Message ID | 20180801102221.5308-4-nek.in.cn@gmail.com |
---|---|
State | New |
Headers | show |
Series | [RFC,1/7] vfio/spimdev: Add documents for WarpDrive framework | expand |
On Wed, Aug 01, 2018 at 09:23:52AM -0700, Randy Dunlap wrote: > Date: Wed, 1 Aug 2018 09:23:52 -0700 > From: Randy Dunlap <rdunlap@infradead.org> > To: Kenneth Lee <nek.in.cn@gmail.com>, Jonathan Corbet <corbet@lwn.net>, > Herbert Xu <herbert@gondor.apana.org.au>, "David S . Miller" > <davem@davemloft.net>, Joerg Roedel <joro@8bytes.org>, Alex Williamson > <alex.williamson@redhat.com>, Kenneth Lee <liguozhu@hisilicon.com>, Hao > Fang <fanghao11@huawei.com>, Zhou Wang <wangzhou1@hisilicon.com>, Zaibo Xu > <xuzaibo@huawei.com>, Philippe Ombredanne <pombredanne@nexb.com>, Greg > Kroah-Hartman <gregkh@linuxfoundation.org>, Thomas Gleixner > <tglx@linutronix.de>, linux-doc@vger.kernel.org, > linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org, > iommu@lists.linux-foundation.org, kvm@vger.kernel.org, > linux-accelerators@lists.ozlabs.org, Lu Baolu <baolu.lu@linux.intel.com>, > Sanjay Kumar <sanjay.k.kumar@intel.com> > CC: linuxarm@huawei.com > Subject: Re: [RFC PATCH 3/7] vfio: add spimdev support > User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 > Thunderbird/52.9.1 > Message-ID: <d11c7745-2f31-0f33-1bd8-78379dc66e6e@infradead.org> > > On 08/01/2018 03:22 AM, Kenneth Lee wrote: > > From: Kenneth Lee <liguozhu@hisilicon.com> > > > > SPIMDEV is "Share Parent IOMMU Mdev". It is a vfio-mdev. But differ from > > the general vfio-mdev: > > > > 1. It shares its parent's IOMMU. > > 2. There is no hardware resource attached to the mdev is created. The > > hardware resource (A `queue') is allocated only when the mdev is > > opened. > > > > Currently only the vfio type-1 driver is updated to make it to be aware > > of. > > > > Signed-off-by: Kenneth Lee <liguozhu@hisilicon.com> > > Signed-off-by: Zaibo Xu <xuzaibo@huawei.com> > > Signed-off-by: Zhou Wang <wangzhou1@hisilicon.com> > > --- > > drivers/vfio/Kconfig | 1 + > > drivers/vfio/Makefile | 1 + > > drivers/vfio/spimdev/Kconfig | 10 + > > drivers/vfio/spimdev/Makefile | 3 + > > drivers/vfio/spimdev/vfio_spimdev.c | 421 ++++++++++++++++++++++++++++ > > drivers/vfio/vfio_iommu_type1.c | 136 ++++++++- > > include/linux/vfio_spimdev.h | 95 +++++++ > > include/uapi/linux/vfio_spimdev.h | 28 ++ > > 8 files changed, 689 insertions(+), 6 deletions(-) > > create mode 100644 drivers/vfio/spimdev/Kconfig > > create mode 100644 drivers/vfio/spimdev/Makefile > > create mode 100644 drivers/vfio/spimdev/vfio_spimdev.c > > create mode 100644 include/linux/vfio_spimdev.h > > create mode 100644 include/uapi/linux/vfio_spimdev.h > > > > diff --git a/drivers/vfio/spimdev/Kconfig b/drivers/vfio/spimdev/Kconfig > > new file mode 100644 > > index 000000000000..1226301f9d0e > > --- /dev/null > > +++ b/drivers/vfio/spimdev/Kconfig > > @@ -0,0 +1,10 @@ > > +# SPDX-License-Identifier: GPL-2.0 > > +config VFIO_SPIMDEV > > + tristate "Support for Share Parent IOMMU MDEV" > > + depends on VFIO_MDEV_DEVICE > > + help > > + Support for VFIO Share Parent IOMMU MDEV, which enable the kernel to > > enables > > > + support for the light weight hardware accelerator framework, WrapDrive. > > support the lightweight hardware accelerator framework, WrapDrive. > > > + > > + To compile this as a module, choose M here: the module will be called > > + spimdev. > > > -- > ~Randy Thanks, I will update it in next version. -- -Kenneth(Hisilicon) ================================================================================ 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁 止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中 的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it!
On Thu, Aug 02, 2018 at 03:21:25AM +0000, Tian, Kevin wrote: > Date: Thu, 2 Aug 2018 03:21:25 +0000 > From: "Tian, Kevin" <kevin.tian@intel.com> > To: Kenneth Lee <nek.in.cn@gmail.com>, Jonathan Corbet <corbet@lwn.net>, > Herbert Xu <herbert@gondor.apana.org.au>, "David S . Miller" > <davem@davemloft.net>, Joerg Roedel <joro@8bytes.org>, Alex Williamson > <alex.williamson@redhat.com>, Kenneth Lee <liguozhu@hisilicon.com>, Hao > Fang <fanghao11@huawei.com>, Zhou Wang <wangzhou1@hisilicon.com>, Zaibo Xu > <xuzaibo@huawei.com>, Philippe Ombredanne <pombredanne@nexb.com>, Greg > Kroah-Hartman <gregkh@linuxfoundation.org>, Thomas Gleixner > <tglx@linutronix.de>, "linux-doc@vger.kernel.org" > <linux-doc@vger.kernel.org>, "linux-kernel@vger.kernel.org" > <linux-kernel@vger.kernel.org>, "linux-crypto@vger.kernel.org" > <linux-crypto@vger.kernel.org>, "iommu@lists.linux-foundation.org" > <iommu@lists.linux-foundation.org>, "kvm@vger.kernel.org" > <kvm@vger.kernel.org>, "linux-accelerators@lists.ozlabs.org" > <linux-accelerators@lists.ozlabs.org>, Lu Baolu > <baolu.lu@linux.intel.com>, "Kumar, Sanjay K" <sanjay.k.kumar@intel.com> > CC: "linuxarm@huawei.com" <linuxarm@huawei.com> > Subject: RE: [RFC PATCH 3/7] vfio: add spimdev support > Message-ID: <AADFC41AFE54684AB9EE6CBC0274A5D191290F7B@SHSMSX101.ccr.corp.intel.com> > > > From: Kenneth Lee > > Sent: Wednesday, August 1, 2018 6:22 PM > > > > From: Kenneth Lee <liguozhu@hisilicon.com> > > > > SPIMDEV is "Share Parent IOMMU Mdev". It is a vfio-mdev. But differ from > > the general vfio-mdev: > > > > 1. It shares its parent's IOMMU. > > 2. There is no hardware resource attached to the mdev is created. The > > hardware resource (A `queue') is allocated only when the mdev is > > opened. > > Alex has concern on doing so, as pointed out in: > > https://www.spinics.net/lists/kvm/msg172652.html > > resource allocation should be reserved at creation time. Yes. That is why I keep telling that SPIMDEV is not for "VM", it is for "many processes", it is just an access point to the process. Not a device to VM. I hope Alex can accept it:) > > > > > Currently only the vfio type-1 driver is updated to make it to be aware > > of. > > > > Signed-off-by: Kenneth Lee <liguozhu@hisilicon.com> > > Signed-off-by: Zaibo Xu <xuzaibo@huawei.com> > > Signed-off-by: Zhou Wang <wangzhou1@hisilicon.com> > > --- > > drivers/vfio/Kconfig | 1 + > > drivers/vfio/Makefile | 1 + > > drivers/vfio/spimdev/Kconfig | 10 + > > drivers/vfio/spimdev/Makefile | 3 + > > drivers/vfio/spimdev/vfio_spimdev.c | 421 > > ++++++++++++++++++++++++++++ > > drivers/vfio/vfio_iommu_type1.c | 136 ++++++++- > > include/linux/vfio_spimdev.h | 95 +++++++ > > include/uapi/linux/vfio_spimdev.h | 28 ++ > > 8 files changed, 689 insertions(+), 6 deletions(-) > > create mode 100644 drivers/vfio/spimdev/Kconfig > > create mode 100644 drivers/vfio/spimdev/Makefile > > create mode 100644 drivers/vfio/spimdev/vfio_spimdev.c > > create mode 100644 include/linux/vfio_spimdev.h > > create mode 100644 include/uapi/linux/vfio_spimdev.h > > > > diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig > > index c84333eb5eb5..3719eba72ef1 100644 > > --- a/drivers/vfio/Kconfig > > +++ b/drivers/vfio/Kconfig > > @@ -47,4 +47,5 @@ menuconfig VFIO_NOIOMMU > > source "drivers/vfio/pci/Kconfig" > > source "drivers/vfio/platform/Kconfig" > > source "drivers/vfio/mdev/Kconfig" > > +source "drivers/vfio/spimdev/Kconfig" > > source "virt/lib/Kconfig" > > diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile > > index de67c4725cce..28f3ef0cdce1 100644 > > --- a/drivers/vfio/Makefile > > +++ b/drivers/vfio/Makefile > > @@ -9,3 +9,4 @@ obj-$(CONFIG_VFIO_SPAPR_EEH) += vfio_spapr_eeh.o > > obj-$(CONFIG_VFIO_PCI) += pci/ > > obj-$(CONFIG_VFIO_PLATFORM) += platform/ > > obj-$(CONFIG_VFIO_MDEV) += mdev/ > > +obj-$(CONFIG_VFIO_SPIMDEV) += spimdev/ > > diff --git a/drivers/vfio/spimdev/Kconfig b/drivers/vfio/spimdev/Kconfig > > new file mode 100644 > > index 000000000000..1226301f9d0e > > --- /dev/null > > +++ b/drivers/vfio/spimdev/Kconfig > > @@ -0,0 +1,10 @@ > > +# SPDX-License-Identifier: GPL-2.0 > > +config VFIO_SPIMDEV > > + tristate "Support for Share Parent IOMMU MDEV" > > + depends on VFIO_MDEV_DEVICE > > + help > > + Support for VFIO Share Parent IOMMU MDEV, which enable the > > kernel to > > + support for the light weight hardware accelerator framework, > > WrapDrive. > > + > > + To compile this as a module, choose M here: the module will be > > called > > + spimdev. > > diff --git a/drivers/vfio/spimdev/Makefile b/drivers/vfio/spimdev/Makefile > > new file mode 100644 > > index 000000000000..d02fb69c37e4 > > --- /dev/null > > +++ b/drivers/vfio/spimdev/Makefile > > @@ -0,0 +1,3 @@ > > +# SPDX-License-Identifier: GPL-2.0 > > +spimdev-y := spimdev.o > > +obj-$(CONFIG_VFIO_SPIMDEV) += vfio_spimdev.o > > diff --git a/drivers/vfio/spimdev/vfio_spimdev.c > > b/drivers/vfio/spimdev/vfio_spimdev.c > > new file mode 100644 > > index 000000000000..1b6910c9d27d > > --- /dev/null > > +++ b/drivers/vfio/spimdev/vfio_spimdev.c > > @@ -0,0 +1,421 @@ > > +// SPDX-License-Identifier: GPL-2.0+ > > +#include <linux/anon_inodes.h> > > +#include <linux/idr.h> > > +#include <linux/module.h> > > +#include <linux/poll.h> > > +#include <linux/vfio_spimdev.h> > > + > > +struct spimdev_mdev_state { > > + struct vfio_spimdev *spimdev; > > +}; > > + > > +static struct class *spimdev_class; > > +static DEFINE_IDR(spimdev_idr); > > + > > +static int vfio_spimdev_dev_exist(struct device *dev, void *data) > > +{ > > + return !strcmp(dev_name(dev), dev_name((struct device *)data)); > > +} > > + > > +#ifdef CONFIG_IOMMU_SVA > > +static bool vfio_spimdev_is_valid_pasid(int pasid) > > +{ > > + struct mm_struct *mm; > > + > > + mm = iommu_sva_find(pasid); > > + if (mm) { > > + mmput(mm); > > + return mm == current->mm; > > + } > > + > > + return false; > > +} > > +#endif > > + > > +/* Check if the device is a mediated device belongs to vfio_spimdev */ > > +int vfio_spimdev_is_spimdev(struct device *dev) > > +{ > > + struct mdev_device *mdev; > > + struct device *pdev; > > + > > + mdev = mdev_from_dev(dev); > > + if (!mdev) > > + return 0; > > + > > + pdev = mdev_parent_dev(mdev); > > + if (!pdev) > > + return 0; > > + > > + return class_for_each_device(spimdev_class, NULL, pdev, > > + vfio_spimdev_dev_exist); > > +} > > +EXPORT_SYMBOL_GPL(vfio_spimdev_is_spimdev); > > + > > +struct vfio_spimdev *vfio_spimdev_pdev_spimdev(struct device *dev) > > +{ > > + struct device *class_dev; > > + > > + if (!dev) > > + return ERR_PTR(-EINVAL); > > + > > + class_dev = class_find_device(spimdev_class, NULL, dev, > > + (int(*)(struct device *, const void > > *))vfio_spimdev_dev_exist); > > + if (!class_dev) > > + return ERR_PTR(-ENODEV); > > + > > + return container_of(class_dev, struct vfio_spimdev, cls_dev); > > +} > > +EXPORT_SYMBOL_GPL(vfio_spimdev_pdev_spimdev); > > + > > +struct vfio_spimdev *mdev_spimdev(struct mdev_device *mdev) > > +{ > > + struct device *pdev = mdev_parent_dev(mdev); > > + > > + return vfio_spimdev_pdev_spimdev(pdev); > > +} > > +EXPORT_SYMBOL_GPL(mdev_spimdev); > > + > > +static ssize_t iommu_type_show(struct device *dev, > > + struct device_attribute *attr, char *buf) > > +{ > > + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); > > + > > + if (!spimdev) > > + return -ENODEV; > > + > > + return sprintf(buf, "%d\n", spimdev->iommu_type); > > +} > > + > > +static DEVICE_ATTR_RO(iommu_type); > > + > > +static ssize_t dma_flag_show(struct device *dev, > > + struct device_attribute *attr, char *buf) > > +{ > > + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); > > + > > + if (!spimdev) > > + return -ENODEV; > > + > > + return sprintf(buf, "%d\n", spimdev->dma_flag); > > +} > > + > > +static DEVICE_ATTR_RO(dma_flag); > > + > > +/* mdev->dev_attr_groups */ > > +static struct attribute *vfio_spimdev_attrs[] = { > > + &dev_attr_iommu_type.attr, > > + &dev_attr_dma_flag.attr, > > + NULL, > > +}; > > +static const struct attribute_group vfio_spimdev_group = { > > + .name = VFIO_SPIMDEV_PDEV_ATTRS_GRP_NAME, > > + .attrs = vfio_spimdev_attrs, > > +}; > > +const struct attribute_group *vfio_spimdev_groups[] = { > > + &vfio_spimdev_group, > > + NULL, > > +}; > > + > > +/* default attributes for mdev->supported_type_groups, used by > > registerer*/ > > +#define MDEV_TYPE_ATTR_RO_EXPORT(name) \ > > + MDEV_TYPE_ATTR_RO(name); \ > > + EXPORT_SYMBOL_GPL(mdev_type_attr_##name); > > + > > +#define DEF_SIMPLE_SPIMDEV_ATTR(_name, spimdev_member, format) > > \ > > +static ssize_t _name##_show(struct kobject *kobj, struct device *dev, \ > > + char *buf) \ > > +{ \ > > + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); > > \ > > + if (!spimdev) \ > > + return -ENODEV; \ > > + return sprintf(buf, format, spimdev->spimdev_member); \ > > +} \ > > +MDEV_TYPE_ATTR_RO_EXPORT(_name) > > + > > +DEF_SIMPLE_SPIMDEV_ATTR(flags, flags, "%d"); > > +DEF_SIMPLE_SPIMDEV_ATTR(name, name, "%s"); /* this should be > > algorithm name, */ > > + /* but you would not care if you have only one algorithm */ > > +DEF_SIMPLE_SPIMDEV_ATTR(device_api, api_ver, "%s"); > > + > > +/* this return total queue left, not mdev left */ > > +static ssize_t > > +available_instances_show(struct kobject *kobj, struct device *dev, char > > *buf) > > +{ > > + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); > > + > > + return sprintf(buf, "%d", > > + spimdev->ops->get_available_instances(spimdev)); > > +} > > +MDEV_TYPE_ATTR_RO_EXPORT(available_instances); > > + > > +static int vfio_spimdev_mdev_create(struct kobject *kobj, > > + struct mdev_device *mdev) > > +{ > > + struct device *dev = mdev_dev(mdev); > > + struct device *pdev = mdev_parent_dev(mdev); > > + struct spimdev_mdev_state *mdev_state; > > + struct vfio_spimdev *spimdev = mdev_spimdev(mdev); > > + > > + if (!spimdev->ops->get_queue) > > + return -ENODEV; > > + > > + mdev_state = devm_kzalloc(dev, sizeof(struct > > spimdev_mdev_state), > > + GFP_KERNEL); > > + if (!mdev_state) > > + return -ENOMEM; > > + mdev_set_drvdata(mdev, mdev_state); > > + mdev_state->spimdev = spimdev; > > + dev->iommu_fwspec = pdev->iommu_fwspec; > > + get_device(pdev); > > + __module_get(spimdev->owner); > > + > > + return 0; > > +} > > + > > +static int vfio_spimdev_mdev_remove(struct mdev_device *mdev) > > +{ > > + struct device *dev = mdev_dev(mdev); > > + struct device *pdev = mdev_parent_dev(mdev); > > + struct vfio_spimdev *spimdev = mdev_spimdev(mdev); > > + > > + put_device(pdev); > > + module_put(spimdev->owner); > > + dev->iommu_fwspec = NULL; > > + mdev_set_drvdata(mdev, NULL); > > + > > + return 0; > > +} > > + > > +/* Wake up the process who is waiting this queue */ > > +void vfio_spimdev_wake_up(struct vfio_spimdev_queue *q) > > +{ > > + wake_up(&q->wait); > > +} > > +EXPORT_SYMBOL_GPL(vfio_spimdev_wake_up); > > + > > +static int vfio_spimdev_q_file_open(struct inode *inode, struct file *file) > > +{ > > + return 0; > > +} > > + > > +static int vfio_spimdev_q_file_release(struct inode *inode, struct file *file) > > +{ > > + struct vfio_spimdev_queue *q = > > + (struct vfio_spimdev_queue *)file->private_data; > > + struct vfio_spimdev *spimdev = q->spimdev; > > + int ret; > > + > > + ret = spimdev->ops->put_queue(q); > > + if (ret) { > > + dev_err(spimdev->dev, "drv put queue fail (%d)!\n", ret); > > + return ret; > > + } > > + > > + put_device(mdev_dev(q->mdev)); > > + > > + return 0; > > +} > > + > > +static long vfio_spimdev_q_file_ioctl(struct file *file, unsigned int cmd, > > + unsigned long arg) > > +{ > > + struct vfio_spimdev_queue *q = > > + (struct vfio_spimdev_queue *)file->private_data; > > + struct vfio_spimdev *spimdev = q->spimdev; > > + > > + if (spimdev->ops->ioctl) > > + return spimdev->ops->ioctl(q, cmd, arg); > > + > > + dev_err(spimdev->dev, "ioctl cmd (%d) is not supported!\n", cmd); > > + > > + return -EINVAL; > > +} > > + > > +static int vfio_spimdev_q_file_mmap(struct file *file, > > + struct vm_area_struct *vma) > > +{ > > + struct vfio_spimdev_queue *q = > > + (struct vfio_spimdev_queue *)file->private_data; > > + struct vfio_spimdev *spimdev = q->spimdev; > > + > > + if (spimdev->ops->mmap) > > + return spimdev->ops->mmap(q, vma); > > + > > + dev_err(spimdev->dev, "no driver mmap!\n"); > > + return -EINVAL; > > +} > > + > > +static __poll_t vfio_spimdev_q_file_poll(struct file *file, poll_table *wait) > > +{ > > + struct vfio_spimdev_queue *q = > > + (struct vfio_spimdev_queue *)file->private_data; > > + struct vfio_spimdev *spimdev = q->spimdev; > > + > > + poll_wait(file, &q->wait, wait); > > + if (spimdev->ops->is_q_updated(q)) > > + return EPOLLIN | EPOLLRDNORM; > > + > > + return 0; > > +} > > + > > +static const struct file_operations spimdev_q_file_ops = { > > + .owner = THIS_MODULE, > > + .open = vfio_spimdev_q_file_open, > > + .unlocked_ioctl = vfio_spimdev_q_file_ioctl, > > + .release = vfio_spimdev_q_file_release, > > + .poll = vfio_spimdev_q_file_poll, > > + .mmap = vfio_spimdev_q_file_mmap, > > +}; > > + > > +static long vfio_spimdev_mdev_get_queue(struct mdev_device *mdev, > > + struct vfio_spimdev *spimdev, unsigned long arg) > > +{ > > + struct vfio_spimdev_queue *q; > > + int ret; > > + > > +#ifdef CONFIG_IOMMU_SVA > > + int pasid = arg; > > + > > + if (!vfio_spimdev_is_valid_pasid(pasid)) > > + return -EINVAL; > > +#endif > > + > > + if (!spimdev->ops->get_queue) > > + return -EINVAL; > > + > > + ret = spimdev->ops->get_queue(spimdev, arg, &q); > > + if (ret < 0) { > > + dev_err(spimdev->dev, "get_queue failed\n"); > > + return -ENODEV; > > + } > > + > > + ret = anon_inode_getfd("spimdev_q", &spimdev_q_file_ops, > > + q, O_CLOEXEC | O_RDWR); > > + if (ret < 0) { > > + dev_err(spimdev->dev, "getfd fail %d\n", ret); > > + goto err_with_queue; > > + } > > + > > + q->fd = ret; > > + q->spimdev = spimdev; > > + q->mdev = mdev; > > + q->container = arg; > > + init_waitqueue_head(&q->wait); > > + get_device(mdev_dev(mdev)); > > + > > + return ret; > > + > > +err_with_queue: > > + spimdev->ops->put_queue(q); > > + return ret; > > +} > > + > > +static long vfio_spimdev_mdev_ioctl(struct mdev_device *mdev, unsigned > > int cmd, > > + unsigned long arg) > > +{ > > + struct spimdev_mdev_state *mdev_state; > > + struct vfio_spimdev *spimdev; > > + > > + if (!mdev) > > + return -ENODEV; > > + > > + mdev_state = mdev_get_drvdata(mdev); > > + if (!mdev_state) > > + return -ENODEV; > > + > > + spimdev = mdev_state->spimdev; > > + if (!spimdev) > > + return -ENODEV; > > + > > + if (cmd == VFIO_SPIMDEV_CMD_GET_Q) > > + return vfio_spimdev_mdev_get_queue(mdev, spimdev, arg); > > + > > + dev_err(spimdev->dev, > > + "%s, ioctl cmd (0x%x) is not supported!\n", __func__, cmd); > > + return -EINVAL; > > +} > > + > > +static void vfio_spimdev_release(struct device *dev) { } > > +static void vfio_spimdev_mdev_release(struct mdev_device *mdev) { } > > +static int vfio_spimdev_mdev_open(struct mdev_device *mdev) { return > > 0; } > > + > > +/** > > + * vfio_spimdev_register - register a spimdev > > + * @spimdev: device structure > > + */ > > +int vfio_spimdev_register(struct vfio_spimdev *spimdev) > > +{ > > + int ret; > > + const char *drv_name; > > + > > + if (!spimdev->dev) > > + return -ENODEV; > > + > > + drv_name = dev_driver_string(spimdev->dev); > > + if (strstr(drv_name, "-")) { > > + pr_err("spimdev: parent driver name cannot include '-'!\n"); > > + return -EINVAL; > > + } > > + > > + spimdev->dev_id = idr_alloc(&spimdev_idr, spimdev, 0, 0, > > GFP_KERNEL); > > + if (spimdev->dev_id < 0) > > + return spimdev->dev_id; > > + > > + atomic_set(&spimdev->ref, 0); > > + spimdev->cls_dev.parent = spimdev->dev; > > + spimdev->cls_dev.class = spimdev_class; > > + spimdev->cls_dev.release = vfio_spimdev_release; > > + dev_set_name(&spimdev->cls_dev, "%s", dev_name(spimdev- > > >dev)); > > + ret = device_register(&spimdev->cls_dev); > > + if (ret) > > + return ret; > > + > > + spimdev->mdev_fops.owner = spimdev->owner; > > + spimdev->mdev_fops.dev_attr_groups = > > vfio_spimdev_groups; > > + WARN_ON(!spimdev->mdev_fops.supported_type_groups); > > + spimdev->mdev_fops.create = > > vfio_spimdev_mdev_create; > > + spimdev->mdev_fops.remove = > > vfio_spimdev_mdev_remove; > > + spimdev->mdev_fops.ioctl = vfio_spimdev_mdev_ioctl; > > + spimdev->mdev_fops.open = > > vfio_spimdev_mdev_open; > > + spimdev->mdev_fops.release = > > vfio_spimdev_mdev_release; > > + > > + ret = mdev_register_device(spimdev->dev, &spimdev->mdev_fops); > > + if (ret) > > + device_unregister(&spimdev->cls_dev); > > + > > + return ret; > > +} > > +EXPORT_SYMBOL_GPL(vfio_spimdev_register); > > + > > +/** > > + * vfio_spimdev_unregister - unregisters a spimdev > > + * @spimdev: device to unregister > > + * > > + * Unregister a miscellaneous device that wat previously successully > > registered > > + * with vfio_spimdev_register(). > > + */ > > +void vfio_spimdev_unregister(struct vfio_spimdev *spimdev) > > +{ > > + mdev_unregister_device(spimdev->dev); > > + device_unregister(&spimdev->cls_dev); > > +} > > +EXPORT_SYMBOL_GPL(vfio_spimdev_unregister); > > + > > +static int __init vfio_spimdev_init(void) > > +{ > > + spimdev_class = class_create(THIS_MODULE, > > VFIO_SPIMDEV_CLASS_NAME); > > + return PTR_ERR_OR_ZERO(spimdev_class); > > +} > > + > > +static __exit void vfio_spimdev_exit(void) > > +{ > > + class_destroy(spimdev_class); > > + idr_destroy(&spimdev_idr); > > +} > > + > > +module_init(vfio_spimdev_init); > > +module_exit(vfio_spimdev_exit); > > + > > +MODULE_LICENSE("GPL"); > > +MODULE_AUTHOR("Hisilicon Tech. Co., Ltd."); > > +MODULE_DESCRIPTION("VFIO Share Parent's IOMMU Mediated Device"); > > diff --git a/drivers/vfio/vfio_iommu_type1.c > > b/drivers/vfio/vfio_iommu_type1.c > > index 3e5b17710a4f..0ec38a17c98c 100644 > > --- a/drivers/vfio/vfio_iommu_type1.c > > +++ b/drivers/vfio/vfio_iommu_type1.c > > @@ -41,6 +41,7 @@ > > #include <linux/notifier.h> > > #include <linux/dma-iommu.h> > > #include <linux/irqdomain.h> > > +#include <linux/vfio_spimdev.h> > > > > #define DRIVER_VERSION "0.2" > > #define DRIVER_AUTHOR "Alex Williamson > > <alex.williamson@redhat.com>" > > @@ -89,6 +90,8 @@ struct vfio_dma { > > }; > > > > struct vfio_group { > > + /* iommu_group of mdev's parent device */ > > + struct iommu_group *parent_group; > > struct iommu_group *iommu_group; > > struct list_head next; > > }; > > @@ -1327,6 +1330,109 @@ static bool vfio_iommu_has_sw_msi(struct > > iommu_group *group, phys_addr_t *base) > > return ret; > > } > > > > +/* return 0 if the device is not spimdev. > > + * return 1 if the device is spimdev, the data will be updated with parent > > + * device's group. > > + * return -errno if other error. > > + */ > > +static int vfio_spimdev_type(struct device *dev, void *data) > > +{ > > + struct iommu_group **group = data; > > + struct iommu_group *pgroup; > > + int (*spimdev_mdev)(struct device *dev); > > + struct device *pdev; > > + int ret = 1; > > + > > + /* vfio_spimdev module is not configurated */ > > + spimdev_mdev = symbol_get(vfio_spimdev_is_spimdev); > > + if (!spimdev_mdev) > > + return 0; > > + > > + /* check if it belongs to vfio_spimdev device */ > > + if (!spimdev_mdev(dev)) { > > + ret = 0; > > + goto get_exit; > > + } > > + > > + pdev = dev->parent; > > + pgroup = iommu_group_get(pdev); > > + if (!pgroup) { > > + ret = -ENODEV; > > + goto get_exit; > > + } > > + > > + if (group) { > > + /* check if all parent devices is the same */ > > + if (*group && *group != pgroup) > > + ret = -ENODEV; > > + else > > + *group = pgroup; > > + } > > + > > + iommu_group_put(pgroup); > > + > > +get_exit: > > + symbol_put(vfio_spimdev_is_spimdev); > > + > > + return ret; > > +} > > + > > +/* return 0 or -errno */ > > +static int vfio_spimdev_bus(struct device *dev, void *data) > > +{ > > + struct bus_type **bus = data; > > + > > + if (!dev->bus) > > + return -ENODEV; > > + > > + /* ensure all devices has the same bus_type */ > > + if (*bus && *bus != dev->bus) > > + return -EINVAL; > > + > > + *bus = dev->bus; > > + return 0; > > +} > > + > > +/* return 0 means it is not spi group, 1 means it is, or -EXXX for error */ > > +static int vfio_iommu_type1_attach_spigroup(struct vfio_domain *domain, > > + struct vfio_group *group, > > + struct iommu_group > > *iommu_group) > > +{ > > + int ret; > > + struct bus_type *pbus = NULL; > > + struct iommu_group *pgroup = NULL; > > + > > + ret = iommu_group_for_each_dev(iommu_group, &pgroup, > > + vfio_spimdev_type); > > + if (ret < 0) > > + goto out; > > + else if (ret > 0) { > > + domain->domain = iommu_group_share_domain(pgroup); > > + if (IS_ERR(domain->domain)) > > + goto out; > > + ret = iommu_group_for_each_dev(pgroup, &pbus, > > + vfio_spimdev_bus); > > + if (ret < 0) > > + goto err_with_share_domain; > > + > > + if (pbus && iommu_capable(pbus, > > IOMMU_CAP_CACHE_COHERENCY)) > > + domain->prot |= IOMMU_CACHE; > > + > > + group->parent_group = pgroup; > > + INIT_LIST_HEAD(&domain->group_list); > > + list_add(&group->next, &domain->group_list); > > + > > + return 1; > > + } > > + > > + return 0; > > + > > +err_with_share_domain: > > + iommu_group_unshare_domain(pgroup); > > +out: > > + return ret; > > +} > > + > > static int vfio_iommu_type1_attach_group(void *iommu_data, > > struct iommu_group > > *iommu_group) > > { > > @@ -1335,8 +1441,8 @@ static int vfio_iommu_type1_attach_group(void > > *iommu_data, > > struct vfio_domain *domain, *d; > > struct bus_type *bus = NULL, *mdev_bus; > > int ret; > > - bool resv_msi, msi_remap; > > - phys_addr_t resv_msi_base; > > + bool resv_msi = false, msi_remap; > > + phys_addr_t resv_msi_base = 0; > > > > mutex_lock(&iommu->lock); > > > > @@ -1373,6 +1479,14 @@ static int vfio_iommu_type1_attach_group(void > > *iommu_data, > > if (mdev_bus) { > > if ((bus == mdev_bus) && !iommu_present(bus)) { > > symbol_put(mdev_bus_type); > > + > > + ret = vfio_iommu_type1_attach_spigroup(domain, > > group, > > + iommu_group); > > + if (ret < 0) > > + goto out_free; > > + else if (ret > 0) > > + goto replay_check; > > + > > if (!iommu->external_domain) { > > INIT_LIST_HEAD(&domain->group_list); > > iommu->external_domain = domain; > > @@ -1451,12 +1565,13 @@ static int > > vfio_iommu_type1_attach_group(void *iommu_data, > > > > vfio_test_domain_fgsp(domain); > > > > +replay_check: > > /* replay mappings on new domains */ > > ret = vfio_iommu_replay(iommu, domain); > > if (ret) > > goto out_detach; > > > > - if (resv_msi) { > > + if (!group->parent_group && resv_msi) { > > ret = iommu_get_msi_cookie(domain->domain, > > resv_msi_base); > > if (ret) > > goto out_detach; > > @@ -1471,7 +1586,10 @@ static int vfio_iommu_type1_attach_group(void > > *iommu_data, > > out_detach: > > iommu_detach_group(domain->domain, iommu_group); > > out_domain: > > - iommu_domain_free(domain->domain); > > + if (group->parent_group) > > + iommu_group_unshare_domain(group->parent_group); > > + else > > + iommu_domain_free(domain->domain); > > out_free: > > kfree(domain); > > kfree(group); > > @@ -1533,6 +1651,7 @@ static void > > vfio_iommu_type1_detach_group(void *iommu_data, > > struct vfio_iommu *iommu = iommu_data; > > struct vfio_domain *domain; > > struct vfio_group *group; > > + int ret; > > > > mutex_lock(&iommu->lock); > > > > @@ -1560,7 +1679,11 @@ static void > > vfio_iommu_type1_detach_group(void *iommu_data, > > if (!group) > > continue; > > > > - iommu_detach_group(domain->domain, iommu_group); > > + if (group->parent_group) > > + iommu_group_unshare_domain(group- > > >parent_group); > > + else > > + iommu_detach_group(domain->domain, > > iommu_group); > > + > > list_del(&group->next); > > kfree(group); > > /* > > @@ -1577,7 +1700,8 @@ static void > > vfio_iommu_type1_detach_group(void *iommu_data, > > else > > > > vfio_iommu_unmap_unpin_reaccount(iommu); > > } > > - iommu_domain_free(domain->domain); > > + if (!ret) > > + iommu_domain_free(domain->domain); > > list_del(&domain->next); > > kfree(domain); > > } > > diff --git a/include/linux/vfio_spimdev.h b/include/linux/vfio_spimdev.h > > new file mode 100644 > > index 000000000000..f7e7d90013e1 > > --- /dev/null > > +++ b/include/linux/vfio_spimdev.h > > @@ -0,0 +1,95 @@ > > +/* SPDX-License-Identifier: GPL-2.0+ */ > > +#ifndef __VFIO_SPIMDEV_H > > +#define __VFIO_SPIMDEV_H > > + > > +#include <linux/device.h> > > +#include <linux/iommu.h> > > +#include <linux/mdev.h> > > +#include <linux/vfio.h> > > +#include <uapi/linux/vfio_spimdev.h> > > + > > +struct vfio_spimdev_queue; > > +struct vfio_spimdev; > > + > > +/** > > + * struct vfio_spimdev_ops - WD device operations > > + * @get_queue: get a queue from the device according to algorithm > > + * @put_queue: free a queue to the device > > + * @is_q_updated: check whether the task is finished > > + * @mask_notify: mask the task irq of queue > > + * @mmap: mmap addresses of queue to user space > > + * @reset: reset the WD device > > + * @reset_queue: reset the queue > > + * @ioctl: ioctl for user space users of the queue > > + * @get_available_instances: get numbers of the queue remained > > + */ > > +struct vfio_spimdev_ops { > > + int (*get_queue)(struct vfio_spimdev *spimdev, unsigned long arg, > > + struct vfio_spimdev_queue **q); > > + int (*put_queue)(struct vfio_spimdev_queue *q); > > + int (*is_q_updated)(struct vfio_spimdev_queue *q); > > + void (*mask_notify)(struct vfio_spimdev_queue *q, int > > event_mask); > > + int (*mmap)(struct vfio_spimdev_queue *q, struct vm_area_struct > > *vma); > > + int (*reset)(struct vfio_spimdev *spimdev); > > + int (*reset_queue)(struct vfio_spimdev_queue *q); > > + long (*ioctl)(struct vfio_spimdev_queue *q, unsigned int cmd, > > + unsigned long arg); > > + int (*get_available_instances)(struct vfio_spimdev *spimdev); > > +}; > > + > > +struct vfio_spimdev_queue { > > + struct mutex mutex; > > + struct vfio_spimdev *spimdev; > > + int qid; > > + __u32 flags; > > + void *priv; > > + wait_queue_head_t wait; > > + struct mdev_device *mdev; > > + int fd; > > + int container; > > +#ifdef CONFIG_IOMMU_SVA > > + int pasid; > > +#endif > > +}; > > + > > +struct vfio_spimdev { > > + const char *name; > > + int status; > > + atomic_t ref; > > + struct module *owner; > > + const struct vfio_spimdev_ops *ops; > > + struct device *dev; > > + struct device cls_dev; > > + bool is_vf; > > + u32 iommu_type; > > + u32 dma_flag; > > + u32 dev_id; > > + void *priv; > > + int flags; > > + const char *api_ver; > > + struct mdev_parent_ops mdev_fops; > > +}; > > + > > +int vfio_spimdev_register(struct vfio_spimdev *spimdev); > > +void vfio_spimdev_unregister(struct vfio_spimdev *spimdev); > > +void vfio_spimdev_wake_up(struct vfio_spimdev_queue *q); > > +int vfio_spimdev_is_spimdev(struct device *dev); > > +struct vfio_spimdev *vfio_spimdev_pdev_spimdev(struct device *dev); > > +int vfio_spimdev_pasid_pri_check(int pasid); > > +int vfio_spimdev_get(struct device *dev); > > +int vfio_spimdev_put(struct device *dev); > > +struct vfio_spimdev *mdev_spimdev(struct mdev_device *mdev); > > + > > +extern struct mdev_type_attribute mdev_type_attr_flags; > > +extern struct mdev_type_attribute mdev_type_attr_name; > > +extern struct mdev_type_attribute mdev_type_attr_device_api; > > +extern struct mdev_type_attribute mdev_type_attr_available_instances; > > +#define VFIO_SPIMDEV_DEFAULT_MDEV_TYPE_ATTRS \ > > + &mdev_type_attr_name.attr, \ > > + &mdev_type_attr_device_api.attr, \ > > + &mdev_type_attr_available_instances.attr, \ > > + &mdev_type_attr_flags.attr > > + > > +#define _VFIO_SPIMDEV_REGION(vm_pgoff) (vm_pgoff & 0xf) > > + > > +#endif > > diff --git a/include/uapi/linux/vfio_spimdev.h > > b/include/uapi/linux/vfio_spimdev.h > > new file mode 100644 > > index 000000000000..3435e5c345b4 > > --- /dev/null > > +++ b/include/uapi/linux/vfio_spimdev.h > > @@ -0,0 +1,28 @@ > > +/* SPDX-License-Identifier: GPL-2.0+ */ > > +#ifndef _UAPIVFIO_SPIMDEV_H > > +#define _UAPIVFIO_SPIMDEV_H > > + > > +#include <linux/ioctl.h> > > + > > +#define VFIO_SPIMDEV_CLASS_NAME "spimdev" > > + > > +/* Device ATTRs in parent dev SYSFS DIR */ > > +#define VFIO_SPIMDEV_PDEV_ATTRS_GRP_NAME "params" > > + > > +/* Parent device attributes */ > > +#define SPIMDEV_IOMMU_TYPE "iommu_type" > > +#define SPIMDEV_DMA_FLAG "dma_flag" > > + > > +/* Maximum length of algorithm name string */ > > +#define VFIO_SPIMDEV_ALG_NAME_SIZE 64 > > + > > +/* the bits used in SPIMDEV_DMA_FLAG attributes */ > > +#define VFIO_SPIMDEV_DMA_INVALID 0 > > +#define VFIO_SPIMDEV_DMA_SINGLE_PROC_MAP 1 > > +#define VFIO_SPIMDEV_DMA_MULTI_PROC_MAP 2 > > +#define VFIO_SPIMDEV_DMA_SVM 4 > > +#define VFIO_SPIMDEV_DMA_SVM_NO_FAULT 8 > > +#define VFIO_SPIMDEV_DMA_PHY 16 > > + > > +#define VFIO_SPIMDEV_CMD_GET_Q _IO('W', 1) > > +#endif > > -- > > 2.17.1 -- -Kenneth(Hisilicon) ================================================================================ 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁 止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中 的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it!
> From: Kenneth Lee [mailto:liguozhu@hisilicon.com] > Sent: Thursday, August 2, 2018 11:47 AM > > > > > > From: Kenneth Lee > > > Sent: Wednesday, August 1, 2018 6:22 PM > > > > > > From: Kenneth Lee <liguozhu@hisilicon.com> > > > > > > SPIMDEV is "Share Parent IOMMU Mdev". It is a vfio-mdev. But differ > from > > > the general vfio-mdev: > > > > > > 1. It shares its parent's IOMMU. > > > 2. There is no hardware resource attached to the mdev is created. The > > > hardware resource (A `queue') is allocated only when the mdev is > > > opened. > > > > Alex has concern on doing so, as pointed out in: > > > > https://www.spinics.net/lists/kvm/msg172652.html > > > > resource allocation should be reserved at creation time. > > Yes. That is why I keep telling that SPIMDEV is not for "VM", it is for "many > processes", it is just an access point to the process. Not a device to VM. I > hope > Alex can accept it:) > VFIO is just about assigning device resource to user space. It doesn't care whether it's native processes or VM using the device so far. Along the direction which you described, looks VFIO needs to support the configuration that some mdevs are used for native process only, while others can be used for both native and VM. I'm not sure whether there is a clean way to enforce it... Let's hear from Alex's thought. Thanks Kevin
On Thu, Aug 02, 2018 at 12:43:27PM -0600, Alex Williamson wrote: > Date: Thu, 2 Aug 2018 12:43:27 -0600 > From: Alex Williamson <alex.williamson@redhat.com> > To: Cornelia Huck <cohuck@redhat.com> > CC: Kenneth Lee <liguozhu@hisilicon.com>, "Tian, Kevin" > <kevin.tian@intel.com>, Kenneth Lee <nek.in.cn@gmail.com>, Jonathan Corbet > <corbet@lwn.net>, Herbert Xu <herbert@gondor.apana.org.au>, "David S . > Miller" <davem@davemloft.net>, Joerg Roedel <joro@8bytes.org>, Hao Fang > <fanghao11@huawei.com>, Zhou Wang <wangzhou1@hisilicon.com>, Zaibo Xu > <xuzaibo@huawei.com>, Philippe Ombredanne <pombredanne@nexb.com>, "Greg > Kroah-Hartman" <gregkh@linuxfoundation.org>, Thomas Gleixner > <tglx@linutronix.de>, "linux-doc@vger.kernel.org" > <linux-doc@vger.kernel.org>, "linux-kernel@vger.kernel.org" > <linux-kernel@vger.kernel.org>, "linux-crypto@vger.kernel.org" > <linux-crypto@vger.kernel.org>, "iommu@lists.linux-foundation.org" > <iommu@lists.linux-foundation.org>, "kvm@vger.kernel.org" > <kvm@vger.kernel.org>, "linux-accelerators@lists.ozlabs.org\" > <linux-accelerators@lists.ozlabs.org>, Lu Baolu > <baolu.lu@linux.intel.com>, Kumar", <Sanjay K " > <sanjay.k.kumar@intel.com>, " linuxarm@huawei.com " > <linuxarm@huawei.com>"> > Subject: Re: [RFC PATCH 3/7] vfio: add spimdev support > Message-ID: <20180802124327.403b10ab@t450s.home> > > On Thu, 2 Aug 2018 10:35:28 +0200 > Cornelia Huck <cohuck@redhat.com> wrote: > > > On Thu, 2 Aug 2018 15:34:40 +0800 > > Kenneth Lee <liguozhu@hisilicon.com> wrote: > > > > > On Thu, Aug 02, 2018 at 04:24:22AM +0000, Tian, Kevin wrote: > > > > > > > From: Kenneth Lee [mailto:liguozhu@hisilicon.com] > > > > > Sent: Thursday, August 2, 2018 11:47 AM > > > > > > > > > > > > > > > > > > From: Kenneth Lee > > > > > > > Sent: Wednesday, August 1, 2018 6:22 PM > > > > > > > > > > > > > > From: Kenneth Lee <liguozhu@hisilicon.com> > > > > > > > > > > > > > > SPIMDEV is "Share Parent IOMMU Mdev". It is a vfio-mdev. But differ > > > > > from > > > > > > > the general vfio-mdev: > > > > > > > > > > > > > > 1. It shares its parent's IOMMU. > > > > > > > 2. There is no hardware resource attached to the mdev is created. The > > > > > > > hardware resource (A `queue') is allocated only when the mdev is > > > > > > > opened. > > > > > > > > > > > > Alex has concern on doing so, as pointed out in: > > > > > > > > > > > > https://www.spinics.net/lists/kvm/msg172652.html > > > > > > > > > > > > resource allocation should be reserved at creation time. > > > > > > > > > > Yes. That is why I keep telling that SPIMDEV is not for "VM", it is for "many > > > > > processes", it is just an access point to the process. Not a device to VM. I > > > > > hope > > > > > Alex can accept it:) > > > > > > > > > > > > > VFIO is just about assigning device resource to user space. It doesn't care > > > > whether it's native processes or VM using the device so far. Along the direction > > > > which you described, looks VFIO needs to support the configuration that > > > > some mdevs are used for native process only, while others can be used > > > > for both native and VM. I'm not sure whether there is a clean way to > > > > enforce it... > > > > > > I had the same idea at the beginning. But finally I found that the life cycle > > > of the virtual device for VM and process were different. Consider you create > > > some mdevs for VM use, you will give all those mdevs to lib-virt, which > > > distribute those mdev to VMs or containers. If the VM or container exits, the > > > mdev is returned to the lib-virt and used for next allocation. It is the > > > administrator who controlled every mdev's allocation. > > Libvirt currently does no management of mdev devices, so I believe > this example is fictitious. The extent of libvirt's interaction with > mdev is that XML may specify an mdev UUID as the source for a hostdev > and set the permissions on the device files appropriately. Whether > mdevs are created in advance and re-used or created and destroyed > around a VM instance (for example via qemu hooks scripts) is not a > policy that libvirt imposes. > > > > But for process, it is different. There is no lib-virt in control. The > > > administrator's intension is to grant some type of application to access the > > > hardware. The application can get a handle of the hardware, send request and get > > > the result. That's all. He/She dose not care which mdev is allocated to that > > > application. If it crashes, it should be the kernel's responsibility to withdraw > > > the resource, the system administrator does not want to do it by hand. > > Libvirt is also not a required component for VM lifecycles, it's an > optional management interface, but there are also VM lifecycles exactly > as you describe. A VM may want a given type of vGPU, there might be > multiple sources of that type and any instance is fungible to any > other. Such an mdev can be dynamically created, assigned to the VM, > and destroyed later. Why do we need to support "empty" mdevs that do > not reserve reserve resources until opened? The concept of available > instances is entirely lost with that approach and it creates an > environment that's difficult to support, resources may not be available > at the time the user attempts to access them. > > > I don't think that you should distinguish the cases by the presence of > > a management application. How can the mdev driver know what the > > intention behind using the device is? > > Absolutely, vfio is a userspace driver interface, it's not tailored to > VM usage and we cannot know the intentions of the user. > > > Would it make more sense to use a different mechanism to enforce that > > applications only use those handles they are supposed to use? Maybe > > cgroups? I don't think it's a good idea to push usage policy into the > > kernel. > > I agree, this sounds like a userspace problem, mdev supports dynamic > creation and removal of mdev devices, if there's an issue with > maintaining a set of standby devices that a user has access to, this > sounds like a userspace broker problem. It makes more sense to me to > have a model where a userspace application can make a request to a > broker and the broker can reply with "none available" rather than > having a set of devices on standby that may or may not work depending > on the system load and other users. Thanks, > > Alex I am sorry, I used a wrong mutt command when reply to Cornelia's last mail. The last reply dose not stay within this thread. So please let me repeat my point here. I should not have use libvirt as the example. But WarpDrive works in such scenario: 1. It supports thousands of processes. Take zip accelerator as an example, any application need data compression/decompression will need to interact with the accelerator. To support that, you have to create tens of thousands of mdev for their usage. I don't think it is a good idea to have so many devices in the system. 2. The application does not want to own the mdev for long. It just need an access point for the hardware service. If it has to interact with an management agent for allocation and release, this makes the problem complex. 3. The service is bound with the process. When the process exit, the resource should be released automatically. Kernel is the best place to monitor the state of the process. I agree this extending the concept of mdev. But again, it is cleaner than creating another facility for user land DMA. We just need to take mdev as an access point of the device: when it is open, the resource is given. It is not a device for a particular entity or instance. But it is still a device which can provide service of the hardware. Cornelia is worrying about resource starving. I think that can be solved by set restriction on the mdev itself. Mdev management agent dose not help much here. Management on the mdev itself can still lead to the status of running out of resource. Thanks -- -Kenneth(Hisilicon) ================================================================================ 本邮件及其附件含有华为公司的保密信息,仅限于发送给上面地址中列出的个人或群组。禁 止任何其他人以任何形式使用(包括但不限于全部或部分地泄露、复制、或散发)本邮件中 的信息。如果您错收了本邮件,请您立即电话或邮件通知发件人并删除本邮件! This e-mail and its attachments contain confidential information from HUAWEI, which is intended only for the person or entity whose address is listed above. Any use of the information contained herein in any way (including, but not limited to, total or partial disclosure, reproduction, or dissemination) by persons other than the intended recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender by phone or email immediately and delete it!
在 2018年08月07日 星期二 01:05 上午, Alex Williamson 写道: > On Mon, 6 Aug 2018 09:34:28 -0700 > "Raj, Ashok" <ashok.raj@intel.com> wrote: > >> On Mon, Aug 06, 2018 at 09:49:40AM -0600, Alex Williamson wrote: >>> On Mon, 6 Aug 2018 09:40:04 +0800 >>> Kenneth Lee <liguozhu@hisilicon.com> wrote: >>>> 1. It supports thousands of processes. Take zip accelerator as an example, any >>>> application need data compression/decompression will need to interact with the >>>> accelerator. To support that, you have to create tens of thousands of mdev for >>>> their usage. I don't think it is a good idea to have so many devices in the >>>> system. >>> Each mdev is a device, regardless of whether there are hardware >>> resources committed to the device, so I don't understand this argument. >>> >>>> 2. The application does not want to own the mdev for long. It just need an >>>> access point for the hardware service. If it has to interact with an management >>>> agent for allocation and release, this makes the problem complex. >>> I don't see how the length of the usage plays a role here either. Are >>> you concerned that the time it takes to create and remove an mdev is >>> significant compared to the usage time? Userspace is certainly welcome >>> to create a pool of devices, but why should it be the kernel's >>> responsibility to dynamically assign resources to an mdev? What's the >>> usage model when resources are unavailable? It seems there's >>> complexity in either case, but it's generally userspace's responsibility >>> to impose a policy. >>> >> Can vfio dev's created representing an mdev be shared between several >> processes? It doesn't need to be exclusive. >> >> The path to hardware is established by the processes binding to SVM and >> IOMMU ensuring that the PASID is plummed properly. One can think the >> same hardware is shared between several processes, hardware knows the >> isolation is via the PASID. >> >> For these cases it isn't required to create a dev per process. > The iommu group is the unit of ownership, a vfio group mirrors an iommu > group, therefore a vfio group only allows a single open(2). A group > also represents the minimum isolation set of devices, therefore devices > within a group are not considered isolated and must share the same > address space represented by the vfio container. Beyond that, it is > possible to share devices among processes, but (I think) it generally > implies a hierarchical rather than peer relationship between > processes. Thanks, Actually, this is the key problem we concerned. Our logic was: The PASID refer to the connection between the device and the process. So the resource should be allocated only when the process "make use of" the device. This strategy also bring another advantage that the kernel driver can also make use of the resource if no user application open it. We do have another branch that allocate resource to mdev directly. It looks not so nice (many mdevs and user agent is required for resource management). If the conclusion here is to keep the mdev's original semantics, we will send that branch for discussion in next RFC. Cheers Kenneth > > Alex >
diff --git a/drivers/vfio/Kconfig b/drivers/vfio/Kconfig index c84333eb5eb5..3719eba72ef1 100644 --- a/drivers/vfio/Kconfig +++ b/drivers/vfio/Kconfig @@ -47,4 +47,5 @@ menuconfig VFIO_NOIOMMU source "drivers/vfio/pci/Kconfig" source "drivers/vfio/platform/Kconfig" source "drivers/vfio/mdev/Kconfig" +source "drivers/vfio/spimdev/Kconfig" source "virt/lib/Kconfig" diff --git a/drivers/vfio/Makefile b/drivers/vfio/Makefile index de67c4725cce..28f3ef0cdce1 100644 --- a/drivers/vfio/Makefile +++ b/drivers/vfio/Makefile @@ -9,3 +9,4 @@ obj-$(CONFIG_VFIO_SPAPR_EEH) += vfio_spapr_eeh.o obj-$(CONFIG_VFIO_PCI) += pci/ obj-$(CONFIG_VFIO_PLATFORM) += platform/ obj-$(CONFIG_VFIO_MDEV) += mdev/ +obj-$(CONFIG_VFIO_SPIMDEV) += spimdev/ diff --git a/drivers/vfio/spimdev/Kconfig b/drivers/vfio/spimdev/Kconfig new file mode 100644 index 000000000000..1226301f9d0e --- /dev/null +++ b/drivers/vfio/spimdev/Kconfig @@ -0,0 +1,10 @@ +# SPDX-License-Identifier: GPL-2.0 +config VFIO_SPIMDEV + tristate "Support for Share Parent IOMMU MDEV" + depends on VFIO_MDEV_DEVICE + help + Support for VFIO Share Parent IOMMU MDEV, which enable the kernel to + support for the light weight hardware accelerator framework, WrapDrive. + + To compile this as a module, choose M here: the module will be called + spimdev. diff --git a/drivers/vfio/spimdev/Makefile b/drivers/vfio/spimdev/Makefile new file mode 100644 index 000000000000..d02fb69c37e4 --- /dev/null +++ b/drivers/vfio/spimdev/Makefile @@ -0,0 +1,3 @@ +# SPDX-License-Identifier: GPL-2.0 +spimdev-y := spimdev.o +obj-$(CONFIG_VFIO_SPIMDEV) += vfio_spimdev.o diff --git a/drivers/vfio/spimdev/vfio_spimdev.c b/drivers/vfio/spimdev/vfio_spimdev.c new file mode 100644 index 000000000000..1b6910c9d27d --- /dev/null +++ b/drivers/vfio/spimdev/vfio_spimdev.c @@ -0,0 +1,421 @@ +// SPDX-License-Identifier: GPL-2.0+ +#include <linux/anon_inodes.h> +#include <linux/idr.h> +#include <linux/module.h> +#include <linux/poll.h> +#include <linux/vfio_spimdev.h> + +struct spimdev_mdev_state { + struct vfio_spimdev *spimdev; +}; + +static struct class *spimdev_class; +static DEFINE_IDR(spimdev_idr); + +static int vfio_spimdev_dev_exist(struct device *dev, void *data) +{ + return !strcmp(dev_name(dev), dev_name((struct device *)data)); +} + +#ifdef CONFIG_IOMMU_SVA +static bool vfio_spimdev_is_valid_pasid(int pasid) +{ + struct mm_struct *mm; + + mm = iommu_sva_find(pasid); + if (mm) { + mmput(mm); + return mm == current->mm; + } + + return false; +} +#endif + +/* Check if the device is a mediated device belongs to vfio_spimdev */ +int vfio_spimdev_is_spimdev(struct device *dev) +{ + struct mdev_device *mdev; + struct device *pdev; + + mdev = mdev_from_dev(dev); + if (!mdev) + return 0; + + pdev = mdev_parent_dev(mdev); + if (!pdev) + return 0; + + return class_for_each_device(spimdev_class, NULL, pdev, + vfio_spimdev_dev_exist); +} +EXPORT_SYMBOL_GPL(vfio_spimdev_is_spimdev); + +struct vfio_spimdev *vfio_spimdev_pdev_spimdev(struct device *dev) +{ + struct device *class_dev; + + if (!dev) + return ERR_PTR(-EINVAL); + + class_dev = class_find_device(spimdev_class, NULL, dev, + (int(*)(struct device *, const void *))vfio_spimdev_dev_exist); + if (!class_dev) + return ERR_PTR(-ENODEV); + + return container_of(class_dev, struct vfio_spimdev, cls_dev); +} +EXPORT_SYMBOL_GPL(vfio_spimdev_pdev_spimdev); + +struct vfio_spimdev *mdev_spimdev(struct mdev_device *mdev) +{ + struct device *pdev = mdev_parent_dev(mdev); + + return vfio_spimdev_pdev_spimdev(pdev); +} +EXPORT_SYMBOL_GPL(mdev_spimdev); + +static ssize_t iommu_type_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); + + if (!spimdev) + return -ENODEV; + + return sprintf(buf, "%d\n", spimdev->iommu_type); +} + +static DEVICE_ATTR_RO(iommu_type); + +static ssize_t dma_flag_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); + + if (!spimdev) + return -ENODEV; + + return sprintf(buf, "%d\n", spimdev->dma_flag); +} + +static DEVICE_ATTR_RO(dma_flag); + +/* mdev->dev_attr_groups */ +static struct attribute *vfio_spimdev_attrs[] = { + &dev_attr_iommu_type.attr, + &dev_attr_dma_flag.attr, + NULL, +}; +static const struct attribute_group vfio_spimdev_group = { + .name = VFIO_SPIMDEV_PDEV_ATTRS_GRP_NAME, + .attrs = vfio_spimdev_attrs, +}; +const struct attribute_group *vfio_spimdev_groups[] = { + &vfio_spimdev_group, + NULL, +}; + +/* default attributes for mdev->supported_type_groups, used by registerer*/ +#define MDEV_TYPE_ATTR_RO_EXPORT(name) \ + MDEV_TYPE_ATTR_RO(name); \ + EXPORT_SYMBOL_GPL(mdev_type_attr_##name); + +#define DEF_SIMPLE_SPIMDEV_ATTR(_name, spimdev_member, format) \ +static ssize_t _name##_show(struct kobject *kobj, struct device *dev, \ + char *buf) \ +{ \ + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); \ + if (!spimdev) \ + return -ENODEV; \ + return sprintf(buf, format, spimdev->spimdev_member); \ +} \ +MDEV_TYPE_ATTR_RO_EXPORT(_name) + +DEF_SIMPLE_SPIMDEV_ATTR(flags, flags, "%d"); +DEF_SIMPLE_SPIMDEV_ATTR(name, name, "%s"); /* this should be algorithm name, */ + /* but you would not care if you have only one algorithm */ +DEF_SIMPLE_SPIMDEV_ATTR(device_api, api_ver, "%s"); + +/* this return total queue left, not mdev left */ +static ssize_t +available_instances_show(struct kobject *kobj, struct device *dev, char *buf) +{ + struct vfio_spimdev *spimdev = vfio_spimdev_pdev_spimdev(dev); + + return sprintf(buf, "%d", + spimdev->ops->get_available_instances(spimdev)); +} +MDEV_TYPE_ATTR_RO_EXPORT(available_instances); + +static int vfio_spimdev_mdev_create(struct kobject *kobj, + struct mdev_device *mdev) +{ + struct device *dev = mdev_dev(mdev); + struct device *pdev = mdev_parent_dev(mdev); + struct spimdev_mdev_state *mdev_state; + struct vfio_spimdev *spimdev = mdev_spimdev(mdev); + + if (!spimdev->ops->get_queue) + return -ENODEV; + + mdev_state = devm_kzalloc(dev, sizeof(struct spimdev_mdev_state), + GFP_KERNEL); + if (!mdev_state) + return -ENOMEM; + mdev_set_drvdata(mdev, mdev_state); + mdev_state->spimdev = spimdev; + dev->iommu_fwspec = pdev->iommu_fwspec; + get_device(pdev); + __module_get(spimdev->owner); + + return 0; +} + +static int vfio_spimdev_mdev_remove(struct mdev_device *mdev) +{ + struct device *dev = mdev_dev(mdev); + struct device *pdev = mdev_parent_dev(mdev); + struct vfio_spimdev *spimdev = mdev_spimdev(mdev); + + put_device(pdev); + module_put(spimdev->owner); + dev->iommu_fwspec = NULL; + mdev_set_drvdata(mdev, NULL); + + return 0; +} + +/* Wake up the process who is waiting this queue */ +void vfio_spimdev_wake_up(struct vfio_spimdev_queue *q) +{ + wake_up(&q->wait); +} +EXPORT_SYMBOL_GPL(vfio_spimdev_wake_up); + +static int vfio_spimdev_q_file_open(struct inode *inode, struct file *file) +{ + return 0; +} + +static int vfio_spimdev_q_file_release(struct inode *inode, struct file *file) +{ + struct vfio_spimdev_queue *q = + (struct vfio_spimdev_queue *)file->private_data; + struct vfio_spimdev *spimdev = q->spimdev; + int ret; + + ret = spimdev->ops->put_queue(q); + if (ret) { + dev_err(spimdev->dev, "drv put queue fail (%d)!\n", ret); + return ret; + } + + put_device(mdev_dev(q->mdev)); + + return 0; +} + +static long vfio_spimdev_q_file_ioctl(struct file *file, unsigned int cmd, + unsigned long arg) +{ + struct vfio_spimdev_queue *q = + (struct vfio_spimdev_queue *)file->private_data; + struct vfio_spimdev *spimdev = q->spimdev; + + if (spimdev->ops->ioctl) + return spimdev->ops->ioctl(q, cmd, arg); + + dev_err(spimdev->dev, "ioctl cmd (%d) is not supported!\n", cmd); + + return -EINVAL; +} + +static int vfio_spimdev_q_file_mmap(struct file *file, + struct vm_area_struct *vma) +{ + struct vfio_spimdev_queue *q = + (struct vfio_spimdev_queue *)file->private_data; + struct vfio_spimdev *spimdev = q->spimdev; + + if (spimdev->ops->mmap) + return spimdev->ops->mmap(q, vma); + + dev_err(spimdev->dev, "no driver mmap!\n"); + return -EINVAL; +} + +static __poll_t vfio_spimdev_q_file_poll(struct file *file, poll_table *wait) +{ + struct vfio_spimdev_queue *q = + (struct vfio_spimdev_queue *)file->private_data; + struct vfio_spimdev *spimdev = q->spimdev; + + poll_wait(file, &q->wait, wait); + if (spimdev->ops->is_q_updated(q)) + return EPOLLIN | EPOLLRDNORM; + + return 0; +} + +static const struct file_operations spimdev_q_file_ops = { + .owner = THIS_MODULE, + .open = vfio_spimdev_q_file_open, + .unlocked_ioctl = vfio_spimdev_q_file_ioctl, + .release = vfio_spimdev_q_file_release, + .poll = vfio_spimdev_q_file_poll, + .mmap = vfio_spimdev_q_file_mmap, +}; + +static long vfio_spimdev_mdev_get_queue(struct mdev_device *mdev, + struct vfio_spimdev *spimdev, unsigned long arg) +{ + struct vfio_spimdev_queue *q; + int ret; + +#ifdef CONFIG_IOMMU_SVA + int pasid = arg; + + if (!vfio_spimdev_is_valid_pasid(pasid)) + return -EINVAL; +#endif + + if (!spimdev->ops->get_queue) + return -EINVAL; + + ret = spimdev->ops->get_queue(spimdev, arg, &q); + if (ret < 0) { + dev_err(spimdev->dev, "get_queue failed\n"); + return -ENODEV; + } + + ret = anon_inode_getfd("spimdev_q", &spimdev_q_file_ops, + q, O_CLOEXEC | O_RDWR); + if (ret < 0) { + dev_err(spimdev->dev, "getfd fail %d\n", ret); + goto err_with_queue; + } + + q->fd = ret; + q->spimdev = spimdev; + q->mdev = mdev; + q->container = arg; + init_waitqueue_head(&q->wait); + get_device(mdev_dev(mdev)); + + return ret; + +err_with_queue: + spimdev->ops->put_queue(q); + return ret; +} + +static long vfio_spimdev_mdev_ioctl(struct mdev_device *mdev, unsigned int cmd, + unsigned long arg) +{ + struct spimdev_mdev_state *mdev_state; + struct vfio_spimdev *spimdev; + + if (!mdev) + return -ENODEV; + + mdev_state = mdev_get_drvdata(mdev); + if (!mdev_state) + return -ENODEV; + + spimdev = mdev_state->spimdev; + if (!spimdev) + return -ENODEV; + + if (cmd == VFIO_SPIMDEV_CMD_GET_Q) + return vfio_spimdev_mdev_get_queue(mdev, spimdev, arg); + + dev_err(spimdev->dev, + "%s, ioctl cmd (0x%x) is not supported!\n", __func__, cmd); + return -EINVAL; +} + +static void vfio_spimdev_release(struct device *dev) { } +static void vfio_spimdev_mdev_release(struct mdev_device *mdev) { } +static int vfio_spimdev_mdev_open(struct mdev_device *mdev) { return 0; } + +/** + * vfio_spimdev_register - register a spimdev + * @spimdev: device structure + */ +int vfio_spimdev_register(struct vfio_spimdev *spimdev) +{ + int ret; + const char *drv_name; + + if (!spimdev->dev) + return -ENODEV; + + drv_name = dev_driver_string(spimdev->dev); + if (strstr(drv_name, "-")) { + pr_err("spimdev: parent driver name cannot include '-'!\n"); + return -EINVAL; + } + + spimdev->dev_id = idr_alloc(&spimdev_idr, spimdev, 0, 0, GFP_KERNEL); + if (spimdev->dev_id < 0) + return spimdev->dev_id; + + atomic_set(&spimdev->ref, 0); + spimdev->cls_dev.parent = spimdev->dev; + spimdev->cls_dev.class = spimdev_class; + spimdev->cls_dev.release = vfio_spimdev_release; + dev_set_name(&spimdev->cls_dev, "%s", dev_name(spimdev->dev)); + ret = device_register(&spimdev->cls_dev); + if (ret) + return ret; + + spimdev->mdev_fops.owner = spimdev->owner; + spimdev->mdev_fops.dev_attr_groups = vfio_spimdev_groups; + WARN_ON(!spimdev->mdev_fops.supported_type_groups); + spimdev->mdev_fops.create = vfio_spimdev_mdev_create; + spimdev->mdev_fops.remove = vfio_spimdev_mdev_remove; + spimdev->mdev_fops.ioctl = vfio_spimdev_mdev_ioctl; + spimdev->mdev_fops.open = vfio_spimdev_mdev_open; + spimdev->mdev_fops.release = vfio_spimdev_mdev_release; + + ret = mdev_register_device(spimdev->dev, &spimdev->mdev_fops); + if (ret) + device_unregister(&spimdev->cls_dev); + + return ret; +} +EXPORT_SYMBOL_GPL(vfio_spimdev_register); + +/** + * vfio_spimdev_unregister - unregisters a spimdev + * @spimdev: device to unregister + * + * Unregister a miscellaneous device that wat previously successully registered + * with vfio_spimdev_register(). + */ +void vfio_spimdev_unregister(struct vfio_spimdev *spimdev) +{ + mdev_unregister_device(spimdev->dev); + device_unregister(&spimdev->cls_dev); +} +EXPORT_SYMBOL_GPL(vfio_spimdev_unregister); + +static int __init vfio_spimdev_init(void) +{ + spimdev_class = class_create(THIS_MODULE, VFIO_SPIMDEV_CLASS_NAME); + return PTR_ERR_OR_ZERO(spimdev_class); +} + +static __exit void vfio_spimdev_exit(void) +{ + class_destroy(spimdev_class); + idr_destroy(&spimdev_idr); +} + +module_init(vfio_spimdev_init); +module_exit(vfio_spimdev_exit); + +MODULE_LICENSE("GPL"); +MODULE_AUTHOR("Hisilicon Tech. Co., Ltd."); +MODULE_DESCRIPTION("VFIO Share Parent's IOMMU Mediated Device"); diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c index 3e5b17710a4f..0ec38a17c98c 100644 --- a/drivers/vfio/vfio_iommu_type1.c +++ b/drivers/vfio/vfio_iommu_type1.c @@ -41,6 +41,7 @@ #include <linux/notifier.h> #include <linux/dma-iommu.h> #include <linux/irqdomain.h> +#include <linux/vfio_spimdev.h> #define DRIVER_VERSION "0.2" #define DRIVER_AUTHOR "Alex Williamson <alex.williamson@redhat.com>" @@ -89,6 +90,8 @@ struct vfio_dma { }; struct vfio_group { + /* iommu_group of mdev's parent device */ + struct iommu_group *parent_group; struct iommu_group *iommu_group; struct list_head next; }; @@ -1327,6 +1330,109 @@ static bool vfio_iommu_has_sw_msi(struct iommu_group *group, phys_addr_t *base) return ret; } +/* return 0 if the device is not spimdev. + * return 1 if the device is spimdev, the data will be updated with parent + * device's group. + * return -errno if other error. + */ +static int vfio_spimdev_type(struct device *dev, void *data) +{ + struct iommu_group **group = data; + struct iommu_group *pgroup; + int (*spimdev_mdev)(struct device *dev); + struct device *pdev; + int ret = 1; + + /* vfio_spimdev module is not configurated */ + spimdev_mdev = symbol_get(vfio_spimdev_is_spimdev); + if (!spimdev_mdev) + return 0; + + /* check if it belongs to vfio_spimdev device */ + if (!spimdev_mdev(dev)) { + ret = 0; + goto get_exit; + } + + pdev = dev->parent; + pgroup = iommu_group_get(pdev); + if (!pgroup) { + ret = -ENODEV; + goto get_exit; + } + + if (group) { + /* check if all parent devices is the same */ + if (*group && *group != pgroup) + ret = -ENODEV; + else + *group = pgroup; + } + + iommu_group_put(pgroup); + +get_exit: + symbol_put(vfio_spimdev_is_spimdev); + + return ret; +} + +/* return 0 or -errno */ +static int vfio_spimdev_bus(struct device *dev, void *data) +{ + struct bus_type **bus = data; + + if (!dev->bus) + return -ENODEV; + + /* ensure all devices has the same bus_type */ + if (*bus && *bus != dev->bus) + return -EINVAL; + + *bus = dev->bus; + return 0; +} + +/* return 0 means it is not spi group, 1 means it is, or -EXXX for error */ +static int vfio_iommu_type1_attach_spigroup(struct vfio_domain *domain, + struct vfio_group *group, + struct iommu_group *iommu_group) +{ + int ret; + struct bus_type *pbus = NULL; + struct iommu_group *pgroup = NULL; + + ret = iommu_group_for_each_dev(iommu_group, &pgroup, + vfio_spimdev_type); + if (ret < 0) + goto out; + else if (ret > 0) { + domain->domain = iommu_group_share_domain(pgroup); + if (IS_ERR(domain->domain)) + goto out; + ret = iommu_group_for_each_dev(pgroup, &pbus, + vfio_spimdev_bus); + if (ret < 0) + goto err_with_share_domain; + + if (pbus && iommu_capable(pbus, IOMMU_CAP_CACHE_COHERENCY)) + domain->prot |= IOMMU_CACHE; + + group->parent_group = pgroup; + INIT_LIST_HEAD(&domain->group_list); + list_add(&group->next, &domain->group_list); + + return 1; + } + + return 0; + +err_with_share_domain: + iommu_group_unshare_domain(pgroup); +out: + return ret; +} + static int vfio_iommu_type1_attach_group(void *iommu_data, struct iommu_group *iommu_group) { @@ -1335,8 +1441,8 @@ static int vfio_iommu_type1_attach_group(void *iommu_data, struct vfio_domain *domain, *d; struct bus_type *bus = NULL, *mdev_bus; int ret; - bool resv_msi, msi_remap; - phys_addr_t resv_msi_base; + bool resv_msi = false, msi_remap; + phys_addr_t resv_msi_base = 0; mutex_lock(&iommu->lock); @@ -1373,6 +1479,14 @@ static int vfio_iommu_type1_attach_group(void *iommu_data, if (mdev_bus) { if ((bus == mdev_bus) && !iommu_present(bus)) { symbol_put(mdev_bus_type); + + ret = vfio_iommu_type1_attach_spigroup(domain, group, + iommu_group); + if (ret < 0) + goto out_free; + else if (ret > 0) + goto replay_check; + if (!iommu->external_domain) { INIT_LIST_HEAD(&domain->group_list); iommu->external_domain = domain; @@ -1451,12 +1565,13 @@ static int vfio_iommu_type1_attach_group(void *iommu_data, vfio_test_domain_fgsp(domain); +replay_check: /* replay mappings on new domains */ ret = vfio_iommu_replay(iommu, domain); if (ret) goto out_detach; - if (resv_msi) { + if (!group->parent_group && resv_msi) { ret = iommu_get_msi_cookie(domain->domain, resv_msi_base); if (ret) goto out_detach; @@ -1471,7 +1586,10 @@ static int vfio_iommu_type1_attach_group(void *iommu_data, out_detach: iommu_detach_group(domain->domain, iommu_group); out_domain: - iommu_domain_free(domain->domain); + if (group->parent_group) + iommu_group_unshare_domain(group->parent_group); + else + iommu_domain_free(domain->domain); out_free: kfree(domain); kfree(group); @@ -1533,6 +1651,7 @@ static void vfio_iommu_type1_detach_group(void *iommu_data, struct vfio_iommu *iommu = iommu_data; struct vfio_domain *domain; struct vfio_group *group; + int ret; mutex_lock(&iommu->lock); @@ -1560,7 +1679,11 @@ static void vfio_iommu_type1_detach_group(void *iommu_data, if (!group) continue; - iommu_detach_group(domain->domain, iommu_group); + if (group->parent_group) + iommu_group_unshare_domain(group->parent_group); + else + iommu_detach_group(domain->domain, iommu_group); + list_del(&group->next); kfree(group); /* @@ -1577,7 +1700,8 @@ static void vfio_iommu_type1_detach_group(void *iommu_data, else vfio_iommu_unmap_unpin_reaccount(iommu); } - iommu_domain_free(domain->domain); + if (!ret) + iommu_domain_free(domain->domain); list_del(&domain->next); kfree(domain); } diff --git a/include/linux/vfio_spimdev.h b/include/linux/vfio_spimdev.h new file mode 100644 index 000000000000..f7e7d90013e1 --- /dev/null +++ b/include/linux/vfio_spimdev.h @@ -0,0 +1,95 @@ +/* SPDX-License-Identifier: GPL-2.0+ */ +#ifndef __VFIO_SPIMDEV_H +#define __VFIO_SPIMDEV_H + +#include <linux/device.h> +#include <linux/iommu.h> +#include <linux/mdev.h> +#include <linux/vfio.h> +#include <uapi/linux/vfio_spimdev.h> + +struct vfio_spimdev_queue; +struct vfio_spimdev; + +/** + * struct vfio_spimdev_ops - WD device operations + * @get_queue: get a queue from the device according to algorithm + * @put_queue: free a queue to the device + * @is_q_updated: check whether the task is finished + * @mask_notify: mask the task irq of queue + * @mmap: mmap addresses of queue to user space + * @reset: reset the WD device + * @reset_queue: reset the queue + * @ioctl: ioctl for user space users of the queue + * @get_available_instances: get numbers of the queue remained + */ +struct vfio_spimdev_ops { + int (*get_queue)(struct vfio_spimdev *spimdev, unsigned long arg, + struct vfio_spimdev_queue **q); + int (*put_queue)(struct vfio_spimdev_queue *q); + int (*is_q_updated)(struct vfio_spimdev_queue *q); + void (*mask_notify)(struct vfio_spimdev_queue *q, int event_mask); + int (*mmap)(struct vfio_spimdev_queue *q, struct vm_area_struct *vma); + int (*reset)(struct vfio_spimdev *spimdev); + int (*reset_queue)(struct vfio_spimdev_queue *q); + long (*ioctl)(struct vfio_spimdev_queue *q, unsigned int cmd, + unsigned long arg); + int (*get_available_instances)(struct vfio_spimdev *spimdev); +}; + +struct vfio_spimdev_queue { + struct mutex mutex; + struct vfio_spimdev *spimdev; + int qid; + __u32 flags; + void *priv; + wait_queue_head_t wait; + struct mdev_device *mdev; + int fd; + int container; +#ifdef CONFIG_IOMMU_SVA + int pasid; +#endif +}; + +struct vfio_spimdev { + const char *name; + int status; + atomic_t ref; + struct module *owner; + const struct vfio_spimdev_ops *ops; + struct device *dev; + struct device cls_dev; + bool is_vf; + u32 iommu_type; + u32 dma_flag; + u32 dev_id; + void *priv; + int flags; + const char *api_ver; + struct mdev_parent_ops mdev_fops; +}; + +int vfio_spimdev_register(struct vfio_spimdev *spimdev); +void vfio_spimdev_unregister(struct vfio_spimdev *spimdev); +void vfio_spimdev_wake_up(struct vfio_spimdev_queue *q); +int vfio_spimdev_is_spimdev(struct device *dev); +struct vfio_spimdev *vfio_spimdev_pdev_spimdev(struct device *dev); +int vfio_spimdev_pasid_pri_check(int pasid); +int vfio_spimdev_get(struct device *dev); +int vfio_spimdev_put(struct device *dev); +struct vfio_spimdev *mdev_spimdev(struct mdev_device *mdev); + +extern struct mdev_type_attribute mdev_type_attr_flags; +extern struct mdev_type_attribute mdev_type_attr_name; +extern struct mdev_type_attribute mdev_type_attr_device_api; +extern struct mdev_type_attribute mdev_type_attr_available_instances; +#define VFIO_SPIMDEV_DEFAULT_MDEV_TYPE_ATTRS \ + &mdev_type_attr_name.attr, \ + &mdev_type_attr_device_api.attr, \ + &mdev_type_attr_available_instances.attr, \ + &mdev_type_attr_flags.attr + +#define _VFIO_SPIMDEV_REGION(vm_pgoff) (vm_pgoff & 0xf) + +#endif diff --git a/include/uapi/linux/vfio_spimdev.h b/include/uapi/linux/vfio_spimdev.h new file mode 100644 index 000000000000..3435e5c345b4 --- /dev/null +++ b/include/uapi/linux/vfio_spimdev.h @@ -0,0 +1,28 @@ +/* SPDX-License-Identifier: GPL-2.0+ */ +#ifndef _UAPIVFIO_SPIMDEV_H +#define _UAPIVFIO_SPIMDEV_H + +#include <linux/ioctl.h> + +#define VFIO_SPIMDEV_CLASS_NAME "spimdev" + +/* Device ATTRs in parent dev SYSFS DIR */ +#define VFIO_SPIMDEV_PDEV_ATTRS_GRP_NAME "params" + +/* Parent device attributes */ +#define SPIMDEV_IOMMU_TYPE "iommu_type" +#define SPIMDEV_DMA_FLAG "dma_flag" + +/* Maximum length of algorithm name string */ +#define VFIO_SPIMDEV_ALG_NAME_SIZE 64 + +/* the bits used in SPIMDEV_DMA_FLAG attributes */ +#define VFIO_SPIMDEV_DMA_INVALID 0 +#define VFIO_SPIMDEV_DMA_SINGLE_PROC_MAP 1 +#define VFIO_SPIMDEV_DMA_MULTI_PROC_MAP 2 +#define VFIO_SPIMDEV_DMA_SVM 4 +#define VFIO_SPIMDEV_DMA_SVM_NO_FAULT 8 +#define VFIO_SPIMDEV_DMA_PHY 16 + +#define VFIO_SPIMDEV_CMD_GET_Q _IO('W', 1) +#endif