From: Lu Baolu <baolu.lu@linux.intel.com>
To: "Liu, Yi L" <yi.l.liu@intel.com>,
David Woodhouse <dwmw2@infradead.org>,
Joerg Roedel <joro@8bytes.org>
Cc: "Raj, Ashok" <ashok.raj@intel.com>,
"Kumar, Sanjay K" <sanjay.k.kumar@intel.com>,
"Pan, Jacob jun" <jacob.jun.pan@intel.com>,
"Tian, Kevin" <kevin.tian@intel.com>,
"Sun, Yi Y" <yi.y.sun@intel.com>,
"iommu@lists.linux-foundation.org"
<iommu@lists.linux-foundation.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
Jacob Pan <jacob.jun.pan@linux.intel.com>
Subject: Re: [PATCH 5/9] iommu/vt-d: Per domain pasid table interfaces
Date: Wed, 2 May 2018 11:08:27 +0800 [thread overview]
Message-ID: <5AE92BAB.3010705@linux.intel.com> (raw)
In-Reply-To: <A2975661238FB949B60364EF0F2C257439BE7516@SHSMSX104.ccr.corp.intel.com>
Hi Yi,
Thank you very much for reviewing my patches.
On 05/01/2018 05:22 PM, Liu, Yi L wrote:
>> From: Lu Baolu [mailto:baolu.lu@linux.intel.com]
>> Sent: Tuesday, April 17, 2018 11:03 AM
>>
>> This patch adds the interfaces for per domain pasid table
>> management. Currently we allocate one pasid table for all
>> devices under the scope of an IOMMU. It's insecure in the
>> cases where multiple devices under one single IOMMU unit
>> support PASID feature. With per domain pasid table, we can
>> achieve finer protection and isolation granularity.
>>
>> Cc: Ashok Raj <ashok.raj@intel.com>
>> Cc: Jacob Pan <jacob.jun.pan@linux.intel.com>
>> Cc: Kevin Tian <kevin.tian@intel.com>
>> Cc: Liu Yi L <yi.l.liu@intel.com>
>> Suggested-by: Ashok Raj <ashok.raj@intel.com>
>> Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
>> ---
>> drivers/iommu/intel-pasid.c | 75
>> +++++++++++++++++++++++++++++++++++++++++++++
>> drivers/iommu/intel-pasid.h | 4 +++
>> include/linux/intel-iommu.h | 5 +++
>> 3 files changed, 84 insertions(+)
>>
>> diff --git a/drivers/iommu/intel-pasid.c b/drivers/iommu/intel-pasid.c
>> index 0690f39..b8691a6 100644
>> --- a/drivers/iommu/intel-pasid.c
>> +++ b/drivers/iommu/intel-pasid.c
>> @@ -13,6 +13,7 @@
>> #include <linux/intel-iommu.h>
>> #include <linux/iommu.h>
>> #include <linux/memory.h>
>> +#include <linux/pci.h>
>> #include <linux/spinlock.h>
>>
>> #include "intel-pasid.h"
>> @@ -58,3 +59,77 @@ void *intel_pasid_lookup_id(int pasid)
>>
>> return p;
>> }
>> +
>> +/*
>> + * Interfaces for per domain pasid table management:
>> + */
>> +int intel_pasid_alloc_table(struct device *dev, size_t entry_size,
>> + size_t entry_count)
>> +{
>> + struct device_domain_info *info;
>> + struct dmar_domain *domain;
>> + struct page *pages;
>> + int order;
>> +
>> + info = dev->archdata.iommu;
>> + if (WARN_ON(!info || !dev_is_pci(dev) ||
>> + !info->pasid_supported ||
>> + !info->domain))
>> + return -EINVAL;
>> +
>> + domain = info->domain;
>> +
>> + if (entry_count > intel_pasid_max_id)
>> + entry_count = intel_pasid_max_id;
>> +
>> + order = get_order(entry_size * entry_count);
>> + pages = alloc_pages_node(domain->nid, GFP_KERNEL | __GFP_ZERO, order);
>> + if (!pages)
>> + return -ENOMEM;
>> +
>> + spin_lock(&pasid_lock);
>> + if (domain->pasid_table) {
> Can the check be moved prior to the page allocation?
I chose allocation and then assignment with lock to avoid
race and possible page allocation failure.
>
>> + __free_pages(pages, order);
>> + } else {
>> + domain->pasid_table = page_address(pages);
>> + domain->order = order;
>> + domain->max_pasid = entry_count;
>> + }
>> + domain->pasid_users++;
>> + spin_unlock(&pasid_lock);
>> +
>> + return 0;
>> +}
>> +
>> +void intel_pasid_free_table(struct device *dev)
>> +{
>> + struct dmar_domain *domain;
>> +
>> + domain = get_valid_domain_for_dev(dev);
>> + if (!domain || !dev_is_pci(dev))
>> + return;
>> +
>> + spin_lock(&pasid_lock);
>> + if (domain->pasid_table) {
>> + domain->pasid_users--;
>> + if (!domain->pasid_users) {
>> + free_pages((unsigned long)domain->pasid_table,
>> + domain->order);
>> + domain->pasid_table = NULL;
>> + domain->order = 0;
>> + domain->max_pasid = 0;
>> + }
>> + }
>> + spin_unlock(&pasid_lock);
>> +}
>> +
>> +void *intel_pasid_get_table(struct device *dev)
> Will intel_iommu_get_pasid_table() more accurate?
This function defines in intel-pasid.c. The name pattern for global
functions defined in this function is intel_pasid_xxx_xxxx().
>
> Regards,
> Yi Liu
>
Best regards,
Lu Baolu
next prev parent reply other threads:[~2018-05-02 3:08 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-04-17 3:03 [PATCH 0/9] iommu/vt-d: Improve PASID id and table management Lu Baolu
2018-04-17 3:03 ` [PATCH 1/9] iommu/vt-d: Global PASID name space Lu Baolu
2018-05-01 9:21 ` Liu, Yi L
2018-04-17 3:03 ` [PATCH 2/9] iommu/vt-d: Decouple idr bond pointer from svm Lu Baolu
2018-05-01 9:21 ` Liu, Yi L
2018-04-17 3:03 ` [PATCH 3/9] iommu/vt-d: Use global PASID for SVM usage Lu Baolu
2018-05-01 9:21 ` Liu, Yi L
2018-04-17 3:03 ` [PATCH 4/9] iommu/vt-d: Move device_domain_info to header Lu Baolu
2018-05-01 9:21 ` Liu, Yi L
2018-04-17 3:03 ` [PATCH 5/9] iommu/vt-d: Per domain pasid table interfaces Lu Baolu
2018-05-01 9:22 ` Liu, Yi L
2018-05-02 3:08 ` Lu Baolu [this message]
2018-04-17 3:03 ` [PATCH 6/9] iommu/vt-d: Allocate and free pasid table Lu Baolu
2018-05-01 9:22 ` Liu, Yi L
2018-05-02 3:09 ` Lu Baolu
2018-04-17 3:03 ` [PATCH 7/9] iommu/vt-d: Calculate PTS value Lu Baolu
2018-05-01 9:22 ` Liu, Yi L
2018-04-17 3:03 ` [PATCH 8/9] iommu/vt-d: Use per-domain pasid table Lu Baolu
2018-05-01 9:23 ` Liu, Yi L
2018-05-02 4:38 ` Lu Baolu
2018-04-17 3:03 ` [PATCH 9/9] iommu/vt-d: Clean up PASID talbe management for SVM Lu Baolu
2018-05-01 9:24 ` Liu, Yi L
2018-05-02 4:43 ` Lu Baolu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5AE92BAB.3010705@linux.intel.com \
--to=baolu.lu@linux.intel.com \
--cc=ashok.raj@intel.com \
--cc=dwmw2@infradead.org \
--cc=iommu@lists.linux-foundation.org \
--cc=jacob.jun.pan@intel.com \
--cc=jacob.jun.pan@linux.intel.com \
--cc=joro@8bytes.org \
--cc=kevin.tian@intel.com \
--cc=linux-kernel@vger.kernel.org \
--cc=sanjay.k.kumar@intel.com \
--cc=yi.l.liu@intel.com \
--cc=yi.y.sun@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox