From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8C06863DE for ; Tue, 30 May 2023 05:39:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1685425141; x=1716961141; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=07iXsgZBQsRNVYOgRRfnTYdWG3SMG8/nVfXEU8dn588=; b=hN6oVPkZBjOb5k+OD+7MuY5JY9BTm2zNPsx0HbTAXjWkflxw3JJ8uWzA 9LQZYWM6JKO82FgHUele5KcyC4aW0Ri4Cl0LAlyb+hQfAgiI3YvnX4WFq gHKYDwg4eGJesVVuuiWwfhqZFcjm6uh9lgcuFCDlpYVQ/bFOX9gm37FQ5 kF+mocLMAk3pM3n5Xi5XzovIkK/u0mxNmQ1goJI1qFjbwUNQ/QDH1k0l5 UeXumutlTq588cfES2t1fDD3ezaZoDEe3qkqPiZKsMUOVW4ZAQrQaekOB RMdZNLwIOFtd3hFeZn9XgTmTdC79sNDOtHOKAJFwptd+6Kx1YHqJ5j1TF w==; X-IronPort-AV: E=McAfee;i="6600,9927,10725"; a="420579804" X-IronPort-AV: E=Sophos;i="6.00,203,1681196400"; d="scan'208";a="420579804" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 May 2023 22:39:01 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10725"; a="739369765" X-IronPort-AV: E=Sophos;i="6.00,203,1681196400"; d="scan'208";a="739369765" Received: from allen-box.sh.intel.com ([10.239.159.127]) by orsmga001.jf.intel.com with ESMTP; 29 May 2023 22:38:58 -0700 From: Lu Baolu To: Jason Gunthorpe , Kevin Tian , Joerg Roedel , Will Deacon , Robin Murphy , Jean-Philippe Brucker , Nicolin Chen , Yi Liu , Jacob Pan Cc: iommu@lists.linux.dev, linux-kselftest@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu Subject: [RFC PATCHES 10/17] iommufd: Add IOMMU_HWPT_ALLOC_FLAGS_USER_PASID_TABLE for hwpt_alloc Date: Tue, 30 May 2023 13:37:17 +0800 Message-Id: <20230530053724.232765-11-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230530053724.232765-1-baolu.lu@linux.intel.com> References: <20230530053724.232765-1-baolu.lu@linux.intel.com> Precedence: bulk X-Mailing-List: iommu@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This flag indicates that the architecture supports assigning the whole PASID table for a device to userspace. When this flag is set, the host kernel does not need to be involved in attaching or detaching HWPTs to any PASID of the device. For such architectures, the fault cookie is always saved as {device, 0}. Signed-off-by: Lu Baolu --- drivers/iommu/iommufd/iommufd_private.h | 1 + include/uapi/linux/iommufd.h | 3 +++ drivers/iommu/iommufd/hw_pagetable.c | 6 +++++- 3 files changed, 9 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/iommufd/iommufd_private.h b/drivers/iommu/iommufd/iommufd_private.h index 8ff7721ea922..67e5aa0f996e 100644 --- a/drivers/iommu/iommufd/iommufd_private.h +++ b/drivers/iommu/iommufd/iommufd_private.h @@ -241,6 +241,7 @@ struct hw_pgtable_fault { struct list_head deliver; struct list_head response; struct eventfd_ctx *trigger; + bool user_pasid_table; }; struct iommufd_fault { diff --git a/include/uapi/linux/iommufd.h b/include/uapi/linux/iommufd.h index 2c7c44c00da2..63863e21d043 100644 --- a/include/uapi/linux/iommufd.h +++ b/include/uapi/linux/iommufd.h @@ -449,6 +449,8 @@ struct iommu_hwpt_arm_smmuv3 { * must be valid once this flag is set. On successful return, user can * listen to @event_fd and retrieve faults by reading @out_fault_fd. * The fault data is encoded in the format defined by iommu_hwpt_pgfault. + * - USER_PASID_TABLE: The architecture supports assigning the whole pasid + * table of a device to user. * @dev_id: The device to allocate this HWPT for * @pt_id: The IOAS to connect this HWPT to * @out_hwpt_id: The ID of the new HWPT @@ -487,6 +489,7 @@ struct iommu_hwpt_alloc { __u32 size; __u32 flags; #define IOMMU_HWPT_ALLOC_FLAGS_IOPF_CAPABLE (1 << 0) +#define IOMMU_HWPT_ALLOC_FLAGS_USER_PASID_TABLE (1 << 1) __u32 dev_id; __u32 pt_id; __u32 out_hwpt_id; diff --git a/drivers/iommu/iommufd/hw_pagetable.c b/drivers/iommu/iommufd/hw_pagetable.c index 4d07c7c0073e..ca3e4d92f2aa 100644 --- a/drivers/iommu/iommufd/hw_pagetable.c +++ b/drivers/iommu/iommufd/hw_pagetable.c @@ -304,6 +304,9 @@ int iommufd_hwpt_alloc(struct iommufd_ucmd *ucmd) goto out_hwpt; } + if (cmd->flags & IOMMU_HWPT_ALLOC_FLAGS_USER_PASID_TABLE) + hwpt->fault->user_pasid_table = true; + iommu_domain_set_iopf_handler(hwpt->domain, iommufd_hw_pagetable_iopf_handler, hwpt); @@ -401,7 +404,8 @@ iommufd_hw_pagetable_iopf_handler(struct iommu_fault *fault, if (!ifault) return IOMMU_PAGE_RESP_FAILURE; - cookie = iommu_get_device_fault_cookie(dev, fault->prm.pasid); + cookie = iommu_get_device_fault_cookie(dev, + hwpt->fault->user_pasid_table ? 0 : fault->prm.pasid); if (!cookie) return IOMMU_PAGE_RESP_FAILURE; -- 2.34.1