthorpe via iommu
2021-10-02  4:21             ` david
2021-10-02  4:21               ` david
2021-10-02 12:25               ` Jason Gunthorpe
2021-10-02 12:25                 ` Jason Gunthorpe via iommu
2021-10-11  5:37                 ` david
2021-10-11  5:37                   ` david
2021-10-11 17:17                   ` Jason Gunthorpe
2021-10-11 17:17                     ` Jason Gunthorpe via iommu
2021-10-14  4:33                     ` david
2021-10-14  4:33                       ` david
2021-10-14 15:06                       ` Jason Gunthorpe via iommu
2021-10-14 15:06                         ` Jason Gunthorpe
2021-10-18  3:40                         ` david
2021-10-18  3:40                           ` david
2021-10-01  6:15       ` david
2021-10-01  6:15         ` david
2021-09-22 12:51     ` Liu, Yi L
2021-09-22 12:51       ` Liu, Yi L
2021-09-22 13:32       ` Jason Gunthorpe
2021-09-22 13:32         ` Jason Gunthorpe via iommu
2021-09-23  6:26         ` Liu, Yi L
2021-09-23  6:26           ` Liu, Yi L
2021-10-01  6:13     ` David Gibson
2021-10-01  6:13       ` David Gibson
2021-10-01 12:22       ` Jason Gunthorpe
2021-10-01 12:22         ` Jason Gunthorpe via iommu
2021-10-11  6:02         ` David Gibson
2021-10-11  6:02           ` David Gibson
2021-10-11  8:49           ` Jean-Philippe Brucker
2021-10-11  8:49             ` Jean-Philippe Brucker
2021-10-11 23:38             ` Jason Gunthorpe
2021-10-11 23:38               ` Jason Gunthorpe via iommu
2021-10-12  8:33               ` Jean-Philippe Brucker
2021-10-12  8:33                 ` Jean-Philippe Brucker
2021-10-13  7:14                 ` Tian, Kevin
2021-10-13  7:14                   ` Tian, Kevin
2021-10-13  7:07             ` Tian, Kevin
2021-10-13  7:07               ` Tian, Kevin
2021-10-14  4:38             ` David Gibson
2021-10-14  4:38               ` David Gibson
2021-10-11 18:49           ` Jason Gunthorpe
2021-10-11 18:49             ` Jason Gunthorpe via iommu
2021-10-14  4:53             ` David Gibson
2021-10-14  4:53               ` David Gibson
2021-10-14 14:52               ` Jason Gunthorpe
2021-10-14 14:52                 ` Jason Gunthorpe via iommu
2021-10-18  3:50                 ` David Gibson
2021-10-18  3:50                   ` David Gibson
2021-10-18 17:42                   ` Jason Gunthorpe
2021-10-18 17:42                     ` Jason Gunthorpe via iommu
2021-09-22 13:45   ` Jean-Philippe Brucker
2021-09-22 13:45     ` Jean-Philippe Brucker
2021-09-29 10:47     ` Liu, Yi L
2021-09-29 10:47       ` Liu, Yi L
2021-10-01  6:11   ` David Gibson
2021-10-01  6:11     ` David Gibson
2021-10-13  7:00     ` Tian, Kevin
2021-10-13  7:00       ` Tian, Kevin
2021-10-14  5:00       ` David Gibson
2021-10-14  5:00         ` David Gibson
2021-10-14  6:53         ` Tian, Kevin
2021-10-14  6:53           ` Tian, Kevin
2021-10-25  5:05           ` David Gibson
2021-10-25  5:05             ` David Gibson
2021-10-27  2:32             ` Tian, Kevin
2021-10-27  2:32               ` Tian, Kevin
2021-09-19  6:38 ` [RFC 12/20] iommu/iommufd: Add IOMMU_CHECK_EXTENSION Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 17:47   ` Jason Gunthorpe
2021-09-21 17:47     ` Jason Gunthorpe via iommu
2021-09-22  3:41     ` Tian, Kevin
2021-09-22  3:41       ` Tian, Kevin
2021-09-22 12:55       ` Jason Gunthorpe
2021-09-22 12:55         ` Jason Gunthorpe via iommu
2021-09-22 14:13         ` Tian, Kevin
2021-09-19  6:38 ` [RFC 13/20] iommu: Extend iommu_at[de]tach_device() for multiple devices group Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-10-14  5:24   ` David Gibson
2021-10-14  5:24     ` David Gibson
2021-10-14  7:06     ` Tian, Kevin
2021-10-14  7:06       ` Tian, Kevin
2021-10-18  3:57       ` David Gibson
2021-10-18  3:57         ` David Gibson
2021-10-18 16:32         ` Jason Gunthorpe
2021-10-18 16:32           ` Jason Gunthorpe via iommu
2021-10-25  5:14           ` David Gibson
2021-10-25  5:14             ` David Gibson
2021-10-25 12:14             ` Jason Gunthorpe
2021-10-25 12:14               ` Jason Gunthorpe via iommu
2021-10-25 13:16               ` David Gibson
2021-10-25 13:16                 ` David Gibson
2021-10-25 23:36                 ` Jason Gunthorpe
2021-10-25 23:36                   ` Jason Gunthorpe via iommu
2021-10-26  9:23                   ` David Gibson
2021-10-26  9:23                     ` David Gibson
2021-09-19  6:38 ` Liu Yi L [this message]
2021-09-19  6:38   ` [RFC 14/20] iommu/iommufd: Add iommufd_device_[de]attach_ioasid() Liu Yi L
2021-09-21 18:02   ` Jason Gunthorpe
2021-09-21 18:02     ` Jason Gunthorpe via iommu
2021-09-22  3:53     ` Tian, Kevin
2021-09-22  3:53       ` Tian, Kevin
2021-09-22 12:57       ` Jason Gunthorpe
2021-09-22 12:57         ` Jason Gunthorpe via iommu
2021-09-22 14:16         ` Tian, Kevin
2021-09-22 14:16           ` Tian, Kevin
2021-09-19  6:38 ` [RFC 15/20] vfio/pci: Add VFIO_DEVICE_[DE]ATTACH_IOASID Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 18:04   ` Jason Gunthorpe
2021-09-21 18:04     ` Jason Gunthorpe via iommu
2021-09-22  3:56     ` Tian, Kevin
2021-09-22  3:56       ` Tian, Kevin
2021-09-22 12:58       ` Jason Gunthorpe
2021-09-22 12:58         ` Jason Gunthorpe via iommu
2021-09-22 14:17         ` Tian, Kevin
2021-09-22 14:17           ` Tian, Kevin
2021-09-19  6:38 ` [RFC 16/20] vfio/type1: Export symbols for dma [un]map code sharing Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-21 18:14   ` Jason Gunthorpe
2021-09-21 18:14     ` Jason Gunthorpe via iommu
2021-09-22  3:57     ` Tian, Kevin
2021-09-22  3:57       ` Tian, Kevin
2021-09-19  6:38 ` [RFC 17/20] iommu/iommufd: Report iova range to userspace Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-19  9:38   ` kernel test robot
2021-09-19 16:41   ` kernel test robot
2021-09-22 14:49   ` Jean-Philippe Brucker
2021-09-22 14:49     ` Jean-Philippe Brucker
2021-09-29 10:44     ` Liu, Yi L
2021-09-29 10:44       ` Liu, Yi L
2021-09-29 12:07       ` Jean-Philippe Brucker
2021-09-29 12:07         ` Jean-Philippe Brucker
2021-09-29 12:31         ` Jason Gunthorpe
2021-09-29 12:31           ` Jason Gunthorpe via iommu
2021-09-19  6:38 ` [RFC 18/20] iommu/iommufd: Add IOMMU_[UN]MAP_DMA on IOASID Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-19 11:53   ` kernel test robot
2021-09-19  6:38 ` [RFC 19/20] iommu/vt-d: Implement device_info iommu_ops callback Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-09-19  6:38 ` [RFC 20/20] Doc: Add documentation for /dev/iommu Liu Yi L
2021-09-19  6:38   ` Liu Yi L
2021-10-29  0:15   ` David Gibson
2021-10-29  0:15     ` David Gibson
2021-10-29 12:44     ` Jason Gunthorpe
2021-10-29 12:44       ` Jason Gunthorpe via iommu
2021-09-19  6:45 ` [RFC 00/20] Introduce /dev/iommu for userspace I/O address space management Liu, Yi L
2021-09-19  6:45   ` Liu, Yi L
2021-09-21 13:45 ` Jason Gunthorpe
2021-09-21 13:45   ` Jason Gunthorpe via iommu
2021-09-22  3:25   ` Liu, Yi L
2021-09-22  3:25     ` Liu, Yi L

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210919063848.1476776-15-yi.l.liu@intel.com \
    --to=yi.l.liu@intel.com \
    --cc=alex.williamson@redhat.com \
    --cc=ashok.raj@intel.com \
    --cc=baolu.lu@linux.intel.com \
    --cc=corbet@lwn.net \
    --cc=dave.jiang@intel.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=dwmw2@infradead.org \
    --cc=eric.auger@redhat.com \
    --cc=hao.wu@intel.com \
    --cc=hch@lst.de \
    --cc=iommu@lists.linux-foundation.org \
    --cc=jacob.jun.pan@linux.intel.com \
    --cc=jasowang@redhat.com \
    --cc=jean-philippe@linaro.org \
    --cc=jgg@nvidia.com \
    --cc=joro@8bytes.org \
    --cc=jun.j.tian@intel.com \
    --cc=kevin.tian@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=kwankhede@nvidia.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lkml@metux.net \
    --cc=lushenming@huawei.com \
    --cc=nicolinc@nvidia.com \
    --cc=parav@mellanox.com \
    --cc=pbonzini@redhat.com \
    --cc=robin.murphy@arm.com \
    --cc=yi.l.liu@linux.intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.